Video description
Duration
More Than 10 Hours of Video Instruction
Overview
Learn everything you need to know to pass the Certified Ethical Hacker exam in under 10 hours. Understand the basics of network and Internet accessible application technologies, common discovery, and analysis techniques as well as more advanced security concepts such as malware and cryptography.
Description
The Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 10 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam. The course begins with a general overview of security essentials. You then explore system, network, and web services security before diving into wireless and Internet security. This course provides the breadth of coverage necessary to learn the full security concepts behind the CEH exam. It also helps prepare you for a career as a security professional.
Topics include
Module 1: Security Essentials
Module 2: Systems Security
Module 3: Network Security
Module 4: Web Services Security
Module 5: Wireless and Internet Security
About the Instructor
Nick Garner, CCIE No. 17871, is a solutions integration architect for Cisco Systems. He has been in Cisco Advanced Services supporting customers in both transactional and subscription engagements for 8 years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside of data center routing and switching designs is security and multicast.
William Bo Rothwell, lead instructor and courseware developer - One Course Source, has more than 20 years of experience teaching security courses. During his career he has authored more than 30 technical courses on topics that include security, programming, and system administration. In addition to his security experience, his areas of expertise include Perl, Python, Tcl/TK, and Shell programming, as well as Unix and Linux.
Skill Level
Intermediate
What You Will Learn
- Footprinting and recon
- Scanning networks
- Enumeration
- System hacking
- Malware threats
- Sniffing
- Social engineering
- Denial of Service (DoS)
- Session hijacking
- Hacking web servers
- Hacking web applications
- SQL injection
- Hacking wireless
- IDS, firewalls, and honeypots
- Cloud computing
- Cryptography
Who Should Take This Course
- Anyone interested in passing their Certified Ethical Hacker (CEH) exam
- Anyone interested in becoming a security professional
Course Requirements
Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have 5 years of information security experience in each of the 5 CCISO domains via the application form. Please go to the EC-Council website for more information.
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View All LiveLessons at http://www.pearsonitcertification.com/livelessons.
Table of Contents
Introduction
Certified Ethical Hacker CEH Complete Video Course: Introduction
00:01:49
Module 1 Security Essentials
Lesson 1: Course Overview
1.0 Learning objectives
00:00:25
1.1 Areas of Focus and Exam Info
00:04:14
1.2 Course Is and Isn’t
00:01:00
1.3 Author Introductions
00:00:47
Lesson 2: Introduction to Ethical Hacking
2.0 Learning objectives
00:00:24
2.1 InfoSec Overview
00:02:16
2.2 Threats and Attack Vectors
00:01:54
2.3 Attack Concepts
00:03:41
2.4 Attack Phases
00:03:16
2.5 Attack Types
00:03:14
2.6 InfoSec Policies
00:04:18
Lesson 3: Footprinting and Recon
3.0 Learning objectives
