The Complete CEH Exam Prep Course

Tim Pierson
(0 review)
$195.00 $99.00

If you are curious about new technologies and passionate about jump starting your career as a ethical hacker, then this course is for you!  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.

In this course, you will:

  • Learn the business and technical logistics behind penetration testing
  • Identify evolving threats from different types of hackers
  • Reveal shocking truths about the information operating systems can divulge
  • Realize the power of footprinting on the Internet
  • Detect live systems by inference
  • Get by a step-by-step, no-nonsense introduction to cryptography
  • Identify differences between vulnerability assessments and penetration tests
  • Master ways to prevent and disable system hacking
  • Protect yourself from malware, including Trojans, backdoor, viruses, and more
  • Thwart hackers attacking wireless networks and mobile devices
  • Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls
  • Implement countermeasures to stop SQL injections and other database attacks
  • And more!

Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 150 exam questions. Each question comes with a carefully crafted explanation for why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace in order to test your knowledge.

Take a look at the many students who have already used this course to ACE their Ethical Hacker Exam.  Don’t take my word for it, ask questions to them directly in the forums.

Just as Brayden and many others did…
Do you want to pass on your first attempt?
I did. So I did what Tim told me and I just got my Certification today!!
Thanks Instructor TIM! This course made all the difference.

 

Why Learn Ethical Hacking?

A growing number of companies today seek ethical hackers to protect their most sensitive information. Very few days go by without a breaking news story revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking has quickly become one of the most sought after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development.

 

Why Learn From Me?

The ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the Ethical Hacker [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 27 years of experience as a technical trainer, consultant, and pen tester into this course material.

I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a very good idea of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to mastering the concepts covered and completing the assignments and quizzes, you will set yourself up for success on exam day.

I took a lighthearted approach in several sections of the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future.

Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.

By the end of the course, you’ll have everything you need to ace the Ethical Hacker Certification [1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.

Join me on this journey, and enroll in the course today.

References:  [1] Certified Ethical Hacker and CEH are Registered Trade Marks of EC-Council,

Note: Ethical Hacker is not a registered trade mark.

 

Who this course is for:

  • Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network
  • This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.
  • This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.
  • People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.

Requirements:

  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.

Course Features

  • Lectures 189
  • Quizzes 0
  • Duration 16.5 hours
  • Skill level All levels
  • Language English
  • Students 43
  • Certificate No
  • Assessments Yes
  • Opening Section 2

  • Build Your Lab - In the Future We will offer an Online Solution 13

    • Lecture2.1
      Explaination of Resources for CEH Course
    • Lecture2.2
      Create A VeraCrypt Container to Protect Your Laptop or Desktop 11 min
    • Lecture2.3
      Utilities, Cheat Sheets, Various Items You really only Want to Download Once 02 min
    • Lecture2.4
      Build a Manual Lab 01 04 min
    • Lecture2.5
      Lab Legalities 03 min
    • Lecture2.6
      Housekeeping 02 min
    • Lecture2.7
      Getting to Know Your XPAttacker VM 03 min
    • Lecture2.8
      Getting to Know Your Win2k VM 05 min
    • Lecture2.9
      Getting to Know You Win7 VM 04 min
    • Lecture2.10
      Getting to Know Your Win2k3-AD 01 min
    • Lecture2.11
      Getting to Know Your WebApp 01 min
    • Lecture2.12
      Putting Our Lab Together Step By Step 13 min
    • Lecture2.13
      Tying everything together in our Lab 06 min
  • Ethical Hacking Overview 22

    • Lecture3.1
      Introduction to Pentesting and Ethical Hacking 01 min
    • Lecture3.2
      Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro 05 min
    • Lecture3.3
      Defintion of a Penetration Test 02 min
    • Lecture3.4
      The Evolving Threat 02 min
    • Lecture3.5
      The Vulnerabilty Lifecycle 02 min
    • Lecture3.6
      Map.Norsecorp.com 02 min
    • Lecture3.7
      Botnet Definition 05 min
    • Lecture3.8
      Defense in Depth 05 min
    • Lecture3.9
      MetaData 03 min
    • Lecture3.10
      Types of PenTests 05 min
    • Lecture3.11
      Types of Hackers 01 min
    • Lecture3.12
      Common Definitions 02 min
    • Lecture3.13
      Hacker vs. Penetration Tester 05 min
    • Lecture3.14
      Penetration Testing Terminology 03 min
    • Lecture3.15
      Essential Terminology 04 min
    • Lecture3.16
      OSSTMM Methodology 09 min
    • Lecture3.17
      Tools vs Technique 05 min
    • Lecture3.18
      Things are not always as they seem 01 min
    • Lecture3.19
      Calculating Risk & Formulas 03 min
    • Lecture3.20
      Analyzing Findings 01 min
    • Lecture3.21
      Calculating SLE, ARO, ALE 01 min
    • Lecture3.22
      Other Penetration Testing Methodologies 03 min
  • FootPrinting - Reconnaissance and Information Gathering 21

