We may earn an affiliate commission when you visit our partners.
Course image
Tim Pierson

If you are curious about new technologies and passionate about jump-starting your career as an ethical hacker, then this course is for you.  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your protection solutions for networks around the globe.   

Read more

If you are curious about new technologies and passionate about jump-starting your career as an ethical hacker, then this course is for you.  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your protection solutions for networks around the globe.   

In this course, you will:

  • Learn the business and technical logistics behind penetration testing

  • Identify evolving threats from different types of hackers

  • Reveal shocking truths about the information operating systems can divulge

  • Realize the power of footprinting on the Internet

  • Detect live systems by inference

  • Get by a step-by-step, no-nonsense introduction to cryptography

  • Identify differences between vulnerability assessments and penetration tests

  • Master ways to prevent and disable system hacking

  • Protect yourself from malware, including Trojans, backdoors, viruses, and more

  • Thwart hackers attacking wireless networks and mobile devices

  • Understand the pros and cons of intrusion detection systems, intrusion prevention systems, and web application firewalls

  • Implement countermeasures to stop SQL injections and other database attacks

  • And more.

Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 700 exam questions. More than any other course on Udemy.  

It's like buying 2 courses for the price of one.

Each question comes with a carefully crafted explanation of why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace to test your knowledge.

Take a look at the many students who have already used this course to ACE their Ethical Hacker Exam.  Don't take my word for it, ask questions to them directly in the forums.

               Just as Brayden and many others did...               Do you want to pass on your first attempt?               I did. So I did what Tim told me and I just got my Certification today.                Thanks, Instructor TIM. This course made all the difference.

Why Learn Ethical Hacking

A growing number of companies today seek ethical hackers to protect their most sensitive information. Very few days go by without breaking news, revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking as a certified course has quickly become one of the most sought-after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development.

Why Learn From Me

The ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the  [Certified] Ethical Hacker (TM) [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 35 years of experience as a technical trainer, consultant, and pen tester into this course material.

I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a course containing the spot-on knowledge of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to master the concepts covered and complete the assignments and quizzes, you will set yourself up for exam day success.

I took a lighthearted approach during the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future. 

Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.  

By the end of the course, you’ll have everything you need to ace the Ethical Hacker Certification [1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.

Join me on this journey, and enroll in the course today.

References:  [1] "Certified Ethical Hacker" and "CEH" are Registered Trademarks of the EC-Council corporation, 

Note: "Ethical Hacker" is not a registered trademark.

This course prepares you specifically to take the Certified Ethical Hacker v12 Exam from the EC Council but is also a great primer for the GPEN test from SANS, the C)PTS course from Mile2, and the Pentest+ and Security+ tests from CompTIA.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • Master the topics needed to pass the certified ethical hacker exam from ec-council.
  • Discover the why behind security administrators’ work and secure your corporate and/or home-based network.
  • Build your career towards becoming a professional penetration tester.
  • Get paid for providing a valuable service for companies with sensitive data.

Syllabus

Introduction
Orientation
Purpose of this Course
Build a Pentest Lab
Read more
Create A VeraCrypt Container to Protect Your Laptop or Desktop

This is where I am going to keep the things that you will really only want to download once.  Things that are rather large and you will not want to be downloading them over and over again.  I will reference them Throughout the course and tell you where to find them, but its a good idea to go ahead and get them downloaded and put into your veracrypt repository for safekeeping when you do need them.  They will generally be in the form of an .iso file that you will mount as a CD ROM on a VM to get access to utilities.

If you would like a shortcut to setting up your entire lab you can use this link.  This assumes you are using VMware Workstation Pro v12 or above on a Windows platform and that have set up your Veracrypt (if you plan to use that).   

Lab Legalities

Here you will find some useful Utilities that will be used throughout the course.

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then
select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these
essential VMs to you

This is a compressed VM, it is in Open Virtualization Format.  It will run on all sorts of Hypervisors, BUT I will ONLY give support for VMwareWorkstation Professional.  You must either download WinRar or get it from the UdemyUtils.iso  located in the: "Utilities, CheatSheets, VariousItems You really only Want to Download Once" Lecture. 

