TOIT Training

Ethical Hacking v12

Ethical Hacking v12
  • Overview
  • Curriculum
  • Reviews

 

StormWind’s Ethical Hacking v12 online training course will immerse students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. Students will gain an understanding of how to leverage a multitude of tools at the disposal of today’s hackers. Ethical hackers use many of the same tools as malicious hackers including, footprinting, sniffing, trojans, and more! When a student completes this online training course they will have knowledge and experience working as penetration testers on their organization’s Red Team. Students completing all activities in this training will have the knowledge to pass the CEH exam (312-50).

  • 16 Sections
  • 32 Lessons
  • 0 Quizzes
  • 24h Duration
Expand All

Hack, Hacker, Hacking

3 Lessons 0 Quizzes
  • Hack
  • Hacker
  • Hacking

Hacking Process

4 Lessons 0 Quizzes
  • Basics of Hacking
  • Reconnaissance
  • Scanning, Uptime Chart
  • Gaining Access and Clearing Tracks

What is Hacking

1 Lesson 0 Quizzes
  • What Exactly is Ethical Hacking

Organizational Infrastructure

9 Lessons 0 Quizzes
  • Network Infrastructure, OSI Model, Network Devices
  • Understanding IP, DNS, DHCP, Subnetting
  • Understanding IPv4 Addresses, Address Classes
  • Subnet Masks
  • CIDR
  • DHCP
  • Domain Name Systems
  • Dual Homed Host, APT’s
  • Intrusion Detection Software

Physical Security Techniques

1 Lesson 0 Quizzes
  • Securing the Perimeter

Organizational Protocols

1 Lesson 0 Quizzes
  • Security Based Organizational Protocols

Organizational Policies

1 Lesson 0 Quizzes
  • Confidentiality, AAA, Non-Repudiation

Governmental Policies

1 Lesson 0 Quizzes
  • Mandatory and Non-Mandatory Compliance Frameworks

Keys

1 Lesson 0 Quizzes
  • Keys, Digital Certificates

Threat Level Midnight

2 Lessons 0 Quizzes
  • Attack Steps, Wireless Attacks
  • Internet of Things (IoT)

Malware

3 Lessons 0 Quizzes
  • Viruses, Worms, Trojans
  • Stealth Viruses, Steganography
  • Ransomware, Spyware, Adware, Scareware

Spamalot

1 Lesson 0 Quizzes
  • Spam Emails and Mitigation Techniques

Exploitable Bugs

1 Lesson 0 Quizzes
  • Bug Types and Attack Vectors

 Password Cracking

1 Lesson 0 Quizzes
  • Honeypots and Password Attacks

 Exploiting Web Applications

1 Lesson 0 Quizzes
  • Website Vulnerabilities

Risk Management

1 Lesson 0 Quizzes
  • Understanding Risk and Liability

0

0 Ratings
5 Star 0%
4 Star 0%
3 Star 0%
2 Star 0%
1 Star 0%

Reviews

Free

Start Course

Retake Course

Are you sure you want to retake the course? This action will permanently delete all your progress in this course.

Course Includes

  • Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
  • Different types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Different types of vulnerability assessment and vulnerability assessment tools
  • System hacking methodology
  • Different types of malware, malware analysis procedure, and malware countermeasures
  • Various packet sniffing techniques and sniffing countermeasures
  • Social engineering techniques, insider threats, identity theft, and countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures
  • Different types of web server and web application attacks, hacking methodology, and countermeasures
  • SQL injection attacks, evasion techniques, and SQL injection countermeasure
  • Different types of wireless encryption, wireless threats, wireless hacking methodology, wireless hacking tools, Wi-Fi security tools, and countermeasures
  • Mobile platform attack vector, andriod and iOS hacking, mobile device management, mobile security guidelines, and security tools
  • Different IoT attacks, IoT hacking methodology, IoT hacking tools, and countermeasures

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Ethical Hacking v12
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)