Certified Ethical Hacking(CEH) Course
-
Initiating Control – Part 1 -
Retaining Control -
Bypassing the Same Origin Policy -
Attacking Users
- Basic computer knowledge
- NO programming knowledge required
Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them.
- Anyone wanting to learn the absolute basics of hacking