Make sure all of the segments you have downloaded are stored in the same directory/folder  then select any one of them and using the WinRar Utility select Extract Here.  It may take up to 10-30 minutes depending on how fast your machine is.  This is the best and most compressed way I could get these essential VMs to you

Putting Our Lab Together Step By Step
Tying everything together in our Lab
Business and Technical Logistics for Penetration Testing
Introduction to Pentesting and Ethical Hacking
Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro
Defintion of a Penetration Test
The Evolving Threat
The Vulnerabilty Lifecycle
Map.Norsecorp.com
Botnet Definition
Defense in Depth

I was asked to appear on the NBC Today Show Local Edition in Miami.  I was preparing to do a segment on the Dangers of Social Media.  And I must admit I did a fairly good job of getting my point across on that.  But unbeknownst to me the host, and attractive girl had a stalker, and I showed her how posting information on social media can divulge the latitude and longitude of where the photo was taken.  Watch the video as she realizes, and asks questions like.."What if you take a picture of your family in front of your front door?"  After the Segment, I had not noticed anything strange, and I thanked her kindly for her time.  She Sternly said..."YOUR NOT GOING ANYWHERE!!!"  We looked at her pictures and sure enough the Exif data showed her location of where she lived.  She asked what could be done.  I said..Well not much short of moving.  :-(



Types of PenTests
Types of Hackers
Common Definitions
Hacker vs. Penetration Tester
Penetration Testing Terminology
Essential Terminology
OSSTMM Methodology
Tools vs Technique
Things are not always as they seem
Calculating Risk & Formulas
Analyzing Findings
Calculating SLE, ARO, ALE
Other Penetration Testing Methodologies

To get a better grasp on the concepts from this section, you should study the questions AND explanations.  Some of the concepts will be new, this is done on purpose/  .  

Section Quiz - Ethical Hacking Overview 2
Section Quiz - Ethical Hacking Overview 3
FootPrinting - Reconnaissance and Information Gathering
Introduction to Footprinting
What Information is Gathered by the Hacker
Methods of Obtaining Information And Physical Access
Social Access
Digital Access
Passive vs Active Reconnaissance
Footprinting Defined
Exercise: Footprinting Tool: Maltego
Most Powerful Hacking Tool on the Internet Today
Instructor Demonstration - The Power of Google -A
Instructor Demonstration - The Power of Google -B
Instructor Demo: GoogleAlerts
Removing Searchable Content
Internet Archive: The WayBack Machine
Domain Name Registration-WhoIs Information
Instructor Demonstation - CentralOps
DNS Databases
Traceroute Operation
InstructorDemonstration: Online Tools
Spokeo - No Refuge for the Wealthy
Netcraft, DoaminsbyProxy, Countermeasures
Section Quiz - FootPrinting - Reconnaissance and Information Gathering 1
Section Quiz - FootPrinting - Reconnaissance and Information Gathering 2
Linux Overview
Introduction to Linux
Linux History - Linus + Minux = Linux
Linux GUI Desktops
Linux Shell Linux Bash Shell
Passwd & Shadow File Formats
InstructorDemo:User Account Management
Tarballs & Zips & Installing VMware Tools
Compiling Programs in Linux, Shell Shock, Poodle Vulnerability
Most Popular Linux Security Distribution
Section Quiz - Linux
Detecting Live Systems - Port Scanning
Introduction to Port Scanning
TCP/IP Stack
TCP 3-Way HandShake
NMap ServiceVersion Detection And Demo
Instructor Demonstration-Engage, NmapScans
Hping3, NMap -O
Fuzzy Logic
Countermeasures: Scanning
NMap Assignment

Enumeration - What Can We Get For Free?
Intro to Enumeration
Grabbing Banners
Shodan
ZoneTransfers
SNMP Enumeration.
SNMP Countermeasures, AD and AD Countermeasures
Null Sessions
Section Quiz - Enumeration

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Delves into real-world skills needed as a practicing security professional
Meets the demand for ethical hackers as more businesses seek to protect data
Covers the essential topics for the Certified Ethical Hacker Exam from EC-Council
Includes over 700 practice questions and 15 practice quizzes
Offers career development opportunities for students interested in becoming professional penetration testers
Suitable for individuals considering the GPEN test from SANS, the C)PTS course from Mile2, and the Pentest+ and Security+ tests from CompTIA

Save this course

Save The Complete Ethical Hacker Certification Exam Prep Course to your list so you can find it easily later:
Save

