Let this year be the year of hard work and success | 30% on everything | Use TOGETHER at checkout !!

Certified Ethical Hacker (CEH) Online Course

The Complete Ethical Hacking Course [Video]

This course is highly practical and is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system so that you can practice all the skills and techniques you learn in real-time. You'll start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We'll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time!

In this course, you'll learn:

  • How hackers launch attacks on different systems, computers, users, websites, and wireless networks
  • What tools hackers use, why, and how they work
  • How to protect yourself (or your clients!) against these attacks
  • How to build your security and hacking tools with Python—from scratch and with no programming experience necessary!
  • How to create your own ethical hacking tool portfolio.


Course Table of Content

  1. Introduction
  2. Hacking Lab Setup
  3. Kali Linux 101
  4. Anonymity Online
  5. Dark Web
  6. Network Pentesting
  7. Gathering Information From Networks
  8. Wireless Attacks
  9. Post Connection Attacks
  10. System Pentesting
  11. Attacks On Users
  12. Social Engineering
  13. Social Media Security
  14. Beef
  15. External Network Attacks
  16. Fake Game Website Attacks Introduction
  17. Post Hacking Sessions
  18. Hacker Methodology
  19. Website Reconnaissance
  20. Website Pentesting
  21. Cross Site Scripting
  22. SQL 101
  23. SQL Injection
  24. Website Pentesting Tools
  25. Ethical Hacking Certifications
  26. Python For Ethical Hacking Setup
  27. Python Data Types & Structures Introduction
  28. Control Statements & Loops
  29. Essentials
  30. Functions
  31. Object Oriented Programming
  32. Modules
  33. MAC Changer
  34. Network Scanner
  35. Man In The Middle
  36. Packet Listener
  37. Keylogger
  38. Backdoor
  39. Packaging & Malicious Files

Medium: Self-paced

Content Type: Videos

Delivery: Online

Access Duration: Life Long Access

Tags: Certified Ethical Hacker (CEH) Online Course