Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
Module 1 – CEH v11 Foundations Course Introduction
1.1 About this course: CEH Foundations
1.2 About the Instructor
Module 2 – CEH v11 Introduction To Networking
2.1 Networking Overview
2.2 Network Scope
2.3 Network Addressing
2.4 Activity – Examining Network Addressing
Module 3 – CEH v11 Lan Components
3.1 Protocols, Ports, Sockets
3.2 Network Topologies
3.3 LAN Devices
3.4 LAN Devices Part 2
3.5 VLANs
3.6 Activity – Examining Ports and Sockets
3.7 Activity – Examining Switches and VLANs
Module 4 – CEH v11 Routing and Network Access
4.1 Routers
4.2 Layer 3 Switches
4.3 Modems and Remote Access
4.4 Firewalls and Proxies
4.5 Activity – Examining Routing
4.6 Activity – Examining VLAN Routing
4.7 Activity – Examining Firewall Rules
Module 5 – CEH v11 Intrusion Detection and Network Layers
5.1 IDS and IPS
5.2 OSI Model
5.3 TCP-IP
5.4 Activity – Examining Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
6.1 Layer 4 Protocols
6.2 Layer 3 Protocols
6.3 Layer 2 Protocols
6.4 IP Addressing
6.5 Subnetting
6.6 DHCP
6.7 Activity – Examining TCP
6.8 Activity – Examining UDP
6.9 Activity – Examining IP
6.10 Activity – Examining ICMP
6.11 Activity – Examining ARP
Module 7 – CEH v11 Network Services
7.1 DNS
7.2 DNS Records
7.3 NTP
7.4 Authentication
7.5 Biometrics
7.6 Activity – Examining DNS
7.7 Activity – Examining DNS Records
Module 8 – CEH v11 Access Control
8.1 Local Authentication
8.2 Directory Service Authentication
8.3 Extending Authentication
8.4 Authorization
8.5 Activity – Testing Access Control
Module 9 – CEH v11 Intro to Linux
9.1 Linux Overview
9.2 Linux File System
9.3 Linux Core Commands
9.4 Linux Search and Read Commands
9.5 Activity – Exploring Linux
9.6 Activity – Using Linux Core Commands
9.7 Activity – Using Linux Search Commands
9.8 Activity – Using Linux Read Commands
Module 10 – CEH v11 Configuring Linux
10.1 Linux File Permissions
10.2 Linux Special Permissions
10.3 Linux Configuration
10.4 Linux Packages
10.5 Linux User Management
Module 11 – CEH v11 Practicing Linux Configuration
11.1 Activity – Setting Linux Permissions
11.2 Activity – Setting Linux Special Permissions
11.3 Activity – Managing Packages in Kali Linux
11.4 Activity – Managing Users and Groups in Linux
Module 12 – CEH v11 Managing Linux
12.1 Linux Job Scheduling
12.2 Linux File, Directory, and Download Commands
12.3 Linux System Commands
12.4 Linux Network Management
12.5 Linux Firewall
Module 13 – CEH v11 Practicing Linux Management
13.1 Activity – Scheduling Tasks in Linux
13.2 Activity – Using Linux File, Directory, and Download Commands
13.3 Activity – Using Linux Edit and Archive Commands
13.4 Activity – Compiling Malicious Code
13.5 Activity – Using Linux Process and System Commands
13.6 Activity – Using Linux Disk, Hardware, and Network Commands
Module 14 – CEH v11 Intro to Windows
14.1 Windows Overview
14.2 Windows Registry
14.3 Windows Security
Module 15 – CEH v11 Windows Commands
15.1 Windows Commands
15.2 Windows Admin Commands
15.3 Windows Network Commands
15.4 Windows Run Line Commands
15.5 Windows PowerShell
Module 16 – CEH v11 Practicing Windows Commands
16.1 Activity – Using Windows Built-in Commands
16.2 Activity – Using Windows Task Commands
16.3 Activity – Using Windows Admin Commands
16.4 Activity – Using Windows Network Commands
16.5 Activity – Using Windows PowerShell
16.6 Networking and OS Penetration Testing
16.7 Review
Module 17 – CEH v11 Intro to Hacking
17.1 Information Security Overview
17.2 Hacking Concepts
17.3 Ethical Hacking Concepts
17.4 Penetration Testing
17.5 Penetration Testing Part 2
17.6 Activity – Performing a Static Code Review
Module 18 – CEH v11 Information Security
18.1 Cyber Kill Chain Concepts
18.2 Activity – Performing Weaponization
18.3 Information Security
18.4 Security Policies
18.5 Security Controls
18.6 Access Control
Module 19 – CEH v11 Protecting Data
19.1 Data Protection
19.2 Backup Sites
19.3 Vulnerability Management
19.4 SIEM
19.5 Risks
Module 20 – CEH v11 Managing Risk
20.1 Risk Management
20.2 Incident Handling
20.3 Information Security Laws and Standards
20.4 Activity – Assessing Risk
20.5 Ethical Hacking Penetration Testing
20.6 Review
20.7 Conclusion