Learning Outcome:
Requirement:
Mohamed Atef






Reliable and fast internet connection--
Wireless networking card--
Different kinds of foot-printing, foot-printing tools, and countermeasures--
System checking strategies and filtering countermeasures--
Specification strategies and identification countermeasures--
Framework hacking approach, steganography, steganalysis attacks, and covering tracks--
Different kinds of penetration testing, security review and system testing guide--
This is the universe's most progressive ethical hacking course with 18 of the most current security spaces any ethical hacker will ever need to know when they are intending to amplify the data security stance of their association. In 18 comprehensive modules, the course covers more than 270 assault advances, regularly utilized by programmers.
The objective of this course is to enable you to ace a moral hacking technique that can be utilized as a part of an penetration testing or email hacking circumstance. At the end of the course, you will have ethical hacking skills that are exceptionally popular, and also the all-around perceived Certified Ethical Hacker Certification. This course sets you up for EC-Council Certified Ethical Hacker CEH exam.
In the course, you will learn:
Make This Investment in Yourself
In the event that you need to do energizing work and appreciate the compensations that ethical hacking make, at that point, this is the course for you!
Take this course turn into a confirmed moral programmer!
Course Curriculum
Introduction
Available in
days
days
after you enroll
Build your lab
Available in
days
days
after you enroll
Get Familiar with Kali Linux
Available in
days
days
after you enroll
Important Definitions
Available in
days
days
after you enroll
Footprinting and Reconnaissance
Available in
days
days
after you enroll
-
Start
15.Footprinting Introduction
(7:28)
-
Start
16.Footprinting and Reconnaissance
(14:12)
-
Start
17.Email Harvest
(9:51)
-
Start
18. Google Hacking
(10:36)
-
Start
19.Metagoofil
(10:18)
-
Start
20.People Search Engine
(6:13)
-
Start
21.Maltego (Intelligence Tool)
(8:38)
-
Start
22.Internet Archives and Alerts
(7:04)
Network Scanning
Available in
days
days
after you enroll
-
Start
23.Network Scanning Overview
(5:21)
-
Start
24.Important Scanning Defination
(13:18)
-
Start
25. Network Scanning Methology
(2:55)
-
Start
26.Identifying Live system
(6:40)
-
Start
27.Port Scanning
(14:23)
-
Start
28.Advanced Scanning Techniques
(7:23)
-
Start
29.Get more information about your victim
(7:15)
-
Start
30.NMAP NSE Scripts
(1:40)
-
Start
31.Zenmap
(5:43)
-
Start
32.Netcat
(7:59)
-
Start
33.Grabbing Banner
(2:24)
-
Start
34.Network Mapping
(11:41)
-
Start
35.Vulnerability Scanning
(13:51)
Hiding your Identity
Available in
days
days
after you enroll
Enumeration
Available in
days
days
after you enroll
System Hacking
Available in
days
days
after you enroll
-
Start
45. Introduction to System Hackin
(8:23)
-
Start
46.Password Hacking techniques
(8:50)
-
Start
47.Default Password
(5:40)
-
Start
48.Important Tool
(14:33)
-
Start
49.Cain in Action
(18:22)
-
Start
50. Xhydra
(7:33)
-
Start
51.SSH Cracking
(3:29)
-
Start
52.Ncrack
(8:44)
-
Start
53.Ncrack different OS
(4:07)
-
Start
54.The right world list
(4:30)
-
Start
55.Crunch
(6:04)
-
Start
56.The most amazing and effect wordlsit
(6:22)
-
Start
57. Password Reset Hack
(15:57)
-
Start
58.Offline Password attack
(5:58)
Malware Threats
Available in
days
days
after you enroll
Sniffring
Available in
days
days
after you enroll
-
Start
