O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Ethical Hacker (CEH): Platform Penetration

Video Description

This is part three of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. It teaches you how to exploit operating systems, applications, networks, databases, and mobile devices. You'll come away with the knowledge you need to master the CEH exam objectives related to system hacking, denial of service, hacking Web apps, SQL injection, and cross site scripting.

Course participants should have a basic understanding of TCP/IP and Ethernet networking, plus core familiarity with the Windows and Linux operating systems.

  • Learn how to craft the exploits used by ethical hackers to perform real world pen tests
  • Discover how to build and deliver exploit payloads using techniques like buffer overflows
  • Understand the methods for conducting SQL Injection based exploits
  • Explore attack techniques like fuzzing and know how to ethically hack mobile devices

Chad Russell (CISSP, CCNP, MCSE) has been in the cyber security industry for over 15 years, working for companies such as Oracle, Microsoft, and SAP. He conducts security risk assessments for customers throughout North America, teaches cyber security at Vatterott College, holds a Bachelor of Computer Science degree from Excelsior College, and is the author of O'Reilly Media's Certifed Ethical Hacking series.