Course Overview

This course is the first step in becoming an ethical hacker. You will learn how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

cybersecurity auditor 300x200 1

Course objectives

This Extensive CEH v11 Instructional Series Includes 3 Individual Courses:

  • Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
  • Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)Instructor – Chrys Thorsen
0
Course Videos
0
Test Questions
0
E-BOOKS
0
Duration

Modules

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)

Module 1: CEH v11 Foundations Course Introduction

  • 1.1 About this course: CEH Foundations
  • 1.2 About the Instructor

Module 2: CEH v11 Introduction To Networking

  • 2.1 Networking Overview
  • 2.2 Network Scope
  • 2.3 Network Addressing
  • 2.4 Activity – Examining Network Addressing

Module 3: CEH v11 Lan Components

  • 3.1 Protocols, Ports, Sockets
  • 3.2 Network Topologies
  • 3.3 LAN Devices
  • 3.4 LAN Devices Part 2
  • 3.5 VLANs
  • 3.6 Activity – Examining Ports and Sockets
  • 3.7 Activity – Examining Switches and VLANs

Module 4: CEH v11 Routing and Network Access

  • 4.1 Routers
  • 4.2 Layer 3 Switches
  • 4.3 Modems and Remote Access
  • 4.4 Firewalls and Proxies
  • 4.5 Activity – Examining Routing
  • 4.6 Activity – Examining VLAN Routing
  • 4.7 Activity – Examining Firewall Rules

Module 5: CEH v11 Intrusion Detection and Network Layers

  • 5.1 IDS and IPS
  • 5.2 OSI Model
  • 5.3 TCP-IP
  • 5.4 Activity – Examining Network Layers

Module 6: CEH v11 Networking Protocols and Addressing

  • 6.1 Layer 4 Protocols
  • 6.2 Layer 3 Protocols
  • 6.3 Layer 2 Protocols
  • 6.4 IP Addressing
  • 6.5 Subnetting
  • 6.6 DHCP
  • 6.7 Activity – Examining TCP
  • 6.8 Activity – Examining UDP
  • 6.9 Activity – Examining IP
  • 6.10 Activity – Examining ICMP
  • 6.11 Activity – Examining ARP

Module 7: CEH v11 Network Services

  • 7.1 DNS
  • 7.2 DNS Records
  • 7.3 NTP
  • 7.4 Authentication
  • 7.5 Biometrics
  • 7.6 Activity – Examining DNS
  • 7.7 Activity – Examining DNS Records

Module 8: CEH v11 Access Control

  • 8.1 Local Authentication
  • 8.2 Directory Service Authentication
  • 8.3 Extending Authentication
  • 8.4 Authorization
  • 8.5 Activity – Testing Access Control

Module 9: CEH v11 Intro to Linux

  • 9.1 Linux Overview
  • 9.2 Linux File System
  • 9.3 Linux Core Commands
  • 9.4 Linux Search and Read Commands
  • 9.5 Activity – Exploring Linux
  • 9.6 Activity – Using Linux Core Commands
  • 9.7 Activity – Using Linux Search Commands
  • 9.8 Activity – Using Linux Read Commands

Module 10: CEH v11 Configuring Linux

  • 10.1 Linux File Permissions
  • 10.2 Linux Special Permissions
  • 10.3 Linux Configuration
  • 10.4 Linux Packages
  • 10.5 Linux User Management

Module 11: CEH v11 Practicing Linux Configuration

  • 11.1 Activity – Setting Linux Permissions
  • 11.2 Activity – Setting Linux Special Permissions
  • 11.3 Activity – Managing Packages in Kali Linux
  • 11.4 Activity – Managing Users and Groups in Linux

Module 12: CEH v11 Managing Linux

  • 12.1 Linux Job Scheduling
  • 12.2 Linux File, Directory, and Download Commands
  • 12.3 Linux System Commands
  • 12.4 Linux Network Management
  • 12.5 Linux Firewall

Module 13:  CEH v11 Practicing Linux Management

  • 13.1 Activity – Scheduling Tasks in Linux
  • 13.2 Activity – Using Linux File, Directory, and Download Commands
  • 13.3 Activity – Compiling Malicious Code
  • 13.4 Activity – Using Linux Process and System Commands
  • 13.5 Activity – Using Linux Disk Management and Hardware Commands
  • 13.6 Activity – Using Linux Networking Commands

