Learn Ethical Hacking from scratch | Latest version

BY
Udemy

Learn everything there is to understand about ethical hacking and cyber security using CEHv10 certification from scratch.

Mode

Online

Fees

₹ 799

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

Learn Ethical Hacking from scratch | Latest version certification course is designed by Saurabh Kumar - IT Corporate Trainer, HOD IMS & Sr. IT Consultant which is accessible on Udemy for those who want to become certified ethical hackers. Learn Ethical Hacking from the Ground Up | CEHv10 online course focuses on teaching both fundamental and advanced ethical hacking principles from the ground up.

Learn Ethical Hacking from scratch | Latest version online classes consist of 95 well-structured videos that cover a wide range of topics from beginner to advanced ethical hacking and cyber security. This course includes topics like information security, cloud computing, security control, virus, trojan, and malware analysis, scanning networks, vulnerability testing, password cracking, steganography, enumeration, sniffing, and DHCP snooping, NAT, PAT, and many more.

The highlights

  • Certificate of completion
  • Self-paced course
  • 32 hours of pre-recorded video content
  • 30-day money-back guarantee 
  • Unlimited access
  • Accessible on mobile devices and TV

Program offerings

  • Online course
  • Unlimited access
  • Accessible on mobile devices and tv

Course and certificate fees

Fees information
₹ 799
certificate availability

Yes

certificate providing authority

Udemy

What you will learn

Knowledge of cloud computing Knowledge of cyber security Ethical hacking

After completing the Learn Ethical Hacking from scratch | Latest version online certification, applicants will get a thorough understanding of the fundamental concepts of cyber security and information security. Applicants will learn about the fundamental principles and techniques of ethical hacking and cloud computing. Applicants will become familiar with concepts such as website reconnaissance, metadata, steganography, malware, trojan, virus, snooping, sniffing, proxy server, scanning network, vulnerability assessment, malware analysis, and password cracking as well as the principles of Kali Linux. Candidates will also learn how to use DHCP, NAT, PAT, security controls, and SQL.

The syllabus

Complete Ethical Hacking tutorial Vidoes

  • Part 0: Course & Trainer Intro
  • Part1: CEH Introduction
  • Part 2: Getting Ready with Windows pc for CEH
  • Part 3: Installing and Updating Kali Linux
  • Part 4: Hacking, Hacker Types and Ethics
  • Part 5: Hacking Vocabulary
  • Part 6: Information Security
  • Part 7: Attack Types and Vector
  • Part 8: 5 Phases of Hacking
  • Part 9: Foot Printing and Reconnaissance
  • Part 10: Google Hacking
  • Part 11: Website Reconnaissance
  • Part 12: Metagoofil Metadata
  • Part 13: Email Recon Footprint
  • Part 14: whois, nslookup tool for Recon
  • Part 15: Scanning Network
  • Part 16: Port Discovery
  • Part 17: Stealth Idle Scan
  • Part 18: OS & Application Fingerprint
  • Part 19: Vulnerability Scanning
  • Part 20: Windows Vulnerability
  • Part 21: Network Mapping Tool
  • Part 22: Proxy Server
  • Part 23: Public Proxy Server
  • Part 24: Enumeration Concept
  • Part 25: NetBIOS Enumeration
  • Part 26: SNMP Enumeration
  • Part 27: LDAP Enumeration
  • Part 28: SMTP Enumeration
  • Part 29: System Hacking Overview
  • Part 30: Windows Password Break
  • Part 31: Password Cracking Overview
  • Part 32: Password Cracking Telnet/HTTP/FTP
  • Part 33: Rainbow crack Lab Setup
  • Part 34: Rainbow Crack Demonstration
  • Part 35: Password Reset Hacking
  • Part 36: DHCP Starvation Attack
  • Part 37: Malicious Exe Script
  • Part 38: Spyware
  • Part 39: NTFS Alt Data Streams Exploits
  • Part 40: Steganography with Open puff
  • Part 41: Steganography with snow
  • Part 42: Covering track after hack
  • Part 43: Malware Overview
  • Part 44: Trojan Overview and Execute
  • Part 45: Creating Trojan
  • Part 46: Virus Overview
  • Part 47: Creating Virus
  • Part 48: Detecting Malware
  • Part 49: Malware Analysis
  • Part 50: Hash file verification
  • Part 51: Sniffing Overview
  • Part 52: CAM Table overflow, Port Security
  • Part 53: DHCP Snooping
  • Part 54: Dynamic ARP Inspection
  • Part 55: Social Engineering
  • Part 56: Denial of Service Attack
  • Part 57: Session Hijack
  • Part 58: Hack Web Server
  • Part 59: Buffer Overflow Attack
  • Part 60: Shell Shock Attack
  • Part 61: OWASP Broken Web Application Project
  • Part 62: SQL Introduction and Installation SQL Server
  • Part 63: SQL Injection
  • Part 64: Web App Hacking
  • Part 65: Wireless Hacking
  • Part 66. Android VM
  • Part 67: Malware for Mobile
  • Part 68: Mobile Device Risk and Best practices
  • Part 69: Firewall Evasion
  • Part 70: Firewall ACL Example
  • Part 71: NAT and PAT Fundamentals
  • Part 72: IDS IPS Evasion
  • Part 73: Honeypot
  • Part 74: Cloud Computing
  • Part 75: CIA
  • Part 76: Policies
  • Part 77: Quantifying Risk
  • Part 78: Separation of Duties
  • Part 79: Symmetrical Encryption Concept
  • Part 80: Asymmetrical Encryption Concept
  • Part 81: Control Types
  • Part 82: Multifactor Authentication
  • Part 83: Centralized identity Management
  • Part 84: Kerberos and Single sign-on
  • Part 85: Backup and Media Management
  • Part 86: Operation Security Control
  • Part 87: Physical Security Controls
  • Part 88: Incident Response
  • Part 89: VPNs
  • Part 90: Disaster Recovery Planning
  • Part 91: Pen Testing Tips
  • Part 92: Useful Tools
  • Part 93: Case Study
  • Part 94: IoT

Instructors

Mr saurabh Kumar 1

Mr saurabh Kumar 1
IT Corporate Trainer
Freelancer

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books