The Complete CEH Exam Prep Course

(0 review)
$194.00 $69.00

If you are curious about new technologies and passionate about jump starting your career as a ethical hacker, then this course is for you!  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.

In this course, you will:

  • Learn the business and technical logistics behind penetration testing
  • Identify evolving threats from different types of hackers
  • Reveal shocking truths about the information operating systems can divulge
  • Realize the power of footprinting on the Internet
  • Detect live systems by inference
  • Get by a step-by-step, no-nonsense introduction to cryptography
  • Identify differences between vulnerability assessments and penetration tests
  • Master ways to prevent and disable system hacking
  • Protect yourself from malware, including Trojans, backdoor, viruses, and more
  • Thwart hackers attacking wireless networks and mobile devices
  • Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls
  • Implement countermeasures to stop SQL injections and other database attacks
  • And more!

Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 150 exam questions. Each question comes with a carefully crafted explanation for why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace in order to test your knowledge.

Take a look at the many students who have already used this course to ACE their Ethical Hacker Exam.  Don’t take my word for it, ask questions to them directly in the forums.

Just as Brayden and many others did…
Do you want to pass on your first attempt?
I did. So I did what Tim told me and I just got my Certification today!!
Thanks Instructor TIM! This course made all the difference.

 

Why Learn Ethical Hacking?

A growing number of companies today seek ethical hackers to protect their most sensitive information. Very few days go by without a breaking news story revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking has quickly become one of the most sought after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development.

 

Why Learn From Me?

The ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the Ethical Hacker [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 27 years of experience as a technical trainer, consultant, and pen tester into this course material.

I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a very good idea of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to mastering the concepts covered and completing the assignments and quizzes, you will set yourself up for success on exam day.

I took a lighthearted approach in several sections of the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future.

Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.

By the end of the course, you’ll have everything you need to ace the Ethical Hacker Certification [1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.

Join me on this journey, and enroll in the course today.

References:  [1] Certified Ethical Hacker and CEH are Registered Trade Marks of EC-Council,

Note: Ethical Hacker is not a registered trade mark.

 

Who this course is for:

  • Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network
  • This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.
  • This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.
  • People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.

Requirements:

  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.

Course Features

  • Lectures 188
  • Duration 16.5 hours
  • Skill level All levels
  • Language English
  • Students 2
  • Assessments Yes
  • Opening Section 0/2

  • Build Your Lab - In the Future We will offer an Online Solution 0/12

    • Lecture2.1
      Create A VeraCrypt Container to Protect Your Laptop or Desktop
      11m
    • Lecture2.2
      Utilities, Cheat Sheets, Various Items You really only Want to Download Once
      2m
    • Lecture2.3
      Build a Manual Lab 01
      4m
    • Lecture2.4
      Lab Legalities
      3m
    • Lecture2.5
      Housekeeping
      2m
    • Lecture2.6
      Getting to Know Your XPAttacker VM
      3m
    • Lecture2.7
      Getting to Know Your Win2k VM
      5m
    • Lecture2.8
      Getting to Know You Win7 VM
      4m
    • Lecture2.9
      Getting to Know Your Win2k3-AD
      1m
    • Lecture2.10
      Getting to Know Your WebApp
      1m
    • Lecture2.11
      Putting Our Lab Together Step By Step
      13m
    • Lecture2.12
      Tying everything together in our Lab
      6m
  • Ethical Hacking Overview 0/22

    • Lecture3.1
      Introduction to Pentesting and Ethical Hacking
      1m
    • Lecture3.2
      Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
      5m
    • Lecture3.3
      Defintion of a Penetration Test
      2m
    • Lecture3.4
      The Evolving Threat
      2m
    • Lecture3.5
      The Vulnerabilty Lifecycle
      2m
    • Lecture3.6
      Map.Norsecorp.com
      2m
    • Lecture3.7
      Botnet Definition
      5m
    • Lecture3.8
      Defense in Depth
      5m
    • Lecture3.9
      MetaData
      3m
    • Lecture3.10
      Types of PenTests
      5m
    • Lecture3.11
      Types of Hackers
      1m
    • Lecture3.12
      Common Definitions
      2m
    • Lecture3.13
      Hacker vs. Penetration Tester
      5m
    • Lecture3.14
      Penetration Testing Terminology
      3m
    • Lecture3.15
      Essential Terminology
      4m
    • Lecture3.16
      OSSTMM Methodology
      9m
    • Lecture3.17
      Tools vs Technique
      5m
    • Lecture3.18
      Things are not always as they seem
      1m
    • Lecture3.19
      Calculating Risk & Formulas
      3m
    • Lecture3.20
      Analyzing Findings
      1m
    • Lecture3.21
      Calculating SLE, ARO, ALE
      1m
    • Lecture3.22
      Other Penetration Testing Methodologies
      3m
  • FootPrinting - Reconnaissance and Information Gathering 0/21

