![Pluralsight](https://images.shiksha.ws/public/images/instHeaderDesktop.jpg)
![Pluralsight Logo](https://images.shiksha.com/mediadata/images/1716572675phpYcMwiO.gif)
Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
- Offered byPluralsight
Certified Ethical Hacker (CEH) - Linux Academy's Prep Course at Pluralsight Overview
Duration | 20 hours |
Mode of learning | Part Time-Classroom |
Official Website | Go to Website |
Credential | Certificate |
Certified Ethical Hacker (CEH) - Linux Academy's Prep Course at Pluralsight Highlights
- Earn a certificate from Pluralsight
- Learn from industry experts
Certified Ethical Hacker (CEH) - Linux Academy's Prep Course at Pluralsight Course details
Individuals who are new to the field of ethical hacking and cybersecurity and want to build a foundational understanding of ethical hacking principles and practices
Individuals with a strong interest in cybersecurity who wish to formalize their knowledge and pursue a career in ethical hacking or cybersecurity
Understand the role of an ethical hacker and the importance of ethical hacking in cybersecurity
Learn about the different phases of ethical hacking, including reconnaissance, scanning, gaining access, maintaining access, and covering tracks
Learn how to gather information about a target system or network using various tools and techniques
Understand how to perform active and passive reconnaissance to identify potential vulnerabilities
Gain knowledge of network scanning techniques and tools, such as Nmap, to discover open ports, services, and vulnerabilities
This course offers a comprehensive introduction to ethical hacking, with a focus on the practical skills and knowledge required to pass the CEH certification exam
Throughout the course, learners will gain hands-on experience with the latest tools and techniques used by ethical hackers to assess and secure computer systems
With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies
$35/month after a 7-day trial
Certified Ethical Hacker (CEH) - Linux Academy's Prep Course at Pluralsight Curriculum
Overview of Information Security
Common Terms (Hack Value, Vulnerability, Exploit, Payload)
Zero Day Attack
Daisy Chaining
QUIZ SOLUTION: Overview of Information Security - Questions answered and explained
QUIZ: Overview of Information Security QUIZ: Overview of Information Security
Threats vs Attacks
Motives and Reasons Behind Cyber Security Attacks
What Are the Means by Which Hackers Gain Access to Systems and Networks?
Cloud Computing Threats
Advanced Persistent Threats
Viruses and Worms
Ransomware
Mobile Threats
Modern Age Information Warfare
Insider Attacks
Phishing
Web Application Threats
Classification of Threats: Network Threats
Clasification of Threats: Host Threats
Clasification of Threats: Application Threats
Classification of Attacks
Botnets
Laws, Standards, and Regulations
QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained
QUIZ: Information Security Threats and AttacksQUIZ: Information Security Threats and Attacks
Types of Hackers
What is Ethical Hacking? What is Its Purpose?
Scope of Ethical Hacking
Hacking Stages: Reconnaissance
Hacking Stages: Scanning
Hacking Stages: Gaining Access
Hacking Stages: Maintaining Access
Hacking Stages: Clearing Tracks
QUIZ SOLUTION: History of Hacking - Questions answered and explained
QUIZ: The History of HackingQUIZ: The History of Hacking
Information Assurance
EISA and Information security management program
Network Zoning
Defense in Depth
What Sort of Things Do Policies Regulate?
Workplace Security Policies and Examples
Physical Security Controls and Risk
Risk Management
Threat Modeling and Incident Management
UBA - User Behavior Analytics and Network Security Controls
Access Controls
Identification Authentication Authorization Accounting and IAM
Data Leakage
Data Backup
Data Recovery
QUIZ SOLUTION: Protecting Information - Questions answered and explained
QUIZ: Protecting InformationQUIZ: Protecting Information
What Does a Good Penetration Test Consist of?
Why Do a Penetration Test
Pre-Attack Phase: Contracts
Audit vs Vulnerability Assessment vs Penetration Test
Red vs Blue Team!
