Pluralsight
Pluralsight Logo

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course 

  • Offered byPluralsight

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
 at 
Pluralsight 
Overview

Gain practical experience using a wide range of hacking tools and techniques used by ethical hackers, such as Nmap, Metasploit, Wireshark, and Burp Suite

Duration

20 hours

Mode of learning

Part Time-Classroom

Official Website

Go to Website External Link Icon

Credential

Certificate

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
 at 
Pluralsight 
Highlights

  • Earn a certificate from Pluralsight
  • Learn from industry experts
Details Icon

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
 at 
Pluralsight 
Course details

Who should do this course?

Individuals who are new to the field of ethical hacking and cybersecurity and want to build a foundational understanding of ethical hacking principles and practices

Individuals with a strong interest in cybersecurity who wish to formalize their knowledge and pursue a career in ethical hacking or cybersecurity

What are the course deliverables?

Understand the role of an ethical hacker and the importance of ethical hacking in cybersecurity

Learn about the different phases of ethical hacking, including reconnaissance, scanning, gaining access, maintaining access, and covering tracks

Learn how to gather information about a target system or network using various tools and techniques

Understand how to perform active and passive reconnaissance to identify potential vulnerabilities

Gain knowledge of network scanning techniques and tools, such as Nmap, to discover open ports, services, and vulnerabilities

 

More about this course

This course offers a comprehensive introduction to ethical hacking, with a focus on the practical skills and knowledge required to pass the CEH certification exam

Throughout the course, learners will gain hands-on experience with the latest tools and techniques used by ethical hackers to assess and secure computer systems

With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies

$35/month after a 7-day trial

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
 at 
Pluralsight 
Curriculum

Overview of Information Security

Chapter Introduction 
Common Terms (Hack Value, Vulnerability, Exploit, Payload) 
Zero Day Attack 
Daisy Chaining 
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained 
QUIZ: Overview of Information Security QUIZ: Overview of Information Security 
 
Overview of Information Security Threats and Attacks
Chapter Introduction 
Threats vs Attacks 
Motives and Reasons Behind Cyber Security Attacks 
What Are the Means by Which Hackers Gain Access to Systems and Networks? 
Cloud Computing Threats 
Advanced Persistent Threats 
Viruses and Worms 
Ransomware 
Mobile Threats 
Modern Age Information Warfare 
Insider Attacks 
Phishing 
Web Application Threats 
Classification of Threats: Network Threats 
Clasification of Threats: Host Threats 
Clasification of Threats: Application Threats 
Classification of Attacks 
Botnets 
Laws, Standards, and Regulations 
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained 
QUIZ: Information Security Threats and AttacksQUIZ: Information Security Threats and Attacks 
 
History of Hacking
 A Brief Look at the History of Hacking 
Types of Hackers 
What is Ethical Hacking? What is Its Purpose? 
Scope of Ethical Hacking 
Hacking Stages: Reconnaissance 
Hacking Stages: Scanning 
Hacking Stages: Gaining Access 
Hacking Stages: Maintaining Access 
Hacking Stages: Clearing Tracks 
QUIZ SOLUTION: History of Hacking - Questions answered and explained 
QUIZ: The History of HackingQUIZ: The History of Hacking 
 
Protecting Information
Chapter Introduction 
Information Assurance 
EISA and Information security management program 
Network Zoning 
Defense in Depth 
What Sort of Things Do Policies Regulate? 
Workplace Security Policies and Examples 
Physical Security Controls and Risk 
Risk Management 
Threat Modeling and Incident Management 
UBA - User Behavior Analytics and Network Security Controls 
Access Controls 
Identification Authentication Authorization Accounting and IAM 
Data Leakage 
Data Backup 
Data Recovery 
QUIZ SOLUTION: Protecting Information - Questions answered and explained 
QUIZ: Protecting InformationQUIZ: Protecting Information 
 
Penetration Testing
What Is Penetration Testing? 
What Does a Good Penetration Test Consist of? 
Why Do a Penetration Test 
Pre-Attack Phase: Contracts 
Audit vs Vulnerability Assessment vs Penetration Test 
Red vs Blue Team! 
Types of Penetration Testing 
Pre-Attack Phase: Rules of Engagement 
Pre-Attack Phase: Understanding your Client's requirements 
Pre-Attack Phase: Scope of a Penetration Test 
Pre-Attack Phase: Information Gathering 
Pre-Attack Phase: Two Types of Information Gathering 
Attack Phase 
Attack Phase: Penetrating the Perimeter 
Attack Phase: Target Acquisition 
Attack Phase: Privilege Escalation 
Attack Phase: Execute, Implant, Retract 
Post-Attack Phase 
Security Testing Methodologies 
QUIZ SOLUTION: Penetration Testing - Questions answered and explained 
QUIZ: Penetration TestingQUIZ: Penetration Testing 
 