    • Lecture4.1
      Introduction to Footprinting
      1m
    • Lecture4.2
      What Information is Gathered by the Hacker
      5m
    • Lecture4.3
      Methods of Obtaining Information And Physical Access
      1m
    • Lecture4.4
      Social Access
      4m
    • Lecture4.5
      Digital Access
      3m
    • Lecture4.6
      Passive vs Active Reconnaissance
      2m
    • Lecture4.7
      Footprinting Defined
      1m
    • Lecture4.8
      Exercise: Footprinting Tool: Maltego
      2m
    • Lecture4.9
      Most Powerful Hacking Tool on the Internet Today
      4m
    • Lecture4.10
      Instructor Demonstration – The Power of Google -A
      6m
    • Lecture4.11
      Instructor Demonstration – The Power of Google -B
      10m
    • Lecture4.12
      Instructor Demo: GoogleAlerts
      4m
    • Lecture4.13
      Removing Searchable Content
      5m
    • Lecture4.14
      Internet Archive: The WayBack Machine
      7m
    • Lecture4.15
      Domain Name Registration-WhoIs Information
      1m
    • Lecture4.16
      Instructor Demonstation – CentralOps
      6m
    • Lecture4.17
      DNS Databases
      3m
    • Lecture4.18
      Traceroute Operation
      5m
    • Lecture4.19
      InstructorDemonstration: Online Tools
      4m
    • Lecture4.20
      Spokeo – No Refuge for the Wealthy
      5m
    • Lecture4.21
      Netcraft, DoaminsbyProxy, Countermeasures
      9m
  • Linux Overview 0/9

    • Lecture5.1
      Introduction to Linux
      1m
    • Lecture5.2
      Linux History – Linus + Minux = Linux
      2m
    • Lecture5.3
      Linux GUI Desktops
      2m
    • Lecture5.4
      Linux Shell Linux Bash Shell
      2m
    • Lecture5.5
      Passwd & Shadow File Formats
      2m
    • Lecture5.6
      InstructorDemo:User Account Management
      6m
    • Lecture5.7
      Tarballs & Zips & Installing VMware Tools
      5m
    • Lecture5.8
      Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
      3m
    • Lecture5.9
      Most Popular Linux Security Distribution
      2m
  • Detecting Live Systems - Port Scanning 0/9

    • Lecture6.1
      Introduction to Port Scanning
      1m
    • Lecture6.2
      Introduction to Port Scanning
      2m
    • Lecture6.3
      TCP/IP Stack
      5m
    • Lecture6.4
      TCP 3-Way HandShake
      7m
    • Lecture6.5
      NMap ServiceVersion Detection And Demo
      2m
    • Lecture6.6
      Instructor Demonstration-Engage, NmapScans
      8m
    • Lecture6.7
      Hping3, NMap -O
      1m
    • Lecture6.8
      Fuzzy Logic
      1m
    • Lecture6.9
      Countermeasures: Scanning
      2m
  • Enumeration - What Can We Get For Free? 0/7

    • Lecture7.1
      Intro to Enumeration
      1m
    • Lecture7.2
      Grabbing Banners
      4m
    • Lecture7.3
      Shodan
      5m
    • Lecture7.4
      ZoneTransfers
      5m
    • Lecture7.5
      DNS Enumeration
      4m
    • Lecture7.6
      SNMP Countermeasures, AD and AD Countermeasures
      4m
    • Lecture7.7
      Null Sessions
      9m
  • Cryptography 0/8

    • Lecture8.1
      Intro Into Cryptography
      1m
    • Lecture8.2
      Beginings of Cryptography
      4m
    • Lecture8.3
      Implementation, Stream Cipher, Block Cipher and the Enigima
      9m
    • Lecture8.4
      Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange
      5m
    • Lecture8.5
      Hashing, Hashing Collisions, Common Hash Algorithms
      9m
    • Lecture8.6
      Ransomware
      3m
    • Lecture8.7
      IPSec and SSH
      4m
    • Lecture8.8
      PKI Applications, Quantum Crypto and VeraCrypt
      3m
  • Malware - Sofware Goes Undercover 0/17

