O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Path: Certified Ethical Hacker CEH Complete Video Course

Video Description

Duration

More Than 10 Hours of Video Instruction


Overview

Learn everything you need to know to pass the Certified Ethical Hacker exam in under 10 hours. Understand the basics of network and Internet accessible application technologies, common discovery, and analysis techniques as well as more advanced security concepts such as malware and cryptography.


Description

The Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 10 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam. The course begins with a general overview of security essentials. You then explore system, network, and web services security before diving into wireless and Internet security. This course provides the breadth of coverage necessary to learn the full security concepts behind the CEH exam. It also helps prepare you for a career as a security professional.


Topics include

Module 1: Security Essentials

Module 2: Systems Security

Module 3: Network Security

Module 4: Web Services Security

Module 5: Wireless and Internet Security


About the Instructor

Nick Garner, CCIE No. 17871, is a solutions integration architect for Cisco Systems. He has been in Cisco Advanced Services supporting customers in both transactional and subscription engagements for 8 years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside of data center routing and switching designs is security and multicast.


William Bo Rothwell, lead instructor and courseware developer - One Course Source, has more than 20 years of experience teaching security courses. During his career he has authored more than 30 technical courses on topics that include security, programming, and system administration. In addition to his security experience, his areas of expertise include Perl, Python, Tcl/TK, and Shell programming, as well as Unix and Linux.

Skill Level

Intermediate


What You Will Learn

  • Footprinting and recon
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Sniffing
  • Social engineering
  • Denial of Service (DoS)
  • Session hijacking
  • Hacking web servers
  • Hacking web applications
  • SQL injection
  • Hacking wireless
  • IDS, firewalls, and honeypots
  • Cloud computing
  • Cryptography

Who Should Take This Course

  • Anyone interested in passing their Certified Ethical Hacker (CEH) exam
  • Anyone interested in becoming a security professional

Course Requirements

Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have 5 years of information security experience in each of the 5 CCISO domains via the application form. Please go to the EC-Council website for more information.


About LiveLessons Video Training

LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View All LiveLessons at http://www.pearsonitcertification.com/livelessons.