Module 14: CEH v11 Intro to Windows

  • 14.1 Windows Overview
  • 14.2 Windows Registry
  • 4.3 Windows Security

Module 15: CEH v11 Windows Commands

  • 15.1 Windows Commands
  • 15.2 Windows Admin Commands
  • 15.3 Windows Network Commands
  • 15.4 Windows Run Line Commands
  • 15.5 Windows PowerShell

Module 16: CEH v11 Practicing Windows Commands

  • 16.1 Activity – Using Windows Built-in Commands
  • 16.2 Activity – Using Windows Task Commands
  • 16.3 Activity – Using Windows Admin Commands
  • 16.4 Activity – Using Windows Network Commands
  • 16.5 Activity – Using Windows PowerShell
  • 16.6 Networking and OS Penetration Testing
  • 16.7 Review

Module 17: CEH v11 Intro to Hacking

  • 17.1 Information Security Overview
  • 17.2 Hacking Concepts
  • 17.3 Ethical Hacking Concepts
  • 17.4 Penetration Testing
  • 17.5 Penetration Testing Part 2
  • 17.6 Activity – Performing a Static Code Review

Module 18: CEH v11 Information Security

  • 18.1 Cyber Kill Chain Concepts
  • 18.2 Activity – Performing Weaponization
  • 18.3 Information Security
  • 18.4 Security Policies
  • 18.5 Security Controls
  • 18.6 Access Control

Module 19: CEH v11 Protecting Data

  • 19.1 Data Protection
  • 19.2 Backup Sites
  • 19.3 Vulnerability Management
  • 19.4 SIEM
  • 19.5 Risks

Module 20: CEH v11 Managing Risk

  • 20.1 Risk Management
  • 20.2 Incident Handling
  • 20.3 Information Security Laws and Standards
  • 20.4 Activity – Assessing Risk
  • 20.5 Ethical Hacking Penetration Testing
  • 20.6 Review
  • 20.7 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)

Module 21: CEH v11 Ethical Hacker Course Intro

  • 21.1 About this course – Ethical Hacker
  • 21.2 About the Instructor

Module 22: CEH v11 Intro to Footprinting

  • 22.1 Footprinting Concepts
  • 22.2 Footprinting Methodology
  • 22.3 OSINT Tools
  • 22.4 Advanced Google Search
  • 22.5 Whois Footprinting
  • 22.6 Activity – Performing a Whois Lookup

Module 23: CEH v11 Footprinting Network Services

  • 23.1 DNS Footprinting
  • 23.2 Website Footprinting
  • 23.3 Email Footprinting
  • 23.4 Network Footprinting
  • 23.5 Footprinting through Social Networking Sites

Module 24: CEH v11 Defend Against Footprinting

  • 24.1 Competitive Intelligence Gathering
  • 24.2 Footprinting Countermeasures
  • 24.3 Footprinting Penetration Testing
  • 24.4 Review

Module 25: CEH v11 Intro to Scanning

  • 25.1 Scanning Concepts
  • 25.2 ICMP Discovery Scans
  • 25.3 Other Discovery Scans

Module 26: CEH v11 Port Scanning

  • 26.1 Ports
  • 26.2 TCP Flags and Handshakes
  • 26.3 TCP Scan Types
  • 26.4 Other Scanning Techniques

Module 27: CEH v11 Vulnerability Scanning

  • 27.1 Banner Grabbing
  • 27.2 Vulnerability Scanning
  • 27.3 SSDP Scanning

Module 28: CEH v11 NMAP

  • 28.1 Nmap
  • 28.2 Common Nmap Scans
  • 28.3 Nmap Options
  • 28.4 Nmap Stealth Scans
  • 28.5 Hping and Other Scanners

Module 29: CEH v11 Firewalls and Intrusion Detection

  • 29.1 Firewall Types
  • 29.2 Firewall Features
  • 29.3 Firewall Features Part 2
  • 29.4 Firewall Configurations
  • 29.5 Intrusion Detection and Prevention

Module 30: CEH v11 Evading Detection

  • 30.1 Firewall and IDS Evasion
  • 30.2 Firewall and IDS Evasion Part 2
  • 30.3 Firewalking
  • 30.4 Probing a Firewall
  • 30.5 Probing a Firewall Part 2

Module 31:  CEH v11 Proxies and VPNs

  • 31.1 Proxies
  • 31.2 VPNs
  • 31.3 Tor
  • 31.4 Scanning Countermeasures
  • 31.5 Scanning Penetration Testing
  • 31.6 Review

