Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Certified Ethical Hacker v10 (CEH)

E-COURSE:

Certified Ethical Hacker v10 (CEH)

Instructor-led, video based E-Learning course.
Overview

EC-Council's Certified Ethical Hacker(CEH) course is meant to give the student a foundational knowledge and skillset to be an asset to their current organization as a security analyst or become an effective member of a security team engaged in offensive security testing and vulnerability assessments. In this course you'll learn about specific topics including: Intro to Ethical Hacking, Information gathering through foot-printing and reconnaissance techniques, network and system scanning, service enumeration, vulnerability discovery and analysis, system hacking, malware, social engineering, web application hacking, SQL Injection, Wireless, Mobile, IoT, and more.

Objectives
  • Possess a strong background knowledge of networking, telecommunications, web and computer systems.
  • Understand the current security protocols for popular operating environments, e.g., Linux, Windows & Mac OS.
  • "Hack" into an organization's network/systems - with its permission - to assess weaknesses and vulnerabilities.
  • Undertake preventive, corrective and protective countermeasures to safeguard systems against malicious attack.
  • Have the ability to identify and crack multiple types of passwords, and effectively counter password attacks.
  • Comprehend the terminology, stages, classes, phases and methodologies of ethical hacking.
  • Can cover their tracks and erase digital evidence of networks and system intrusions.
  • Understand cryptography & encryption techniques, and private/public key infrastructure.
  • Adhere to a code of ethics governing professional conduct & the appropriateness of hacking.
  • Understand common cyber attacks, e.g. social engineering, phishing, identity theft, URL obfuscation, trojans, dumpster diving, insider attacks, etc, and can undertake the appropriate evasion techniques and countermeasures.
Prerequisites
  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because, in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects
Target Audience
  • Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network
  • This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.
  • This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.
  • People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. Introduction
0
Start
Overview
1
Start
Intro To Ethical Hacking: Threats
2
Start
Intro To Ethical Hacking: Threats Part 2
3
Start
Intro To Ethical Hacking: Hacking Concepts
4
Start
Intro To Ethical Hacking: Hacking Concepts Part 2
5
Start
Intro To Ethical Hacking: Security Controls
6
Start
Intro To Ethical Hacking: Security Controls Part 2
7
Start
Intro To Ethical Hacking: Security Controls Part 3
8
Start
Intro To Ethical Hacking: Security Controls Part 4
9
Start
Intro To Ethical Hacking: Security Controls Part 5
10
Start
Intro To Ethical Hacking: Pentesting
11
Start
Intro To Ethical Hacking: Laws And Standards
  1. INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
12
Start
Footprinting
13
Start
Footprinting Part 2
14
Start
Footprinting Part 3
  1. ATTACKS AND EXPLOITS
15
Start
Host Discovery
16
Start
Scanning With Nmap
17
Start
Scanning With Nmap Part 2
18
Start
ProxyChains
  1. ENUMERATION
19
Start
Enumeration
  1. VULNERABILITY ANALYSIS
20
Start
Vulnerability Analysis Concepts
21
Start
Vulnerability Analysis Tools
  1. SYSTEM HACKING
22
Start
Password Attacks
23
Start
Password Attacks Part 2
24
Start
Password Attacks Part 3
25
Start
Password Attacks Part 4
26
Start
Password Attacks Part 5
27
Start
Privilege Escalation
28
Start
Privilege Escalation Part 2
29
Start
Privilege Escalation Part 3
30
Start
Covert Data Gathering
31
Start
Hidden Files
32
Start
Covering Tracks
  1. MALWARE THREATS
33
Start
Malware Threats Cehv10
34
Start
Malware Threats Part 2
35
Start
Malware Threats Part 3
  1. SNIFFING
36
Start
Network Sniffing
37
Start
Network Sniffing Part 2
  1. SOCIAL ENGINEERING
38
Start
Social Engineering
39
Start
Social Engineering Part 2
40
Start
Social Engineering Part 3
  1. DENIAL OF SERVICE
41
Start
Denial Of Service
42
Start
Denial Of Service Part 2
43
Start
Denial Of Service Part 3
  1. SESSION HIJACKING
44
Start
Session Hijacking
45
Start
Session Hijacking Part 2
46
Start
Session Hijacking Part 3
  1. EVADING IDS, FIREWALLS, AND HONEYPOTS
47
Start
Evading IDS, Firewalls And Honeypots
48
Start
Evading IDS, Firewall And Honeypots Part 2
49
Start
Evading IDS, Firewall And Honeypots Part 3
50
Start
Evading IDS, Firewall And Honeypots Part 4
51
Start
Evading IDS, Firewall And Honeypots Part 5
  1. HACKING WEB SERVERS
52
Start
Hacking Web Servers
  1. HACKING WEB APPLICATIONS
53
Start
Common Web App Threats
54
Start
Common Web App Threats Part 2
55
Start
Common Web Apps Threats Part 3
56
Start
Common Web App Threats Part 4
57
Start
Practical Web App Hacking
58
Start
Practical Web App Hacking Part 2
59
Start
Practical Web App Hacking Part 3
  1. SQL INJECTION
60
Start
SQL Concepts
61
Start
SQL Injection Types
62
Start
Other SQLi And Tools
  1. HACKING WIRELESS NETWORKS
63
Start
Wireless Hacking Concepts
64
Start
Wireless Hacking: Tools
65
Start
Wireless Hacking: Tools Part 2
66
Start
Wireless Hacking: Common Threats
67
Start
Wireless Hacking: Common Threats Part 2
68
Start
Wireless Hacking: Cracking WEP
69
Start
Wireless Hacking: Cracking WPA/WPA2
  1. HACKING MOBILE PLATFORMS
70
Start
Mobile Hacking
  1. IOT HACKING
71
Start
IoT Concepts
72
Start
IoT Concepts Part 2
73
Start
IoT Attacks
74
Start
IoT Attacks Part 2
75
Start
IoT Attacks Part 3
  1. CLOUD COMPUTING
76
Start
Cloud Computing Concepts
77
Start
Cloud Computing Concepts Part 2
78
Start
Cloud Computing Attacks
79
Start
Cloud Computing Attacks Part 2
  1. CRYPTOGRAPHY
80
Start
Cryptography Concepts
81
Start
Cryptography Concepts Part 2
82
Start
Cryptography Concepts Part 3
83
Start
Cryptography Concepts Part 4
84
Start
Cryptography Concepts Part 5
85
Start
Cryptography Concepts Part 6
86
Start
Cryptography Attacks
E-COURSE Instructor-led, video based E-Learning course.
USD 19
  • 39:33:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top