Table of Contents

  1. Introduction
    1. Certified Ethical Hacker CEH Complete Video Course: Introduction 00:01:49
  2. Module 1 Security Essentials
  3. Lesson 1: Course Overview
    1. 1.0 Learning objectives 00:00:25
    2. 1.1 Areas of Focus and Exam Info 00:04:14
    3. 1.2 Course Is and Isn't 00:01:00
    4. 1.3 Author Introductions 00:00:47
  4. Lesson 2: Introduction to Ethical Hacking
    1. 2.0 Learning objectives 00:00:24
    2. 2.1 InfoSec Overview 00:02:16
    3. 2.2 Threats and Attack Vectors 00:01:54
    4. 2.3 Attack Concepts 00:03:41
    5. 2.4 Attack Phases 00:03:16
    6. 2.5 Attack Types 00:03:14
    7. 2.6 InfoSec Policies 00:04:18
  5. Lesson 3: Footprinting and Recon
    1. 3.0 Learning objectives 00:00:30
    2. 3.1 Footprinting Concepts 00:03:47
    3. 3.2 Footprinting Objectives 00:02:53
    4. 3.3 Footprinting Methodologies 00:02:53
    5. 3.4 Search Engines 00:03:36
    6. 3.5 Finding People 00:02:16
    7. 3.6 Competitive Intelligence 00:01:55
    8. 3.7 Websites 00:04:40
    9. 3.8 Email Tracking 00:01:48
    10. 3.9 Network Discovery 00:07:50
    11. 3.10 DNS/Whois 00:04:20
    12. 3.11 Social Engineering 00:03:27
    13. 3.12 Employee Online Activities 00:03:02
    14. 3.13 Footprinting Tools 00:01:41
    15. 3.14 Footprinting Countermeasures 00:06:33
    16. 3.15 Penetration Testing: Footprinting and Recon 00:04:39
  6. Lesson 4: Scanning Networks
    1. 4.0 Learning objectives 00:00:29
    2. 4.1 Network Scanning Overview 00:02:00
    3. 4.2 Scanning Techniques 00:05:49
    4. 4.3 TCP/UDP Refresher 00:06:46
    5. 4.4 TCP Scanning Types 00:04:25
    6. 4.5 More TCP Scanning Techniques 00:09:11
    7. 4.6 Nmap Demo 00:07:15
    8. 4.7 IDS Evasion 00:03:53
    9. 4.8 Banner Grabbing 00:04:51
    10. 4.9 Vulnerability Scanning 00:03:43
    11. 4.10 Network Diagramming 00:03:32
    12. 4.11 Using and Chaining Proxies 00:06:55
    13. 4.12 HTTP and SSH Tunneling 00:05:33
    14. 4.13 Anonymizers 00:02:02
    15. 4.14 IP Spoofing and Countermeasures 00:04:41
    16. 4.15 Penetration Testing: Scanning Networks 00:01:21
  7. Module 2 System Security
    1. Module Intro 00:00:26
  8. Lesson 5: Enumeration
    1. 5.0 Learning objectives 00:00:18
    2. 5.1 Enumeration Overview 00:01:51
    3. 5.2 NetBIOS Enumeration 00:01:55
    4. 5.3 Users and Default Passwords 00:02:17
    5. 5.4 SNMP Enumeration 00:05:27
    6. 5.5 Linux Enumeration 00:02:45
    7. 5.6 LDAP, NTP, SMTP, DNS Enumeration 00:08:29
    8. 5.7 Enumeration Countermeasures 00:02:46
    9. 5.8 Penetration Testing: Enumeration 00:02:20
  9. Lesson 6: System Hacking
    1. 6.0 Learning objectives 00:00:25
    2. 6.1 Hacking Methodology 00:03:06
    3. 6.2 Password Cracking 00:08:04
    4. 6.3 Keyloggers and Anti-keyloggers 00:08:23
    5. 6.4 Microsoft Authentication 00:06:45
    6. 6.5 Defense Against Password Cracking 00:07:12
    7. 6.6 Privilege Escalation 00:08:04
    8. 6.7 Executing Applications 00:05:27
    9. 6.8 Rootkits and Anti-rootkits 00:08:26
    10. 6.9 NTFS Stream Manipulation 00:04:13
    11. 6.10 Steganography and Steganalysis Methods 00:06:42
    12. 6.11 Covering Tracks 00:03:39
    13. 6.12 Penetration Testing: System Hacking 00:03:15
  10. Lesson 7: Malware Threats
    1. 7.0 Learning objectives 00:00:21
    2. 7.1 Trojans, Backdoors, Viruses, Worms 00:10:38
    3. 7.2 Indications of Infection 00:04:13
    4. 7.3 Common Ports 00:03:55
    5. 7.4 How Malware Gets Into a System 00:02:00
    6. 7.5 How to Detect 00:04:24
    7. 7.6 Trojan Horse Construction Kit 00:05:31
    8. 7.7 Anti-malware Software 00:01:12
    9. 7.8 Online Malware Analysis Services 00:02:16
    10. 7.9 Countermeasures 00:02:27
    11. 7.10 Penetration Testing: Malware Threats 00:02:50
  11. Lesson 8: Sniffing
    1. 8.0 Learning objectives 00:00:33
    2. 8.1 Sniffing Overview 00:03:39
    3. 8.2 Sniffing Attack Types 00:08:46
    4. 8.3 Protocol Analyzers 00:01:44
    5. 8.4 MAC Flooding 00:03:16
    6. 8.5 DHCP Attacks 00:04:31
    7. 8.6 ARP Spoofing and Poisoning 00:04:15
    8. 8.7 MAC Spoofing 00:01:42
    9. 8.8 DNS Spoofing 00:04:03
    10. 8.9 Sniffing Tools 00:08:31
    11. 8.10 Sniffing Detection and Defense 00:03:39
    12. 8.11 Penetration Testing: Sniffing 00:01:27
  12. Lesson 9: Social Engineering
    1. 9.0 Learning objectives 00:00:27
