back

Certified Ethical Hacker (CEH) v11

41 H 53 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Intro to Ethical Hacking
    • Overview
    • CEH v11 EC-Council Certification Overview
    • Basic Cybersecurity Concepts
    • Attacker Motives, Goals, and Objectives
    • Attack Classifications
    • Information Warfare
    • Cyber Kill Chain
    • Tactics Techniques and Procedures
    • Common Adversarial Behaviors
    • Threat Hunting Concepts
    • Hacking Phases
    • Ethical Hacking Concepts
    • Risk
    • Risk Management
    • Cyber Threat Intelligence
    • Threat Modeling
    • Incident Management
    • Incident Handling and Response
    • ML and AI
    • Standards and Regulations
  • Recon Techniques - Footprinting and Recon
    • Footprinting Concepts
    • Google Dorks
    • Shodan Censys and Thingful
    • Sub-Domain Enumeration
    • Geolocation Recon
    • Social Networking Recon
    • Job Board Recon
    • Deep-Dark Web Recon
    • Metadata Recon
    • Custom Wordlists
    • Email Tracking
    • WHOIS Recon and DNS Recon
    • Public Network Footprinting
    • Other Footprinting Tools
    • Social Engineering Recon
    • Footprinting and Recon Countermeasures
  • Recon Techniques - Scanning
    • Network Scanning Types
    • TCP Communication
    • Network Scanning Tools
    • Host Discovery
    • Port and Service Scanning
    • Nmap: TCP Connect Scan
    • Nmap Stealth Scan
    • Nmap Inverse TCP XMAS and Maimon Scans
    • Nmap ACK Scan
    • Nmap IDLE IPID Scan
    • Nmap UDP Scan
    • Nmap SCTP INIT and COOKIE ECHO Scans
    • Nmap IPv6 List and Version Scans
    • Nmap Scan Optimizations
    • Target OS Identification Techniques
    • IDS and Firewall Evasion
  • Recon Techniques - Enumeration
    • Enumeration Basics
    • NetBIOS and SMB Enumeration
    • SNMP Enumeration
    • LDAP Enumeration
    • NTP Enumeration
    • NFS Enumeration
    • SMTP and FTP Enumeration
  • System Hacking Phases and Attack Techniques - Vulnerability Analysis
    • Vulnerability Assessment Concepts and Resources
    • Vulnerability Management Life-Cycle
    • Vulnerability Classification
    • Vulnerability Assessment Types
    • Vulnerability Assessment Models and Tools
    • Vulnerability Assessment Reports
  • System Hacking Phases and Attack Techniques - System Hacking
    • CEH Hacking Methodology and Goals
    • Windows Authentication
    • Password Attacks - Basic Concepts
    • Password Extraction and Cracking
    • Password Attacks Cracking Enhancement Techniques
    • Exploitation Buffer Overflows
    • Privilege Escalation
    • Maintaining Access
    • Steganography
    • Covering Tracks
  • System Hacking Phases and Attack Techniques - Malware Threats
    • Malware Concepts and Components
    • APT
    • Trojans
    • Viruses and Worms
    • Fileless Malware
    • Malware Analysis
    • Malware Countermeasures
  • Network and Perimeter Hacking - Sniffing
    • Network Sniffing Basics
    • DHCP Sniffing Attacks
    • ARP Poisoning
    • DNS Poisoning
    • Sniffing Defenses
  • Network and Perimeter Hacking - Social Engineering
    • Social Engineering Concepts
    • Insider Threats
    • Identity Theft
  • Network and Perimeter Hacking - Denial of Service
    • DoS and DDoS Attacks
    • Volumetric Attacks
    • Protocol Attacks
    • Application Layer Attacks
    • Botnets
    • DoS and DDoS Countermeasures
  • Network and Perimeter Hacking - Session Hijacking
    • Session Hijacking Concepts
    • Network Level Session Hijacking
    • Application Level Session Hijacking
    • Session Hijacking Countermeasures
  • Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots
    • IDS and IPS
    • Firewalls
    • Honeypots
  • Web Application Hacking - Hacking Web Servers
    • Web Server Hacking Concepts
    • Web Server Attacks
    • Web Server Attack Methodology
  • Web Application Hacking - Hacking Web Applications
    • Web App Basics
    • OWASP Top 10 Web Application Attacks 2017
    • Unvalidated Redirects and Forwards
    • CSRF
    • IDOR
    • LFI RFI
    • Web App Hacking Methodology
    • Web App Hacking Tools
    • Web App Login Attacks
    • XSS Filtering Evasion
    • Web Shell Backdoors
    • APIs and Webhooks
  • Web Application Hacking - SQL Injection
    • SQLi Concepts
    • Error-Based SQLi Attacks
    • Blind-Based SQLi Attacks
    • SQLi to System Access
    • SQLMap
  • Wireless Network Hacking - Hacking Wireless Networks
    • Wireless Basics
    • Wireless Threats
    • Wireless Hacking Tools
    • Wireless Hacking
    • Wireless Hacking Countermeasures
  • Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms
    • Mobile Hacking Basics
    • Android Security
    • iOS Security
    • Mobile Device Management and Security Tools
  • Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking
    • IoT Basics
    • IoT Threats and Vulnerabilities
    • IoT Attacks Tools and Countermeasures
    • OT Basics
    • OT Attacks Tools and Countermeasures
  • Cloud Computing - Cloud Computing
    • Cloud Computing Basics
    • Container Basics
    • Hacking Cloud Services
    • Cloud Security Controls
  • Cryptography - Cryptography
    • Cryptography Basics
    • Crypto Algorithms and Implementations
    • Cryptography Tools
    • Public Key Infrastructure
    • Cryptanalysis
    • Crypto-Attack Countermeasures

Overview

5 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

The Certified Ethical Hacker(CEH) v11 course is designed to give the student a foundational knowledge-base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.