    • Lecture4.1
      Introduction to Footprinting 01 min
    • Lecture4.2
      What Information is Gathered by the Hacker 05 min
    • Lecture4.3
      Methods of Obtaining Information And Physical Access 01 min
    • Lecture4.4
      Social Access 04 min
    • Lecture4.5
      Digital Access 03 min
    • Lecture4.6
      Passive vs Active Reconnaissance 02 min
    • Lecture4.7
      Footprinting Defined 01 min
    • Lecture4.8
      Exercise: Footprinting Tool: Maltego 02 min
    • Lecture4.9
      Most Powerful Hacking Tool on the Internet Today 04 min
    • Lecture4.10
      Instructor Demonstration – The Power of Google -A 06 min
    • Lecture4.11
      Instructor Demonstration – The Power of Google -B 10 min
    • Lecture4.12
      Instructor Demo: GoogleAlerts 04 min
    • Lecture4.13
      Removing Searchable Content 05 min
    • Lecture4.14
      Internet Archive: The WayBack Machine 07 min
    • Lecture4.15
      Domain Name Registration-WhoIs Information 01 min
    • Lecture4.16
      Instructor Demonstation – CentralOps 06 min
    • Lecture4.17
      DNS Databases 03 min
    • Lecture4.18
      Traceroute Operation 05 min
    • Lecture4.19
      InstructorDemonstration: Online Tools 04 min
    • Lecture4.20
      Spokeo – No Refuge for the Wealthy 05 min
    • Lecture4.21
      Netcraft, DoaminsbyProxy, Countermeasures 09 min
  • Linux Overview 9

    • Lecture5.1
      Introduction to Linux 01 min
    • Lecture5.2
      Linux History – Linus + Minux = Linux 02 min
    • Lecture5.3
      Linux GUI Desktops 02 min
    • Lecture5.4
      Linux Shell Linux Bash Shell 02 min
    • Lecture5.5
      Passwd & Shadow File Formats 02 min
    • Lecture5.6
      InstructorDemo:User Account Management 06 min
    • Lecture5.7
      Tarballs & Zips & Installing VMware Tools 05 min
    • Lecture5.8
      Compiling Programs in Linux, Shell Shock, Poodle Vulnerability 03 min
    • Lecture5.9
      Most Popular Linux Security Distribution 02 min
  • Detecting Live Systems - Port Scanning 9

    • Lecture6.1
      Introduction to Port Scanning 01 min
    • Lecture6.2
      Introduction to Port Scanning 02 min
    • Lecture6.3
      TCP/IP Stack 05 min
    • Lecture6.4
      TCP 3-Way HandShake 07 min
    • Lecture6.5
      NMap ServiceVersion Detection And Demo 02 min
    • Lecture6.6
      Instructor Demonstration-Engage, NmapScans 08 min
    • Lecture6.7
      Hping3, NMap -O 01 min
    • Lecture6.8
      Fuzzy Logic 01 min
    • Lecture6.9
      Countermeasures: Scanning 02 min
  • Enumeration - What Can We Get For Free? 7

    • Lecture7.1
      Intro to Enumeration 01 min
    • Lecture7.2
      Grabbing Banners 04 min
    • Lecture7.3
      Shodan 05 min
    • Lecture7.4
      ZoneTransfers 05 min
    • Lecture7.5
      DNS Enumeration 04 min
    • Lecture7.6
      SNMP Countermeasures, AD and AD Countermeasures 04 min
    • Lecture7.7
      Null Sessions 09 min
  • Cryptography 8

    • Lecture8.1
      Intro Into Cryptography 01 min
    • Lecture8.2
      Beginings of Cryptography 04 min
    • Lecture8.3
      Implementation, Stream Cipher, Block Cipher and the Enigima 09 min
    • Lecture8.4
      Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange 05 min
    • Lecture8.5
      Hashing, Hashing Collisions, Common Hash Algorithms 09 min
    • Lecture8.6
      Ransomware 03 min
    • Lecture8.7
      IPSec and SSH 04 min
    • Lecture8.8
      PKI Applications, Quantum Crypto and VeraCrypt 03 min
  • Malware - Sofware Goes Undercover 17