Module 32: CEH v11 Accessing Vulnerability

  • 32.1 Vulnerability Assessment Overview
  • 32.2 Vulnerability Scoring Systems
  • 32.3 Vulnerability Assessment Tools

Module 33: CEH v11 Vulnerability Research

  • 33.1 Scanner Output and Reports
  • 33.2 Vulnerability Research
  • 33.3 Review

Module 34: CEH v11 Intro to Enumeration

  • 34.1 Enumeration Concepts
  • 34.2 Enumeration Techniques and Tools
  • 34.3 Service and Application Enumeration
  • 34.4 SMB and NetBIOS Enumeration

Module 35: CEH v11 Service Enumeration

  • 35.1 SNMP Enumeration
  • 35.2 LDAP Enumeration
  • 35.3 DNS Enumeration
  • 35.4 SMTP Enumeration
  • 35.5 NTP Enumeration

Module 36: CEH v11 Advanced Enumeration

  • 36.1 Remote Connection Enumeration
  • 36.2 File Transfer Enumeration
  • 36.3 VoIP Enumeration
  • 36.4 IPSEC Enumeration
  • 36.5 IPv6 Enumeration
  • 36.6 BGP Enumeration

Module 37: CEH v11 Command Line Enumeration

  • 37.1 Windows Command Line Enumeration
  • 37.2 Linux Command Line Enumeration
  • 37.3 Linux Command Line Enumeration Part 2

Module 38: CEH v11 Defending Against Enumeration

  • 38.1 Enumeration Countermeasures
  • 38.2 Enumeration Countermeasures Part 2
  • 38.3 Enumeration Penetration Testing
  • 38.4 Review

Module 39: CEH v11 Intro to System Hacking

  • 39.1 System Hacking Concepts
  • 39.2 System Hacking Tools and Frameworks
  • 39.3 Searchsploit
  • 39.4 Compiling and Running Exploits

Module 40: CEH v11 System Hacking with Metasploit

  • 40.1 Metasploit
  • 40.2 Metasploit Search
  • 40.3 Metasploit Exploits and Payloads
  • 40.4 Metasploit Meterpreter
  • 40.5 Metasploit Connectivity
  • 40.6 Metasploit Impersonation and Migration

Module 41 : CEH v11 Further Attacking a Compromised System

  • 41.1 Netcat
  • 41.2 Pivoting
  • 41.3 Netcat Relays
  • 41.4 Metasploit Post Exploitation Modules
  • 41.5 Common Operating System Exploits

Module 42 : CEH v11 Hacking an Operating System

  • 42.1 Hacking Windows
  • 42.2 Hacking Linux
  • 42.3 Network Service Exploits
  • 42.4 Password Attacks

Module 43: CEH v11 Password Cracking Overview

  • 43.1 Dictionary Attack
  • 43.2 Brute Force Attack
  • 43.3 Password Spraying
  • 43.4 Rainbow Tables

Module 44: CEH v11 Performing Password Attacks

  • 44.1 Network Service Password Attacks
  • 44.2 Password Cracking Tools
  • 44.3 Online Password Cracking Sites
  • 44.4 Windows Password Cracking
  • 44.5 Linux Password Cracking
  • 44.6 Other Methods for Obtaining Passwords

Module 45: CEH v11 Using Exploits

  • 45.1 Keylogging
  • 45.2 Spyware
  • 45.3 Rootkits
  • 45.4 Buffer Overflows
  • 45.5 Privilege Escalation
  • 45.6 Hiding Files

Module 46: CEH v11 Hiding Information

  • 46.1 Alternate Data Streams
  • 46.2 Steganography
  • 46.3 Creating and Maintaining Remote Access
  • 46.4 Hiding Evidence

Module 47: CEH v11 Covering Tracks

  • 47.1 Covering Tracks in Windows
  • 47.2 Covering Tracks in Linux
  • 47.3 System Hacking Counter-Measures
  • 47.4 System Hacking Penetration Testing
  • 47.5 Review

Module 48: CEH v11 Malware Overview

  • 48.1 Intro to Malware
  • 48.2 Virus Overview
  • 48.3 Virus Types
  • 48.4 Self-Hiding Viruses
  • 48.5 Worms
  • 48.6 Trojans
  • 48.7 Trojan Types
  • 48.8 RATS

