Browse Library

The Complete Ethical Hacking Certification Course

Master Ethical Hacking, Kali Linux, Cyber Security

Instructed by Mohamed Atef

$25 $80 69% off

1 days left at this price! Buy Now

30-Day Money Back Guarantee

Full Access to this course
Play & Pause Videos
High Quality Recorded Lectures 24
Learn Online from Mobile/PC/Tablet
Download Course for Offline Viewing
Inlcudes Real Projects
Lifetime access & free updates
Certificate of Completion
Free Instructor Support

$19 /month

Buy Subscription See all plans
  • Access to all marketplace courses
  • Access to all new courses
  • Play & Pause Videos
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Download Course for Offline Viewing
  • Inlcudes Real Projects
  • Certificate of Completion
  • Free Instructor Support

$199 /month

Buy Subscription See all plans
  • Access to all marketplace courses
  • Access to all new courses
  • Play & Pause Videos
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Download Course for Offline Viewing
  • Inlcudes Real Projects
  • Certificate of Completion
  • Free Instructor Support
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

This is the worlds most advanced ethical hacking course with 18 of the most current security
domains any ethical hacker will ever want to know when they are planning to beef up the
information security posture of their organization. In 18 comprehensive modules, the course
covers over 270 attack technologies, commonly used by hackers

The goal of this course is to help you master an ethical hacking methodology that can be used in
a penetration testing or ethical hacking situation. By the end of the course, you will have ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker Certification. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In the course, you will learn:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of foot-printing, foot-printing tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffring techniques and how to defend against sniffring
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wi-Fi Hacking, wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing road map

Make This Investment in Yourself

If you want to do exciting work and enjoy the salaries that ethical hackers make, then this is the course for you!

Take this course become a certified ethical hacker!

  • Basic Computer Knowledge
  • Computer Science Students
View More...

Section 1 : Introduction

  • Lecture 1 :
  • Lecture 2 :
  • 2.Is PT EH a real job
  • Lecture 3 :
  • 3.CEH Exam

Section 2 : Build your lab

  • Lecture 1 :
  • 4.Build your virtual lab
  • Lecture 2 :
  • 5.Download Windows ISO Images
  • Lecture 3 :
  • 6.Configure Windows VM
  • Lecture 4 :
  • 7.Download Kali Linux
  • Lecture 5 :
  • 8.Configure Kali Linux
  • Lecture 6 :
  • 9.Download OWASBWA and Metasploitable

Section 3 : Get Familiar with Kali Linux

  • Lecture 1 :
  • 10.Get Familiar with Kali Linux
  • Lecture 2 :
  • 11.File Management
  • Lecture 3 :
  • 12. Find,Locate

Section 4 : Important Definations

  • Lecture 1 :
  • 13.Essential Terminology
  • Lecture 2 :
  • 14.CIA

Section 5 : Footprinting and Reconnaissance

  • Lecture 1 :
  • 15.Footprinting Introduction
  • Lecture 2 :
  • 16.Footprinting and Reconnaissance
  • Lecture 3 :
  • 17.Email Harvest
  • Lecture 4 :
  • 18. Google Hacking
  • Lecture 5 :
  • 19.Metagoofil
  • Lecture 6 :
  • 20.People Search Engine
  • Lecture 7 :
  • 21.Maltego (Intelligence Tool)
  • Lecture 8 :
  • 22.Internet Archives and Alerts

Section 6 : Network Scanning

  • Lecture 1 :
  • 23.Network Scanning Overview
  • Lecture 2 :
  • 24.Important Scanning Defination
  • Lecture 3 :
  • 25. Network Scanning Methology
  • Lecture 4 :
  • 26.Identifying Live system
  • Lecture 5 :
  • 27.Port Scanning
  • Lecture 6 :
  • 28.Advanced Scanning Techniques
  • Lecture 7 :
  • 29.Get more information about your victim
  • Lecture 8 :
  • 30.NMAP NSE Scripts
  • Lecture 9 :
  • 31.Zenmap
  • Lecture 10 :
  • 32.Netcat
  • Lecture 11 :
  • 33.Grabbing Banner
  • Lecture 12 :
  • 34.Network Mapping
  • Lecture 13 :
  • 35.Vulnerability Scanning

Section 7 : Hiding your Identity

  • Lecture 1 :
  • 36.Proxy Server
  • Lecture 2 :
  • 37.Configure a local proxy
  • Lecture 3 :
  • 38.Using Public Proxy

Section 8 : Enumeration

  • Lecture 1 :
  • 39.Enumeration Overview
  • Lecture 2 :
  • NetBios Enumeration
  • Lecture 3 :
  • SNMP Enumeration
  • Lecture 4 :
  • DNS Enumeration
  • Lecture 5 :
  • DNS Zone Transfer
  • Lecture 6 :
  • Enum4Linux

Section 9 : System Hacking

  • Lecture 1 :
  • Introduction to System Hacking
  • Lecture 2 :
  • Password Hacking techniques
  • Lecture 3 :
  • Default Password
  • Lecture 4 :
  • Important Tool
  • Lecture 5 :
  • Cain in Action
  • Lecture 6 :
  • Xhydra
  • Lecture 7 :
  • SSH Cracking
  • Lecture 8 :
  • Ncrack
  • Lecture 9 :
  • Ncrack different OS
  • Lecture 10 :
  • The right worldlist
  • Lecture 11 :
  • Crunch
  • Lecture 12 :
  • The most amazing and effect wordlsit
  • Lecture 13 :
  • Password Reset Hack
  • Lecture 14 :
  • Offline Password attack

Section 10 : Malware Threats

  • Lecture 1 :
  • 59.Introduction to Maleware
  • Lecture 2 :
  • 60.Types of Malware
  • Lecture 3 :
  • 61.Create a virus
  • Lecture 4 :
  • 62.Creating a Virus using a Tool
  • Lecture 5 :
  • 63.Creating a Trojan 1 (R)
  • Lecture 6 :
  • 64.64. Creating a Trojan 2. (R)
  • Lecture 7 :
  • 64.1 Using the Meterpreter Sessions
  • Lecture 8 :
  • 64.2 Can I Bypass the AV

Section 11 : Sniffring

  • Lecture 1 :
  • 65. Introduction to Sniffring
  • Lecture 2 :
  • 65.1 MITM Attack (Proof of Concept)
  • Lecture 3 :
  • 66. Enable Routing
  • Lecture 4 :
  • 67.MITM Attack using Ettercap and Xplico
  • Lecture 5 :
  • 68. Start Xplico
  • Lecture 6 :
  • 69. Ettercap and Xplico attack
  • Lecture 7 :
  • 70. DNS Spoofing 2
  • Lecture 8 :
  • 71. DNS Spoofing attack

Section 12 : Cryptography

  • Lecture 1 :
  • 72. Cryptography Basics
  • Lecture 2 :
  • 73. Symmetric Encryption
  • Lecture 3 :
  • 74. Asymmetric Encryption
  • Lecture 4 :
  • 75. Digital Signature
  • Lecture 5 :
  • 76. Hash
  • Lecture 6 :
  • 77. Steganography
  • Lecture 7 :
  • 78. Cryptography Attacks

Section 13 : Social Engineering

  • Lecture 1 :
  • 79. Introduction to Social Engineering
  • Lecture 2 :
  • 80. Social Engineering Proof of Concept
  • Lecture 3 :
  • 81. Phishing Attack
  • Lecture 4 :
  • 82. How far you can go with SE
  • Lecture 5 :
  • 83.Vishing Attack using Fake Call
  • Lecture 6 :
  • 84. Vishing using Fake SMS
  • Lecture 7 :
  • 85. Important Countermeasures
  • Lecture 8 :
  • 86. Other SET Attack

Section 14 : Denial Of Service

  • Lecture 1 :
  • 87.Introduction to Denail of Service
  • Lecture 2 :
  • 88.Denial of Service Attack Demonstration 1
  • Lecture 3 :
  • 89. Denial of Service Attack Demonstration 2
  • Lecture 4 :
  • 90. Denial of Service Attack Demonstration 3
  • Lecture 5 :
  • 91. Distributed Denial of Service (DDOS)

Section 15 : Hacking Web Server

  • Lecture 1 :
  • 92. Hacking web server
  • Lecture 2 :
  • 93.Hacking an Apache Server
  • Lecture 3 :
  • 94 . Hacking a Windows Server
  • Lecture 4 :
  • 95.Practice
  • Lecture 5 :
  • 96.Working with Exploit
  • Lecture 6 :
  • 97.MetaSploit
  • Lecture 7 :
  • 98. Armitage
  • Lecture 8 :
  • 99. Armitage in Action
  • Lecture 9 :
  • 100.Armitage Example 2