Types of Penetration Testing
Pre-Attack Phase: Rules of Engagement
Pre-Attack Phase: Understanding your Client's requirements
Pre-Attack Phase: Scope of a Penetration Test
Pre-Attack Phase: Information Gathering
Pre-Attack Phase: Two Types of Information Gathering
Attack Phase
Attack Phase: Penetrating the Perimeter
Attack Phase: Target Acquisition
Attack Phase: Privilege Escalation
Attack Phase: Execute, Implant, Retract
Post-Attack Phase
Security Testing Methodologies
QUIZ SOLUTION: Penetration Testing - Questions answered and explained
QUIZ: Penetration TestingQUIZ: Penetration Testing
Hacker State of Mind
Search Engine and Online Resources
Whois GeoIpLocation and DNS Interogation
Email Header Analysis
Getting an IP Address from an Email and More
Quick Look at a Website Certificate, Source Code and Traffic
How to Clone a Website and Extract Metadata from Files
Nmap and Traceroute
QUIZ SOLUTION: Footprinting - Questions answered and explained
QUIZ: FootprintingQUIZ: Footprinting
Extract Data from a FileExtract Data from a File
Phishing Emails and GeoIP LookupPhishing Emails and GeoIP Lookup
What Goes into a Footprinting Report?
QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained
QUIZ: Reports and CountermeasuresQUIZ: Reports and Countermeasures
Drawing and Mapping Out Network Topologies
Scanning for Vulnerabilities
Enumeration
QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained
QUIZ: Network Scanning TechniquesQUIZ: Network Scanning Techniques
Using Hydra for online password cracking
Hashcat: Environment Setup
HashCat: Installation
HashCat: Let Us Crack Some Passwords!
HashCat: Results and Recap
QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained
QUIZ: Password Cracking Techniques QUIZ: Password Cracking Techniques
Keylogger Intro and Environment Setup
Keylogger Source Code Download and Import
Keylogger Configuration
Keylogger Demo
Decrypting Keylogger Logs
QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained
QUIZ: Persistent Remote AccessQUIZ: Persistent Remote Access
How to Create a Safe Sandbox Environment
Anti-Malware Software Overview
Packing Malware
Rootkits
Hiding Files and Steganography
QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained
QUIZ: Hiding Malicious ProgramsQUIZ: Hiding Malicious Programs
QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained
QUIZ: Covering Tracks and Destroying Evidence QUIZ: Covering Tracks and Destroying Evidence
Examine Log Files and Remove Traces of Your PresenceExamine Log Files and Remove Traces of Your Presence
MAC Address Spoofing
DHCP Starvation
QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained
QUIZ: Sniffing TechniquesQUIZ: Sniffing Techniques
Cracking WPA2 Passkey
QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained
QUIZ: Wireless NetworksQUIZ: Wireless Networks
Well Known Social Engineering Attacks: A Retrospective
QUIZ SOLUTION: Social Engineering - Questions Answered and Explained
QUIZ: Social Engineering QUIZ: Social Engineering
Firewall Usage, Logging, and Configuration
Evading Firewall GeoIpBock
QUIZ SOLUTION: Firewalls - Questions answered and explained
QUIZ: FirewallsQUIZ: Firewalls
How to grab traffic from a Honeypot
QUIZ SOLUTION: Honeypots - Questions Answered and Explained
QUIZ: HoneypotsQUIZ: Honeypots
XSS Cross Site Scripting
SQL Injections
QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained
QUIZ: Attacking Web Servers and Web ApplicationsQUIZ: Attacking Web Servers and Web Applications
Cryptography Common Algorithms and Message Digest
PKI Public Key Infrastructure
Checksum and File Encryption
SSH RSA Demo
Storage Medium Encryption
QUIZ SOLUTION: Cryptography - Questions Answered and Explained
QUIZ: Cryptography QUIZ: Cryptography
Encrypting Storage DevicesEncrypting Storage Devices
Certified Ethical Hacker (CEH) Practice ExamCertified Ethical Hacker (CEH) Practice Exam
Final Practice exam Question and Answer overview part 2
Final Practice exam Question and Answer overview part 3
Final Practice exam Question and Answer overview part 4