back

Certified Ethical Hacker (CEH) v.12

48 H 17 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
This course has a virtual lab
This course has a practice test
Episodes
Episodes
  • Intro to Ethical Hacking
    • Course Overview
    • Basic Cybersecurity Concepts
    • Attacker Motives, Goals, and Objectives
    • Attack Classifications
    • Information Warfare
    • Cyber Kill Chain
    • Tactics Techniques and Procedures
    • Common Adversarial Behaviors
    • Threat Hunting Concepts
    • Risk and Risk Management
    • Cyber Threat Intelligence
    • Threat Modeling
    • Incident Management Handling and Response
    • ML and AI
    • Standards and Regulations
    • CEH Hacking Methodology
    • MITRE ATT&CK Framework
    • Diamond Model of Intrusion Analysis
  • Recon Techniques - Footprinting and Recon
    • Footprinting Concepts
    • Google Dorks
    • Shodan and Censys
    • Sub-Domain Enumeration
    • Social Networking Recon
    • Job Board Recon
    • Deep-Dark Web Recon
    • Email Tracking
    • WHOIS and DNS Recon
    • Social Engineering Recon
    • Other Footprinting Tools
    • Footprinting and Recon Countermeasures
  • Recon Techniques - Scanning
    • Network Scanning Types
    • Network Scanning Tools
    • Host Discovery
    • Port and Service Scanning
    • TCP Connect Scan
    • Stealth Scan
    • Inverse TCP XMAS and Maimon Scans
    • ACK Scan
    • IDLE IPID Scan
    • UDP Scan
    • SCTP INIT and COOKIE ECHO Scans
    • Scan Optimizations
    • Target OS Identification Techniques
    • IDS and Firewall Evasion
  • Recon Techniques - Enumeration
    • NetBIOS and SMB Enumeration
    • SNMP Enumeration
    • LDAP Enumeration
    • NTP Enumeration
    • NFS Enumeration
    • SMTP Enumeration
  • System Hacking Phases and Attack Techniques - Vulnerability Analysis
    • Vulnerability Assessment Concepts and Resources
    • Vulnerability Management Life-Cycle
    • Vulnerability Classification
    • Vulnerability Assessment Types
    • Vulnerability Assessment Models and Tools
    • Vulnerability Assessment Reports
  • System Hacking Phases and Attack Techniques - System Hacking
    • CEH Hacking Methodology and Goals
    • Windows Authentication
    • Password Attacks - Basic Concepts
    • Password Extraction and Cracking
    • Password Attacks Cracking Enhancement Techniques
    • Buffer Overflows
    • Privilege Escalation
    • Maintaining Access
    • Steganography
    • Covering Tracks
    • AD Enumeration
    • Mimikatz
    • Pivoting
  • System Hacking Phases and Attack Techniques - Malware Threats
    • Malware Concepts and Components
    • APT
    • Trojans
    • Viruses and Worms
    • Fileless Malware
    • Malware Analysis
    • Malware Countermeasures
  • Network and Perimeter Hacking - Sniffing
    • Network Sniffing Basics
    • DHCP Sniffing Attacks
    • ARP Poisoning
    • DNS Poisoning
    • Sniffing Defenses
  • Network and Perimeter Hacking - Social Engineering
    • Social Engineering Concepts and Attacks
    • Insider Threats
    • Identity Theft
  • Network and Perimeter Hacking - Denial of Service
    • DoS and DDoS Attacks
    • Volumetric Attacks
    • Protocol Attacks
    • Application Layer Attacks
    • Botnets
    • DoS and DDoS Countermeasures
  • Network and Perimeter Hacking - Session Hijacking
    • Session Hijacking Concepts
    • Network Level Session Hijacking
    • Application Level Session Hijacking
    • Session Hijacking Countermeasures
  • Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots
    • IDS and IPS
    • Firewalls
    • Honeypots
  • Web Application Hacking - Hacking Web Servers
    • Web Server Basics
    • Web Server Attacks
    • Web Server Hacking Methodology
  • Web Application Hacking - Hacking Web Applications
    • Web App Basics
    • OWASP Top 10 Web Application Attacks 2021
    • Web App Hacking Methodology
    • Unvalidated Redirects and Forwards
    • XSS and CSRF
    • Input Filtering Evasion
    • IDOR
    • LFI RFI
    • APIs and Webhooks
  • Web Application Hacking - SQL Injection
    • SQLi Concepts
    • Error-Based SQLi Attacks
    • Blind-Based SQLi Attacks
    • SQLi to System Access
    • SQLMap
  • Wireless Network Hacking - Hacking Wireless Networks
    • Wireless Basics
    • Wireless Threats
    • Wireless Hacking Tools
    • Wireless Hacking
    • Wireless Hacking Countermeasures
  • Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms
    • Mobile Security Basics
    • Android Security
    • iOS Security
    • Mobile Device Management
  • Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking
    • IoT Basics
    • IoT Threats and Vulnerabilities
    • IoT Attacks Tools and Countermeasures
    • OT Basics
    • OT Attacks Tools and Countermeasures
  • Cloud Computing - Cloud Computing
    • Cloud Computing Basics
    • Container Basics
    • Hacking Cloud Services
    • Cloud Security Controls
  • Cryptography - Cryptography
    • Cryptography Basics
    • Crypto Algorithms and Implementations
    • Cryptography Tools
    • Public Key Infrastructure
    • Cryptanalysis
    • Crypto-Attack Countermeasures

Course Overview

5 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

WEBVTT >> You're watching ITProTV. (upbeat music) - >> Welcome and thanks for joining us for the overview to this course, CEH version 12. I'm your host, Sophie Goodwin. I will be guiding you along on this course. I'll be kind of your learner advocate. I am also learning a lot of this stuff for the first time. So I'm gonna be asking questions you might have at home. And alongside me is Mr. Daniel Lowry. You know him, you love him. He's gonna be our subject matter expert for this course. Daniel, how are you? - >> I'm very well. - Thanks for having me on, Sophia. I'm looking forward to diving into some of the topics that are in the CEH course because it's hacky stuff. - It's very hacky. - Not like hacky stuff. - Yes. - And I enjoy it quite well. So I hope you get as much enjoyment out of it as I do, because it's a lot of fun. - >> Besides your casual enjoyment of hacking, tell us a little bit more about you, Daniel. - >> Sure, well, I've been doing IT for over, jeez, 20 years now. I know, the gray and the beard is starting to show my age. But yeah, I remember when dinosaurs used computers, and I was there when it happened. So yeah, like I said, I've been in the business for a little while now, and within the last eight or so years, I've started to focus more into security realm, specifically in that offensive security, ethical hacking, pen testing kind of roles. So CEH, Pen Test Plus, that kind of stuff is kind of my forte now. Now I get to take those skills and give them to you so that you can follow in my footsteps or whoever's footsteps down that security path that we're blazing for you. So >> again, really look forward to doing this. - Okay, so as we start to get into this CEH V12 course, what is the structure of this course gonna look like? - >> So the structure of the course is we're gonna break it down into the domains of each one of the, that's brought to you by EC Council. So if you're looking at their blueprint, that would be a good thing to follow. But basically, it's going to be kind of walking your way through the introduction of what is it like to be in ethical hacking? What are some of the terms and definitions and concepts that we need to be aware of? Then we'll move into more of the, okay, how do we start hacking things? What are the phases of hacking? What does that look like? And then how do we actually start breaching systems, maintaining access, covering our tracks, going through that whole methodology of hacking into things? We'll also take a look at how to hack into things like web servers and web server technologies. It's gonna be a lot of fun there. And we're gonna dive into things like IoT and cloud as well. And even getting into a little bit of cryptography there near the end. So there's plenty of material for us to get through. This is going to be a pack of lunch. We got a lot of stuff to get through. But at the other side of this thing, you should be very well schooled up on concepts, terms, and even techniques. - >> Lots of material, the demos are the best part. So it's gonna be fun. Stick around for that. So at the end of the day, you mentioned that this is an EC Council thing. So there is probably an exam maybe that you might be working towards. But other than that, what might be the goal for taking this course? - >> The goal for this course is to get you familiar with a wide variety of tactics, tools, techniques that are associated with offensive type security, ethical hacking. Anybody in the ethical hacking or pentesting world will be familiar with these things and have some hands-on experience with that. So that's what my goal is to give you that, the conceptual knowledge behind it and some actual hands-on showing those demonstrations. Let me just tell you how to do a web server attack. Let me show you how to do that. So you can see it, walk through it, and then hopefully you'll assimilate that knowledge and be able to apply it into other areas that are not inside of your labs or whatever. - >> Okay, so as far as what's in it for myself and for other learners out there, it would kind of be, it gives us a really broad view of a lot of different ethical hacking type concepts, right? - Exactly. - Okay, awesome, cool. - Touch on a lot. - We're gonna touch on a lot, but it's gonna be fun. And then lastly, of course, before we sign off here, why are you excited about this course, Daniel? - >> Well, I think I've probably made that well and clear already, but if I haven't, I enjoy hacking things and doing this course allows me to do that. I've taken myriad of different types of training and the best ones are always the ones where you get to actually do things. And you will be able to get to do things. You'll be able to follow my bouncing ball, anything that's out there that you wanna do is, I try to use everything that's available freely to you to kind of make use of. So anything you see in this course, you should be able to go grab and utilize for yourself. I try not to use anything that's paid for or walled away in some shape or form. So it's gonna be a lot of fun for you to be able to build in and work your way through these things and lobby these attacks. We also have our practice lab environment. You can use that whole lab environment to work out if you don't wanna spin up your own environments. But I recommend using both because heck, experience is experience and seeing you guys gain that experience and being able to say, I can do it. That is my goal as a trainer is at the end of the episode, you go, I can do the thing. I understand what he said and I know how to apply that. That's what we're gonna try to do. - >> Well, I am looking forward to getting into this CEH version 12 course. I've done a couple of courses alongside Daniel that have to do with like IOT pen testing, AWS pen testing and so far I've loved all of it. So really looking forward to getting into more of this ethical hacking stuff. And hopefully you are too. Thanks for joining us for this overview. We'll see you there. - >> Thank you for watching ITProTV.