65. Introduction to Sniffring
(9:33)
-
Start
65.1 MITM Attack (Proof of Concept)
(13:07)
-
Start
66. Enable Routing
(3:37)
-
Start
67.MITM Attack using Ettercap and Xplico
(9:07)
-
Start
68. Start Xplico
(1:46)
-
Start
69. Ettercap and Xplico attack
(9:34)
-
Start
70. DNS Spoofing 2
(10:58)
-
Start
71. DNS Spoofing attack
(10:07)
Cryptography
Available in
days
days
after you enroll
Social Engineering
Available in
days
days
after you enroll
-
Start
79. Introduction to Social Engineering
(3:13)
-
Start
80. Social Engineering Proof of Concept
(10:02)
-
Start
81. Phishing Attack
(16:17)
-
Start
82. How far you can go with SE
(7:40)
-
Start
83.Vishing Attack using Fake Call
(5:51)
-
Start
84. Vishing using Fake SMS
(4:53)
-
Start
85. Important Countermeasures
(8:29)
-
Start
86. Other SET Attack
(9:11)
Denial Of Service
Available in
days
days
after you enroll
Hacking Web Server
Available in
days
days
after you enroll
-
Start
92. Hacking web server
(15:44)
-
Start
93.Hacking an Apache Server
(11:07)
-
Start
94 . Hacking a Windows Server
(5:42)
-
Start
95.Practice
(1:32)
-
Start
96.Working with Exploit
(4:34)
-
Start
97.MetaSploit
(7:30)
-
Start
98. Armitage
(2:49)
-
Start
99. Armitage in Action
(7:48)
-
Start
100.Armitage Example 2
(7:38)
Important Definition for the Exam
Available in
days
days
after you enroll
Hacking Mobile Platform
Available in
days
days
after you enroll
Buffer Overflow
Available in
days
days
after you enroll
Cloud Computing
Available in
days
days
after you enroll
-
Start
123.Introduction to Cloud Computing
(3:03)
-
Start
124.IaaS vs PaaS vs SaaS
(2:25)
-
Start
125.SaaS
(4:24)
-
Start
126.PaaS
(2:04)
-
Start
127.IaaS
(1:59)
-
Start
128.Cloud Deployment
(0:49)
-
Start
129.Private Cloud
(3:03)
-
Start
130.Public Cloud
(8:04)
-
Start
131.Hybrid Cloud
(1:30)
-
Start
132.NIST SP 800 -145
(1:45)
Evading IDS, Firewalls and Honeyhots
Available in
days
days
after you enroll
Hacking Wireless Network
Available in
days
days
after you enroll
Attack Remote Target
Available in
days
days
after you enroll
Physical Security
Available in
days
days
after you enroll
Operations Security
Available in
days
days
after you enroll
Introduction
Available in
days
days
after you enroll
Build your lab
Available in
days
days
after you enroll
Get Familiar with Kali Linux
Available in
days
days
after you enroll
Important Definitions
Available in
days
days
after you enroll
Footprinting and Reconnaissance
Available in
days
days
after you enroll
-
Start15.Footprinting Introduction (7:28)
-
Start16.Footprinting and Reconnaissance (14:12)
-
Start17.Email Harvest (9:51)
-
Start18. Google Hacking (10:36)
-
Start19.Metagoofil (10:18)
-
Start20.People Search Engine (6:13)
-
Start21.Maltego (Intelligence Tool) (8:38)
-
Start22.Internet Archives and Alerts (7:04)
Network Scanning
Available in
days
days
after you enroll
-
Start23.Network Scanning Overview (5:21)
-
Start24.Important Scanning Defination (13:18)
-
Start25. Network Scanning Methology (2:55)
-
Start26.Identifying Live system (6:40)
-
Start27.Port Scanning (14:23)
-
Start28.Advanced Scanning Techniques (7:23)
-
Start29.Get more information about your victim (7:15)
-
Start30.NMAP NSE Scripts (1:40)
-
Start31.Zenmap (5:43)
-
Start32.Netcat (7:59)
-
Start33.Grabbing Banner (2:24)
-
Start34.Network Mapping (11:41)
-
Start35.Vulnerability Scanning (13:51)
Hiding your Identity
Available in
days
days
after you enroll
Enumeration
Available in
days
days
after you enroll
System Hacking
Available in
days
days
after you enroll
-
Start45. Introduction to System Hackin (8:23)
