Certified Ethical Hacker (CEH) Version 11 - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

Certified Ethical Hacker (CEH) Version 11

This 3 Course online cyber security ethical hacking program is the first step in becoming an ethical hacker. You will learn advanced hacking concepts how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

Included In This Course

Quickbooks Point of Sale (POS)
72 Hrs 58 Min
Videos
484 On-demand Videos
Closed Captions

Closed Captions

Course Topics
100  Topics
Question & Answers
100 Prep Questions
Certificate of Completion

Certificate of Completion

There is a newer version of this course available. Please see our Certified Ethical Hacker Certification Training V12 course

Learn to be an Ethical Hacker

This is an exciting cyber security training series teaching students hacking techniques and types of attacks to become an ethical hacker. This Extensive CEH v11 Instructional Series Includes 3 Individual online courses covering current security domains and is the path to achieving your ethical hacking certification:

  • Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
  • Instructor – Chrys Thorsen

What is an Ethical Hacker

Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hacking uses expertise to identify and fix vulnerabilities in systems, rather than exploit them for personal gain or to cause harm. This type of ethical hacking is typically done with the permission of the owner of the system being tested and is often done by cybersecurity professionals as a way to prevent malicious hackers, who are sometimes referred to as “black hat” hackers, from gaining access to a system.

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, all lessons and topics are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning for ethical hacking.

In this Ethical hacking Foundations course, students will learn network security and how networks, protocols, and networking devices work. They will gain in-depth understanding of the network security limits found in a traditional networks and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities, network security and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a cyber security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer or network security. They will examine the controls used to protect a company’s digital assets and what it takes to circumvent such controls.

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test covering cybersecurity domain
  • Certificate of Completion

Online Ethical Hacking Online Course Description:

Ethical Hacker is the second in a three-part comprehensive series on white-hat hacking. Students will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools for practical experience. The focus of this course is to solve the challenge of breaking into a computer system, collect evidence of success, and escape unnoticed. As before, every lesson and topic are infused with step-by-step guided practice using real hardware  and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

Students will learn to application hacking with Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks with this application attacks. They will crack passwords, intercept transmissions, use malware threats to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service their way to “pwning” a target*. Along with such venerable tools as nmap and netcat, students will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks and find app vulnerability. They will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.

* To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Includes

  • Copies of all slides used in course
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • Certificate of Completion

Online Course Description:

Advanced Ethical Hacker is the last in a three-part comprehensive series on white-hat hacking. In this course, students will take their penetrating skills to the next level, branching out into hacking web applications, websites, Wi-Fi, hacking mobile platforms, IoT/OT, hacking web servers,  and cloud computing. They will employ encryption, hijack sessions, evade firewalls and intrusion detection, and test honeypots.

Students will evaluate a wide array of concepts of hacking and exploits against web applications and develop a vulnerability analysis. These include website defacement, command/SQL/iFrame injection, man-in-the-browser parameter tampering, cross-site scripting, malicious attacks, request forgeries, and attacks against XXE, SOAP, and AJAX. Students will then learn how to deploy a Wi-Fi “pineapple”, performing Evil Twin, KARMA, and KR00K attacks on wireless clients. They will crack WPA2 and WPS while learning the secret vulnerabilities of WPA3. They will hack mobile devices, steal files from an iPhone, capture audio and video from an Android phone, hack Bluetooth, clone an RFID badge, crack an encrypted NFC card, and plant a Raspberry PI “back door” on a target network. They will then move on to more exotic targets such as the Internet of Things, Industrial Control/SCADA Systems, and cloud-based networks.

Why you should take this course:

This online course ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct attack techniques for successful ethical hacking campaign.

Intended audience:

This course is intended for IT professionals including:

  • Ethical hackers
  • System Administrators
  • Security Analyst
  • Security Consultant
  • Subject Matter Experts
  • Cloud Security Experts
  • Network Administrators
  • Engineers
  • Web managers
  • Auditors
  • Security Professionals
  • SOC Security

Course prerequisites:

Before taking this course:

  • You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required).
  • You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later.

Frequently Asked Questions About Certified Ethical Hacker (CEH) Version 11

What is the Certified Ethical Hacker (CEH) Version 11 course about?

The Certified Ethical Hacker (CEH) Version 11 course is an online cyber security ethical hacking program designed to teach students advanced hacking concepts. It provides instruction on how to select appropriate tools for a cybersecurity penetration test and understand why they work. This course features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

What is the cost of the Certified Ethical Hacker (CEH) Version 11 course?

The cost of the Certified Ethical Hacker (CEH) Version 11 course is see above pricing on page. Alternatively, you can get access to this training and over 2,500 hours of on-demand content with an All Access Monthly Subscription, with an affordable monthly payment per month after a 7-day free trial period​.

What does the Certified Ethical Hacker (CEH) Version 11 course include?

The Certified Ethical Hacker (CEH) Version 11 course includes 70 hours of training, 482 videos, 100 topics, and 100 practice questions.

Is there a newer version of this course available?

Yes, there is a newer version of this course available, which is the Certified Ethical Hacker Certification Training V12 course​.

What is ethical hacking?

Ethical hacking, also known as “white hat” hacking, is the practice of using computer skills to test and improve the security of a computer system or network. Ethical hacking uses expertise to identify and fix vulnerabilities in the system​.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro

  •    61.1 About This Course: Advanced Ethical Hacker
  •    61.2 About the Instructor

Module 62 - CEH v11 Session Hjacking

  •    62.1 Session Hijacking Concepts
  •    62.2 Token-based Authentication
  •    62.3 Compromising a Session Token
  •    62.4 XSS
  •    62.5 CSRF
  •    62.6 Other Attacks

Module 63 - CEH v11 Defending Against Hijacking

  •    63.1 Network Level Hijacking
  •    63.2 Session Hijacking Tools
  •    63.3 Session Hijacking Countermeasures
  •    63.4 Session Penetration Hijacking
  •    63.5 Review

Module 64 - CEH v11 Implementing Intrusion Detection

  •    64.1 IDS-IPS
  •    64.2 Snort
  •    64.3 Snort Rules
  •    64.4 Syslog

Module 65 - CEH v11 Testing Intrusion Detection

  •    65.1 WIPS
  •    65.2 IDS Considerations
  •    65.3 IDS Tools
  •    65.4 IDS Evasion
  •    65.5 IDS-Firewall Evasion Tools
  •    65.6 IDS Scenerios

Module 66 - CEH v11 Implementing Firewalls

  •    66.1 Firewalls
  •    66.2 Packet Filtering Rules
  •    66.3 Firewall Deployments
  •    66.4 Traffic Flow through Firewalls
  •    66.5 Split DNS

Module 67 - CEH v11 Testing Firewallls

  •    67.1 Firewall Tools
  •    67.2 Firewall Evasion
  •    67.3 Firewall Scenarios

Module 68 - CEH v11 Implementing Honeypots

  •    68.1 Honeypots
  •    68.2 Honeypot Detection
  •    68.3 IDS-Firewall Evasion Countermeasures
  •    68.4 IDS-Firewall Honeypot Penetration Testing
  •    68.5 Review

Module 69 - CEH v11 Attacker Webserver

  •    69.1 Webserver Security Overview
  •    69.2 Common Webservers
  •    69.3 Webserver Attacks
  •    69.4 Misconfiguration Attack Examples

Module 70 - CEH v11 Webserver Defense

  •    70.1 Webserver Attack Tools
  •    70.2 Attack Countermeasures
  •    70.3 Webserver Penetration Testing
  •    70.4 Review

Module 71 - CEH v11 Intro To Web Apps

  •    71.1 Web Application Concepts
  •    71.2 Attacking Web Apps

Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities

  •    72.1 A01 - Broken Access Control
  •    72.2 A02 - Cryptographic Failures
  •    72.3 A03 - Injection
  •    72.4 A04 - Insecure Design
  •    72.5 A05 - Security Misconfiguration

Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities

  •    73.1 A06 - Vulnerable and Outdated Components
  •    73.2 A07 - Identification and Authentication Failures
  •    73.3 A08 - Software and Data Integrity Failures
  •    73.4 A09 - Security Logging and Monitoring
  •    73.5 A10 - Server Side Request Forgery

Module 74 - CEH v11 Common Web App Attacks

  •    74.1 XSS Attacks
  •    74.2 CSRF
  •    74.3 Parameter Tampering
  •    74.4 Clickjacking
  •    74.5 SQL Injection

Module 75 - CEH v11 Unauthorized Access Through Web Apps

  •    75.1 Insecure Deserialization Attacks
  •    75.2 IDOR
  •    75.3 Directory Traversal
  •    75.4 Session Management Attacks
  •    75.5 Response Splitting

Module 76 - CEH v11 Web App Overflow Attacks

  •    76.1 Denial of Service
  •    76.2 Overflow Attacks
  •    76.3 XXE Attacks
  •    76.4 Soap Attacks
  •    76.5 Ajax Attacks

Module 77 - CEH v11 Defending Web Apps

  •    77.1 Web App Hacking Tools
  •    77.2 Web Hacking Countermeasures
  •    77.3 Web Application Penetration Testing
  •    77.4 Review

Module 78 - CEH v11 Intro To SQL Injection

  •    78.1 SQL Overview
  •    78.2 SQL Injection Concepts
  •    78.3 Basic SQL Injection

Module 79 - CEH v11 Performing SQL Injection

  •    79.1 Finding Vulnerable Websites
  •    79.2 Error-based SQL Injection
  •    79.3 Union SQL Injection
  •    79.4 Blind SQL Injection
  •    79.5 SQL Injection Scenarios
  •    79.6 Evading Detection

Module 80 - CEH v11 Defending Against SQL Injection

  •    80.1 SQL Injection Tools
  •    80.2 SQL Injection Countermeasures
  •    80.3 Safe Coding Examples
  •    80.4 SQL Wildcards
  •    80.5 SQL Injection Penetration Testing
  •    80.6 Review

Module 81 - CEH v11 Wireless Networking Overview

  •    81.1 Wireless Concepts
  •    81.2 Wireless Signal Encoding
  •    81.3 Wi-Fi Standards
  •    81.4 Wi-Fi Antennas
  •    81.5 Wireless Authentication

Module 82 - CEH v11 Wi-Fi Security

  •    82.1 Wi-Fi Security Standards
  •    82.2 Wireless Network Troubleshooting Tools
  •    82.3 Wi-Fi Discovery Tools
  •    82.4 Sniffing Wi-Fi

Module 83 - CEH v11 Hacking Wi-Fi

  •    83.1 Wi-Fi Attack Types
  •    83.2 Wi-Fi Rogue Access Point Attacks
  •    83.3 Wi-Fi Denial of Service Attacks
  •    83.4 Wi-Fi Password Cracking Attacks
  •    83.5 WEP Cracking

Module 84 - CEH v11 Advanced Wireless Attacks

  •    84.1 WPA-WPA2 Cracking
  •    84.2 WPA3 Attacks
  •    84.3 WPS Cracking
  •    84.4 Wi-Fi Attack Tools for Mobile Devices
  •    84.5 Bluetooth Hacking
  •    84.6 Other Wireless Hacking

Module 85 - CEH v11 Defending Wireless Networks

  •    85.1 Wireless Hacking Countermeasures
  •    85.2 Wireless Security Tools
  •    85.3 Wireless Penetration Testing
  •    85.4 Review

Module 86 - CEH v11 Mobile Platform Overview

  •    86.1 Mobile Platform Overview
  •    86.2 Mobile Device Vulnerabilities
  •    86.3 Mobile Device Attacks

