There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Certified Ethical Hacker ( CEH )

About the Author
About the Course
Course Requirements
How to Get Help
About the Exam

Chapter Introduction
Common Terms (Hack Value, Vulnerability, Exploit, Payload)
Zero Day Attack
Daisy Chaining

Chapter Introduction
Threats vs Attacks
Motives and Reasons Behind Cyber Security Attacks
What Are the Means by Which Hackers Gain Access to Systems and Networks?
Cloud Computing Threats
Advanced Presistent Threats
Viruses and Worms
Mobile Threats
Modern Age Information Warfare
Insider Attacks
Web Application Threats
Classification of Threats: Network Threats
Clasification of Threats: Host Threats
Clasification of Threats: Application Threats
Classification of Attacks
Laws, Standards, and Regulations

History of Hacking:
A Brief Look at the History of Hacking
Types of Hackers
What is Ethical Hacking? What is Its Purpose?
Scope of Ethical Hacking
Hacking Stages: Reconnaissance
Hacking Stages: Scanning
Hacking Stages: Gaining Access
Hacking Stages: Maintaining Access
Hacking Stages: Clearing Tracks

Chapter Introduction
Information Assurance
EISA and Information security management program
Network Zoning
Defense in Depth
What Sort of Things Do Policies Regulate?
Workplace Security Policies and Examples
Physical Security Controls and Risk
Risk Management
Threat Modeling and Incident Management
UBA - User Behavior Analytics and Network Security Controls
Access Controls
Identification Authentication Authorization Accounting and IAM
Data Leakage
Data Backup
Data Recovery
QUIZ SOLUTION: Protecting Information - Questions answered and explained

What Is Penetration Testing?
What Does a Good Penetration Test Consist of?
Why Do a Penetration Test
Pre-Attack Phase: Contracts
Audit vs Vulnerability Assessment vs Penetration Test
Red vs Blue Team!
Types of Penetration Testing
Pre-Attack Phase: Rules of Engagement
Pre-Attack Phase: Understanding your Client's requirements
Pre-Attack Phase: Scope of a Penetration Test
Pre-Attack Phase: Information Gathering
Pre-Attack Phase: Two Types of Information Gathering
Attack Phase
Attack Phase: Penetrating the Perimeter
Attack Phase: Target Acquisition
Attack Phase: Privilege Escalation
Attack Phase: Execute, Implant, Retract
Post-Attack Phase
Security Testing Methodologies
QUIZ SOLUTION: Penetration Testing - Questions answered and explained
QUIZ: Penetration Testing

About Footprinting
Hacker State of Mind
Search Engine and Online Resources
Whois GeoIpLocation and DNS Interogation
Email Header Analysis
Getting an IP Address from an Email and More
Quick Look at a Website Certificate, Source Code and Traffic
How to Clone a Website and Extract Metadata from Files
Nmap and Traceroute
QUIZ SOLUTION: Footprinting - Questions answered and explained

Countermeasures and Best Practices
What Goes into a Footprinting Report?
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained

Drawing and Mapping Out Network Topologies
Scanning for Vulnerabilities
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained

Password Cracking, Crunch, and Some Basics
Using Hydra for online password cracking
Hashcat: Environment Setup
HashCat: Installation
HashCat: Let Us Crack Some Passwords!
HashCat: Results and Recap
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained

Reverse Shell and Remote Service Exploitation
Keylogger Intro and Environment Setup
Keylogger Source Code Download and Import
Keylogger Configuration
Keylogger Demo
Decrypting Keylogger Logs
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained

How to Create a Safe Sandbox Environment
Anti-Malware Software Overview
Packing Malware
Hiding Files and Steganography
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained

Log Files: Covering Your Tracks
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and

Spoofing Techniques:
ARP Spoofing
MAC Address Spoofing
DHCP Starvation
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained

Attacking and Exploiting Wireless Networks:
Capturing the WPA2 Handshake
Cracking WPA2 Passkey
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained

Tip,Tricksand Real Life Scenarios:
Social Engineering
Well Known Social Engineering Attacks: A Retrospective
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained

What Is a Firewall? How Does It Work?
Firewall Usage, Logging, and Configuration
Evading Firewall GeoIpBock
QUIZ SOLUTION: Firewalls - Questions answered and explained

How to Set Up a Honeypot
How to grab traffic from a Honeypot
QUIZ SOLUTION: Honeypots - Questions Answered and Explained

Let'sAttack Web Servers and Web Applications!:
OWASP - Open Web Application Security Project
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained
XSS Cross Site Scripting
SQL Injections

About Cryptography:
Cryptography Basics
Cryptography Common Algorithms and Message Digest
PKI Public Key Infrastructure

Encryption,Decryption,Cryptana lysisand Attack Vectors:
Cryptanalysis and Attack Vectors
Checksum and File Encryption
Storage Medium Encryption
QUIZ SOLUTION: Cryptography - Questions Answered and Explained

Final Practice Exam
Practice Exam: Certified Ethical Hacker (CEH) Practice Exam
Final practice exam SOLUTIONS
Final Practice Exam Question and Answer overview part 1
Final Practice exam Question and Answer overview part 2
Final Practice exam Question and Answer overview part 3
Final Practice exam Question and Answer overview part 44