Certified Ethical Hacker (CEH) Online Course
This hands-on course is designed with a practical approach, broken into targeted sections—each focused on achieving a specific objective, such as ethically hacking into a system to apply the concepts in real time. You'll begin by setting up your own ethical hacking lab, a secure environment where you can safely test your skills, use hacking tools, and simulate various attacks.
Throughout the course, you’ll gain firsthand experience with real-world hacking scenarios while simultaneously learning how to defend against them.
Who should take this Course?
The Certified Ethical Hacker (CEH) Online Course is ideal for cybersecurity professionals, network administrators, penetration testers, and IT security enthusiasts who want to understand and apply ethical hacking techniques to identify and fix security vulnerabilities. It’s also suitable for individuals preparing for the CEH certification exam. A solid understanding of networking, operating systems, and basic cybersecurity concepts is recommended for effective learning.
What you'll learn:
- How hackers target systems, networks, users, websites, and wireless connections
- The tools hackers use—how they work and why they’re effective
- How to defend yourself or your clients from these types of cyber threats
- How to build your own security and hacking tools using Python—even without prior coding experience
- How to develop a personal portfolio of ethical hacking tools to showcase your skills
- This course is ideal for anyone looking to gain practical knowledge in ethical hacking and cybersecurity defense.
Course Table of Content
- Introduction
- Hacking Lab Setup
- Kali Linux 101
- Anonymity Online
- Dark Web
- Network Pentesting
- Gathering Information From Networks
- Wireless Attacks
- Post Connection Attacks
- System Pentesting
- Attacks On Users
- Social Engineering
- Social Media Security
- Beef
- External Network Attacks
- Fake Game Website Attacks Introduction
- Post Hacking Sessions
- Hacker Methodology
- Website Reconnaissance
- Website Pentesting
- Cross Site Scripting
- SQL 101
- SQL Injection
- Website Pentesting Tools
- Ethical Hacking Certifications
- Python For Ethical Hacking Setup
- Python Data Types & Structures Introduction
- Control Statements & Loops
- Essentials
- Functions
- Object Oriented Programming
- Modules
- MAC Changer
- Network Scanner
- Man In The Middle
- Packet Listener
- Keylogger
- Backdoor
- Packaging & Malicious Files
Medium: Self-paced
Content Type: Videos
Delivery: Online
Access Duration: Life Long Access