-
Start46.Password Hacking techniques (8:50)
-
Start47.Default Password (5:40)
-
Start48.Important Tool (14:33)
-
Start49.Cain in Action (18:22)
-
Start50. Xhydra (7:33)
-
Start51.SSH Cracking (3:29)
-
Start52.Ncrack (8:44)
-
Start53.Ncrack different OS (4:07)
-
Start54.The right world list (4:30)
-
Start55.Crunch (6:04)
-
Start56.The most amazing and effect wordlsit (6:22)
-
Start57. Password Reset Hack (15:57)
-
Start58.Offline Password attack (5:58)
Malware Threats
Available in
days
days
after you enroll
Sniffring
Available in
days
days
after you enroll
-
Start65. Introduction to Sniffring (9:33)
-
Start65.1 MITM Attack (Proof of Concept) (13:07)
-
Start66. Enable Routing (3:37)
-
Start67.MITM Attack using Ettercap and Xplico (9:07)
-
Start68. Start Xplico (1:46)
-
Start69. Ettercap and Xplico attack (9:34)
-
Start70. DNS Spoofing 2 (10:58)
-
Start71. DNS Spoofing attack (10:07)
Cryptography
Available in
days
days
after you enroll
Social Engineering
Available in
days
days
after you enroll
-
Start79. Introduction to Social Engineering (3:13)
-
Start80. Social Engineering Proof of Concept (10:02)
-
Start81. Phishing Attack (16:17)
-
Start82. How far you can go with SE (7:40)
-
Start83.Vishing Attack using Fake Call (5:51)
-
Start84. Vishing using Fake SMS (4:53)
-
Start85. Important Countermeasures (8:29)
-
Start86. Other SET Attack (9:11)
Denial Of Service
Available in
days
days
after you enroll
Hacking Web Server
Available in
days
days
after you enroll
-
Start92. Hacking web server (15:44)
-
Start93.Hacking an Apache Server (11:07)
-
Start94 . Hacking a Windows Server (5:42)
-
Start95.Practice (1:32)
-
Start96.Working with Exploit (4:34)
-
Start97.MetaSploit (7:30)
-
Start98. Armitage (2:49)
-
Start99. Armitage in Action (7:48)
-
Start100.Armitage Example 2 (7:38)
Important Definition for the Exam
Available in
days
days
after you enroll
Hacking Mobile Platform
Available in
days
days
after you enroll
Buffer Overflow
Available in
days
days
after you enroll
Cloud Computing
Available in
days
days
after you enroll
-
Start123.Introduction to Cloud Computing (3:03)
-
Start124.IaaS vs PaaS vs SaaS (2:25)
-
Start125.SaaS (4:24)
-
Start126.PaaS (2:04)
-
Start127.IaaS (1:59)
-
Start128.Cloud Deployment (0:49)
-
Start129.Private Cloud (3:03)
-
Start130.Public Cloud (8:04)
-
Start131.Hybrid Cloud (1:30)
-
Start132.NIST SP 800 -145 (1:45)
Evading IDS, Firewalls and Honeyhots
Available in
days
days
after you enroll
Hacking Wireless Network
Available in
days
days
after you enroll
Attack Remote Target
Available in
days
days
after you enroll
Physical Security
Available in
days
days
after you enroll
Operations Security
Available in
days
days
after you enroll
Your Instructor
Mohamed Atef
ICT Consultant and certified instructor with more than 20 years of experience deliver professional and academic courses and 2 books published.
Certified Information System Security Professional (CISSP) ID #517943
Microsoft Certified Trainer (MCT) ID #3022752
EC Council Certified Instructor (CEI) ID #ECC51750391761
CEH: Certified Ethical Hacking ID #ECC64515022319
Certified Cisco System Instructor (CCSI)
Microsoft Certified System Engineer (MCSE)
Microsoft Certified IT Professional (Windows Server Administration 2008)
CompTIA Certified (Network +)
CompTIA Certified (Server +)
CompTIA Certified (Linux +)
CompTIA Certified (Security +)
Cisco Certified Network Associate (CCNA)ID #CSCO11273248
Cisco Certified Network Professional (CCNP)
Project Management Professional (PMP) )ID #1772374
Reviews







