Livelab Ethical Hacker CeHv11

Details
Ethical hacking (also known as penetration testing) is a simulated cyber attack designed to exploit security vulnerabilities within a network and systems. Individuals conducting ethical hacking locate those vulnerabilities and attempt to exploit them. Designed and developed by Practice Labs and our subject matter experts, the Ethical Hacker Live Lab will teach individuals how to become a security expert to ensure IT infrastructure is sufficiently secured against potential malicious attacks. For example, this might involve breaching applications, protocols, Application Programming Interfaces (APIs), servers and firewalls, plus anything else on a network that could be open to potential exploitation.
Result
You have extensive practical experience with the application of various methods and techniques that help you detect security problems. In addition, this livelab is a good preparation for the exam CeHv10.
Prerequisites
You have a technical background with a good knowledge of networks and network concepts. In addition, we recommend that you follow a CeHv10 training before you start with this livelab.
Target audience
Security Specialist
Content
Livelab Ethical Hacker CeHv11
Compromising & Exploiting Mobile Devices
- Introduction
- Lab Topology
- Exercise 1 - Hacking Android and iOS
- Exercise 2 - Mobile Device Management (MDM)
- Exercise 3 - Preventing Mobile Device Exploitation
- Review
Exploiting Wireless Vulnerabilities
- Introduction
- Lab Topology
- Exercise 1 - Wireless Concepts
- Exercise 2 - Wireless Prevention
- Review
Social Engineering Exploits
- Introduction
- Lab Topology
- Exercise 1 - Social Engineering
- Review
Compromising Web Servers
- Introduction
- Lab Topology
- Exercise 1 - Web Server Concepts, Attacks, Methodologies and Tools
- Exercise 2 - Upgrade Kali Linux
- Review
Web Application Exploitation Attacks - Part 1
- Introduction
- Lab Topology
- Exercise 1 - Attacking Authentication Mechanisms
- Exercise 2 - Attack Authorization Schemes
- Exercise 3 - Attack Access Controls
- Exercise 4 - Attack Session Management Mechanisms
- Review
Cryptographic Concepts, Implementation & Detection
- Introduction
- Lab Topology
- Exercise 1 - Using Cryptography Tools
- Exercise 2 - Other Cryptographic Options
- Review
Denial of Services Techniques & Attacks
- Introduction
- Lab Topology
- Exercise 1 - DoS/DDoS Concepts
- Exercise 2 - DoS/DDoS Attacks and Attack Tools
- Exercise 3 - DoS/DDoS Countermeasures
- Review
Ethical Hacking Concepts
- Introduction
- Lab Topology
- Exercise 1 - Information Security and Ethical Hacking Overview
- Review
Web Application Exploitation Concepts
- Introduction
- Lab Topology
- Exercise 1 - Web Application Concepts
- Exercise 2 - Web Application Threats
- Exercise 3 - Web Application Hacking Methodology
- Exercise 4 - Footprint and Analyze Web Infrastructure
- Review
Introduction to Cloud Computing Vulnerabilities
- Introduction
- Lab Topology
- Exercise 1 - Cloud Computing Concepts
- Exercise 2 - Cloud Computing Threats and Protection
- Review
NTP, DNS & Other Network Enumeration Techniques & Countermeasures
- Introduction
- Lab Topology
- Exercise 1 - NTP Enumeration
- Exercise 2 -DNS Enumeration
- Exercise 3 - Other Enumeration Techniques
- Exercise 4 - Enumeration Countermeasures
- Review
Network Resource Discovery Methods - Part 2
- Introduction
- Lab Topology
- Exercise 1 - OS Discovery (Banner Grabbing / OS Fingerprinting)
- Exercise 2 - Scanning Beyond Firewalls
- Exercise 3 - Draw Network Topologies
- Review
Vulnerability Assessment Tools and Techniques
- Introduction
- Lab Topology
- Exercise 1 - Vulnerability Assessment Concepts
- Exercise 2 - Vulnerability Classification and Assessment Types
- Exercise 3 - Vulnerability Assessment Solutions and Tools
- Exercise 4 - Vulnerability Assessment Reports
- Review
Footprinting & Reconnaissance - Part 2
- Introduction
- Lab Topology
- Exercise 1 - Whois Footprinting
- Exercise 2 - DNS Footprinting
- Exercise 3 - Network Footprinting
- Exercise 4 - Footprinting through Social Engineering
- Review
Implementing Malware Concepts
- Introduction
- Lab Topology
- Exercise 1 - Types of Malware
- Exercise 2 - Advanced Persistent Threat
- