IT training guru James Conrad's newest Certified Ethical Hacker training will show you just how important it is to know thy enemy. You'll see how frighteningly easy it can be to hack into a system, elevate your privilege and quickly "own" a machine. You'll learn how easy it can be to crack passwords – even those that would be considered "secure." You'll learn how hackers create the dreaded Trojans that can potentially infect the computer of an unsuspecting user and taking control of the machine to infiltrate networks.
Why will we teach you these things? Because you have to know the hackers' tricks to prevent them from accessing your users.
Most Certified Ethical Hackers become highly adept at detecting and thwarting security threats – preventing significant harm to your business and making you an incredible asset! You can also use your new skills to move into the field of penetration testing – utilizing your CEH to test the security of your client's systems.
01 – Certified Ethical Hacker Series Introduction 02 – Introduction to Certified Ethical Hacking 03 – VMWare and Linux 04 – Footprinting and Reconnaissance Part 1 05 – Footprinting and Reconnaissance Part 2 06 – Scanning Part 1 07 – Scanning Part 2 08 – Enumeration 09 – Passwords Part 1 Windows 10 – Passwords Part 2 Linux 11 – System Hacking 12 – Malware 13 – Hack-O_Rama 14 – Sniffing 15 – Social Engineering 16 – Denial of Service 17 – Session Hijacking 18 – Web and SQL Hacking 19 – Cryptography 20 – Intrusion Detection Systems 21 – Hacking Wireless Networks