Ultimate Penetration Tester Products

One Time Offers

We offer every product you could ever need to get Penetration Testing / (CEHv9) ® Certification!

Test Questions, Study Guides, Mind Maps, Checklists, Blueprints, Audio, Video & More...

Time left before offer expires:

video placeholder

Monthly 1-Day Test Question Test Clinic

Regular Price:

$997

Special Price:

$97

Test Questions & Test Clinic
video placeholder

Penetration Testing (CEHv9) Self-Paced Training

Regular Price:

$999

Special Price:

$795

Click Here To Add To Cart »
video placeholder

Penetration Testing (CEHv9) Apprentice Program

Regular Price:

$1,495

Special Price:

$995

Click Here to Add To Cart
  • 180 Day

    Guarantee

  • Secure

    Checkout

  • Privacy

    Protected

  • CEH v9 Brochure
    CEH v9 Brochure

    The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will want to be in.

All of our content is centered around the CEH Testable Domains

Test Questions
$9795
  • 2000 Test Question Database
  • Monthly Test Question Webinar
Order Now
Self Paced Training
$795
  • Complete Domain Coverage
  • Bonus Crypotraphy Module
  • Self-Paced Module Tracking
  • Dropbox Account with Instructor Resources!!!
Order Now

01 - Introduction to Ethical Hacking

  • Confidentiality, Integrity, and Availability concepts
  • Security Principles
  • Legal and regulatory issues
  • Professional Ethics
  • Security policies, standards, procedures and guidelines
  • Various Types of Penetration Tests
  • Black Hat, Grey Hat, White Hat Practices

02- Footprinting

  • Compiled list of all manual footprinting practices
  • Active Footprinting
  • Passive Footprinting
  • Internet Footprinting
  • Footprinting Tools
  • How to do it fast and effective
  • Using Disclosure to your advantage

03- Network Scanning

  • Scanning Tools
  • Scanning with Nmap
  • Scanning with Hping
  • Scanning with SuperScan4
  • Scanning with Kali Linux Tools
  • Footpriting and Identifying devices
  • Scanning Countermeasures

04 - Enumeration

  • Get deep into the devices and appliances
  • Find Usernames & Groups
  • Trick computers into telling you information
  • Get the computer to "Tell you more"

05- Hacking Systems

  • Use known exploits
  • Learn how to use Metasploit
  • Over 800 Known exploits still active
  • Advanced System Hacking Principles

06 - Trojans

  • Learn how to construct a trojan
  • Elitewrap & Advanced File Joiner
  • Wrapper Programs
  • Malware Analysis Intro
  • Detecting Trojans
  • Trojan Countermeasures

07 - Virus & Worms

  • Virus Creation Kits
  • Worm Creation Kits
  • Identify common behavior of Virus & Worms
  • How to analyze Virus & Worms
  • Forensic Analysis
  • Preventative measures

08 -Packet Sniffing

  • Active Packet Sniffing
  • Passive Packet Sniffing
  • Getting into encrypted sessions
  • hiding your information
  • Sniffing Tools
  • Sniffing Countermeasures
  • Advanced Filter Techniques

09 - Social Engineering

  • Social Engineering Resources and Landscape
  • Social Engineering Toolkit
  • Types of Social Engineering
  • Social Engineering Countermeasures

10 -DoS / DDoS

  • DDoS Attack techniques
  • DDoS Tools
  • DDoS Countermeasures

11 - Session Hijacking

  • Active Session Hijacking
  • Passive Session Hijacking
  • Session TCP 3 way handshake
  • Steps in Session Hijacking

12 - Webserver Attacks

  • Web Applications
  • Understanding Web Components
  • eCommerce Stores
  • Databases
  • Identifying applications
  • Reviewing Source Code

13 - Web Application

  • Web Hacking Tools
  • Session Splicing
  • Session Setup
  • Web Application Hackers Handbook

14 - SQL Injection

  • SQL Injection Landscape
  • Advanced SQL Injection
  • SQL Injection Tools
  • Enumerating, Databases, Tables, Columns, Rows

15 - Wireless

  • Wireless Landscape
  • Wireless Tools
  • Windows Wireless
  • Linux Wireless
  • Wardriving
  • Advanced Tools

16 - Mobile Hacking

  • Mobile Platforms
  • Android Vulnerabilities
  • SQL Injection Tools
  • Jailbreaking
  • iOS
  • Windows 8
  • Mobile Best Practices

17 - Firewalls, IDS & Honeypots

  • Evasion Techniques
  • Encryption
  • Evasion Tools
  • Honeypot behavior

18 - Cloud Concepts

  • Concepts
  • Threats
  • Attacks
  • Countermeasures

19 - Cryptography

  • Symmetric
  • Asymmetric
  • PKI
  • Cryptography Tools
  • Crypto Spreadsheet!!!

20 - Penetration Testing Roadmaps

  • Concepts
  • Threats
  • Attacks
  • Countermeasures

BONUS - Hack your way to getting paid$$$- BONUS

  • White Hack Professions
  • Grey Hat Professions
  • Job Boards
  • Freelance Jobs
  • Training
  • Affiliate ads
  • 60K/Week Business Model

Copyright 2015 © TheCodeOfLearning.com · All Rights Reserved