Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

By Ermin

Get ready to pass the Certified Ethical Hacker exam.

36 hours
  • 157 Lessons
  • 4 Hands-On Labs
  • 19 Course Quizzes
  • 1 Practice Exam

About the course

Welcome to the Certified Ethical Hacker Course!

Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.

With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.

If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then the CEH certificate will be of great benefit to you and your organization.

This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.

  • Chapter 1 6 Lessons Getting Started 33:10

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    About the Course

    7:04

    About the Author

    1:57

    Course Requirements

    4:52

    How to Get Help

    6:13

    About the Exam

    11:45
  • Chapter 2 6 Lessons Overview of Information Security 1:02:59

    Chapter Introduction

    2:28

    Common Terms (Hack Value, Vulnerability, Exploit, Payload)

    7:20

    Zero Day Attack

    6:36

    Daisy Chaining

    8:13

    QUIZ SOLUTION: Overview of Information Security - Questions answered and explained

    8:22

    QUIZ: Overview of Information Security

    30:00 Quiz
  • Chapter 3 21 Lessons Overview of Information Security Threats and Attacks 1:58:44

    Chapter Introduction

    0:46

    Threats vs Attacks

    2:34

    Motives and Reasons Behind Cyber Security Attacks

    3:00

    What Are the Means by Which Hackers Gain Access to Systems and Networks?

    2:39

    Cloud Computing Threats

    6:37

    Advanced Persistent Threats

    2:10

    Viruses and Worms

    3:19

    Ransomware

    5:17

    Mobile Threats

    3:47

    Modern Age Information Warfare

    4:42

    Insider Attacks

    1:50

    Phishing

    2:26

    Web Application Threats

    2:32

    Classification of Threats: Network Threats

    2:53

    Clasification of Threats: Host Threats

    2:29

    Clasification of Threats: Application Threats

    3:58

    Classification of Attacks

    12:25

    Botnets

    3:00

    Laws, Standards, and Regulations

    12:39

    QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained

    9:41

    QUIZ: Information Security Threats and Attacks

    30:00 Quiz
  • Chapter 4 11 Lessons History of Hacking 1:26:22

    A Brief Look at the History of Hacking

    12:44

    Types of Hackers

    10:06

    What is Ethical Hacking? What is Its Purpose?

    3:22

    Scope of Ethical Hacking

    3:57

    Hacking Stages: Reconnaissance

    3:05

    Hacking Stages: Scanning

    2:08

    Hacking Stages: Gaining Access

    0:43

    Hacking Stages: Maintaining Access

    3:49

    Hacking Stages: Clearing Tracks

    3:30

    QUIZ SOLUTION: History of Hacking - Questions answered and explained

    12:58

    QUIZ: The History of Hacking

    30:00 Quiz
  • Chapter 5 18 Lessons Protecting Information 3:51:39

    Chapter Introduction

    5:01

    Information Assurance

    12:57

    EISA and Information security management program

    11:46

    Network Zoning

    14:21

    Defense in Depth

    12:08

    What Sort of Things Do Policies Regulate?

    15:03

    Workplace Security Policies and Examples

    12:03

    Physical Security Controls and Risk

    11:53

    Risk Management

    11:45

    Threat Modeling and Incident Management

    20:15

    UBA - User Behavior Analytics and Network Security Controls

    8:22

    Access Controls

    8:42

    Identification Authentication Authorization Accounting and IAM

    11:39

    Data Leakage

    9:44

    Data Backup

    21:35

    Data Recovery

    2:29

    QUIZ SOLUTION: Protecting Information - Questions answered and explained

    11:56

    QUIZ: Protecting Information

    30:00 Quiz
  • Chapter 6 21 Lessons Penetration Testing 2:13:00

    What Is Penetration Testing?

    3:52

    What Does a Good Penetration Test Consist of?

    11:47

    Why Do a Penetration Test

    11:10

    Pre-Attack Phase: Contracts

    2:45

    Audit vs Vulnerability Assessment vs Penetration Test

    2:23

    Red vs Blue Team!

    2:53

    Types of Penetration Testing

    7:32

    Pre-Attack Phase: Rules of Engagement

    2:24

    Pre-Attack Phase: Understanding your Client's requirements

    4:00

    Pre-Attack Phase: Scope of a Penetration Test

    6:55

    Pre-Attack Phase: Information Gathering

    6:17

    Pre-Attack Phase: Two Types of Information Gathering

    5:28

    Attack Phase

    1:36

    Attack Phase: Penetrating the Perimeter

    4:28

    Attack Phase: Target Acquisition

    3:04

    Attack Phase: Privilege Escalation

    3:14

    Attack Phase: Execute, Implant, Retract

    3:42

    Post-Attack Phase

    2:09

    Security Testing Methodologies

    7:08

    QUIZ SOLUTION: Penetration Testing - Questions answered and explained

    10:13

    QUIZ: Penetration Testing

    30:00 Quiz
  • Chapter 7 13 Lessons Footprinting Process 2:45:14

    About Footprinting

    2:58

    Hacker State of Mind

    5:26

    Search Engine and Online Resources

    17:56

    Whois GeoIpLocation and DNS Interogation

    14:41

    Email Header Analysis

    16:14

    Getting an IP Address from an Email and More

    16:42

    Quick Look at a Website Certificate, Source Code and Traffic

    14:59

    How to Clone a Website and Extract Metadata from Files

    18:27

    Nmap and Traceroute

    19:11

    QUIZ SOLUTION: Footprinting - Questions answered and explained

    8:40

    QUIZ: Footprinting

    30:00 Quiz

    Extract Data from a File

    0:00 Hands-On Lab

    Phishing Emails and GeoIP Lookup

    0:00 Hands-On Lab
  • Chapter 8 4 Lessons Reports and Countermeasures 54:35

    Countermeasures and Best Practices

    11:41

    What Goes into a Footprinting Report?

    5:15

    QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained

    7:39

    QUIZ: Reports and Countermeasures

    30:00 Quiz
  • Chapter 9 6 Lessons Network Scanning Techniques 1:18:41

    Banner Grabbing

    6:30

    Drawing and Mapping Out Network Topologies

    9:18

    Scanning for Vulnerabilities

    15:15

    Enumeration

    8:08

    QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained

    9:30

    QUIZ: Network Scanning Techniques

    30:00 Quiz
  • Chapter 10 8 Lessons Password Cracking Techniques 2:09:15

    Password Cracking, Crunch, and Some Basics

    17:07

    Using Hydra for online password cracking

    17:23

    Hashcat: Environment Setup

    16:59

    HashCat: Installation

    7:52

    HashCat: Let Us Crack Some Passwords!

    17:08

    HashCat: Results and Recap

    11:37

    QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained

    11:09

    QUIZ: Password Cracking Techniques

    30:00 Quiz
  • Chapter 11 8 Lessons Techniques for Creating and Maintaining Access to the Remote System 1:38:09

    Reverse Shell and Remote Service Exploitation

    16:17

    Keylogger Intro and Environment Setup

    11:00

    Keylogger Source Code Download and Import

    4:43

    Keylogger Configuration

    7:14

    Keylogger Demo

    12:07

    Decrypting Keylogger Logs

    8:41

    QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained

    8:07

    QUIZ: Persistent Remote Access

    30:00 Quiz
  • Chapter 12 8 Lessons Hiding Malicious Programs 1:46:11

    SandBox

    15:40

    How to Create a Safe Sandbox Environment

    13:17

    Anti-Malware Software Overview

    10:25

    Packing Malware

    11:06

    Rootkits

    7:27

    Hiding Files and Steganography

    12:48

    QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained

    5:28

    QUIZ: Hiding Malicious Programs

    30:00 Quiz
  • Chapter 13 4 Lessons Covering Tracks and Destroying Evidence 55:33

    Log Files: Covering Your Tracks

    15:50

    QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained

    9:43

    QUIZ: Covering Tracks and Destroying Evidence

    30:00 Quiz

    Examine Log Files and Remove Traces of Your Presence

    0:00 Hands-On Lab
  • Chapter 14 5 Lessons Spoofing Techniques 1:20:44

    ARP Spoofing

    16:38

    MAC Address Spoofing

    12:27

    DHCP Starvation

    6:24

    QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained

    15:15

    QUIZ: Sniffing Techniques

    30:00 Quiz
  • Chapter 15 4 Lessons Attacking and Exploiting Wireless Networks 1:12:30

    Capturing the WPA2 Handshake

    15:41

    Cracking WPA2 Passkey

    15:53

    QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained

    10:56

    QUIZ: Wireless Networks

    30:00 Quiz
  • Chapter 16 4 Lessons Tip, Tricks and Real Life Scenarios 1:08:05

    Social Engineering

    17:21

    Well Known Social Engineering Attacks: A Retrospective

    11:44

    QUIZ SOLUTION: Social Engineering - Questions Answered and Explained

    9:00

    QUIZ: Social Engineering

    30:00 Quiz
  • Chapter 17 5 Lessons Firewalls 1:14:32

    What Is a Firewall? How Does It Work?

    8:38

    Firewall Usage, Logging, and Configuration

    10:29

    Evading Firewall GeoIpBock

    17:22

    QUIZ SOLUTION: Firewalls - Questions answered and explained

    8:03

    QUIZ: Firewalls

    30:00 Quiz
  • Chapter 18 4 Lessons Honeypots 1:05:32

    How to Set Up a Honeypot

    13:56

    How to grab traffic from a Honeypot

    14:14

    QUIZ SOLUTION: Honeypots - Questions Answered and Explained

    7:22

    QUIZ: Honeypots

    30:00 Quiz
  • Chapter 19 5 Lessons Let's Attack Web Servers and Web Applications! 1:10:33

    OWASP - Open Web Application Security Project

    4:46

    XSS Cross Site Scripting

    12:21

    SQL Injections

    15:54

    QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained

    7:32

    QUIZ: Attacking Web Servers and Web Applications

    30:00 Quiz
  • Chapter 20 3 Lessons About Cryptography 25:54

    Cryptography Basics

    8:40

    Cryptography Common Algorithms and Message Digest

    9:19

    PKI Public Key Infrastructure

    7:55
  • Chapter 21 7 Lessons Encryption, Decryption, Cryptanalysis and Attack Vectors 1:28:25

    Cryptanalysis and Attack Vectors

    11:03

    Checksum and File Encryption

    12:50

    SSH RSA Demo

    13:49

    Storage Medium Encryption

    12:32

    QUIZ SOLUTION: Cryptography - Questions Answered and Explained

    8:11

    QUIZ: Cryptography

    30:00 Quiz

    Encrypting Storage Devices

    0:00 Hands-On Lab
  • Chapter 22 2 Lessons Final 2:05:14

    Final Practice Exam

    5:14

    Certified Ethical Hacker (CEH) Practice Exam

    2:00:00 Quiz
  • Chapter 23 4 Lessons Final SOLUTIONS 1:11:50

    Final Practice Exam Question and Answer overview part 1

    21:04

    Final Practice exam Question and Answer overview part 2

    12:37

    Final Practice exam Question and Answer overview part 3

    19:49

    Final Practice exam Question and Answer overview part 4

    18:20

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?

How many seats do you need?

  • $499 USD per seat per year
  • Billed Annually
  • Renews in 12 months

Ready to accelerate learning?

For over 25 licenses, a member of our sales team will walk you through a custom tailored solution for your business.


$2,495.00

Checkout
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!