Course Description This course is the first in a three-part comprehensive series on ethical hacking. Students will build the foundational skills necessary to not only choose the right tools when performing a cybersecurity penetration test, but to also be able to explain why the chosen technique will work. Throughout this entire series, every lesson and topic are infused with real world examples, walkthroughs of actual penetration testing scenarios, and extensive hands-on learning.In this Foundations course, students will learn how networks, protocols, and networking devices work. They will understand the security limits found in a traditional network and how to exploit those limits. They will learn ethical hacking concepts, the cyber kill chain process, operating system vulnerabilities and how to use Linux as an attack platform. They will practice essential Windows and Linux commands, research and download the latest exploit source code, and compile and use that code against a target. As a security professional, they will also learn about relevant laws and how best to serve their clients’ needs when auditing a computer network. They will examine the controls used to protect a company’s digital assets-and what it takes to circumvent such controls.WHY YOU SHOULD TAKE THIS COURSE:CEH Part 1: Foundations ensures that you have the critical background necessary to build a successful career in cyber security. So many hacking classes only teach the tools, or the specific vulnerabilities of a particular target. They often fail, however, to ensure that you have the understanding needed to be more than just a “script kiddie”. Not only does this course and series cover all of the CEH 312-50 exam objectives, it also ensures that you can find and use the latest tools necessary to conduct a successful ethical hacking campaign.INTENDED AUDIENCE:This course is intended for IT professionals including: Ethical hackers System Administrators Network Administrators Engineers Web managers Auditors Security Professionals COURSE PREREQUISITES:Before taking this course: You should have a basic understanding of networking and operating system essentials (CompTIA Network+ or Security+ certification or equivalent knowledge is helpful though not required). You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 40 GB of free disk space, running Windows 8.1 Professional or later. Course Outline The topics in this course cover a broad range of ethical hacking concepts and techniques, and will provide you with a solid foundation to pursue advanced cyber security studies. Module 1 - CEH v11 Foundations Course Introduction1.1 About this course: CEH Foundations1.2 About the InstructorModule 2 - CEH v11 Introduction To Networking2.1 Networking Overview2.2 Network Scope2.3 Network Addressing2.4 Activity - Examining Network AddressingModule 3 - CEH v11 Lan Components3.1 Protocols, Ports, Sockets3.2 Network Topologies3.3 LAN Devices3.4 LAN Devices Part 23.5 VLANs3.6 Activity - Examining Ports and Sockets3.7 Activity - Examining Switches and VLANsModule 4 - CEH v11 Routing and Network Access4.1 Routers4.2 Layer 3 Switches4.3 Modems and Remote Access4.4 Firewalls and Proxies4.5 Activity - Examining Routing4.6 Activity - Examining VLAN Routing4.7 Activity - Examining Firewall RulesModule 5 - CEH v11 Intrusion Detection and Network Layers5.1 IDS and IPS5.2 OSI Model5.3 TCP-IP5.4 Activity - Examining Network LayersModule 6 - CEH v11 Networking Protocols and Addressing6.1 Layer 4 Protocols6.2 Layer 3 Protocols6.3 Layer 2 Protocols6.4 IP Addressing6.5 Subnetting6.6 DHCP6.7 Activity - Examining TCP6.8 Activity - Examining UDP6.9 Activity - Examining IP6.10 Activity - Examining ICMP6.11 Activity - Examining ARPModule 7 - CEH v11 Network Services7.1 DNS7.2 DNS Records7.3 NTP7.4 Authentication7.5 Biometrics7.6 Activity - Examining DNS7.7 Activity - Examining DNS RecordsModule 8 - CEH v11 Access Control8.1 Local Authentication8.2 Directory Service Authentication8.3 Extending Authentication8.4 Authorization8.5 Activity - Testing Access ControlModule 9 - CEH v11 Intro to Linux9.1 Linux Overview9.2 Linux File System9.3 Linux Core Commands9.4 Linux Search and Read Commands9.5 Activity - Exploring Linux9.6 Activity - Using Linux Core Commands9.7 Activity - Using Linux Search Commands9.8 Activity - Using Linux Read CommandsModule 10 - CEH v11 Configuring Linux10.1 Linux File Permissions10.2 Linux Special Permissions10.3 Linux Configuration10.4 Linux Packages10.5 Linux User ManagementModule 11 - CEH v11 Practicing Linux Configuration11.1 Activity - Setting Linux Permissions11.2 Activity - Setting Linux Special Permissions11.3 Activity - Managing Packages in Kali Linux11.4 Activity - Managing Users and Groups in LinuxModule 12 - CEH v11 Managing Linux12.1 Linux Job Scheduling12.2 Linux File, Directory, and Download Commands12.3 Linux System Commands12.4 Linux Network Management12.5 Linux FirewallModule 13 - CEH v11 Practicing Linux Management13.1 Activity - Scheduling Tasks in Linux13.2 Activity - Using Linux File, Directory, and Download Commands13.3 Activity - Compiling Malicious Code13.4 Activity - Using Linux Process and System Commands13.5 Activity - Using Linux Disk Management and Hardware Commands13.6 Activity - Using Linux Networking CommandsModule 14 - CEH v11 Intro to Windows14.1 Windows Overview14.2 Windows Registry14.3 Windows SecurityModule 15 - CEH v11 Windows Commands15.1 Windows Commands15.2 Windows Admin Commands15.3 Windows Network Commands15.4 Windows Run Line Commands15.5 Windows PowerShellModule 16 - CEH v11 Practicing Windows Commands16.1 Activity - Using Windows Built-in Commands16.2 Activity - Using Windows Task Commands16.3 Activity - Using Windows Admin Commands16.4 Activity - Using Windows Network Commands16.5 Activity - Using Windows PowerShell16.6 Networking and OS Penetration Testing16.7 ReviewModule 17 - CEH v11 Intro to Hacking17.1 Information Security Overview17.2 Hacking Concepts17.3 Ethical Hacking Concepts17.4 Penetration Testing17.5 Penetration Testing Part 217.6 Activity - Performing a Static Code ReviewModule 18 - CEH v11 Information Security18.1 Cyber Kill Chain Concepts18.2 Activity - Performing Weaponization18.3 Information Security18.4 Security Policies18.5 Security Controls18.6 Access ControlModule 19 - CEH v11 Protecting Data19.1 Data Protection19.2 Backup Sites19.3 Vulnerability Management19.4 SIEM19.5 RisksModule 20 - CEH v11 Managing Risk20.1 Risk Management20.2 Incident Handling20.3 Information Security Laws and Standards20.4 Activity - Assessing Risk20.5 Ethical Hacking Penetration Testing20.6 Review20.7 Conclusion LEARN365 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: Learn 365 uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes andamp; Exam Simulators: Learn 365’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Social Learning andamp; Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. Flash Cards andamp; Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high. Navigation and Controls: Learn 365’s self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.