00:00:30
3.1 Footprinting Concepts
00:03:47
3.2 Footprinting Objectives
00:02:53
3.3 Footprinting Methodologies
00:02:53
3.4 Search Engines
00:03:36
3.5 Finding People
00:02:16
3.6 Competitive Intelligence
00:01:55
3.7 Websites
00:04:40
3.8 Email Tracking
00:01:48
3.9 Network Discovery
00:07:50
3.10 DNS/Whois
00:04:20
3.11 Social Engineering
00:03:27
3.12 Employee Online Activities
00:03:02
3.13 Footprinting Tools
00:01:41
3.14 Footprinting Countermeasures
00:06:33
3.15 Penetration Testing: Footprinting and Recon
00:04:39
Lesson 4: Scanning Networks
4.0 Learning objectives
00:00:29
4.1 Network Scanning Overview
00:02:00
4.2 Scanning Techniques
00:05:49
4.3 TCP/UDP Refresher
00:06:46
4.4 TCP Scanning Types
00:04:25
4.5 More TCP Scanning Techniques
00:09:11
4.6 Nmap Demo
00:07:15
4.7 IDS Evasion
00:03:53
4.8 Banner Grabbing
00:04:51
4.9 Vulnerability Scanning
00:03:43
4.10 Network Diagramming
00:03:32
4.11 Using and Chaining Proxies
00:06:55
4.12 HTTP and SSH Tunneling
00:05:33
4.13 Anonymizers
00:02:02
4.14 IP Spoofing and Countermeasures
00:04:41
4.15 Penetration Testing: Scanning Networks
00:01:21
Module 2 System Security
Module Intro
00:00:26
Lesson 5: Enumeration
5.0 Learning objectives
00:00:18
5.1 Enumeration Overview
00:01:51
5.2 NetBIOS Enumeration
00:01:55
5.3 Users and Default Passwords
00:02:17
5.4 SNMP Enumeration
00:05:27
5.5 Linux Enumeration
00:02:45
5.6 LDAP, NTP, SMTP, DNS Enumeration
00:08:29
5.7 Enumeration Countermeasures
00:02:46
5.8 Penetration Testing: Enumeration
00:02:20
Lesson 6: System Hacking
6.0 Learning objectives
00:00:24
6.1 Hacking Methodology
00:03:06
6.2 Password Cracking
00:08:04
6.3 Keyloggers and Anti-keyloggers
00:08:23
6.4 Microsoft Authentication
00:06:45
6.5 Defense Against Password Cracking
00:07:12
6.6 Privilege Escalation
00:08:04
6.7 Executing Applications
00:05:27
6.8 Rootkits and Anti-rootkits
00:08:26
6.9 NTFS Stream Manipulation
00:04:13
6.10 Steganography and Steganalysis Methods
00:06:42
6.11 Covering Tracks
00:03:39
6.12 Penetration Testing: System Hacking
00:03:15
Lesson 7: Malware Threats
7.0 Learning objectives
00:00:21
7.1 Trojans, Backdoors, Viruses, Worms
00:10:38
7.2 Indications of Infection
00:04:13
7.3 Common Ports
00:03:55
7.4 How Malware Gets Into a System
00:02:00
7.5 How to Detect
00:04:24
7.6 Trojan Horse Construction Kit
00:05:31
7.7 Anti-malware Software
00:01:12
7.8 Online Malware Analysis Services
00:02:16
7.9 Countermeasures
00:02:27
7.10 Penetration Testing: Malware Threats
00:02:50
Lesson 8: Sniffing
8.0 Learning objectives
00:00:33
8.1 Sniffing Overview
00:03:39
8.2 Sniffing Attack Types
00:08:46
8.3 Protocol Analyzers
00:01:44
8.4 MAC Flooding
00:03:16
8.5 DHCP Attacks
00:04:31
8.6 ARP Spoofing and Poisoning
00:04:15
8.7 MAC Spoofing
00:01:42
8.8 DNS Spoofing
00:04:03
8.9 Sniffing Tools
00:08:31
8.10 Sniffing Detection and Defense
00:03:39
8.11 Penetration Testing: Sniffing
00:01:27
Lesson 9: Social Engineering
9.0 Learning objectives
00:00:27
9.1 Social Engineering Concepts
00:02:36
9.2 Targets
00:02:16
9.3 Techniques
00:06:28
9.4 Social Networking
00:02:26
9.5 Identity Theft
00:03:12
9.6 Social Engineering Countermeasures
00:02:58
9.7 Penetration Testing: Social Engineering
00:01:50
Module 3 Network Security
Module Intro
00:00:18
Lesson 10: Denial-of-Service (DoS)