Section 16 : SQL Injection

  • Lecture 1 :
  • 101.SQL Injection Introduction
  • Lecture 2 :
  • 102.What is SQL Injection
  • Lecture 3 :
  • 103.Setup your web application lab
  • Lecture 4 :
  • 104.Is the site infected with SQLI
  • Lecture 5 :
  • 105.The amazing SQLMAP
  • Lecture 6 :
  • 106.Live Example

Section 17 : Important Definition for the Exam

  • Lecture 1 :
  • 107.Risk Assessment
  • Lecture 2 :
  • 108.Information Asset Register
  • Lecture 3 :
  • 109.Policy and Procedure
  • Lecture 4 :
  • 110.Security in Layers

Section 18 : Hacking Mobile Platform

  • Lecture 1 :
  • 111.Introduction to Mobile Hacking
  • Lecture 2 :
  • 112.Setting up Your Android Platform
  • Lecture 3 :
  • 113.Creating a Fake APP-1
  • Lecture 4 :
  • 114.Creating a Fake APP-2
  • Lecture 5 :
  • 115.Android attack using Armitage
  • Lecture 6 :
  • 116.Stagefright Attack

Section 19 : Buffer Overflow

  • Lecture 1 :
  • 117.1Introduction to Buffer Overflow
  • Lecture 2 :
  • 117.How to search for Buffer Overflow
  • Lecture 3 :
  • 118. Buffer overflow 1
  • Lecture 4 :
  • 119. Buffer overflow 2
  • Lecture 5 :
  • 120.Buffer Overflow 3
  • Lecture 6 :
  • 121.Another Buffer Overflow Demonstration
  • Lecture 7 :
  • 122.Practice

Section 20 : Cloud Computing

  • Lecture 1 :
  • 123.Introduction to Cloud Computing
  • Lecture 2 :
  • 124.IaaS vs PaaS vs SaaS
  • Lecture 3 :
  • 125.SaaS
  • Lecture 4 :
  • 126.PaaS
  • Lecture 5 :
  • 127.IaaS
  • Lecture 6 :
  • 128.Cloud Deployment
  • Lecture 7 :
  • 129.Private Cloud
  • Lecture 8 :
  • 130.Public Cloud
  • Lecture 9 :
  • 131.Hybrid Cloud
  • Lecture 10 :
  • 132.NIST SP 800 -145

Section 21 : Evading IDS, Firewalls and Honeyhots

  • Lecture 1 :
  • 133.Introduction to Evading IDS, Firewalls, Honeypots
  • Lecture 2 :
  • 134.Honeypots
  • Lecture 3 :
  • 135.Firewalls
  • Lecture 4 :
  • 136.Access Control List - ACL
  • Lecture 5 :
  • 137.Standard Access Control list
  • Lecture 6 :
  • 138.Intrusion Detection System - IDS

Section 22 : Hacking Wireless Network

  • Lecture 1 :
  • 139.Introduction to Wireless - Part 1
  • Lecture 2 :
  • 140.Introduction to Wireless - Part 2
  • Lecture 3 :
  • 141.WEP cracking
  • Lecture 4 :
  • 142.WPA WPA2 Cracking
  • Lecture 5 :
  • 143.Advanced WPA.WPA2 attacks

Section 23 : Attack Remote Target

  • Lecture 1 :
  • 146.Port Forwarding
  • Lecture 2 :
  • 147.Hacking Remotely Demonstration

Section 24 : Physical Security

  • Lecture 1 :
  • 148.What is Physical Security

Section 25 : Operations Security

  • Lecture 1 :
  • 149.Operations Security Control Methods
  • 1. How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • 2. Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • 3. Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • 4. How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • 5. Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • 6. Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • 7. For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • 8. Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • 9. Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • 10. What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Mohamed Atef,

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

complete-ethical-hacking-penetration-testing-for-web-apps

Complete Ethical Hacking & Penetrat...

By : Abhilash Nelson

Lecture 30

Buy

$25

Sign up and start learning
By signing up, you agree to our Terms of Use and Privacy Policy
Forget Password