    • Lecture9.1
      Introduction to Malware and How The Internet Makes Money
      1m
    • Lecture9.2
      Things that make the World Go Around – Well as far as the Internet is concerned
      9m
    • Lecture9.3
      Trojans and Back Doors
      6m
    • Lecture9.4
      Defining Malware: Viruses and Worms
      7m
    • Lecture9.5
      Defining Malware: Spyware
      5m
    • Lecture9.6
      Data Loss Prevention (DLP) and other Creepy things
      10m
    • Lecture9.7
      Distributing Malware
      6m
    • Lecture9.8
      Malware Capabilities
      5m
    • Lecture9.9
      Auto Starting Malware
      2m
    • Lecture9.10
      Tool: Netcat
      4m
    • Lecture9.11
      Demo: NetCat Procedure
      10m
    • Lecture9.12
      Executable Wrappers
      4m
    • Lecture9.13
      Instructor Demo: Executeable Wrappers 1
      9m
    • Lecture9.14
      Instructor Demo: Executeable Wrappers 2
      2m
    • Lecture9.15
      Malware Avoiding Detection
      4m
    • Lecture9.16
      Malware Countermeasures 1
      8m
    • Lecture9.17
      Malware Countermeasures 2
      6m
  • System Hacking 0/24

    • Lecture10.1
      Introduction to System Hacking Introduction
      1m
    • Lecture10.2
      Types of Password Attacks, Keystroke Loggers
      6m
    • Lecture10.3
      Password Guessing Online
      8m
    • Lecture10.4
      Cracking Windows Passwords – A
      3m
    • Lecture10.5
      Cracking Windows Passwords – B
      8m
    • Lecture10.6
      Cracking Windows Passwords – C
      7m
    • Lecture10.7
      Cracking Windows Passwords – D
      8m
    • Lecture10.8
      Cracking Windows Passwords – E
      8m
    • Lecture10.9
      Countermeasures: Stealing the Passwords, Syskey, Salting
      9m
    • Lecture10.10
      Cloud Cracking Techniques
      2m
    • Lecture10.11
      Generating Rainbow Tables, Free Rainbow Tables
      3m
    • Lecture10.12
      Password Hash Insertion Attack
      9m
    • Lecture10.13
      Demonstration MimiKatz
      11m
    • Lecture10.14
      Privilege Escalation, Countermeasures
      5m
    • Lecture10.15
      Covering Tracks, Disable Auditing, Clearing the Event Log
      3m
    • Lecture10.16
      Alternate Data Streams Demonstration – A
      8m
    • Lecture10.17
      Alternate Data Streams Demonstration – B
      12m
    • Lecture10.18
      Alternate Data Streams Demonstration – C
      10m
    • Lecture10.19
      Anonymizers – JAP
      4m
    • Lecture10.20
      Steganography
      12m
    • Lecture10.21
      Virtually Complete Secrecy, TOR
      11m
    • Lecture10.22
      RootKits – Overview
      8m
    • Lecture10.23
      RootKits – Frightening Demo
      13m
    • Lecture10.24
      Root Kit Countermeasures, Tokens and Smart Cards
      11m
  • Advanced Hacking and Explotiation Techniques 0/12

    • Lecture11.1
      Introduction to Advanced System Explotation
      1m
    • Lecture11.2
      How do Exploits Work?
      5m
    • Lecture11.3
      Buffer Over Flows Introduction I do when Speaking at a Conference
      6m
    • Lecture11.4
      Processors and Stacks
      10m
    • Lecture11.5
      Basic Types of Buffer Overflows And Demo 01
      11m
    • Lecture11.6
      Basic Types of Buffer Overflows And Demo 02
      11m
    • Lecture11.7
      Basic Types of Buffer Overflows And Demo 03
      9m
    • Lecture11.8
      Stages of Exploit Development
      1m
    • Lecture11.9
      Buffer Overflow Prevention
      8m
    • Lecture11.10
      The Metasploit Project
      5m
    • Lecture11.11
      Core Impact Overview
      5m
    • Lecture11.12
      Core Impact Demo with Narrative Comments
      13m
  • Attacking Databases 0/8

    • Lecture12.1
      Introduction to Database Management Systems
      1m
    • Lecture12.2
      Overview of Databases, Types of Databases, Relations of Databases
      7m
    • Lecture12.3
      View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties
      7m
    • Lecture12.4
      SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info
      9m
    • Lecture12.5
      Hardening SQL Server
      2m
    • Lecture12.6
      SQL Injection Demo 1
      10m
    • Lecture12.7
      SQL Injection Demo 2
      6m
    • Lecture12.8
      SQL Injection Demo 3
      4m
  • Attacking Wireless Networks and Mobile Phones 0/9

    • Lecture13.1
      Introduction to WiFi and Mobile Hacking
      1m
    • Lecture13.2
      WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n – MIMO, 802.11ac,
      4m
    • Lecture13.3
      802.11n – MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets
      6m
    • Lecture13.4
      XOR Basics, WEP Weaknesses
      3m
    • Lecture13.5
      TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption
      7m
    • Lecture13.6
      Kismet, Aircrack-ng, Aireplay
      3m
    • Lecture13.7
      EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network
      3m
    • Lecture13.8
      Exercise/Assignment; Cracking WPA/WPA2 Password Preparation
      13m
    • Lecture13.9
      Exercise/Assignment; Cracking WPA/WPA2 Password – Solution
      5m
  • Networks - Sniffing, ARP Poisioning, and Breaking SSL 0/9

    • Lecture14.1
      Introduction to Sniffing
      1m
    • Lecture14.2
      Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer
      7m
    • Lecture14.3
      TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing
      4m
    • Lecture14.4
      Active Sniffing & Methods, Switch Table Flooding
      4m
    • Lecture14.5
      Arp Cache Posioning
      6m
    • Lecture14.6
      Arp Cache Posioning Tools and Countermeasures
      5m
    • Lecture14.7
      Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M
      6m
    • Lecture14.8
      Exercise/Assignment Breaking SSL – Preparation
      9m
    • Lecture14.9
      Exercise/Assignment Breaking SSL – Solution
      5m
  • Firewalls, IDS and IPS and some New Age Protection 0/5

    • Lecture15.1
      Introduction tp Firewalls, IDS and IPS WAF
      1m
    • Lecture15.2
      Firewall – Your First Line of Defense
      6m
    • Lecture15.3
      IDS Your Second Line of Defense
      5m
    • Lecture15.4
      Web Application Firewall and Evasion Techniques’
      8m
    • Lecture15.5
      Behavioural Firewalls and IPS Systems
      3m
  • Attacking Web Technologies 0/11

    • Lecture16.1
      Introduction to Web Application
      1m
    • Lecture16.2
      Common Security Threats, Need for Monitoring, SANS Seven MGT Errors
      6m
    • Lecture16.3
      Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets
      5m
    • Lecture16.4
      Logs Cancanolization and Other Attacks
      3m
    • Lecture16.5
      Web App Scanner, HTTrack,HTTPrint, Proxies
      7m
    • Lecture16.6
      Directory Traversal & Other Common Vulnerabilties
      10m
    • Lecture16.7
      XSS Demo and Countermeasures
      9m
    • Lecture16.8
      Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)
      9m
    • Lecture16.9
      Cross Site Request Forgery
      6m
    • Lecture16.10
      Cookies and Session Management
      5m
    • Lecture16.11
      OWASP Top 10
      7m
  • So Your Ready To Take Your Test 0/2

    • Lecture17.1
      So your Ready To Take Your Test 1?
      7m
    • Lecture17.2
      So Your Ready To Take Your Test 2?
      5m
  • Bonus Section 0/1

    • Lecture18.1
      Backing Up our Veracrypt Storage Enclosure for Saftey
      5m
Tim Pierson
Hi, I’m Tim Pierson. I’m a technical consultant and pen tester who is passionate about teaching. For the past 27 years, I’ve gained industry experience in security, secure coding, virtualization, and cloud. My first love, however, has always been teaching. I enjoy explaining complex topics to both technical and non-technical clients, and I’ve taken this passion around the world, where I have delivered seminars, keynotes, and training's for global corporations. I have taught my Ethical Hacking Exam preparation course well over 300 times–from San Francisco to Malaysia to London. IT certification has now evolved into an industry staple; now all people who operate computers with privileged network access should obtain this certification to stay current with new technologies and jump the curve. If you are serious about obtaining your Ethical Hacker Certification, you have come to the right place. In 2009, EC-Council, the creator of the Certified Ethical Hacker™ exam, voted me Instructor of the Year for successfully preparing countless individuals to pass the exam. I was voted Master Trainer in 2010 one of 10 in the world from a large pool of nominees. When teaching, I use a combination of hands-on labs, instructional videos, and practice test questions to help all my students easily grasp concepts. I take a lighthearted and fun approach; if you’re not careful, you might find that some of my jokes stick with you even until the day of the exam! So what are you waiting for? Join me on your journey to passing the Ethical Hacker Certification exam.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
$194.00 $69.00