Certified Ethical Hacker v10

or log in to view this course.

Prepare for the Certified Ethical Hacker version 10 (CEHv10).

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

[content source: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/]

About the Exam

About the InfoSec Addicts Self-Paced CEH course

The InfoSec Addicts Certified Ethical Hacker version 10 (CEHv10) prep course has everything that you need to prepare for the exam. The course has content, videos, quizzes and more for FREE.

Take all infosecaddicts class for $89/month (With lab access).

Avatar
Course By

Marcus Smith

Lessons

Module 1: Introduction to Ethical Hacking

Author: Marcus Smith

Certified Ethical Hacking You will need lab access to go through this course. If you do not already have lab access please purchase lab access here--> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a broader understanding is Ultimate Hacklab Self-paced-->  https://infosecaddicts.com/course/ultimate-hacklab-self-paced/ You could also pay $89/month and receive access to every class and Lab access--> https://infosecaddicts.com/course/unlimited-classes/ Contact [...]

Module 2: Footprinting

Author: Marcus Smith

Intro You will need lab access to go through this course. If you do not already have lab access please purchase lab access here–> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a…

Module 3: Scanning

Author: Marcus Smith

Intro You will need lab access to go through this course. If you do not already have lab access please purchase lab access here–> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a…

Module 4: Enumeration

Author: Marcus Smith

Introduction: Enumeration is the process of discovering each domain that is located within the LAN. These domains are identified using built-in Windows commands. Enumeration is also defined as the process of…

Module 5: System Hacking

Author: Marcus Smith

Intro You will need lab access to go through this course. If you do not already have lab access please purchase lab access here–> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a…

Module 6: Malware Threats

Author: Marcus Smith

Introduction: Who enjoys a disease? Unless we use it as an excuse to skip an unpleasant event, right?. A virus comes without warning and locates and thrives in the host.…

Module 7: Sniffing

Author: Marcus Smith

Introduction: After having compromised a system or the machine of a user, there is no doubt that we can obtain much more information, such as passwords of some other systems,…

Module 8: Social Engineering

Author: Marcus Smith

Introduction: Social Engineering is an art of manipulation and the skill of exploiting human weakness. A social engineering attack may occur over the phone, by e-mail, by a personal visit,…

Module 9: Denial of Service

Author: Marcus Smith

Introduction: The availability of the applications, systems or platform are also targets for an attack, in this lesson we will talk about the different methods of denial of service most…

Module 10: Session Hijacking

Author: Marcus Smith

Introduction: Another way to access any system is to… well, the name says it all, doesn’t it? How a hacker can impersonate you to access a corporation and take anything…

Module 11: Hacking WebServers

Author: Marcus Smith

Introduction Web systems are an essential element in the analysis of hacking, the reason? They are widely used to publish systems, Web services and others. When a web server has…

Module 12: Hacking Web Applications

Author: Marcus Smith

Introduction: Web servers use Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) to allow web-based clients to connect to them and view and download files. HTTP is an…

Module 13: SQL Injection

Author: Marcus Smith

Intro You will need lab access to go through this course. If you do not already have lab access please purchase lab access here–> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a…

Module 15: Hacking Mobile Platforms

Author: Marcus Smith

Intro You will need lab access to go through this course. If you do not already have lab access please purchase lab access here–> https://infosecaddicts.com/course/lab-environment/ A great Course to gain a…

Module 17: Cloud Computing

Author: Marcus Smith

Introduction: Cloud Computing is an on-demand delivery of IT capabilities where IT infrastructure and applications are provided to subscribers as metered services over a network. Learning Objectives: By the end…

Module 18: Cryptography

Author: Marcus Smith

Introduction: Confidentiality, integrity, authentication. Hash, security certificates, how the data is protected. Basic concepts and its importance. Learning Objectives: By the end of this lesson you should be able to:…

Module 19: Ethics, Process, General Knowledge

Author: Marcus Smith

Introduction: Ethical hackers are usually security professionals or network penetration testers who use their hacking skills and toolsets for defensive and protective purposes. Ethical hackers who are security professionals test…

Module 21: IoT Security

Author: Marcus Smith

Introduction: The implementation of IoT devices does not escape from the possibility of being compromised, on the contrary, its extensive use has turned it into a potential target of attack…