Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course

Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course

About the course

Welcome to the Certified Ethical Hacker Course!

Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.

With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.

If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.

This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.

Chapter 1
6 Lessons
Getting Started
33:10

Chapter 2
6 Lessons
Overview of Information Security
2:59

Chapter 3
21 Lessons
Overview of Information Security Threats and Attacks
58:44

Chapter 4
11 Lessons
History of Hacking
26:22

Chapter 5
18 Lessons
Protecting Information
51:39

Chapter 6
21 Lessons
Penetration Testing
13:00

Chapter 7
13 Lessons
Footprinting Process
45:14

Chapter 8
4 Lessons
Reports and Countermeasures
54:35

Chapter 9
6 Lessons
Network Scanning Techniques
18:41

Chapter 10
8 Lessons
Password Cracking Techniques
9:15

Chapter 11
8 Lessons
Techniques for Creating and Maintaining Access to the Remote System
38:09

Chapter 12
8 Lessons
Hiding Malicious Programs
46:11

Chapter 13
4 Lessons
Covering Tracks and Destroying Evidence
55:33

Chapter 14
5 Lessons
Spoofing Techniques
20:44

Chapter 15
4 Lessons
Attacking and Exploiting Wireless Networks
12:30

Chapter 16
4 Lessons
Tip, Tricks and Real Life Scenarios
8:05

Chapter 17
5 Lessons
Firewalls
14:32

Chapter 18
4 Lessons
Honeypots
5:32

Chapter 19
5 Lessons
Let’s Attack Web Servers and Web Applications!
10:33

Chapter 20
3 Lessons
About Cryptography
25:54

Chapter 21
7 Lessons
Encryption, Decryption, Cryptanalysis and Attack Vectors
28:25

Chapter 22
2 Lessons
Final
5:14

Chapter 23
4 Lessons
Final SOLUTIONS
11:50

Direct Download Link

Sales Page: https://acloudguru.com/course/certified-ethical-hacker-ceh-linux-academys-prep-course?utm_source=legacyla&utm_medium=redirect&utm_campaign=one_platform

2 Comments

  1. Matthe December 4, 2020 Reply
  2. Mike December 10, 2020 Reply

Add a Comment

Your email address will not be published. Required fields are marked *