Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
Prepare for the Certified Ethical Hacker (CEH) certification exam.
Overview
15+ hours of video training
Certified Ethical Hacker (CEH), 4th Edition gives a complete overview of the topics in the EC-Councils updated Certified Ethical Hacker (CEH) exam. This video course has seven modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; System Hacking Phases and Attack Techniques; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help learners better understand the world of hacking so they can act to defend attacks, as well as pass the CEH exam.
Related learning
Skill Level:
Intermediate
Course Requirement
None
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.
Module 1:Information Security, Cybersecurity, and Ethical Hacking Overview
Lesson 1: Introduction to Ethical Hacking
Module 2: Reconnaissance Techniques
Lesson 2: Footprinting and Reconnaissance
Lesson 3: Scanning Networks
Lesson 4: Enumeration
Module 3: System Hacking Phases and Attack Techniques
Lesson 5: Vulnerability Analysis
Lesson 6: System Hacking
Lesson 7: Malware Threats
Module 4: Network and Perimeter Hacking
Lesson 8: Sniffing
Lesson 9: Social Engineering
Lesson 10: Denial-of-Service
Lesson 11: Session Hijacking
Lesson 12: Evading IDS, Firewalls, and Honeypots
Module 5: Web Application Hacking
Lesson 13: Hacking Web Servers
Lesson 14: Hacking Web Applications
Lesson 15: SQL Injection
Module 6: Wireless, Mobile, IoT, and OT Hacking
Lesson 16 Hacking Wireless Networks
Lesson 17 Hacking Mobile Platforms
Lesson 18 IoT and OT Hacking
Module 7: Cloud Computing and Cryptography
Lesson 19 Cloud Computing
Lesson 20 Cryptography