Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

E-COURSE:

Certified Ethical Hacker (CEH)

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview
Certified Ethical Hackers use the knowledge and tools of malicious attackers to uncover vulnerabilities in an organization's computer systems. The Complete Ethical Hacker Certification Exam Prep Course [1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.
Objectives
  • Possess a strong background knowledge of networking, telecommunications, web and computer systems.
  • Understand the current security protocols for popular operating environments, e.g., Linux, Windows & Mac OS.
  • "Hack" into an organization's network/systems - with its permission - to assess weaknesses and vulnerabilities.
  • Undertake preventive, corrective and protective countermeasures to safeguard systems against malicious attack.
  • Have the ability to identify and crack multiple types of passwords, and effectively counter password attacks.
  • Comprehend the terminology, stages, classes, phases and methodologies of ethical hacking.
  • Can cover their tracks and erase digital evidence of networks and system intrusions.
  • Understand cryptography & encryption techniques, and private/public key infrastructure.
  • Adhere to a code of ethics governing professional conduct & the appropriateness of hacking.
  • Understand common cyber attacks, e.g. social engineering, phishing, identity theft, URL obfuscation, trojans, dumpster diving, insider attacks, etc, and can undertake the appropriate evasion techniques and countermeasures.
Prerequisites
  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because, in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects
Target Audience
  • Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network
  • This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.
  • This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.
  • People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.

Module 1: Intro

1.1 Intro- Part 1

1.2 Intro- Part 2

1.3 Intro- Part 3

1.4 Intro- Part 4

1.5 Intro- Part 5

1.6 Intro- Part 6

1.7 Intro- Part 7

1.8 Intro- Part 8

1.9 Intro- Part 9

1.10 Intro- Part 10

1.11 Pretest- Intro

1.12 Questions

1.13 Pretest- Summary

1.14 Intro To Ethical Hacking- Part 1

1.15 Intro To Ethical Hacking- Part 2

1.16 Intro To Ethical Hacking- Part 3

1.17 Intro To Ethical Hacking- Part 4

1.18 Intro To Ethical Hacking- Part 5

1.19 Intro To Ethical Hacking- Part 6

1.20 Intro To Ethical Hacking- Part 7

1.21 Intro To Ethical Hacking- Part 8

1.22 Intro To Ethical Hacking- Part 9

Module 2: Footprinting & Reconnaissance

2.1 Footprinting And Reconnaissance- Part 1

2.2 Footprinting And Reconnaissance- Part 2

2.3 Footprinting And Reconnaissance- Part 3

2.4 Footprinting And Reconnaissance- Part 4

2.5 Footprinting And Reconnaissance- Part 5

2.6 Footprinting And Reconnaissance- Part 6

2.7 Footprinting And Reconnaissance- Part 7

2.8 Footprinting And Reconnaissance- Part 8

2.9 Footprinting And Reconnaissance- Part 9

Module 3: Scanning Networks

3.1 Scanning Networks- Part 1

3.2 Scanning Networks- Part 2

3.3 Scanning Networks- Part 3

3.4 Scanning Networks- Part 4

Module 4: Enumeration

4.1 Enumeration- Part 1

4.2 Enumeration- Part 2

4.3 Enumeration- Part 3

4.4 Enumeration- Part 4

4.5 Enumeration- Part 5

Module 5: System Hacking

5.1 System Hacking- Part 1

5.2 System Hacking- Part 2

5.3 System Hacking- Part 3

5.4 System Hacking- Part 4

5.5 System Hacking- Part 5

Module 6: Trojans & Backdoors

6.1 Trojans And Backdoors- Part 1

6.2 Trojans And Backdoors- Part 2

6.3 Trojans And Backdoors- Part 3

Module 7: Viruses & Worms

7.1 Viruses And Worms- Part 1

7.2 Viruses And Worms- Part 2

7.3 Viruses And Worms- Part 3

7.4 Viruses And Worms- Part 4

7.5 Viruses And Worms- Part 5

7.6 Viruses And Worms- Part 6

Module 8: Denial of Service

8.1 Denial Of Service- Part 1

8.2 Denial Of Service- Part 2

8.3 Denial Of Service- Part 3

8.4 Denial Of Service- Part 4

Module 9: Social Engineering

9.1 Social Engineering - Part 1

9.2 Social Engineering - Part 2

9.3 Social Engineering - Part 3

9.4 Social Engineering - Part 4

Module 10: Snffers

10.1 Snffers - Part 1

10.2 Snffers - Part 2

10.3 Snffers - Part 3

10.4 Snffers - Part 4

10.5 Snffers - Part 5

10.6 Snffers - Part 6

Module 11: Session Hijacking

11.1 Session Hijacking - Part 1

11.2 Session Hijacking - Part 2

11.3 Session Hijacking - Part 3

11.4 Session Hijacking - Part 4

11.5 Session Hijacking - Part 5

11.6 Session Hijacking - Part 6

11.7 Session Hijacking - Part 7

Module 12: Hacking Web Servers

12.1 Hacking Web Servers - Part 1

12.2 Hacking Web Servers - Part 2

12.3 Hacking Web Servers - Part 3

12.4 Hacking Web Servers - Part 4

12.5 Hacking Web Servers - Part 5

Module 13: Web Application Vulnerabilities

13.1 Web Application Vulnerabilities - Part 1

13.2 Web Application Vulnerabilities - Part 2

13.3 Web Application Vulnerabilities - Part 3

13.4 Web Application Vulnerabilities - Part 4

Module 14: SQL Injection

14.1 SQL Injection - Part 1

14.2 SQL Injection - Part 2

14.3 SQL Injection - Part 3

Module 15: Hacking Wireless Networks

15.1 Hacking Wireless Networks - Part 1

15.2 Hacking Wireless Networks - Part 2

15.3 Hacking Wireless Networks - Part 3

15.4 Hacking Wireless Networks - Part 4

15.5 Hacking Wireless Networks - Part 5

Module 16: Evading IDS, Firewalls & Honeypots

16.1 Evading IDS, Firewalls & Honeypots - Part 1

16.2 Evading IDS, Firewalls & Honeypots - Part 2

16.3 Evading IDS, Firewalls & Honeypots - Part 3

Module 17: Buffer Overflows

17.1 Buffer Overflows - Part 1

17.2 Buffer Overflows - Part 2

17.3 Buffer Overflows - Part 3

17.4 Buffer Overflows - Part 4

15.5 Buffer Overflows - Part 5

Module 18: Cryptography & Steganography

18.1 Cryptography & Steganography - Part 1

18.2 Cryptography & Steganography - Part 2

18.3 Cryptography & Steganography - Part 3

18.4 Cryptography & Steganography - Part 4

18.5 Cryptography & Steganography - Part 5

18.6 Cryptography & Steganography - Part 6

18.7 Cryptography & Steganography - Part 7

Module 19: Metasploit for Penertration Testing

19.1 Metasploit for Penertration Testing - Part 1

19.2 Metasploit for Penertration Testing - Part 2

19.3 Metasploit for Penertration Testing - Part 3

19.4 Metasploit for Penertration Testing - Part 4

19.5 Metasploit for Penertration Testing - Part 5

19.6 Metasploit for Penertration Testing - Part 6

19.7 Metasploit for Penertration Testing - Part 7

19.8 Business Process - Part 1

19.9 Business Process - Part 2

19.10 Business Process - Part 3

19.11 Business Process - Part 4

19.12 Business Process - Part 5

19.13 Business Process - Part 6

19.14 Lab Suggestions

E-COURSE Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
  • 12:19:39+ Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top