Table of contents
Getting Started
0mins
Lock icon
About the Course | 0m
Lock icon
About the Author | 0m
Lock icon
Course Requirements | 0m
Lock icon
How to Get Help | 0m
Lock icon
About the Exam | 0m
Overview of Information Security
30mins
Lock icon
Chapter Introduction | 0m
Lock icon
Common Terms (Hack Value, Vulnerability, Exploit, Payload) | 0m
Lock icon
Zero Day Attack | 0m
Lock icon
Daisy Chaining | 0m
Lock icon
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained | 0m
Lock icon
QUIZ: Overview of Information Security QUIZ: Overview of Information Security | 30m
Overview of Information Security Threats and Attacks
30mins
Lock icon
Chapter Introduction | 0m
Lock icon
Threats vs Attacks | 0m
Lock icon
Motives and Reasons Behind Cyber Security Attacks | 0m
Lock icon
What Are the Means by Which Hackers Gain Access to Systems and Networks? | 0m
Lock icon
Cloud Computing Threats | 0m
Lock icon
Advanced Persistent Threats | 0m
Lock icon
Viruses and Worms | 0m
Lock icon
Ransomware | 0m
Lock icon
Mobile Threats | 0m
Lock icon
Modern Age Information Warfare | 0m
Lock icon
Insider Attacks | 0m
Lock icon
Phishing | 0m
Lock icon
Web Application Threats | 0m
Lock icon
Classification of Threats: Network Threats | 0m
Lock icon
Clasification of Threats: Host Threats | 0m
Lock icon
Clasification of Threats: Application Threats | 0m
Lock icon
Classification of Attacks | 0m
Lock icon
Botnets | 0m
Lock icon
Laws, Standards, and Regulations | 0m
Lock icon
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained | 0m
Lock icon
QUIZ: Information Security Threats and AttacksQUIZ: Information Security Threats and Attacks | 30m
History of Hacking
30mins
Lock icon
A Brief Look at the History of Hacking | 0m
Lock icon
Types of Hackers | 0m
Lock icon
What is Ethical Hacking? What is Its Purpose? | 0m
Lock icon
Scope of Ethical Hacking | 0m
Lock icon
Hacking Stages: Reconnaissance | 0m
Lock icon
Hacking Stages: Scanning | 0m
Lock icon
Hacking Stages: Gaining Access | 0m
Lock icon
Hacking Stages: Maintaining Access | 0m
Lock icon
Hacking Stages: Clearing Tracks | 0m
Lock icon
QUIZ SOLUTION: History of Hacking - Questions answered and explained | 0m
Lock icon
QUIZ: The History of HackingQUIZ: The History of Hacking | 30m
Protecting Information
30mins
Lock icon
Chapter Introduction | 0m
Lock icon
Information Assurance | 0m
Lock icon
EISA and Information security management program | 0m
Lock icon
Network Zoning | 0m
Lock icon
Defense in Depth | 0m
Lock icon
What Sort of Things Do Policies Regulate? | 0m
Lock icon
Workplace Security Policies and Examples | 0m
Lock icon
Physical Security Controls and Risk | 0m
Lock icon
Risk Management | 0m
Lock icon
Threat Modeling and Incident Management | 0m
Lock icon
UBA - User Behavior Analytics and Network Security Controls | 0m
Lock icon
Access Controls | 0m
Lock icon
Identification Authentication Authorization Accounting and IAM | 0m
Lock icon
Data Leakage | 0m
Lock icon
Data Backup | 0m
Lock icon
Data Recovery | 0m
Lock icon
QUIZ SOLUTION: Protecting Information - Questions answered and explained | 0m
Lock icon
QUIZ: Protecting InformationQUIZ: Protecting Information | 30m
Penetration Testing
60mins
Lock icon
What Is Penetration Testing? | 0m
Lock icon
What Does a Good Penetration Test Consist of? | 0m
Lock icon
Why Do a Penetration Test | 0m
Lock icon
Pre-Attack Phase: Contracts | 0m
Lock icon
Audit vs Vulnerability Assessment vs Penetration Test | 0m
Lock icon
Red vs Blue Team! | 0m
Lock icon
Types of Penetration Testing | 0m
Lock icon
Pre-Attack Phase: Rules of Engagement | 0m
Lock icon
Pre-Attack Phase: Understanding your Client's requirements | 0m
Lock icon
Pre-Attack Phase: Scope of a Penetration Test | 0m
Lock icon
Pre-Attack Phase: Information Gathering | 0m
Lock icon
Pre-Attack Phase: Two Types of Information Gathering | 0m
Lock icon
Attack Phase | 0m
Lock icon
Attack Phase: Penetrating the Perimeter | 0m
Lock icon
Attack Phase: Target Acquisition | 0m
Lock icon
Attack Phase: Privilege Escalation | 0m
Lock icon
Attack Phase: Execute, Implant, Retract | 0m
Lock icon
Post-Attack Phase | 0m
Lock icon
Security Testing Methodologies | 0m
Lock icon
QUIZ SOLUTION: Penetration Testing - Questions answered and explained | 0m
Lock icon
QUIZ: Penetration TestingQUIZ: Penetration Testing | 1h 0m
Footprinting Process
150mins
Lock icon
About Footprinting | 0m
Lock icon
Hacker State of Mind | 0m
Lock icon
Search Engine and Online Resources | 0m
Lock icon
Whois GeoIpLocation and DNS Interogation | 0m
Lock icon
Email Header Analysis | 0m
Lock icon
Getting an IP Address from an Email and More | 0m
Lock icon
Quick Look at a Website Certificate, Source Code and Traffic | 0m
Lock icon
How to Clone a Website and Extract Metadata from Files | 0m
Lock icon
Nmap and Traceroute | 0m
Lock icon
QUIZ SOLUTION: Footprinting - Questions answered and explained | 0m
Lock icon
QUIZ: FootprintingQUIZ: Footprinting | 30m
Lock icon
Extract Data from a FileExtract Data from a File | 1h 0m
Lock icon
Phishing Emails and GeoIP LookupPhishing Emails and GeoIP Lookup | 1h 0m
Reports and Countermeasures
60mins
Lock icon
Countermeasures and Best Practices | 0m
Lock icon
What Goes into a Footprinting Report? | 0m
Lock icon
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained | 0m
Lock icon
QUIZ: Reports and CountermeasuresQUIZ: Reports and Countermeasures | 1h 0m
Network Scanning Techniques
30mins
Lock icon
Banner Grabbing | 0m
Lock icon
Drawing and Mapping Out Network Topologies | 0m
Lock icon
Scanning for Vulnerabilities | 0m
Lock icon
Enumeration | 0m
Lock icon
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained | 0m
Lock icon
QUIZ: Network Scanning TechniquesQUIZ: Network Scanning Techniques | 30m
Password Cracking Techniques
60mins
Lock icon
Password Cracking, Crunch, and Some Basics | 0m
Lock icon
Using Hydra for online password cracking | 0m
Lock icon
Hashcat: Environment Setup | 0m
Lock icon
HashCat: Installation | 0m
Lock icon
HashCat: Let Us Crack Some Passwords! | 0m
Lock icon
HashCat: Results and Recap | 0m
Lock icon
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained | 0m
Lock icon
QUIZ: Password Cracking Techniques QUIZ: Password Cracking Techniques | 1h 0m
Techniques for Creating and Maintaining Access to the Remote System
30mins
Lock icon
Reverse Shell and Remote Service Exploitation | 0m
Lock icon
Keylogger Intro and Environment Setup | 0m
Lock icon
Keylogger Source Code Download and Import | 0m
Lock icon
Keylogger Configuration | 0m
Lock icon
Keylogger Demo | 0m
Lock icon
Decrypting Keylogger Logs | 0m
Lock icon
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained | 0m
Lock icon
QUIZ: Persistent Remote AccessQUIZ: Persistent Remote Access | 30m
Hiding Malicious Programs
30mins
Lock icon
SandBox | 0m
Lock icon
How to Create a Safe Sandbox Environment | 0m
Lock icon
Anti-Malware Software Overview | 0m
Lock icon
Packing Malware | 0m
Lock icon
Rootkits | 0m
Lock icon
Hiding Files and Steganography | 0m
Lock icon
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained | 0m
Lock icon
QUIZ: Hiding Malicious ProgramsQUIZ: Hiding Malicious Programs | 30m
Covering Tracks and Destroying Evidence
90mins
Lock icon
Log Files: Covering Your Tracks | 0m
Lock icon
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained | 0m
Lock icon
QUIZ: Covering Tracks and Destroying Evidence QUIZ: Covering Tracks and Destroying Evidence | 30m
Lock icon
Examine Log Files and Remove Traces of Your PresenceExamine Log Files and Remove Traces of Your Presence | 1h 0m
Spoofing Techniques
30mins
Lock icon
ARP Spoofing | 0m
Lock icon
MAC Address Spoofing | 0m
Lock icon
DHCP Starvation | 0m
Lock icon
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained | 0m
Lock icon
QUIZ: Sniffing TechniquesQUIZ: Sniffing Techniques | 30m
Attacking and Exploiting Wireless Networks
30mins
Lock icon
Capturing the WPA2 Handshake | 0m
Lock icon
Cracking WPA2 Passkey | 0m
Lock icon
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained | 0m
Lock icon
QUIZ: Wireless NetworksQUIZ: Wireless Networks | 30m
Tip, Tricks and Real Life Scenarios
60mins
Lock icon
Social Engineering | 0m
Lock icon
Well Known Social Engineering Attacks: A Retrospective | 0m
Lock icon
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained | 0m
Lock icon
QUIZ: Social Engineering QUIZ: Social Engineering | 1h 0m
Firewalls
30mins
Lock icon
What Is a Firewall? How Does It Work? | 0m
Lock icon
Firewall Usage, Logging, and Configuration | 0m
Lock icon
Evading Firewall GeoIpBock | 0m
Lock icon
QUIZ SOLUTION: Firewalls - Questions answered and explained | 0m
Lock icon
QUIZ: FirewallsQUIZ: Firewalls | 30m
Honeypots
30mins
Lock icon
How to Set Up a Honeypot | 0m
Lock icon
How to grab traffic from a Honeypot | 0m
Lock icon
QUIZ SOLUTION: Honeypots - Questions Answered and Explained | 0m
Lock icon
QUIZ: HoneypotsQUIZ: Honeypots | 30m
Let's Attack Web Servers and Web Applications!
30mins
Lock icon
OWASP - Open Web Application Security Project | 0m
Lock icon
XSS Cross Site Scripting | 0m
Lock icon
SQL Injections | 0m
Lock icon
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained | 0m
Lock icon
QUIZ: Attacking Web Servers and Web ApplicationsQUIZ: Attacking Web Servers and Web Applications | 30m
About Cryptography
0mins
Lock icon
Cryptography Basics | 0m
Lock icon
Cryptography Common Algorithms and Message Digest | 0m
Lock icon
PKI Public Key Infrastructure | 0m
Encryption, Decryption, Cryptanalysis and Attack Vectors
90mins
Lock icon
Cryptanalysis and Attack Vectors | 0m
Lock icon
Checksum and File Encryption | 0m
Lock icon
SSH RSA Demo | 0m
Lock icon
Storage Medium Encryption | 0m
Lock icon
QUIZ SOLUTION: Cryptography - Questions Answered and Explained | 0m
Lock icon
QUIZ: Cryptography QUIZ: Cryptography | 30m
Lock icon
Encrypting Storage DevicesEncrypting Storage Devices | 1h 0m
Final
240mins
Lock icon
Final Practice Exam | 0m
Lock icon
Certified Ethical Hacker (CEH) Practice ExamCertified Ethical Hacker (CEH) Practice Exam | 4h 0m
Final SOLUTIONS
0mins
Lock icon
Final Practice Exam Question and Answer overview part 1 | 0m
Lock icon
Final Practice exam Question and Answer overview part 2 | 0m
Lock icon
Final Practice exam Question and Answer overview part 3 | 0m
Lock icon
Final Practice exam Question and Answer overview part 4 | 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon