CertPREP Courseware: EC-Council Certified Ethical Hacker (312-50) - Self-Paced

🔍 Click to enlarge photo

Summary

WEB PRICE: $199.00
Member price: $199.00
Qty

Please select required options above

Description

This self-paced CertPREP Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.

The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.

Course components:

  • Lessons
  • Video learning
  • MeasureUp Practice Test for EC-Council Certified Ethical Hacker (312-50). Practice Mode with remediation and Certification mode to simulate the test day experience.

Duration: Approximately 40 hours of primary course content. Each learner will progress at their own rate.

Audience:

  • Skilled IT professionals who understand and know how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess the security posture of a target system(s).

Prerequisites:

  • Minimum 2 years’ experience in Information Security
  • Knowledge of networking, TCP/IP, and basic computer knowledge.

Required course materials: Self-paced CertPREP Certified Ethical Hacker (CEH 312-50) Courseware.

Course objectives 

Upon successful completion of this course, students should be able to:  

  • Explain basic concepts related to ethical hacking.
  • Demonstrate reconnaissance techniques.
  • Describe system hacking phases and attack techniques.
  • Identify network and perimeter hacking.
  • Explain how web application hacking occurs.
  • Understand wireless network hacking.
  • Describe hacking on mobile platforms, IoT, and OT hacking.
  • Lesson 1: An Introduction to Ethical Hacking
  • Lesson 2: The Technical Foundations of Hacking
  • Lesson 3: Footprinting, Reconnaissance, and Scanning
  • Lesson 4: Enumeration and System Hacking
  • Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis
  • Lesson 6: Sniffers, Session Hijacking, and Denial of Service
  • Lesson 7: Web Server Hacking, Web Applications, and Database Attacks
  • Lesson 8: Wireless Technologies, Mobile Security, and Attacks
  • Lesson 9: Evading IDs, Firewalls, and Honeypots
  • Lesson 10: Cryptographic Attacks and Defenses
  • Lesson 11: Cloud Computing, IoT and Botnets