10.0 Learning objectives
00:00:30
10.1 DoS/DDoS Overview
00:03:52
10.2 DoS Techniques
00:03:53
10.3 Botnets
00:02:19
10.4 DoS Attack Tools
00:03:41
10.5 Detection and Countermeasures
00:11:34
10.6 DDoS Protection Tools
00:00:33
10.7 Penetration Testing: DoS
00:02:06
Lesson 11: Session Hijacking
11.0 Learning objectives
00:00:18
11.1 What Is Session Hijacking?
00:04:33
11.2 Techniques
00:03:31
11.3 Application Level Session Hijacking
00:07:08
11.4 MitM Attacks
00:02:30
11.5 Cross-site Attacks
00:02:24
11.6 Network Level Hijacking
00:06:28
11.7 Session Hijacking Tools
00:02:34
11.8 Hijacking Protection
00:02:52
11.9 Penetration Testing: Session Hijacking
00:00:41
Module 4 Web Services Security
Module Intro
00:00:26
Lesson 12: Hacking Webservers
12.0 Learning objectives
00:00:18
12.1 Webserver Concepts
00:03:34
12.2 Webserver Attacks
00:06:47
12.3 Attack Methodology
00:07:48
12.4 Countermeasures
00:05:23
12.5 System Patch Management
00:02:07
12.6 Security Tools
00:02:42
12.7 Penetration Testing: Hacking Webservers
00:01:09
Exercise: Match the Attack Method
00:01:09
Lesson 13: Hacking Web Applications
13.0 Learning objectives
00:00:28
13.1 Attack Vectors and Threats
00:07:06
13.2 Footprinting
00:02:57
13.3 Hacking Web Servers
00:02:06
13.4 Authentication and Authorization System Attacks
00:05:04
13.5 Session Management Attacks
00:01:18
13.6 Database Connectivity Attacks
00:03:26
13.7 Web Application Hacking Tools
00:05:07
13.8 Web Application Security Tools
00:02:16
13.9 Web Application Firewalls
00:01:17
13.10 Penetration Testing: Hacking Web Applications
00:02:57
Lesson 14: SQL Injection
14.0 Learning objectives
00:00:28
14.1 Overview
00:02:12
14.2 Attacks Using SQL Injection
00:07:51
14.3 Methodology
00:04:41
14.4 SQL Injection Tools
00:02:15
14.5 SQL Injection Defense
00:04:33
14.6 Detection Tools
00:01:56
14.7 Penetration Testing: SQL Injection
00:00:35
Module 5 Wireless and Internet Security
Module Intro
00:00:22
Lesson 15: Hacking Wireless
15.0 Learning objectives
00:00:28
15.1 Wireless LAN Overview
00:06:49
15.2 Wireless Encryption
00:09:04
15.3 Wireless Threats
00:07:44
15.4 Wireless Attack Methods
00:16:44
15.5 Bluetooth and Bluejacking
00:02:50
15.6 Wireless Attack Defense
00:03:52
15.7 Wireless IPS
00:01:17
15.8 Penetration Testing: Hacking Wireless
00:00:57
Lesson 16: IDS, Firewalls, and Honeypots
16.0 Learning objectives
00:00:31
16.1 IDS, Firewall, and Honeypot Concepts
00:08:17
16.2 Firewall Tools
00:03:51
16.3 Honeypot Tools
00:02:59
16.4 IDS Tools
00:03:53
16.5 Evading IDS and Firewalls
00:10:35
16.6 Evading IDS and Firewall Tools
00:02:13
16.7 Detecting Honeypots
00:02:41
16.8 Penetration Testing: IDS, Firewalls, and Honeypots
00:01:32
Lesson 17: Cloud Computing
17.0 Learning objectives
00:00:19
17.1 Overview
00:04:44
17.2 Providers
00:02:14
17.3 Detection
00:02:07
17.4 Instance and VPC Security Methods
00:02:00
17.5 Cloud Use as a Pen Testing Source
00:01:43
Lesson 18: Cryptography
18.0 Learning objectives
00:00:29
18.1 Overview
00:02:06
18.2 Algorithms
00:06:20
18.3 Tools
00:01:00
18.4 Public Key Infrastructure
00:02:01
18.5 Email
00:04:57
18.6 Disk Encryption and Tools
00:03:36
18.7 Attacks Against Cryptography
00:02:53
18.8 Cryptanalysis Tools
00:01:06
Summary
Certified Ethical Hacker CEH Complete Video Course: Summary
00:00:34