You're watching IT Pro Tv. [MUSIC] Hello and welcome to IT Pro TV. This is CEH version 11. We're here to give you an overview of what you can expect to see in this course. I'm Kathy Chambers, I'm gonna be your host throughout this journey and alongside Daniel Lowrie. What's up Daniel, that's you. >> Yes, that would be me. I am a cyber security smith for IT Pro Tv. So that's why they've kind of tapped me in on this little endeavor of ours to get through the CEH version 11. I've been in IT for 20 something years now. Has it been that long? My goodness, you can kind of tell due to the grey in the beard, and then of course I hold different certifications in security as well, including CEH. So I'll be walking you through all the technical details you need to know to be successful on your exam. >> Yeah, and I'm just here for fun. >> She's here to help. [LAUGH]. All right, so before we talk about the course itself, what kind of background should our learners have before diving into CEH? >> I would highly recommend having a strong background in operating systems, both desktop and server and in all the platforms. The Microsofts of the world, the Linux's of the world and the Apples of the world, not only their desktop and server operating system, but mobile devices would probably be on the table as well. You need to have a strong foundational knowledge of how to work in and use all of those platforms and then don't forget networking. You need to have a pretty good foundational knowledge of networking as well to understand the different protocols and things that we use and abuse when it comes to certified ethical hacking. So having those two things underneath your belt is gonna be super helpful. And of course if you've ever used the Cloud before at all, that will also play a bit of a part. So if you have some Cloud experience that will be a cherry on top of that cake. >> All right. So then let's break it down for the good folks out there, on how this course is actually gonna be structured, how we're gonna do this. >> Not a problem. So I have broken this down using the CEH blueprints that is provided by EC Council. I've got that pulled up right here, and we are on version 4.0 this is the latest and greatest of this version. So basically what I've done is kind of jumped these domains and sub domains. Use them as kind of our framework to work our way through. And they made episodes around trying to address each one of the topics that are under this description bar, right. So we'll have an introduction to ethical hacking and there will be episodes that kind of address the different things that are in there, like hacking concepts versus ethical hacking concepts. Maybe some information security controls as well as the laws and standards that you might be confronted with on the exam and in real life as well. I like to keep both of those things walking hand in hand as much as I possibly can throughout this series. That's one of my modus operandi. So we'll be covering things like reconnaissance techniques, foot printing, scanning, enumeration, vulnerability analysis when it comes to system hacking and the phases there in. We definitely wanna know those different system, hacking phases and techniques that are gonna be used to gain access into systems. It's kind of what you're here for, it's what you pay a price for the ticket, right? It's gonna be a lot of fun. We're gonna be doing that, looking at malware threats, doing some network and perimeter hackings or sniffing social engineering and you get the idea. We're gonna kind of walk our way through this blueprint, not verbatim, probably, I take some literary license with a thing or two here and there. So if you're holding my feet to the fire on this specific document, you might get a little disappointed here and there. Just because I thought maybe there's a better way to show this or that's not, super relevance when it comes to the exam or in real life world. So I use this more as a guideline than an actual set of rules, but that's basically we're gonna walk through and you can see there's a lot of different great stuff in here. Web application hacking, super fun I like doing that. We also have wireless as well as mobile, don't forget the IOT and OT hacking. That's interesting when we get into a little bit of cloud computing and wrap it all up with a bit of cryptography at the very end for spice, that does make it nice. >> Cuz why not? >> Cuz why not? [LAUGH]. So there is a lot to take in for this course, a lot to do for the exam, a lot of studying to do. So Daniel what are some tips that you have for people as they're going through these episodes? Yeah, those standards study tips make sure that, if I mentioned hey, this might be a good flash card material. Have some material to actually make flash cards out of or maybe go online and find some flash cards, those are always super cool. You can find those in various corners of the internet, but make your own because they're gonna be yours in curtail straight to the way you think and feel about that specific topic. So do that, we also have practice labs here at IT Pro TV. So if you're an IT Pro Tv member, you should have access to our practice labs environment in which you can try some of the things in the demonstrations that you see throughout the series. Or if you're feeling strong just try to recreate the thing that I'm actually doing in the episode that you're watching. So if it's a virtualization, find the actual the thing that I'm using in a virtualized environment, spin it up in your own and try to do the same things. Follow me step by step, if you feel that that's a great way to get that hands on as a long put that together with practice labs, you should have a pretty good experience. >> Yeah, so at the top of this I said I'm here for fun and that's kinda, I'm kind of serious about that because we did have a really good time, right? I think you guys are gonna enjoy the course and for Daniel Lowrie, I'm Kathy Chambers, thanks for hanging out with us. This is CEH version 11. Thank you for watching IT Pro TV. [MUSIC]

Start training today

Just you? Check out our personal plans

Premium

$529 per seat/per year

2

Total seats

Standard

$349 per seat/per year

2

Total seats

Credit card required

This is for your account.
This is for your account.
We will contact you with this phone number about your trial.
We will contact you with this email about your trial.
What is the name of your company?
In which country is your company located?

Step 1 of 2

Get a demo or a start a team trial