Module 49: CEH v11 Hacking With Malware

  • 49.1 Ransomware
  • 49.2 Botnets
  • 49.3 Covert Channel Trojans
  • 49.4 Banking Trojans
  • 49.5 Rootkits

Module 50: CEH v11 Creating Malware

  • 50.1 Other Malware
  • 50.2 Malware Makers
  • 50.3 Dropper and Stage Creation
  • 50.4 Exploit Kits

Module 51: CEH v11 Detecting Malware

  • 51.1 Malware Detection
  • 51.2 Malware Detection Part 2
  • 51.3 Malware Analysis

Module 52: CEH v11 Defending Against Malware

  • 52.1 Malware Reverse Engineering
  • 52.2 Malware Countermeasures
  • 52.3 Malware Penetration Testing
  • 52.4 Review

Module 53: CEH v11 Sniffing

  •   53.1 Sniffing Concepts
  •    53.2 Types of Sniffing
  •    53.3 Sniffing Protocols
  •    53.4 Sniffing Tools

Module 54: CEH v11 Spoofing and MITM

  • 54.1 ARP
  • 54.2 ARP Spoofing
  • 54.3 MITM
  • 54.4 MAC Attacks
  • 54.5 MAC Spoofing
  • 54.6 DHCP Attacks

Module 55: CEH v11 Defending Against Poisoning and Sniffing

  • 55.1 Name Resolution Poisoning
  • 55.2 VLAN Hopping
  • 55.3 Sniffing Counter Measures
  • 55.4 Sniffing Penetration Testing
  • 55.5 Review

Module 56: CEH v11 Social Engineering

  • 56.1 Social Engineering Concepts
  • 56.2 Social Engineering Techniques
  • 56.3 Social Engineering Examples
  • 56.4 Social Engineering Tools

Module 57: CEH v11 Defending Against Social Engineering

  • 57.1 Social Media
  • 57.2 Identity Theft
  • 57.3 Insider Threats
  • 57.4 Social Engineering Countermeasures
  • 57.5 Social Engineering Penetration Testing
  • 57.6 Review

Module 58: CEH v11 Denial-of-Service

  • 58.1 DoS-DDoS Concepts
  • 58.2 Volumetric Attacks
  • 58.3 Fragmentation Attacks
  • 58.4 State Exhaustion Attacks
  • 58.5 Application Layer Attacks

Module 59: CEH v11 Advanced DoS Attacks

  • 59.1 Protocol Attacks
  • 59.2 Other Attacks
  • 59.3 Botnets

Module 60: CEH v11 Defending Against Denial-of-Service

  • 60.1 DoS-DDoS Attack Tools
  • 60.2 DoS-DDoS Countermeasures
  • 60.3 Dos Penetration Testing
  • 60.4 Review

Certified Ethical Hacker (CEH) Version 11 Part 3: Ethical Hacker (ECC 312-50)

Module 61: CEH v11 Advanced Ethical Hacker Course Intro

  • 61.1 About This Course: Advanced Ethical Hacker
  • 61.2 About the Instructor

Module 62: CEH v11 Session Hjacking

  • 62.1 Session Hijacking Concepts
  • 62.2 Token-based Authentication
  • 62.3 Compromising a Session Token
  • 62.4 XSS
  • 62.5 CSRF
  • 62.6 Other Attacks

Module 63: CEH v11 Defending Against Hijacking

  • 63.1 Network Level Hijacking
  • 63.2 Session Hijacking Tools
  • 63.3 Session Hijacking Countermeasures
  • 63.4 Session Penetration Hijacking
  • 63.5 Review

Module 64: CEH v11 Implementing Intrusion Detection

  • 64.1 IDS-IPS
  • 64.2 Snort
  • 64.3 Snort Rules
  • 64.4 Syslog

Module 65: CEH v11 Testing Intrusion Detection

  • 65.1 WIPS
  • 65.2 IDS Considerations
  • 65.3 IDS Tools
  • 65.4 IDS Evasion
  • 65.5 IDS-Firewall Evasion Tools
  • 65.6 IDS Scenerios

Module 66: CEH v11 Implementing Firewalls

  • 66.1 Firewalls
  • 66.2 Packet Filtering Rules
  • 66.3 Firewall Deployments
  • 66.4 Traffic Flow through Firewalls
  • 66.5 Split DNS

