top of page
Certified Ethical Hacking(CEH) Course
EXPIRED
What you'll learn
Initiating Control - Part 1
Retaining Control
Bypassing the Same Origin Policy
Attacking Users
Description
Hacking (both good and bad) seems to be in the news on a daily basis now. Large data breaches, phishing attacks, voter registration hacked, Smartphones hacked, etc. In this course we go over the basics for ethical hacking and penetration testing. We go step by step building a virtual lab, loading various tools and learning how a malicious hacker thinks and operates. Phishing, password hacking, methodology, OSINT, DDOS attacks, and much more is covered in this course. Learn how a hacker thinks, their methodology and tools in order to help defend from them.
bottom of page