Course provided by Udemy

Study type: Online

Starts: Anytime

Price: See latest price on Udemy

Overview

Do you need to earn your Certified Ethical Hacker (CEH v10) certification? If so, you’ve come to the right place.

Hi, my name is Ric Messier, and I’m an information security (IS) expert with decades of professional experience as a programmer, system administrator, network engineer, security engineering manager, VoIP engineer, and consultant. I’m also an adjunct instructor at Harvard University and bestselling tech book author who has personally trained thousands to pass various IS certification exams including CEH.

The CEH is an entry point to part of the broad world of information security. This course covers the range of topics that are covered in the CEH certification. This includes:

  • the importance of ethics

  • basic testing methodology

  • wireless networks

  • social engineering attacks

  • web application testing

The importance of ethical hacking isn’t in the breaking, it’s in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.

The CEH is a very dense exam. It covers a very broad range of material. This course will be a good resource for you to understand not only the material but the breadth of the material. As EC-Council expects you to have two years of experience before you can even register to take the exam, I don’t expect this course alone will be enough for you to pass the test. Hands-on experience will help a lot. While this course is an excellent way to start preparing for the exam, I will also mention other resources you can use to set yourself up for success.

There is a lot to learn, so let’s get started!

Certified Ethical Hacker and CEH are registered trademarks with EC-Council. Their use here is not an indication that any of the material here is authorized or endorsed by EC-Council.

Expected Outcomes

  1. Assess technical vulnerabilities for the potential for exploitation
  2. Apply a code of ethics to testing situations
  3. Perform technical vulnerability assessments
  4. Determine appropriate remediations for vulnerabilities
  5. Operate tools and utilities used in security testing
  6. Describe a basic penetration testing methodology
  7. Compare differences between testing methodologies that exist
  8. Identify appropriate testing tools
  9. Assess a testing request to identify the scope and remain within that scope