    • Lecture9.1
      Introduction to Malware and How The Internet Makes Money 01 min
    • Lecture9.2
      Things that make the World Go Around – Well as far as the Internet is concerned 09 min
    • Lecture9.3
      Trojans and Back Doors 06 min
    • Lecture9.4
      Defining Malware: Viruses and Worms 07 min
    • Lecture9.5
      Defining Malware: Spyware 05 min
    • Lecture9.6
      Data Loss Prevention (DLP) and other Creepy things 10 min
    • Lecture9.7
      Distributing Malware 06 min
    • Lecture9.8
      Malware Capabilities 05 min
    • Lecture9.9
      Auto Starting Malware 02 min
    • Lecture9.10
      Tool: Netcat 04 min
    • Lecture9.11
      Demo: NetCat Procedure 10 min
    • Lecture9.12
      Executable Wrappers 04 min
    • Lecture9.13
      Instructor Demo: Executeable Wrappers 1 09 min
    • Lecture9.14
      Instructor Demo: Executeable Wrappers 2 02 min
    • Lecture9.15
      Malware Avoiding Detection 04 min
    • Lecture9.16
      Malware Countermeasures 1 08 min
    • Lecture9.17
      Malware Countermeasures 2 06 min
  • System Hacking 24

    • Lecture10.1
      Introduction to System Hacking Introduction 01 min
    • Lecture10.2
      Types of Password Attacks, Keystroke Loggers 06 min
    • Lecture10.3
      Password Guessing Online 08 min
    • Lecture10.4
      Cracking Windows Passwords – A 03 min
    • Lecture10.5
      Cracking Windows Passwords – B 08 min
    • Lecture10.6
      Cracking Windows Passwords – C 07 min
    • Lecture10.7
      Cracking Windows Passwords – D 08 min
    • Lecture10.8
      Cracking Windows Passwords – E 08 min
    • Lecture10.9
      Countermeasures: Stealing the Passwords, Syskey, Salting 09 min
    • Lecture10.10
      Cloud Cracking Techniques 02 min
    • Lecture10.11
      Generating Rainbow Tables, Free Rainbow Tables 03 min
    • Lecture10.12
      Password Hash Insertion Attack 09 min
    • Lecture10.13
      Demonstration MimiKatz 11 min
    • Lecture10.14
      Privilege Escalation, Countermeasures 05 min
    • Lecture10.15
      Covering Tracks, Disable Auditing, Clearing the Event Log 03 min
    • Lecture10.16
      Alternate Data Streams Demonstration – A 08 min
    • Lecture10.17
      Alternate Data Streams Demonstration – B 12 min
    • Lecture10.18
      Alternate Data Streams Demonstration – C 10 min
    • Lecture10.19
      Anonymizers – JAP 04 min
    • Lecture10.20
      Steganography 12 min
    • Lecture10.21
      Virtually Complete Secrecy, TOR 11 min
    • Lecture10.22
      RootKits – Overview 08 min
    • Lecture10.23
      RootKits – Frightening Demo 13 min
    • Lecture10.24
      Root Kit Countermeasures, Tokens and Smart Cards 11 min
  • Advanced Hacking and Explotiation Techniques 12

    • Lecture11.1
      Introduction to Advanced System Explotation 01 min
    • Lecture11.2
      How do Exploits Work? 05 min
    • Lecture11.3
      Buffer Over Flows Introduction I do when Speaking at a Conference 06 min
    • Lecture11.4
      Processors and Stacks 10 min
    • Lecture11.5
      Basic Types of Buffer Overflows And Demo 01 11 min
    • Lecture11.6
      Basic Types of Buffer Overflows And Demo 02 11 min
    • Lecture11.7
      Basic Types of Buffer Overflows And Demo 03 09 min
    • Lecture11.8
      Stages of Exploit Development 01 min
    • Lecture11.9
      Buffer Overflow Prevention 08 min
    • Lecture11.10
      The Metasploit Project 05 min
    • Lecture11.11
      Core Impact Overview 05 min
    • Lecture11.12
      Core Impact Demo with Narrative Comments 13 min
  • Attacking Databases 8

    • Lecture12.1
      Introduction to Database Management Systems 01 min
    • Lecture12.2
      Overview of Databases, Types of Databases, Relations of Databases 07 min
    • Lecture12.3
      View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties 07 min
    • Lecture12.4
      SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info 09 min
    • Lecture12.5
      Hardening SQL Server 02 min
    • Lecture12.6
      SQL Injection Demo 1 10 min
    • Lecture12.7
      SQL Injection Demo 2 06 min
    • Lecture12.8
      SQL Injection Demo 3 04 min
  • Attacking Wireless Networks and Mobile Phones 9

    • Lecture13.1
      Introduction to WiFi and Mobile Hacking 01 min
    • Lecture13.2
      WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n – MIMO, 802.11ac, 04 min
    • Lecture13.3
      802.11n – MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets 06 min
    • Lecture13.4
      XOR Basics, WEP Weaknesses 03 min
    • Lecture13.5
      TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption 07 min
    • Lecture13.6
      Kismet, Aircrack-ng, Aireplay 03 min
    • Lecture13.7
      EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network 03 min
    • Lecture13.8
      Exercise/Assignment; Cracking WPA/WPA2 Password Preparation 13 min
    • Lecture13.9
      Exercise/Assignment; Cracking WPA/WPA2 Password – Solution 05 min
  • Networks - Sniffing, ARP Poisioning, and Breaking SSL 9

    • Lecture14.1
      Introduction to Sniffing 01 min
    • Lecture14.2
      Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer 07 min
    • Lecture14.3
      TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing 04 min
    • Lecture14.4
      Active Sniffing & Methods, Switch Table Flooding 04 min
    • Lecture14.5
      Arp Cache Posioning 06 min
    • Lecture14.6
      Arp Cache Posioning Tools and Countermeasures 05 min
    • Lecture14.7
      Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M 06 min
    • Lecture14.8
      Exercise/Assignment Breaking SSL – Preparation 09 min
    • Lecture14.9
      Exercise/Assignment Breaking SSL – Solution 05 min
  • Firewalls, IDS and IPS and some New Age Protection 5

    • Lecture15.1
      Introduction tp Firewalls, IDS and IPS WAF 01 min
    • Lecture15.2
      Firewall – Your First Line of Defense 06 min
    • Lecture15.3
      IDS Your Second Line of Defense 05 min
    • Lecture15.4
      Web Application Firewall and Evasion Techniques’ 08 min
    • Lecture15.5
      Behavioural Firewalls and IPS Systems 03 min
  • Attacking Web Technologies 11

    • Lecture16.1
      Introduction to Web Application 01 min
    • Lecture16.2
      Common Security Threats, Need for Monitoring, SANS Seven MGT Errors 06 min
    • Lecture16.3
      Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets 05 min
    • Lecture16.4
      Logs Cancanolization and Other Attacks 03 min
    • Lecture16.5
      Web App Scanner, HTTrack,HTTPrint, Proxies 07 min
    • Lecture16.6
      Directory Traversal & Other Common Vulnerabilties 10 min
    • Lecture16.7
      XSS Demo and Countermeasures 09 min
    • Lecture16.8
      Common Ways to Attack Web Technologies, Cross Site Scripting (XSS) 09 min
    • Lecture16.9
      Cross Site Request Forgery 06 min
    • Lecture16.10
      Cookies and Session Management 05 min
    • Lecture16.11
      OWASP Top 10 07 min
  • So Your Ready To Take Your Test 2

    • Lecture17.1
      So your Ready To Take Your Test 1? 07 min
    • Lecture17.2
      So Your Ready To Take Your Test 2? 05 min
  • Bonus Section 1

    • Lecture18.1
      Backing Up our Veracrypt Storage Enclosure for Saftey 05 min
Hi, I’m Tim Pierson. I’m a technical consultant and pen tester who is passionate about teaching. For the past 27 years, I’ve gained industry experience in security, secure coding, virtualization, and cloud. My first love, however, has always been teaching. I enjoy explaining complex topics to both technical and non-technical clients, and I’ve taken this passion around the world, where I have delivered seminars, keynotes, and training's for global corporations.I have taught my Ethical Hacking Exam preparation course well over 300 times–from San Francisco to Malaysia to London. IT certification has now evolved into an industry staple; now all people who operate computers with privileged network access should obtain this certification to stay current with new technologies and jump the curve.If you are serious about obtaining your Ethical Hacker Certification, you have come to the right place. In 2009, EC-Council, the creator of the Certified Ethical Hacker™ exam, voted me Instructor of the Year for successfully preparing countless individuals to pass the exam. I was voted Master Trainer in 2010 one of 10 in the world from a large pool of nominees.When teaching, I use a combination of hands-on labs, instructional videos, and practice test questions to help all my students easily grasp concepts. I take a lighthearted and fun approach; if you’re not careful, you might find that some of my jokes stick with you even until the day of the exam!So what are you waiting for? Join me on your journey to passing the Ethical Hacker Certification exam.

Reviews

Average Rating

0
0 rating

Detailed Rating

5
0%
4
0%
3
0%
2
0%
1
0%
$195.00 $99.00