Learn about the ethical hacking tools, techniques and methodologies used security professionals to conduct a penetration test against an organization and leave fully prepared to earn your Certified Ethical Hacker (CEH) certification on your first attempt.
This boot camp teaches you the knowledge you need to earn your Certified Ethical Hacker (CEH) certification and builds hands-on penetration testing skills you can apply directly to a current or future job role. You'll master a repeatable, documentable penetration testing methodology that can be used in any pentesting or ethical hacking situation.
Learning Objectives
- Penetration testing methodologies
- Stealthy network recon
- Passive traffic identification
- Remote root vulnerability exploitation
- Privilege escalation hacking
- IPv6 Vulnerabilities
- Remote access trojan hacking
- Running shellcode in RAM vs. on disk
- Wireless insecurity
- Breaking IP-based ACLs via spoofing
- Abusing Windows Named Pipes for Domain Impersonation
- Evidence removal and anti-forensics
- Attacking network infrastructure devices
- Hacking by brute forcing remotely
- Hiding exploit payloads in jpeg and gif image files
- Hacking Web Applications
- Breaking into databases with SQL Injection
- Cross Site Scripting hacking
- Hacking into Cisco routers
- Justifying a penetration test to management & customers
- Defensive techniques