Reviews summary

Good learning

According to students, learning in this course is largely positive. It has thankful students.
Course was helpful.
"Thanks a lot Tim .."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Ethical Hacker Certification Exam Prep Course with these activities:
Review Network Fundamentals
Strengthen your understanding of networking fundamentals, including network protocols, topologies, and security concepts, to better prepare for the course content.
Browse courses on Networking
Show steps
  • Review lecture notes or textbooks on basic networking concepts
  • Practice configuring and managing network devices in a lab environment
Practice Port Scanning with Nmap
Gain hands-on experience with Nmap, a popular port scanning tool, to identify open ports and potential vulnerabilities in a target system.
Browse courses on Port Scanning
Show steps
  • Install Nmap on your computer
  • Learn the basics of Nmap commands and options
  • Practice scanning live systems in a controlled environment
Ethical Hacking Discussion Group
Engage in regular discussions with fellow students to share insights, ask questions, and deepen your understanding of ethical hacking concepts and techniques.
Browse courses on Ethical Hacking
Show steps
  • Join an online discussion forum or group dedicated to ethical hacking
  • Participate in discussions, share your thoughts, and respond to others' questions
Three other activities
Expand to see all activities and additional details
Show all six activities
Ethical Hacking Quiz
Test your understanding of ethical hacking concepts and techniques by completing a series of quiz questions covering various aspects of the field.
Browse courses on Ethical Hacking
Show steps
  • Review the course materials related to the quiz topics
  • Take the quiz and identify areas where you need improvement
  • Refer back to the course materials to reinforce your understanding
Design a Penetration Testing Plan
Apply your knowledge of ethical hacking techniques to create a comprehensive plan for conducting a penetration test on a specific target system or network.
Browse courses on Penetration Testing
Show steps
  • Define the scope and objectives of the penetration test
  • Identify potential vulnerabilities and attack vectors
  • Develop a testing methodology and timeline
  • Write a detailed report summarizing your findings and recommendations
Contribute to Metasploit Framework
Gain practical experience in ethical hacking by contributing to the development and maintenance of Metasploit, an open-source penetration testing framework.
Browse courses on Metasploit
Show steps
  • Familiarize yourself with the Metasploit Framework and its features
  • Identify a specific area or module where you can make a contribution
  • Design and develop enhancements or fixes to the Framework

