Certified Ethical Hacker (Cehv12) Practical Hands On Labs
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.12 GB | Duration: 6h 0m
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.12 GB | Duration: 6h 0m
Complete CEH practical exam preparation course with free challenges and resources
What you'll learn
CEH Practical Exam Structure and type of questions expected in the exam
Setting up a personal lab for CEH Practical practice
Scanning and Enumerating services on the target
System Hacking and pentesting methodolgy
Web applications hacking including wordpress hacking, bruteforcing login forms and Sql Injection
Wifi hacking and cracking Wifi Passwords
Using tools for Cryptography and Steganography
Requirements
PC or Laptop with 4GB (8GB Recommended) RAM
No Programming or Linux Skills Required. We teach you from scratch!
Description
CEH Practical Complete Training with Free Resources and ChallengesWelcome to the comprehensive and complete practical course on CEH Practical Certification Preparation. In this course, you will embark on an exciting journey to master ethical hacking techniques, specifically tailored to help you succeed in the Certified Ethical Hacker (CEH) practical labs exam. The course provides step-by-step instructions to set up your own hacking lab for practising labs for CEH. You will also be presented with hands-on challenges on free platforms like Try hack me and Hack the Box that will solidify your hacking skills.Learning Objectives:Gain In-Depth Knowledge of Ethical Hacking: Understand the fundamentals of ethical hacking, including various hacking methodologies, reconnaissance techniques, vulnerability assessment, and system exploitation.Master CEH Practical Lab Concepts: Acquire a deep understanding of the CEH practical lab environment, tasks, and challenges.Develop Practical Skills: Engage in hands-on exercises to enhance your practical skills in penetration testing, vulnerability identification, network scanning, and more.Explore Advanced Techniques: Discover advanced hacking techniques such as privilege escalation, password cracking, reverse engineering, and social engineering.Strengthen Cybersecurity Awareness: Learn about the latest cybersecurity threats, attack vectors, and mitigation strategies to protect systems and networks effectively.Course Highlights:Thorough Coverage of CEH Practical Labs: This course provides comprehensive coverage of the CEH practical lab scenarios, ensuring you are well-prepared to tackle the challenges. There are also some free resources provided to challenge yourself and solidify your concepts.Hands-On Labs: Dive into real-world, hands-on lab exercises to practice ethical hacking techniques in a controlled environment.Step-by-Step Guidance: Receive step-by-step guidance and explanations for each lab exercise, enabling you to understand the underlying concepts and techniques thoroughly.Interactive Learning Experience: Engage in interactive activities, quizzes, and challenges to reinforce your understanding and knowledge retention.Up-to-Date Content: Stay current with the latest trends, tools, and methodologies in ethical hacking, ensuring you are well-equipped to tackle contemporary cybersecurity challenges.Practical Tips and Tricks: Discover valuable tips, tricks, and best practices from industry professionals to enhance your efficiency and effectiveness in ethical hacking.Course Syllabus: Module 1: Introduction to CEH CourseCourse IntroIntroduction to CEH practical labs environmentModule 2: Basic Lab SetupInstalling Parrot OS on VMWAREInstall Kali Linux in a virtual environmentVirtualize a vulnerable environment with metasploitableModule 3: Footprinting and ReconnaissanceSubdomain and VHOST EnumerationCertificates and DNS EnumerationModule 4: Scanning and EnumerationIdentifying live hostsService and OS discoveryEnumerating different servicesModule 5: System HackingScanning a vulnerable targetExploitation and Post ExploitationExploiting different services like FTP, SMB etcComplete hacking methodologyModule 6: SteganographyAlternate data streamsImage and white space SteganographyModule 7: Hacking Web ApplicationsComplete DVWA WalkthroughBrute forcing and SQL InjectionWordPress hackingModule 8: Network traffic analysis with WiresharkAnalyse DOS and DDOS attackExtracting credentialsAnalyse IoT trafficModule 9: Hacking Mobile PlatformsMetasploit and Meterpreter hacking phonesPhonesploit tutorialModule 10: Wireless Network HackingAssessing wireless network securityCracking WEP/WPA/WPA2 encryptionModule 11: Cloud SecurityEnumeration S3 BucketsExploiting cloud MisconfigurationsModule 12: CryptographyTechniques to hash data and filesEncryption and decryption toolsBy the end of this course, you will possess the knowledge, skills, and confidence necessary to excel in the CEH practical labs and pursue a successful career in ethical hacking and cybersecurity.Enrol now and embark on your journey to becoming a proficient Ethical Hacker.Notes:This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test. The instructor is not linked to any tool or service mentioned in the course in any capacity.