    2. 9.1 Social Engineering Concepts 00:02:36
    3. 9.2 Targets 00:02:16
    4. 9.3 Techniques 00:06:28
    5. 9.4 Social Networking 00:02:26
    6. 9.5 Identity Theft 00:03:12
    7. 9.6 Social Engineering Countermeasures 00:02:58
    8. 9.7 Penetration Testing: Social Engineering 00:01:50
  13. Module 3 Network Security
    1. Module Intro 00:00:18
  14. Lesson 10: Denial-of-Service (DoS)
    1. 10.0 Learning objectives 00:00:30
    2. 10.1 DoS/DDoS Overview 00:03:52
    3. 10.2 DoS Techniques 00:03:53
    4. 10.3 Botnets 00:02:19
    5. 10.4 DoS Attack Tools 00:03:41
    6. 10.5 Detection and Countermeasures 00:11:34
    7. 10.6 DDoS Protection Tools 00:00:33
    8. 10.7 Penetration Testing: DoS 00:02:06
  15. Lesson 11: Session Hijacking
    1. 11.0 Learning objectives 00:00:18
    2. 11.1 What Is Session Hijacking? 00:04:33
    3. 11.2 Techniques 00:03:31
    4. 11.3 Application Level Session Hijacking 00:07:08
    5. 11.4 MitM Attacks 00:02:30
    6. 11.5 Cross-site Attacks 00:02:24
    7. 11.6 Network Level Hijacking 00:06:28
    8. 11.7 Session Hijacking Tools 00:02:34
    9. 11.8 Hijacking Protection 00:02:52
    10. 11.9 Penetration Testing: Session Hijacking 00:00:41
  16. Module 4 Web Services Security
    1. Module Intro 00:00:26
  17. Lesson 12: Hacking Webservers
    1. 12.0 Learning objectives 00:00:18
    2. 12.1 Webserver Concepts 00:03:34
    3. 12.2 Webserver Attacks 00:06:47
    4. 12.3 Attack Methodology 00:07:48
    5. 12.4 Countermeasures 00:05:23
    6. 12.5 System Patch Management 00:02:07
    7. 12.6 Security Tools 00:02:42
    8. 12.7 Penetration Testing: Hacking Webservers 00:01:09
    9. Exercise: Match the Attack Method 00:01:09
  18. Lesson 13: Hacking Web Applications
    1. 13.0 Learning objectives 00:00:28
    2. 13.1 Attack Vectors and Threats 00:07:06
    3. 13.2 Footprinting 00:02:57
    4. 13.3 Hacking Web Servers 00:02:06
    5. 13.4 Authentication and Authorization System Attacks 00:05:04
    6. 13.5 Session Management Attacks 00:01:18
    7. 13.6 Database Connectivity Attacks 00:03:26
    8. 13.7 Web Application Hacking Tools 00:05:07
    9. 13.8 Web Application Security Tools 00:02:16
    10. 13.9 Web Application Firewalls 00:01:17
    11. 13.10 Penetration Testing: Hacking Web Applications 00:02:57
  19. Lesson 14: SQL Injection
    1. 14.0 Learning objectives 00:00:28
    2. 14.1 Overview 00:02:12
    3. 14.2 Attacks Using SQL Injection 00:07:51
    4. 14.3 Methodology 00:04:41
    5. 14.4 SQL Injection Tools 00:02:15
    6. 14.5 SQL Injection Defense 00:04:33
    7. 14.6 Detection Tools 00:01:56
    8. 14.7 Penetration Testing: SQL Injection 00:00:35
  20. Module 5 Wireless and Internet Security
    1. Module Intro 00:00:22
  21. Lesson 15: Hacking Wireless
    1. 15.0 Learning objectives 00:00:28
    2. 15.1 Wireless LAN Overview 00:06:49
    3. 15.2 Wireless Encryption 00:09:04
    4. 15.3 Wireless Threats 00:07:44
    5. 15.4 Wireless Attack Methods 00:16:44
    6. 15.5 Bluetooth and Bluejacking 00:02:50
    7. 15.6 Wireless Attack Defense 00:03:52
    8. 15.7 Wireless IPS 00:01:17
    9. 15.8 Penetration Testing: Hacking Wireless 00:00:57
  22. Lesson 16: IDS, Firewalls, and Honeypots
    1. 16.0 Learning objectives 00:00:31
    2. 16.1 IDS, Firewall, and Honeypot Concepts 00:08:17
    3. 16.2 Firewall Tools 00:03:51
    4. 16.3 Honeypot Tools 00:02:59
    5. 16.4 IDS Tools 00:03:53
    6. 16.5 Evading IDS and Firewalls 00:10:35
    7. 16.6 Evading IDS and Firewall Tools 00:02:13
    8. 16.7 Detecting Honeypots 00:02:41
    9. 16.8 Penetration Testing: IDS, Firewalls, and Honeypots 00:01:32
  23. Lesson 17: Cloud Computing
    1. 17.0 Learning objectives 00:00:19
    2. 17.1 Overview 00:04:44
    3. 17.2 Providers 00:02:14
    4. 17.3 Detection 00:02:07
    5. 17.4 Instance and VPC Security Methods 00:02:00
    6. 17.5 Cloud Use as a Pen Testing Source 00:01:43
  24. Lesson 18: Cryptography
    1. 18.0 Learning objectives 00:00:29
    2. 18.1 Overview 00:02:06
    3. 18.2 Algorithms 00:06:20
    4. 18.3 Tools 00:01:00
    5. 18.4 Public Key Infrastructure 00:02:01
    6. 18.5 Email 00:04:57
    7. 18.6 Disk Encryption and Tools 00:03:36
    8. 18.7 Attacks Against Cryptography 00:02:53
    9. 18.8 Cryptanalysis Tools 00:01:06
  25. Summary
    1. Certified Ethical Hacker CEH Complete Video Course: Summary 00:00:34