CEH Preview

This course covers information related to Hands-On Ethical Hacking and Certified Ethical Hacker certification.  

 

-Over 13 hours of HD CEH Video Content from any device on demand!

-Over 150 CEH Practice Exam Questions!

-53 Pages of CEH Study Notes

-75 security tool and hacking live demonstrations including:

 

  • Wireless hacking with Aircrack

  • Hacking Wi-Fi Protected Setup using Reaver

  • Man-in-the-middle Attacks using Wi-Fi Pineapple

  • Bluetooth Low Energy hacks using Ubertooth

  • Frequency manipulation using Software Defined Radio

  • Wireless hacking with KisMAC

  • Pwning over wireless with Metasploit

  • Scanning for vulnerabilities using OpenVAS

  • GFI LanGuard Network scans

  • Using Firebug and View Source Chart to hack AJAX/Javascript

  • Evading Intrusion Detection using Fragroute

  • Live persistent XSS (Cross-Site Scripting) attacks

  • Encrypting Windows files using EFS

  • Encrypt Apache traffic using SSL

  • Create your own worms using Internet Worm Maker

  • Build a virus using JPS Virus Maker

  • Live custom Trojan backdoor creation

  • Static malware analysis demonstrations on Windows and Linux

  • Dynamic malware analysis demonstrations using malware sandboxes

  • Use MSFVenom to create polymorphic virus payloads to bypass Anti-Virus

  • Setup a Snort Intrusion Detection Lab

  • Deploy Bro for host intrusion detection

  • Install the Honeydrive honeypot Linux distro

  • Kippo SSH Honeypot live demonstration

  • Port inspection with netstat

  • Using Nmap inside of Metasploit

  • Visual footprinting with Maltego

  • Hacking IoT with Shodan

  • NTP hacking

  • SNMP enumeration with OIDView

  • SMB Discovery with Metasploit

  • First order SQL Injection live demo

  • OWAS Zed Attack Proxy Data collection

  • Shodan Database Hacking – MongoDB

  • MySQL Database Security Lab buildout

  • MySQL live exploitation

  • MySQL Database hardening demonstration

  • Social hacks using SET (Social Engineering Toolkit)

  • Buffer overflow source code review

  • Hacking people using Rubber Ducky

  • Browser hijacking with Beef (Browser Exploitation Framework)

  • Anonymous hacking with Tor

  • Even more anonymous hacking with Tortilla

  • Proxychains attack hiding

  • Private VPN’s

  • ARP Poisoning attacks

  • ICMP tunneling

  • TAIL Linux Distro live demonstration

And MUCH MORE!!!

 

 

Click Here to Purchase Now

 

 

Facebook Comments