Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
CERTIFIED ETHICAL HACKER
©2021 SiemHunters
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.
©2021 SiemHunters
Module 01 - Introduction to Ethical Hacking
lesson1 - Information Security Overview
lesson2 - Information Security Threats and Attack Vectors
lesson3 - Hacking Concepts
lesson4 - Ethical Hacking Concepts
lesson5 - Information Security Controls -- part 1
lesson5 - Information Security Controls -- part 2
lesson6 - Penetration Testing Concepts
lesson7 - Information Security Laws and Standards
©2021 SiemHunters
Module 02 - Footprinting and Reconnaissance
lesson1 - Footprinting Concepts
lesson2 - Footprinting through Search Engines
lesson3 - Footprinting through Web Services
lesson4 - Footprinting through Social Networking Sites
lesson5 - Website Footprinting
lesson6 - Email Footprinting
lesson7 - Competitive Intelligence
lesson8 - Whois Footprinting
lesson9 - DNS Footprinting
lesson10 - Network Footprinting
lesson11 - Footprinting through Social Engineering
lesson12 - Footprinting Tools
lesson13 - Footprinting Countermeasures
lesson14 - Footprinting Penetration Testing
©2021 SiemHunters
Module 03 - Scanning Networks
lesson1 - Network Scanning Concepts
lesson2 - Scanning Tools
lesson3 - Scanning Techniques part 1
lesson3 - Scanning Techniques part 2
lesson4 - Scanning Beyond IDS and Firewall part 1
lesson4 - Scanning Beyond IDS and Firewall part 2
lesson5 - Banner Grabbing
lesson6 - Draw Network Diagrams
lesson7 - Scanning Pen Testing
©2021 SiemHunters
Module 4 - Enumeration
lesson1 - Enumeration Concepts
lesson2 - NetBIOS Enumeration
lesson3 - SNMP Enumeration
lesson4 - LDAP Enumeration
lesson5 - NTP Enumeration
lesson6 - SMTP and DNS Enumeration
lesson7 - Other Enumeration Techniques
lesson8 - Enumeration Countermeasures
lesson9 - Enumeration Pen Testing
©2021 SiemHunters
Module 5 - Vulnerability Analysis
lesson1 - Vulnerability Assessment Concepts
lesson2 - Vulnerability Assessment Solutions
lesson3 - Vulnerability Scoring Systems
lesson4 - Vulnerability Assessment Tools
lesson5 - Vulnerability Assessment Reports
working with nessus
working with nikto
©2021 SiemHunters
Module 6 - System Hacking
lesson1 - System Hacking Concepts
lesson2 - Cracking Passwords part 1
lesson2 - Cracking Passwords part 2
lesson2 - Cracking Passwords part 3
lesson3 - Escalating Privileges
lesson4 - Executing Applications
lesson5 - Hiding Files part 1
lesson5 - Hiding Files part 2
lesson5 - Hiding Files part 3
lesson6 - Covering Tracks
lesson7 - Penetration Testing
©2021 SiemHunters
©2021 SiemHunters
©2021 SiemHunters
©2021 SiemHunters
Topic