Footprinting Process
 About Footprinting 
 Hacker State of Mind 
 Search Engine and Online Resources 
 Whois GeoIpLocation and DNS Interogation 
 Email Header Analysis 
 Getting an IP Address from an Email and More 
 Quick Look at a Website Certificate, Source Code and Traffic 
 How to Clone a Website and Extract Metadata from Files 
 Nmap and Traceroute 
 QUIZ SOLUTION: Footprinting - Questions answered and explained 
 QUIZ: FootprintingQUIZ: Footprinting 
 Extract Data from a FileExtract Data from a File 
 Phishing Emails and GeoIP LookupPhishing Emails and GeoIP Lookup 
 
Reports and Countermeasures
 Countermeasures and Best Practices 
 What Goes into a Footprinting Report? 
 QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained 
 QUIZ: Reports and CountermeasuresQUIZ: Reports and Countermeasures 
 
Network Scanning Techniques
 Banner Grabbing 
 Drawing and Mapping Out Network Topologies 
 Scanning for Vulnerabilities 
 Enumeration 
 QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained 
 QUIZ: Network Scanning TechniquesQUIZ: Network Scanning Techniques 
 
Password Cracking Techniques
 Password Cracking, Crunch, and Some Basics 
 Using Hydra for online password cracking 
 Hashcat: Environment Setup 
 HashCat: Installation 
 HashCat: Let Us Crack Some Passwords! 
 HashCat: Results and Recap 
 QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained 
 QUIZ: Password Cracking Techniques QUIZ: Password Cracking Techniques 
 
Techniques for Creating and Maintaining Access to the Remote System
 Reverse Shell and Remote Service Exploitation 
 Keylogger Intro and Environment Setup 
 Keylogger Source Code Download and Import 
 Keylogger Configuration 
 Keylogger Demo 
 Decrypting Keylogger Logs 
 QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained 
 QUIZ: Persistent Remote AccessQUIZ: Persistent Remote Access 
 
Hiding Malicious Programs
 SandBox 
 How to Create a Safe Sandbox Environment 
 Anti-Malware Software Overview 
 Packing Malware 
 Rootkits 
 Hiding Files and Steganography 
 QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained 
 QUIZ: Hiding Malicious ProgramsQUIZ: Hiding Malicious Programs 
 
Covering Tracks and Destroying Evidence
 Log Files: Covering Your Tracks 
 QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained 
 QUIZ: Covering Tracks and Destroying Evidence QUIZ: Covering Tracks and Destroying Evidence 
 Examine Log Files and Remove Traces of Your PresenceExamine Log Files and Remove Traces of Your Presence 
 
Spoofing Techniques
 ARP Spoofing 
 MAC Address Spoofing 
 DHCP Starvation 
 QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained 
 QUIZ: Sniffing TechniquesQUIZ: Sniffing Techniques 
 
Attacking and Exploiting Wireless Networks
 Capturing the WPA2 Handshake 
 Cracking WPA2 Passkey 
 QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained 
 QUIZ: Wireless NetworksQUIZ: Wireless Networks 
 
Tip, Tricks and Real Life Scenarios
 Social Engineering 
 Well Known Social Engineering Attacks: A Retrospective 
 QUIZ SOLUTION: Social Engineering - Questions Answered and Explained 
 QUIZ: Social Engineering QUIZ: Social Engineering 
 
Firewalls
 What Is a Firewall? How Does It Work? 
 Firewall Usage, Logging, and Configuration 
 Evading Firewall GeoIpBock 
 QUIZ SOLUTION: Firewalls - Questions answered and explained 
 QUIZ: FirewallsQUIZ: Firewalls 
 
Honeypots
 How to Set Up a Honeypot 
 How to grab traffic from a Honeypot 
 QUIZ SOLUTION: Honeypots - Questions Answered and Explained 
 QUIZ: HoneypotsQUIZ: Honeypots 
 
Let's Attack Web Servers and Web Applications!
 OWASP - Open Web Application Security Project 
 XSS Cross Site Scripting 
 SQL Injections 
 QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained 
 QUIZ: Attacking Web Servers and Web ApplicationsQUIZ: Attacking Web Servers and Web Applications 
 
About Cryptography
 Cryptography Basics 
 Cryptography Common Algorithms and Message Digest 
 PKI Public Key Infrastructure 
 
Encryption, Decryption, Cryptanalysis and Attack Vectors
 Cryptanalysis and Attack Vectors 
 Checksum and File Encryption 
 SSH RSA Demo 
 Storage Medium Encryption 
 QUIZ SOLUTION: Cryptography - Questions Answered and Explained 
 QUIZ: Cryptography QUIZ: Cryptography 
 Encrypting Storage DevicesEncrypting Storage Devices 
 
Final
 Final Practice Exam 
 Certified Ethical Hacker (CEH) Practice ExamCertified Ethical Hacker (CEH) Practice Exam 
 
Final SOLUTIONS
 Final Practice Exam Question and Answer overview part 1 
 Final Practice exam Question and Answer overview part 2 
 Final Practice exam Question and Answer overview part 3 
 Final Practice exam Question and Answer overview part 4 

Other courses offered by Pluralsight

– / –
1 hours
– / –
– / –
2 hours
– / –
– / –
2 hours
Intermediate
– / –
2 hours
Beginner
View Other 14 CoursesRight Arrow Icon
qna

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
 at 
Pluralsight 

Student Forum

chatAnything you would want to ask experts?
Write here...