Overview
Section 1: Introduction
Lecture 1 Introduction to the Course
Lecture 2 CEH Exam Environment & Structure
Section 2: Basic Lab Setup
Lecture 3 Install Parrot OS on VMWARE
Lecture 4 Install Kali Linux on VMWARE (Optional)
Lecture 5 Use Prebuilt Kali Linux on VMWARE
Lecture 6 Setup Metasploitable 2 on VMWARE
Section 3: Footprinting and Reconnaissance
Lecture 7 Dir Busting and Vhost Enumeration - Web
Lecture 8 Subdomain Enumeration Challenge (Takeover THM free room)
Lecture 9 Passive Reconnaissance with Digital Certificates
Lecture 10 DNS Footprinting and Enumeration
Section 4: Scanning and Enumeration
Lecture 11 Identifying Live Hosts
Lecture 12 Service and OS Discovery
Lecture 13 NetBios Enumeration
Lecture 14 SMB Enumeration
Section 5: System Hacking
Lecture 15 Introduction to Module
Lecture 16 Introduction to Metasploit and Windows 10 Hacking Demo
Lecture 17 Scanning Networks
Lecture 18 Vulnerability Assessment
Lecture 19 Exploitation
Lecture 20 Post Exploitation
Lecture 21 Hacking Windows Challenge (Blue THM Free Room)
Lecture 22 Setting up Hack the Box and Crack Meow Machine
Lecture 23 FTP Exploitation
Lecture 24 FTP Exploitation Challenge 1 - HTB Fawn
Lecture 25 SMB Exploitation
Lecture 26 SMB Exploitation Challenge - HTB Dancing
Lecture 27 Telnet Exploitation
Lecture 28 Redis Database Exploitation (Optional) - HTB Redeemer
Section 6: Steganography and Hiding Activities
Lecture 29 Covert Communication Channels
Lecture 30 Hide Files Using Alternate Data Streams
Lecture 31 White Space Steganography - Snow
Lecture 32 Image Steganography
Section 7: Hacking Web Applications and Web Servers
Lecture 33 Install DVWA on Kali
Lecture 34 Install DVWA on Windows
Lecture 35 Command Execution Vulnerabilities - Linux
Lecture 36 Command Execution Vulnerabilities - Windows
Lecture 37 Command Execution Challenge (Pickle Rickle THM Free Room)
Lecture 38 File Upload Vulnerabilities
Lecture 39 Brute Forcing Web Applications Passwords with Burp and Hydra
Lecture 40 Brute Forcing Challenge (Brute it THM Free Room)
Lecture 41 Chaining Multiple Vulnerabilities (Command Injection + File Upload)
Lecture 42 SQL Injection Vulnerabilities -1
Lecture 43 SQL Injection Vulnerabilities -2
Lecture 44 SQL Injection Challenge (SQLMAP THM Free Room)
Lecture 45 Hacking Wordpress Websites with WPscan
Section 8: Packet Analysis with Wireshark
Lecture 46 Detect DDOS attack with Wireshark
Lecture 47 Credentials extraction from Wireshark
Lecture 48 Detect IoT traffic
Section 9: Hacking Mobile Platforms
Lecture 49 Install Android on Vmware
Lecture 50 Hacking Android Devices with msfvenom
Lecture 51 Hacking Android Devices with Phonesploit over ADB
Section 10: Wifi Hacking
Lecture 52 Introduction to Wifi Hacking
Lecture 53 Crack Wifi with Aircrack
Lecture 54 Capturing Handshakes with Hcxdumptool
Lecture 55 Preparing captured Handshakes for Cracking
Lecture 56 Cracking WIFI passwords with hashcat
Lecture 57 Cracking Wifi Passwords with FERN
Section 11: Cloud Security
Lecture 58 Enumerating S3 Buckets
Lecture 59 Exploiting S3 Buckets Unauthenticated
Lecture 60 Exploiting S3 Buckets Authenticated
Section 12: Cryptography
Lecture 61 Disk Encryption Using Veracrypt
Lecture 62 File and Text Message Encryption using Cryptoforge
Lecture 63 File encryption using Advanced encryption package
Lecture 64 Encrypt and Decrypt data using BCtextEncoder
Lecture 65 Calculating Hashes on Windows with different tools
Lecture 66 Cryptanalysis using Cryptool
Students aiming to pass the EC-Council Certified Ethical Hacker (CEH) Practical exam.,Cybersecurity enthusiasts interested in enhancing their skills and knowledge,Beginners White Hat Hackers and Pentesters looking to learn practical hacking and pentesting,Anybody interested in learning ethical hacking / penetration testing,Ethical Hacking professional who are looking for more practical stuff