top of page

Prérequis

  • You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.

  • In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.

  • I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.

  • The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.

 

 

Description

If you are curious about new technologies and passionate about jump starting your career as a ethical hacker, then this course is for you!  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.  

In this course, you will:

  • Learn the business and technical logistics behind penetration testing

  • Identify evolving threats from different types of hackers

  • Reveal shocking truths about the information operating systems can divulge

  • Realize the power of footprinting on the Internet

  • Detect live systems by inference

  • Get by a step-by-step, no-nonsense introduction to cryptography

  • Identify differences between vulnerability assessments and penetration tests

  • Master ways to prevent and disable system hacking

  • Protect yourself from malware, including Trojans, backdoor, viruses, and more

  • Thwart hackers attacking wireless networks and mobile devices

  • Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls

  • Implement countermeasures to stop SQL injections and other database attacks

  • And more!

bottom of page