Module 67: CEH v11 Testing Firewallls

  • 67.1 Firewall Tools
  • 67.2 Firewall Evasion
  • 67.3 Firewall Scenarios

Module 68: CEH v11 Implementing Honeypots

  • 68.1 Honeypots
  • 68.2 Honeypot Detection
  • 68.3 IDS-Firewall Evasion Countermeasures
  • 68.4 IDS-Firewall Honeypot Penetration Testing
  • 68.5 Review

Module 69: CEH v11 Attacker Webserver

  • 69.1 Webserver Security Overview
  • 69.2 Common Webservers
  • 69.3 Webserver Attacks
  • 69.4 Misconfiguration Attack Examples

Module 70: CEH v11 Webserver Defense

  • 70.1 Webserver Attack Tools
  • 70.2 Attack Countermeasures
  • 70.3 Webserver Penetration Testing
  • 70.4 Review

Module 71: CEH v11 Intro To Web Apps

  • 71.1 Web Application Concepts
  • 71.2 Attacking Web Apps

Module 72: CEH v11 OWASP Top 5 Web App Vulnerabilities

  • 72.1 A01 – Broken Access Control
  • 72.2 A02 – Cryptographic Failures
  • 72.3 A03 – Injection
  • 72.4 A04 – Insecure Design
  • 72.5 A05 – Security Misconfiguration

Module 73: CEH v11 OWASP Additional Web App Vulnerabilities

  • 73.1 A06 – Vulnerable and Outdated Components
  • 73.2 A07 – Identification and Authentication Failures
  • 73.3 A08 – Software and Data Integrity Failures
  • 73.4 A09 – Security Logging and Monitoring
  • 73.5 A10 – Server Side Request Forgery

Module 74: CEH v11 Common Web App Attacks

  • 74.1 XSS Attacks
  • 74.2 CSRF
  • 74.3 Parameter Tampering
  • 74.4 Clickjacking
  • 74.5 SQL Injection

Module 75: CEH v11 Unauthorized Access Through Web Apps

  • 75.1 Insecure Deserialization Attacks
  • 75.2 IDOR
  • 75.3 Directory Traversal
  • 75.4 Session Management Attacks
  • 75.5 Response Splitting

Module 76: CEH v11 Web App Overflow Attacks

  • 76.1 Denial of Service
  • 76.2 Overflow Attacks
  • 76.3 XXE Attacks
  • 76.4 Soap Attacks
  • 76.5 Ajax Attacks

Module 77: CEH v11 Defending Web Apps

  • 77.1 Web App Hacking Tools
  • 77.2 Web Hacking Countermeasures
  • 77.3 Web Application Penetration Testing
  • 77.4 Review

Module 78: CEH v11 Intro To SQL Injection

  • 78.1 SQL Overview
  • 78.2 SQL Injection Concepts
  • 78.3 Basic SQL Injection

Module 79: CEH v11 Performing SQL Injection

  • 79.1 Finding Vulnerable Websites
  • 79.2 Error-based SQL Injection
  • 79.3 Union SQL Injection
  • 79.4 Blind SQL Injection
  • 79.5 SQL Injection Scenarios
  • 79.6 Evading Detection

Module 80: CEH v11 Defending Against SQL Injection

  • 80.1 SQL Injection Tools
  • 80.2 SQL Injection Countermeasures
  • 80.3 Safe Coding Examples
  • 80.4 SQL Wildcards
  • 80.5 SQL Injection Penetration Testing
  • 80.6 Review

Module 81 : CEH v11 Wireless Networking Overview

  • 81.1 Wireless Concepts
  • 81.2 Wireless Signal Encoding
  • 81.3 Wi-Fi Standards
  • 81.4 Wi-Fi Antennas
  • 81.5 Wireless Authentication

Module 82 : CEH v11 Wi-Fi Security

  • 82.1 Wi-Fi Security Standards
  • 82.2 Wireless Network Troubleshooting Tools
  • 82.3 Wi-Fi Discovery Tools
  • 82.4 Sniffing Wi-Fi

Module 83: CEH v11 Hacking Wi-Fi

  • 83.1 Wi-Fi Attack Types
  • 83.2 Wi-Fi Rogue Access Point Attacks
  • 83.3 Wi-Fi Denial of Service Attacks
  • 83.4 Wi-Fi Password Cracking Attacks
  • 83.5 WEP Cracking