Career center

Learners who complete The Complete Ethical Hacker Certification Exam Prep Course will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
Ethical Hackers are security professionals who use their knowledge of hacking techniques to identify vulnerabilities in computer systems and networks. They work with organizations to improve their security posture and prevent unauthorized access to sensitive data. The Complete Ethical Hacker Certification Exam Prep Course is an excellent resource for individuals who want to pursue a career as an Ethical Hacker. The course provides a solid foundation in ethical hacking principles and prepares individuals for the Certified Ethical Hacker (CEH) exam, a globally recognized certification for Ethical Hackers.
Penetration Tester
Penetration Testers assess the security of computer systems and networks by simulating real-world attacks. They work with organizations to identify and exploit vulnerabilities in their systems, and to provide recommendations for improving security. The Complete Ethical Hacker Certification Exam Prep Course is ideal for individuals who want to pursue a career as a Penetration Tester. The course provides a comprehensive overview of ethical hacking techniques and strategies, and prepares individuals for the Certified Ethical Hacker (CEH) exam, a globally recognized certification for Penetration Testers.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. They work with organizations to protect their networks from unauthorized access, data breaches, and cyber attacks. The Complete Ethical Hacker Certification Exam Prep Course is a valuable resource for Network Security Engineers as it provides a deep dive into ethical hacking techniques and strategies. By completing this course, Network Security Engineers can gain the skills and knowledge necessary to design and implement effective network security measures.
Vulnerability Analyst
Vulnerability Analysts identify and assess vulnerabilities in computer systems and networks. They work with organizations to develop and implement security measures to protect against these vulnerabilities. The Complete Ethical Hacker Certification Exam Prep Course is a valuable resource for Vulnerability Analysts as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, Vulnerability Analysts can gain the skills and knowledge necessary to identify and assess vulnerabilities and develop effective security measures.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze computer systems and networks to identify and respond to cyber threats. They work with organizations to protect their systems from unauthorized access, data breaches, and cyber attacks. The Complete Ethical Hacker Certification Exam Prep Course would be beneficial for those interested in a career as a Cybersecurity Analyst as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, individuals can gain the skills and knowledge necessary to protect organizations from cyber threats and ensure the security of their systems and networks.
Cybersecurity Manager
Cybersecurity Managers plan and direct the implementation of cybersecurity programs and policies. They work with organizations to protect their computer systems and networks from cyber threats. The Complete Ethical Hacker Certification Exam Prep Course is a valuable resource for Cybersecurity Managers as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, Cybersecurity Managers can gain the skills and knowledge necessary to develop and implement effective cybersecurity programs and policies.
Information Security Analyst
Information Security Analysts identify and assess risks to the security of an organization's information systems and networks. They work with organizations to develop and implement security policies and procedures to protect against these risks. The Complete Ethical Hacker Certification Exam Prep Course would be beneficial for those interested in a career as an Information Security Analyst as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, individuals can gain the skills and knowledge necessary to identify and assess risks to the security of information systems and networks, and to develop effective security measures.
Cybersecurity Consultant
Cybersecurity Consultants help organizations protect their computer systems and networks from cyber threats. They provide consulting services on a variety of topics, including security assessments, risk management, and incident response. The Complete Ethical Hacker Certification Exam Prep Course would be beneficial for those interested in a career as a Cybersecurity Consultant as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, individuals can gain the skills and knowledge necessary to help organizations protect themselves from cyber threats and improve their overall security posture.
Security Analyst
Security Analysts keep computer systems and networks safe by identifying vulnerabilities, developing security measures, and preventing and detecting security breaches. The Complete Ethical Hacker Certification Exam Prep Course would benefit those interested in a career as a Security Analyst because it provides a comprehensive overview of ethical hacking techniques, including penetration testing and vulnerability assessment. By completing this course, individuals can gain the skills and knowledge necessary to protect organizations from cyber threats and ensure the security of their systems and networks.
Chief Security Officer
Chief Security Officers (CSOs) are responsible for overseeing the security of an organization's information systems and networks. They develop and implement security policies and procedures, and manage security teams. The Complete Ethical Hacker Certification Exam Prep Course can be beneficial for CSOs as it provides a comprehensive overview of ethical hacking techniques and strategies. By completing this course, CSOs can gain valuable insights into how hackers operate, which can help them better protect their organizations from cyber threats.
Security Systems Administrator
Security Systems Administrators manage and maintain security systems, including firewalls, intrusion detection systems, and access control systems. They work with organizations to ensure that their security systems are running smoothly and effectively. The Complete Ethical Hacker Certification Exam Prep Course may be helpful for Security Systems Administrators as it provides insights into the techniques used by hackers to compromise security systems. This knowledge can be valuable in understanding how security system-based threats evolve and in developing strategies for preventing and detecting them.
Systems Administrator
Systems Administrators manage and maintain computer systems. They work with organizations to ensure that their systems are running smoothly and securely. The Complete Ethical Hacker Certification Exam Prep Course may be helpful for Systems Administrators as it provides insights into the techniques used by hackers to compromise computer systems. This knowledge can be valuable in understanding how system-based threats evolve and in developing strategies for preventing and detecting them.
Cloud Security Engineer
Cloud Security Engineers design and implement security measures for cloud-based systems and services. They work with organizations to protect their cloud assets from unauthorized access, data breaches, and cyber attacks. The Complete Ethical Hacker Certification Exam Prep Course may be helpful for aspiring Cloud Security Engineers as it provides insights into the techniques used by hackers to compromise cloud-based systems and services. This knowledge can be valuable in understanding how cloud-based threats evolve and in developing strategies for preventing and detecting them.
Forensic Analyst
Forensic Analysts investigate cybercrimes and collect and preserve digital evidence. They work with law enforcement agencies, corporations, and individuals to identify and prosecute cybercriminals. The Complete Ethical Hacker Certification Exam Prep Course may be helpful for aspiring Forensic Analysts as it provides insights into the techniques used by hackers to compromise computer systems and networks. This knowledge can be valuable in understanding how cybercrimes are committed and in developing strategies for preventing and detecting them.
Network Administrator
Network Administrators manage and maintain computer networks. They work with organizations to ensure that their networks are running smoothly and securely. The Complete Ethical Hacker Certification Exam Prep Course may be helpful for Network Administrators as it provides insights into the techniques used by hackers to compromise computer networks. This knowledge can be valuable in understanding how network-based threats evolve and in developing strategies for preventing and detecting them.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Ethical Hacker Certification Exam Prep Course.
Provides an overview of social engineering and covers a wide range of topics, including phishing, pretexting, and dumpster diving. It valuable resource for anyone interested in learning more about social engineering.
Provides a comprehensive overview of computer security and great resource for anyone who wants to learn more about the basics of computer security. It covers a wide range of topics, including cryptography, network security, and operating system security.
Provides a comprehensive overview of Metasploit and great resource for anyone who wants to learn more about using Metasploit for penetration testing. It covers a wide range of topics, including reconnaissance, scanning, exploitation, and post-exploitation.
Provides a comprehensive overview of network security assessment and great resource for anyone who wants to learn more about assessing network security.
Provides a comprehensive overview of Kali Linux and great resource for anyone who wants to learn more about using Kali Linux for penetration testing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Ethical Hacker Certification Exam Prep Course.
Penetration Testing and Ethical Hacking Complete Hands-on
Most relevant
Certified Ethical Hacker (CEH) - Linux Academy's Prep...
Most relevant
Ethical Hacking: Understanding Ethical Hacking
Most relevant
Ethical Hacking: Exam Review and Tips
Most relevant
Ethical Hacking: Hacking Wireless Networks
Most relevant
CompTIA Network+ (N10-007) Full Course & Practice Exam
Most relevant
Ethical Hacking: Network and Perimeter Hacking
Most relevant
Ethical Hacking: Vulnerability Analysis
Most relevant
Ethical Hacking: Reconnaissance/Footprinting
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser