Cyber Security and Ethical Hacking
Become a Certified Ethical Hacker!.

Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 12 Students Enrolled
- 05:07 Hours

Course Overview
Do you need to earn your Certified Ethical Hacker (CEH v10) certification? If so, then this course is for you!
The importance of ethical hacking isn't in the breaking, it's in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
The CEH is a very dense exam. It covers a very broad range of materials. This course will be a good resource for you to understand not only the material but the breadth of the material. As EC-Council expects you to have two years of experience before you can even register to take the exam, I don't expect this course alone will be enough for you to pass the test. Hands-on experience will help a lot. While this course is an excellent way to start preparing for the exam, I will also mention other resources you can use to set yourself up for success.
Get Enrolled! Start Learning!!
Who this course is for:
- IT or IS professionals looking to obtain their CEH certification
- IT professionals looking to expand their careers into security
- Students who want a better understanding of information security components
What you'll learn
- Assess technical vulnerabilities for the potential for exploitation
- Perform technical vulnerability assessments
- Operate tools and utilities used in security testing
- Describe a basic penetration testing methodology
- Compare differences between testing methodologies that exist
- Assess a testing request to identify the scope and remain within that scope
- Identify appropriate testing tools
- Determine appropriate remediations for vulnerabilities
Course Curriculum
-
Prepare CEH Version 10... 00:09:00
-
Theory for Ethical Hac... 00:19:00
-
Active and Passive Inf... 00:16:00
-
DNSDUMSTER, OSINT Fram... 00:27:00
-
Network Scanning Theor... 00:32:00
-
Network Scanning Comma... 00:11:00
-
Port Forwarding and Ho... 00:12:00
-
Network scanning using... 00:10:00
-
Enumeration fundamenta... 00:20:00
-
Basics of enumeration ... 00:15:00
-
Advanced enumeration u... 00:15:00
-
Enumeration with wpsca... 00:19:00
-
Enumeration implementa... 00:10:00
-
Enumeration implementation 00:10:00
-
Vulnerability analysis... 00:30:00
-
Vulnerability analysis... 00:18:00
-
Basic nessus instalati... 00:10:00
-
Basics of nessus and a... 00:23:00
-
Nessus instalation on ... 00:11:00
-
Nessus instalation on Kali Linux 00:11:00
Mohamed Ibrahim
- 52 Courses
- 2416 Students
- 0 Reviews
DR.MOHAMED IBRAHIM, B.E, CCIE, VCIX, NSE3
He is having 20+ years of experience in IT with expertise in Networking, Security, Data Center, Virtualization, and HCI. He has handled major ICT projects across the Middle East region covering UAE, Qatar, and Kuwait and also trained hundreds of students around the globe in the Network Security domain from basic level to expert level.
Item Reviews - 0
Submit Reviews
This Course Include:
- 05:07 Hours On-Demand Videos
- 18 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion