CEH Practical Exam Preparation Course & Training #Unofficial
- Description
- Curriculum
- FAQ
- Reviews
CEHv12 Practical Complete Training with Free Resources and Challenges (Unofficial)
Welcome to the comprehensive and complete practical course for Certified Ethical Hacker v12 Practical Certification exam Preparation #unofficial. In this course, you will embark on an exciting journey to master ethical hacking techniques, specifically tailored to help you succeed in the Certified Ethical Hacker (CEH) practical labs examination by EC-Council. The course provides step-by-step instructions to set up your own hacking lab for practicing labs for CEH. You will also be presented with hands-on challenges on free platforms like Try hack me and Hack the Box that will solidify your hacking skills.
The course covers essential topics after the CEH practical latest update. Lab Walkthroughs have also been included for essential topics to solidify the conceptual understanding and to get the feel about the exam environment and the type of Questions Expected.
Disclaimer
- The instructor is not linked to EC-Council or CEH in any manner. The course is independently created to better prepare for the CEH Practical exams.
- “Certified Ethical Hacker” and “CEH” is a registered trademarks of EC-Council and this course is not licensed, endorsed, or affiliated with EC-Council in any way.”
Learning Objectives:
- Gain In-Depth Knowledge of Ethical Hacking: Understand the fundamentals of ethical hacking, including various hacking methodologies, reconnaissance techniques, vulnerability assessment, and system exploitation.
- Master CEH Practical Lab Concepts: Acquire a deep understanding of the CEH practical lab environment, tasks, and challenges.
- Develop Practical Skills: Engage in hands-on exercises to enhance your practical skills in penetration testing, vulnerability identification, network scanning, and more.
- Explore Advanced Techniques: Discover advanced hacking techniques such as privilege escalation, password cracking, reverse engineering, and social engineering.
- Strengthen Cybersecurity Awareness: Learn about the latest cybersecurity threats, attack vectors, and mitigation strategies to protect systems and networks effectively.
Course Highlights:
- Thorough Coverage of CEH Practical Syllabus: This course provides comprehensive coverage of the practical labs scenarios, ensuring you are well-prepared to tackle the challenges. There are also some free resources provided to challenge yourself and solidify your concepts.
- Hands-On Labs: Dive into real-world, hands-on lab exercises to practice ethical hacking techniques in a controlled environment.
- Step-by-Step Guidance: Receive step-by-step guidance and explanations for each lab exercise, enabling you to understand the underlying concepts and techniques thoroughly.
- Interactive Learning Experience: Engage in interactive activities, quizzes, and challenges to reinforce your understanding and knowledge retention.
- Up-to-Date Content: Stay current with the latest trends, tools, and methodologies in ethical hacking, ensuring you are well-equipped to tackle contemporary cybersecurity challenges.
- Practical Tips and Tricks: Discover valuable tips, tricks, and best practices from industry professionals to enhance your efficiency and effectiveness in ethical hacking.
Course Syllabus: Module 1: Introduction to CEH Practical Exam
- Course Intro
- Introduction to Practical labs environment
Module 2: Basic Lab Setup
- Installing Parrot OS on VMWARE
- Install Kali Linux in a virtual environment
- Virtualize a vulnerable environment with metasploitable
Module 3: Footprinting and Reconnaissance
- Subdomain and VHOST Enumeration
- Certificates and DNS Enumeration
Module 4: Scanning and Enumeration
- Identifying live hosts
- Service and OS discovery
- Enumerating different services
Module 5: System Hacking
- Scanning a vulnerable target
- Exploitation and Post Exploitation
- Exploiting different services like FTP, SMB etc
- Complete hacking methodology
- Basic Linux Privilege escalation techniques
Module 6: Steganography
- Alternate data streams
- Image and white space Steganography
Module 7: Hacking Web Applications
- Complete DVWA Walkthrough
- Brute forcing and SQL Injection
- WordPress hacking
Module 8: Malware Analysis
- Static Malware Analysis for Beginners
- Finding out entropy and file entry points
- Intro to IDA, ollydbg and Ghidra
Module 9: Network traffic analysis with Wireshark
- Analyse DOS and DDOS attack
- Extracting credentials
- Analyse IoT traffic
Module 10: Hacking Mobile Platforms
- Metasploit and Meterpreter hacking phones
- Phonesploit tutorial
Module 11: Wireless Network Hacking
- Assessing wireless network security
- Cracking WEP/WPA/WPA2 encryption
Module 12: Cloud Security
- Enumeration S3 Buckets
- Exploiting cloud Misconfigurations
Module 13: Cryptography
- Techniques to hash data and files
- Encryption and decryption tools
By the end of this course, you will possess the knowledge, skills, and confidence necessary to excel in the CEH practical labs exam and pursue a successful career in ethical hacking and cybersecurity.