Module 87 - CEH v11 Hacking Android

  •    87.1 Android
  •    87.2 Android Vulnerabilities
  •    87.3 Rooting Android
  •    87.4 Android Exploits
  •    87.5 Android Hacking Tools
  •    87.6 Reverse Engineering an Android App
  •    87.7 Securing Android

Module 88 - CEH v11 Hacking iOS

  •    88.1 iOS
  •    88.2 iOS Vulnerabilities
  •    88.3 Jailbreaking iOS
  •    88.4 iOS Exploits
  •    88.5 iOS Hacking Tools
  •    88.6 Securing iOS

Module 89 - CEH v11 Mobile Platform Defense

  •    89.1 Mobile Device Management
  •    89.2 BYOD
  •    89.3 Mobile Security Guidelines and Tools
  •    89.4 Mobile Device Penetration Testing
  •    89.5 Review

Module 90 - CEH v11 IoT Hacking

  •    90.1 loT Concepts
  •    90.2 loT Infrastructure
  •    90.3 Fog Computing
  •    90.4 loT Vulnerabilities
  •    90.5 loT Threats

Module 91 - CEH v11 IoT Defense

  •    91.1 IoT Hacking Methodologies and Tools
  •    91.2 IoT Hacking Methodolgies and Tools Part 2
  •    91.3 Hacking Countermeasures
  •    91.4 IoT Penetration Testing
  •    91.5 OT Concepts
  •    91.6 Industrial IoT

Module 92 - CEH v11 Operational Technology Overview

  •    92.1 IT-OT Convergence
  •    92.2 ICS
  •    92.3 SCADA
  •    92.4 DCS
  •    92.5 RTU
  •    92.6 PLC
  •    92.7 Addition OT Components

Module 93 - CEH v11 Hacking OT

  •    93.1 OT Variables
  •    93.2 Well-known OT attacks
  •    93.3 OT Attack Methodology and Basic Tools
  •    93.4 OT Reconnaissance
  •    93.5 OT Penetration and Control

Module 94 - CEH v11 Defending OT

  •    94.1 OT Attack Tools
  •    94.2 OT Hacking Countermeasures
  •    94.3 OT Penetration Testing
  •    94.4 Review

Module 95 - CEH v11 Attacking The Cloud

  •    95.1 Cloud Computing Concepts
  •    95.2 Virtualization
  •    95.3 Cloud Types
  •    95.4 Cloud Benefits and Considerations
  •    95.5 Cloud Risks and Vulnerablilities

Module 96 - CEH v11 Cloud Defense

  •    96.1 Cloud Threats and Countermeasures
  •    96.2 Cloud Security Tools
  •    96.3 Cloud Security Best Practices
  •    96.4 Cloud Penetration Testing
  •    96.5 Review

Module 97 - CEH v11 Cryptography Overview

  •    97.1 Cryptography Concepts
  •    97.2 Symetric Encryption
  •    97.3 Asymmetric Encryption
  •    97.4 Public Key Exchange
  •    97.5 PKI

Module 98 - CEH v11 Protecting Data With Crytography

  •    98.1 Digital Certificates
  •    98.2 Digital Signatures
  •    98.3 Hashing
  •    98.4 Email Encryption
  •    98.5 Network Communication Encryption

Module 99 - CEH v11 Protecting Data at Home and in Transit

  •    99.1 Disk Encryption
  •    99.2 VPN Encryption
  •    99.3 Cryptography Tools

Module 100 - CEH v11 Pentesting Cryptography

  •    100.1 Cryptography Attacks
  •    100.2 Cryptography Penetration Testing
  •    100.3 Review
  •    100.4 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content

Module 21 - CEH v11 Ethical Hacker Course Intro

  •    21.1 About this course - Ethical Hacker
  •    21.2 About the Instructor

Module 22 - CEH v11 Intro to Footprinting

  •    22.1 Footprinting Concepts
  •    22.2 Footprinting Methodology
  •    22.3 OSINT Tools
  •    22.4 Advanced Google Search
  •    22.5 Whois Footprinting
  •    22.6 Activity - Performing a Whois Lookup

Module 23 - CEH v11 Footprinting Network Services

  •    23.1 DNS Footprinting
  •    23.2 Website Footprinting
  •    23.3 Email Footprinting
  •    23.4 Network Footprinting
  •    23.5 Footprinting through Social Networking Sites

Module 24 - CEH v11 Defend Against Footprinting

  •    24.1 Competitive Intelligence Gathering
  •    24.2 Footprinting Countermeasures
  •    24.3 Footprinting Penetration Testing
  •    24.4 Review

Module 25 - CEH v11 Intro to Scanning

  •    25.1 Scanning Concepts
  •    25.2 ICMP Discovery Scans
  •    25.3 Other Discovery Scans

Module 26 - CEH v11 Port Scanning

  •    26.1 Ports
  •    26.2 TCP Flags and Handshakes
  •    26.3 TCP Scan Types
  •    26.4 Other Scanning Techniques

Module 27 - CEH v11 Vulnerability Scanning

  •    27.1 Banner Grabbing
  •    27.2 Vulnerability Scanning
  •    27.3 SSDP Scanning

Module 28 - CEH v11 NMAP

  •    28.1 Nmap
  •    28.2 Common Nmap Scans
  •    28.3 Nmap Options
  •    28.4 Nmap Stealth Scans
  •    28.5 Hping and Other Scanners

Module 29 - CEH v11 Firewalls and Intrusion Detection

  •    29.1 Firewall Types
  •    29.2 Firewall Features
  •    29.3 Firewall Features Part 2
  •    29.4 Firewall Configurations
  •    29.5 Intrusion Detection and Prevention

Module 30 - CEH v11 Evading Detection

  •    30.1 Firewall and IDS Evasion
  •    30.2 Firewall and IDS Evasion Part 2
  •    30.3 Firewalking
  •    30.4 Probing a Firewall
  •    30.5 Probing a Firewall Part 2

Module 31 - CEH v11 Proxies and VPNs

  •    31.1 Proxies
  •    31.2 VPNs
  •    31.3 Tor
  •    31.4 Scanning Countermeasures
  •    31.5 Scanning Penetration Testing
  •    31.6 Review

Module 32 - CEH v11 Accessing Vulnerability

  •    32.1 Vulnerability Assessment Overview
  •    32.2 Vulnerability Scoring Systems
  •    32.3 Vulnerability Assessment Tools

Module 33 - CEH v11 Vulnerability Research

  •    33.1 Scanner Output and Reports
  •    33.2 Vulnerability Research
  •    33.3 Review

Module 34 - CEH v11 Intro to Enumeration

  •    34.1 Enumeration Concepts
  •    34.2 Enumeration Techniques and Tools
  •    34.3 Service and Application Enumeration
  •    34.4 SMB and NetBIOS Enumeration

Module 35 - CEH v11 Service Enumeration

  •    35.1 SNMP Enumeration
  •    35.2 LDAP Enumeration
  •    35.3 DNS Enumeration
  •    35.4 SMTP Enumeration
  •    35.5 NTP Enumeration

Module 36 - CEH v11 Advanced Enumeration

  •    36.1 Remote Connection Enumeration
  •    36.2 File Transfer Enumeration
  •    36.3 VoIP Enumeration
  •    36.4 IPSEC Enumeration
  •    36.5 IPv6 Enumeration
  •    36.6 BGP Enumeration

Module 37 - CEH v11 Command Line Enumeration

  •    37.1 Windows Command Line Enumeration
  •    37.2 Linux Command Line Enumeration
  •    37.3 Linux Command Line Enumeration Part 2

Module 38 - CEH v11 Defending Against Enumeration

  •    38.1 Enumeration Countermeasures
  •    38.2 Enumeration Countermeasures Part 2
  •    38.3 Enumeration Penetration Testing
  •    38.4 Review

Module 39 - CEH v11 Intro to System Hacking

  •    39.1 System Hacking Concepts
  •    39.2 System Hacking Tools and Frameworks
  •    39.3 Searchsploit
  •    39.4 Compiling and Running Exploits

Module 40 - CEH v11 System Hacking with Metasploit

  •    40.1 Metasploit
  •    40.2 Metasploit Search
  •    40.3 Metasploit Exploits and Payloads
  •    40.4 Metasploit Meterpreter
  •    40.5 Metasploit Connectivity
  •    40.6 Metasploit Impersonation and Migration

Module 41 - CEH v11 Further Attacking a Compromised System

  •    41.1 Netcat
  •    41.2 Pivoting
  •    41.3 Netcat Relays
  •    41.4 Metasploit Post Exploitation Modules
  •    41.5 Common Operating System Exploits

Module 42 - CEH v11 Hacking an Operating System

  •    42.1 Hacking Windows
  •    42.2 Hacking Linux
  •    42.3 Network Service Exploits
  •    42.4 Password Attacks

Module 43 - CEH v11 Password Cracking Overview

  •    43.1 Dictionary Attack
  •    43.2 Brute Force Attack
  •    43.3 Password Spraying
  •    43.4 Rainbow Tables

Module 44 - CEH v11 Performing Password Attacks

  •    44.1 Network Service Password Attacks
  •    44.2 Password Cracking Tools
  •    44.3 Online Password Cracking Sites
  •    44.4 Windows Password Cracking
  •    44.5 Linux Password Cracking
  •    44.6 Other Methods for Obtaining Passwords

Module 45 - CEH v11 Using Exploits

  •    45.1 Keylogging
  •    45.2 Spyware
  •    45.3 Rootkits
  •    45.4 Buffer Overflows
  •    45.5 Privilege Escalation
  •    45.6 Hiding Files

Module 46 - CEH v11 Hiding Information

  •    46.1 Alternate Data Streams
  •    46.2 Steganography
  •    46.3 Creating and Maintaining Remote Access
  •    46.4 Hiding Evidence

Module 47 - CEH v11 Covering Tracks

  •    47.1 Covering Tracks in Windows
  •    47.2 Covering Tracks in Linux
  •    47.3 System Hacking Counter-Measures
  •    47.4 System Hacking Penetration Testing
  •    47.5 Review

Module 48 - CEH v11 Malware Overview

  •    48.1 Intro to Malware
  •    48.2 Virus Overview
  •    48.3 Virus Types
  •    48.4 Self-Hiding Viruses
  •    48.5 Worms
  •    48.6 Trojans
  •    48.7 Trojan Types
  •    48.8 RATS

Module 49 - CEH v11 Hacking With Malware

  •    49.1 Ransomware
  •    49.2 Botnets
  •    49.3 Covert Channel Trojans
  •    49.4 Banking Trojans
  •    49.5 Rootkits

Module 50 - CEH v11 Creating Malware

  •    50.1 Other Malware
  •    50.2 Malware Makers
  •    50.3 Dropper and Stage Creation
  •    50.4 Exploit Kits

Module 51 - CEH v11 Detecting Malware

  •    51.1 Malware Detection
  •    51.2 Malware Detection Part 2
  •    51.3 Malware Analysis

Module 52 - CEH v11 Defending Against Malware

  •    52.1 Malware Reverse Engineering
  •    52.2 Malware Countermeasures
  •    52.3 Malware Penetration Testing
  •    52.4 Review

Module 53 - CEH v11 Sniffing

  •    53.1 Sniffing Concepts
  •    53.2 Types of Sniffing
  •    53.3 Sniffing Protocols
  •    53.4 Sniffing Tools

Module 54 - CEH v11 Spoofing and MITM

  •    54.1 ARP
  •    54.2 ARP Spoofing
  •    54.3 MITM
  •    54.4 MAC Attacks
  •    54.5 MAC Spoofing
  •    54.6 DHCP Attacks

Module 55 - CEH v11 Defending Against Poisoning and Sniffing

  •    55.1 Name Resolution Poisoning
  •    55.2 VLAN Hopping
  •    55.3 Sniffing Counter Measures
  •    55.4 Sniffing Penetration Testing
  •    55.5 Review

Module 56 - CEH v11 Social Engineering

  •    56.1 Social Engineering Concepts
  •    56.2 Social Engineering Techniques
  •    56.3 Social Engineering Examples
  •    56.4 Social Engineering Tools

Module 57 - CEH v11 Defending Against Social Engineering

  •    57.1 Social Media
  •    57.2 Identity Theft
  •    57.3 Insider Threats
  •    57.4 Social Engineering Countermeasures
  •    57.5 Social Engineering Penetration Testing
  •    57.6 Review

Module 58 - CEH v11 Denial-of-Service

  •    58.1 DoS-DDoS Concepts
  •    58.2 Volumetric Attacks
  •    58.3 Fragmentation Attacks
  •    58.4 State Exhaustion Attacks
  •    58.5 Application Layer Attacks

Module 59 - CEH v11 Advanced DoS Attacks

  •    59.1 Protocol Attacks
  •    59.2 Other Attacks
  •    59.3 Botnets

Module 60 - CEH v11 Defending Against Denial-of-Service

  •    60.1 DoS-DDoS Attack Tools
  •    60.2 DoS-DDoS Countermeasures
  •    60.3 Dos Penetration Testing
  •    60.4 Review

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content

Module 1 - CEH v11 Foundations Course Introduction

  •    1.1 About this course: CEH Foundations
  •    1.2 About the Instructor

Module 2 - CEH v11 Introduction To Networking

  •    2.1 Networking Overview
  •    2.2 Network Scope
  •    2.3 Network Addressing
  •    2.4 Activity - Examining Network Addressing

Module 3 - CEH v11 Lan Components

  •    3.1 Protocols, Ports, Sockets
  •    3.2 Network Topologies
  •    3.3 LAN Devices
  •    3.4 LAN Devices Part 2
  •    3.5 VLANs
  •    3.6 Activity - Examining Ports and Sockets
  •    3.7 Activity - Examining Switches and VLANs

Module 4 - CEH v11 Routing and Network Access

  •    4.1 Routers
  •    4.2 Layer 3 Switches
  •    4.3 Modems and Remote Access
  •    4.4 Firewalls and Proxies
  •    4.5 Activity - Examining Routing
  •    4.6 Activity - Examining VLAN Routing
  •    4.7 Activity - Examining Firewall Rules

Module 5 - CEH v11 Intrusion Detection and Network Layers

  •    5.1 IDS and IPS
  •    5.2 OSI Model
  •    5.3 TCP-IP
  •    5.4 Activity - Examining Network Layers

Module 6 - CEH v11 Networking Protocols and Addressing

  •    6.1 Layer 4 Protocols
  •    6.2 Layer 3 Protocols
  •    6.3 Layer 2 Protocols
  •    6.4 IP Addressing
  •    6.5 Subnetting
  •    6.6 DHCP
  •    6.7 Activity - Examining TCP
  •    6.8 Activity - Examining UDP
  •    6.9 Activity - Examining IP
  •    6.10 Activity - Examining ICMP
  •    6.11 Activity - Examining ARP

Module 7 - CEH v11 Network Services

  •    7.1 DNS
  •    7.2 DNS Records
  •    7.3 NTP
  •    7.4 Authentication
  •    7.5 Biometrics
  •    7.6 Activity - Examining DNS
  •    7.7 Activity - Examining DNS Records

Module 8 - CEH v11 Access Control

  •    8.1 Local Authentication
  •    8.2 Directory Service Authentication
  •    8.3 Extending Authentication
  •    8.4 Authorization
  •    8.5 Activity - Testing Access Control

Module 9 - CEH v11 Intro to Linux

  •    9.1 Linux Overview
  •    9.2 Linux File System
  •    9.3 Linux Core Commands
  •    9.4 Linux Search and Read Commands
  •    9.5 Activity - Exploring Linux
  •    9.6 Activity - Using Linux Core Commands
  •    9.7 Activity - Using Linux Search Commands
  •    9.8 Activity - Using Linux Read Commands

Module 10 - CEH v11 Configuring Linux

  •    10.1 Linux File Permissions
  •    10.2 Linux Special Permissions
  •    10.3 Linux Configuration
  •    10.4 Linux Packages
  •    10.5 Linux User Management

Module 11 - CEH v11 Practicing Linux Configuration

  •    11.1 Activity - Setting Linux Permissions
  •    11.2 Activity - Setting Linux Special Permissions
  •    11.3 Activity - Managing Packages in Kali Linux
  •    11.4 Activity - Managing Users and Groups in Linux

Module 12 - CEH v11 Managing Linux

  •    12.1 Linux Job Scheduling
  •    12.2 Linux File, Directory, and Download Commands
  •    12.3 Linux System Commands
  •    12.4 Linux Network Management
  •    12.5 Linux Firewall

Module 13 - CEH v11 Practicing Linux Management

  •    13.1 Activity - Scheduling Tasks in Linux
  •    13.2 Activity - Using Linux File, Directory, and Download Commands
  •    13.3 Activity - Using Linux Edit and Archive Commands
  •    13.4 Activity - Compiling Malicious Code
  •    13.5 Activity - Using Linux Process and System Commands
  •    13.6 Activity - Using Linux Disk, Hardware, and Network Commands

Module 14 - CEH v11 Intro to Windows

  •    14.1 Windows Overview
  •    14.2 Windows Registry
  •    14.3 Windows Security

Module 15 - CEH v11 Windows Commands

  •    15.1 Windows Commands
  •    15.2 Windows Admin Commands
  •    15.3 Windows Network Commands
  •    15.4 Windows Run Line Commands
  •    15.5 Windows PowerShell

Module 16 - CEH v11 Practicing Windows Commands

  •    16.1 Activity - Using Windows Built-in Commands
  •    16.2 Activity - Using Windows Task Commands
  •    16.3 Activity - Using Windows Admin Commands
  •    16.4 Activity - Using Windows Network Commands
  •    16.5 Activity - Using Windows PowerShell
  •    16.6 Networking and OS Penetration Testing
  •    16.7 Review

Module 17 - CEH v11 Intro to Hacking

  •    17.1 Information Security Overview
  •    17.2 Hacking Concepts
  •    17.3 Ethical Hacking Concepts
  •    17.4 Penetration Testing
  •    17.5 Penetration Testing Part 2
  •    17.6 Activity - Performing a Static Code Review

Module 18 - CEH v11 Information Security

  •    18.1 Cyber Kill Chain Concepts
  •    18.2 Activity - Performing Weaponization
  •    18.3 Information Security
  •    18.4 Security Policies
  •    18.5 Security Controls
  •    18.6 Access Control

Module 19 - CEH v11 Protecting Data

  •    19.1 Data Protection
  •    19.2 Backup Sites
  •    19.3 Vulnerability Management
  •    19.4 SIEM
  •    19.5 Risks

Module 20 - CEH v11 Managing Risk

  •    20.1 Risk Management
  •    20.2 Incident Handling
  •    20.3 Information Security Laws and Standards
  •    20.4 Activity - Assessing Risk
  •    20.5 Ethical Hacking Penetration Testing
  •    20.6 Review
  •    20.7 Conclusion
Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
5 star
82
82%
4 star
17
17%
3 star
1
1%
2 star
0%
1 star
0%
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructor

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.

When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.

Chrys lives by, and is fond of repeating, her professional creed:

“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”

Certified Ethical Hacker V11

Subscribe To All-Access
Lock In $16.99 / Month Forever

Access this course and over 2,700 hours of focused IT training. Start your first month for only $1.00.  Then lock in only $16.99 / month for life.

$49.99 $16.99 Monthly

OR

Original price was: $79.00.Current price is: $47.40.

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass