The 2022 Premium Certified Ethical Hacker Certification Bundle

4 Reviews
670 Enrolled
10 Courses & 120 Hours
$34.99$2,000.00
You save 98% -

What's Included

Certified Ethical Hacker Bootcamp
  • Certification included
  • Experience level required: Intermediate
  • Access 105 lectures & 19 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

105 Lessons (19h)

  • Your First Program
  • Introduction to Ethical Hacking
    What is an ethical hacker?7:22
    Terminology crash course pt.19:24
    Terminology crash course pt.213:29
    Terminology crash course pt.38:25
    Confidentiality, integrity, and availability13:18
    Legal considerations11:29
    Section 1 Powerpoint
  • Reconnaissance: Surveying the Attack Surface
    Surveying the attack surface10:24
    Recon types7:44
    Passive recon pt.17:21
    Passive recon pt.210:02
    Active recon15:01
    Recon walk-through and tools summary14:08
    Section 2 Powerpoint
    DEMO - Maltego real world example7:04
    DEMO - FOCA to examine metadata4:57
    DEMO - Harvester2:02
    DEMO - Information collection using Recon-ng6:24
  • Scanning and Enumeration: Getting Down to Business
    Scanning & enumeration8:10
    Identifying active hosts pt.19:45
    Identifying active hosts pt.213:17
    Identifying active services18:23
    OS and services fingerprinting14:41
    Network mapping9:46
    Final thoughts11:04
    Section 3 Powerpoint
    DEMO - Nmap syntax pt.114:21
    DEMO - Nmap syntax pt.215:32
    DEMO - Nmap hosts discovery12:19
    DEMO - Nmap service discovery17:10
    DEMO - Nmap scripts11:17
    DEMO - masscan10:57
  • Network Presence
    Network insecurity4:01
    Sniffing and spoofing12:45
    Sniffing tools8:57
    Spoofing, crypto, and wifi15:00
    Section 4 Powerpoint
    DEMO - tcpdump10:53
    DEMO - Wireshark11:24
    DEMO - Ettercap12:55
    DEMO - SSL Burp Suite15:12
    DEMO - Scapy10:15
  • Attacking
    Security overview windows architecture17:51
    Security overview credentials security15:32
    Security overview memory corruption and exploitation15:31
    Windows hacking basics20:08
    Local access and privilege escalation20:13
    Dumping hashes and cracking passwords18:12
    Linux attacking basics pt.112:44
    Linux attacking basics pt.213:50
    References5:25
    Section 5 Powerpoint
    DEMO - Windows msf exploit pt.113:05
    DEMO - Windows msf exploit pt.215:20
    DEMO - Post exploitation13:13
    DEMO - Mimikatz7:09
    DEMO - Dumping hashes3:23
    DEMO - Hashcat8:21
    DEMO - Konboot12:57
    DEMO - Post exploitation Windows cmd14:08
    DEMO - Post exploitation Windows powershell13:09
    DEMO - Online password cracking pt.114:51
    DEMO - Online password cracking pt.212:02
    DEMO - Attacking Linux targets pt.110:07
    DEMO - Attacking Linux targets pt.212:35
  • Web Hacking
    Introduction to web hacking2:47
    Web security architecture overview pt.116:40
    Web security architecture overview pt.212:20
    Attacking the web server pt.110:28
    Attacking the web server pt.210:59
    Attacking the platform pt.118:33
    Attacking the platform pt.28:13
    Attacking the technology pt.121:00
    Attacking the technology pt.217:20
    OWASP top 10 pt.19:21
    OWASP top 10 pt.221:12
    Attacking the business logic pt.110:37
    Attacking the business logic pt.215:07
    Tools and methodology20:15
    References7:41
    Section 6 Powerpoint
    DEMO - OWASP Mutillidae8:50
    DEMO - SQL injection7:04
    DEMO - SQLMAP intro8:21
    DEMO - SQLMAP practice25:04
    DEMO - Burpsuite37:03
    DEMO - Burpsuite xsshunter16:12
    DEMO - mitmproxy10:27
    DEMO - Skipfish pt.14:30
    DEMO - Skipfish pt.24:29
  • Social Engineering: Hacking Humans
    Social engineering basics14:41
    Social engineering methods15:44
    Tools and techniques pt.114:35
    Tools and techniques pt.211:49
    Tools and techniques pt.39:04
    Physical security considerations12:53
    Final thoughts5:15
    Section 7 Powerpoint
    DEMO - Social engineering intro10:43
    DEMO - Social engineering toolkit prep9:01
    DEMO - Credential harvesting2:06
    DEMO - Website cloning6:19
    DEMO - Automating an attack2:59
    DEMO - Antivirus evasion pt.18:17
    DEMO - Antivirus evasion pt.211:43

Certified Ethical Hacker Bootcamp

JD
Joseph Delgadillo

Joseph Delgadillo | Best-Selling Instructor

4.3/5 Instructor Rating: ★ ★ ★ ★

Joseph Delgadillo teaches skills ranging from computers and technology to entrepreneurship and digital marketing. He produces valuable educational resources for students who wish to learn skills related to information technology, network security, programming languages, and much more. Take a course with him for a practical, down-to-earth approach to learning and to get an over-the-shoulder view of how experts are successful in their respective fields.

Description

This course was designed for information security professionals who wish to become certified and move on to a career as a professional pentester. Here, you'll not only get study materials but gain insight into the day-to-day workflow of an ethical hacker. Through live hacking demonstrations, a blueprint for conducting your penetration test, and lessons on how to think like a hacker, you'll get everything you need to break into this lucrative career.

  • Access 105 lectures & 19 hours of content 24/7
  • Discuss hacking terminology
  • Understand the difference between passive & active reconnaissance
  • Learn about scanning & enumeration, networking mapping, social engineering basics, and more
  • Explore Windows & Linux hacking
  • Cover website cloning, anti-virus evasion, credential harvesting, & more
  • Get hacking demonstrations w/ tools like Maltego, FOCA, Harvester, Recon-ng, Nmap, Wireshark, Scapy, & more

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.