Module 84: CEH v11 Advanced Wireless Attacks

  • 84.1 WPA-WPA2 Cracking
  • 84.2 WPA3 Attacks
  • 84.3 WPS Cracking
  • 84.4 Wi-Fi Attack Tools for Mobile Devices
  • 84.5 Bluetooth Hacking
  • 84.6 Other Wireless Hacking

Module 85: CEH v11 Defending Wireless Networks

  • 85.1 Wireless Hacking Countermeasures
  • 85.2 Wireless Security Tools
  • 85.3 Wireless Penetration Testing
  • 85.4 Review

Module 86: CEH v11 Mobile Platform Overview

  • 86.1 Mobile Platform Overview
  • 86.2 Mobile Device Vulnerabilities
  • 86.3 Mobile Device Attacks

Module 87: CEH v11 Hacking Android

  • 87.1 Android
  • 87.2 Android Vulnerabilities
  • 87.3 Rooting Android
  • 87.4 Android Exploits
  • 87.5 Android Hacking Tools
  • 87.6 Reverse Engineering an Android App
  • 87.7 Securing Android

Module 88: CEH v11 Hacking iOS

  • 88.1 iOS
  • 88.2 iOS Vulnerabilities
  • 88.3 Jailbreaking iOS
  • 88.4 iOS Exploits
  • 88.5 iOS Hacking Tools
  • 88.6 Securing iOS

Module 89:  CEH v11 Mobile Platform Defense

  • 89.1 Mobile Device Management
  • 89.2 BYOD
  • 89.3 Mobile Security Guidelines and Tools
  • 89.4 Mobile Device Penetration Testing
  • 89.5 Review

Module 90:  CEH v11 IoT Hacking

  • 90.1 loT Concepts
  • 90.2 loT Infrastructure
  • 90.3 Fog Computing
  • 90.4 loT Vulnerabilities
  • 90.5 loT Threats

Module 91: CEH v11 IoT Defense

  • 91.1 IoT Hacking Methodologies and Tools
  • 91.2 IoT Hacking Methodolgies and Tools Part 2
  • 91.3 Hacking Countermeasures
  • 91.4 IoT Penetration Testing
  • 91.5 OT Concepts
  • 91.6 Industrial IoT

Module 92: CEH v11 Operational Technology Overview

  • 92.1 IT-OT Convergence
  • 92.2 ICS
  • 92.3 SCADA
  • 92.4 DCS
  • 92.5 RTU
  • 92.6 PLC
  • 92.7 Addition OT Components

Module 93: CEH v11 Hacking OT

  • 93.1 OT Variables
  • 93.2 Well-known OT attacks
  • 93.3 OT Attack Methodology and Basic Tools
  • 93.4 OT Reconnaissance
  • 93.5 OT Penetration and Control

Module 94: CEH v11 Defending OT

  • 94.1 OT Attack Tools
  • 94.2 OT Hacking Countermeasures
  • 94.3 OT Penetration Testing
  • 94.4 Review

Module 95: CEH v11 Attacking The Cloud

  • 95.1 Cloud Computing Concepts
  • 95.2 Virtualization
  • 95.3 Cloud Types
  • 95.4 Cloud Benefits and Considerations
  • 95.5 Cloud Risks and Vulnerablilities

Module 96: CEH v11 Cloud Defense

  • 96.1 Cloud Threats and Countermeasures
  • 96.2 Cloud Security Tools
  • 96.3 Cloud Security Best Practices
  • 96.4 Cloud Penetration Testing
  • 96.5 Review

Module 97: CEH v11 Cryptography Overview

  • 97.1 Cryptography Concepts
  • 97.2 Symetric Encryption
  • 97.3 Asymmetric Encryption
  • 97.4 Public Key Exchange
  • 97.5 PKI

Module 98: CEH v11 Protecting Data With Crytography

  • 98.1 Digital Certificates
  • 98.2 Digital Signatures
  • 98.3 Hashing
  • 98.4 Email Encryption
  • 98.5 Network Communication Encryption

Module 99: CEH v11 Protecting Data at Home and in Transit

  • 99.1 Disk Encryption
  • 99.2 VPN Encryption
  • 99.3 Cryptography Tools

Module 100: CEH v11 Pentesting Cryptography

  • 100.1 Cryptography Attacks
  • 100.2 Cryptography Penetration Testing
  • 100.3 Review
  • 100.4 Conclusion

Modes of Learning