Enroll now and embark on your journey to becoming a proficient Ethical Hacker.
Notes:
- This course is created for educational purposes only and all the attacks are launched in my own lab or against systems that I have permission to test. The instructor is not linked to any tool or service mentioned in the course in any capacity.
-
7Google Dorking and other Search EnginesVideo lesson
-
8Dir Busting and Vhost Enumeration - WebVideo lesson
-
9Subdomain Enumeration Challenge (Takeover THM free room)Video lesson
-
10Passive Reconnaissance with Digital CertificatesVideo lesson
-
11DNS Footprinting and EnumerationVideo lesson
-
12DNS BruteforcingVideo lesson
-
17Introduction to ModuleVideo lesson
-
18Introduction to Metasploit and Windows 10 Hacking DemoVideo lesson
-
19Scanning NetworksVideo lesson
-
20Vulnerability AssessmentVideo lesson
-
21ExploitationVideo lesson
-
22Post ExploitationVideo lesson
-
23Hacking Windows Challenge (Blue THM Free Room)Video lesson
-
24Setting up Hack the Box and Crack Meow MachineVideo lesson
-
25FTP ExploitationVideo lesson
-
26FTP Exploitation Challenge 1 - HTB FawnVideo lesson
-
27SMB ExploitationVideo lesson
-
28SMB Exploitation Challenge - HTB DancingVideo lesson
-
29Telnet ExploitationVideo lesson
-
30Redis Database Exploitation (Optional) - HTB RedeemerVideo lesson
-
31Walkthrough - Escalate Privileges by Exploiting Vulnerability in pkexecVideo lesson
-
32Walkthrough - Escalate Privileges in Linux Machine Exploiting Misconfigured NFSVideo lesson
-
37Install DVWA on KaliVideo lesson
-
38Install DVWA on WindowsVideo lesson
-
39Command Execution Vulnerabilities - LinuxVideo lesson
-
40Command Execution Vulnerabilities - WindowsVideo lesson
-
41Command Execution Challenge (Pickle Rickle THM Free Room)Video lesson
-
42File Upload VulnerabilitiesVideo lesson
-
43Brute Forcing Web Applications Passwords with Burp and HydraVideo lesson
-
44Brute Forcing Challenge (Brute it THM Free Room)Video lesson
-
45Chaining Multiple Vulnerabilities (Command Injection + File Upload)Video lesson
-
46SQL Injection Vulnerabilities -1Video lesson
-
47SQL Injection Vulnerabilities -2Video lesson
-
48SQL Injection Challenge (SQLMAP THM Free Room)Video lesson
-
49Hacking Wordpress Websites with WPscanVideo lesson
-
50Introduction to Malware AnalysisVideo lesson
-
51Malware Scanning using Hybrid AnalysisVideo lesson
-
52Perform a Strings Search using BinTextVideo lesson
-
53Identify Packaging and Obfuscation Methods using PEidVideo lesson
-
54Analyze ELF Executable File using Detect It Easy (DIE)Video lesson
-
55Find the Portable Executable (PE) Information of a Malware Executable FileVideo lesson
-
56Identify File Dependencies using Dependency WalkerVideo lesson
-
57Perform Malware Disassembly using IDAVideo lesson
-
58Perform Malware Disassembly using OllyDbgVideo lesson
-
59Perform Malware Disassembly using GhidraVideo lesson
-
60Gain Control over a Victim Machine using the njRAT RAT TrojanVideo lesson
-
61Create a Trojan Server using Theef RAT TrojanVideo lesson
-
62Create a Virus using the JPS Virus Maker Tool and Infect the Target SystemVideo lesson
-
67Install Android on VmwareVideo lesson
-
68Hacking Android Devices with msfvenomVideo lesson
-
69Hacking Android Devices with Phonesploit over ADBVideo lesson
-
70Walkthrough - Hacking Android Devices with msfvenomVideo lesson
-
71Walkthrough- Phishing Attacks on Android Devices with Social Engineering toolkitVideo lesson
-
72Walkthrough - Conducting DOS attack from Android using LOICVideo lesson
-
73Walkthrough - Exploit the Android Platform through ADB using PhoneSploitVideo lesson
-
74Walkthrough - Hack an Android Device by Creating APK File using AndroRATVideo lesson
-
75Walkthrough - Analyze a Malicious App using Online Android AnalyzersVideo lesson
-
76Introduction to Wifi HackingVideo lesson
-
77Crack Wifi with AircrackVideo lesson
-
78Walkthrough - Perform Wireless AttacksVideo lesson
-
79Capturing Handshakes with HcxdumptoolVideo lesson
-
80Preparing captured Handshakes for CrackingVideo lesson
-
81Cracking WIFI passwords with hashcatVideo lesson
-
82Cracking Wifi Passwords with FERNVideo lesson
External Links May Contain Affiliate Links read more