• Online, Instructor-Led
  • Online, Self-Paced
Course Description

Learn about the ethical hacking tools, techniques and methodologies used security professionals to conduct a penetration test against an organization and leave fully prepared to earn your Certified Ethical Hacker (CEH) certification on your first attempt.

This boot camp teaches you the knowledge you need to earn your Certified Ethical Hacker (CEH) certification and builds hands-on penetration testing skills you can apply directly to a current or future job role. You'll master a repeatable, documentable penetration testing methodology that can be used in any pentesting or ethical hacking situation.

Learning Objectives

  1. Penetration testing methodologies
  2. Stealthy network recon
  3. Passive traffic identification
  4. Remote root vulnerability exploitation
  5. Privilege escalation hacking
  6. IPv6 Vulnerabilities
  7. Remote access trojan hacking
  8. Running shellcode in RAM vs. on disk
  9. Wireless insecurity
  10. Breaking IP-based ACLs via spoofing
  11. Abusing Windows Named Pipes for Domain Impersonation
  12. Evidence removal and anti-forensics
  13. Attacking network infrastructure devices
  14. Hacking by brute forcing remotely
  15. Hiding exploit payloads in jpeg and gif image files
  16. Hacking Web Applications
  17. Breaking into databases with SQL Injection
  18. Cross Site Scripting hacking
  19. Hacking into Cisco routers
  20. Justifying a penetration test to management & customers
  21. Defensive techniques

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.