back

Certified Ethical Hacker (CEH) v.12

This course is currently In Production12 H 22 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
This course has a practice test
Episodes
Episodes
  • Intro to Ethical Hacking
    • Attacker Motives, Goals, and Objectives
    • Information Warfare
    • Tactics Techniques and Procedures
    • Common Adversarial Behaviors
    • Threat Hunting Concepts
    • Risk and Risk Management
    • Cyber Threat Intelligence
    • Threat Modeling
    • Incident Management Handling and Response
    • Standards and Regulations
    • CEH Hacking Methodology
  • Recon Techniques - Footprinting and Recon
    • Footprinting Concepts
    • Google Dorks
    • Shodan and Censys
    • Sub-Domain Enumeration
    • Social Networking Recon
    • Job Board Recon
    • Deep-Dark Web Recon
    • Email Tracking
    • WHOIS and DNS Recon
    • Social Engineering Recon
    • Footprinting and Recon Countermeasures
  • Recon Techniques - Scanning
    • Network Scanning Types
    • Network Scanning Tools
    • Host Discovery
    • Port and Service Scanning
    • TCP Connect Scan
    • Stealth Scan
    • Inverse TCP XMAS and Maimon Scans
    • ACK Scan
    • IDLE IPID Scan
    • UDP Scan
    • SCTP INIT and COOKIE ECHO Scans
    • Scan Optimizations
    • Target OS Identification Techniques
    • IDS and Firewall Evasion
  • Recon Techniques - Enumeration
    • System Hacking Phases and Attack Techniques - Vulnerability Analysis
      • System Hacking Phases and Attack Techniques - System Hacking
        • System Hacking Phases and Attack Techniques - Malware Threats
          • Network and Perimeter Hacking - Sniffing
            • Network and Perimeter Hacking - Social Engineering
              • Network and Perimeter Hacking - Denial of Service
                • Network and Perimeter Hacking - Session Hijacking
                  • Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots
                    • Web Application Hacking - Hacking Web Servers
                      • Web Application Hacking - Hacking Web Applications
                        • Web Application Hacking - SQL Injection
                          • Wireless Network Hacking - Hacking Wireless Networks
                            • Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms
                              • Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking
                                • Cloud Computing - Cloud Computing
                                  • Cryptography - Cryptography

                                    Attacker Motives, Goals, and Objectives

                                    14 M

                                    itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
                                    • Episode Description

                                    Classifying what motivates an attacker to attack a network or system can go a long way into figuring out how to best protect systems and networks. In this episode we'll list and define the common motives, goals, and objectives of today's threat actors.

                                    Start training today

                                    Just you? Check out our personal plans

                                    Premium

                                    $599 per seat/per year

                                    2

                                    Total seats

                                    Standard

                                    $399 per seat/per year

                                    2

                                    Total seats

                                    Get a demo or a start a team trial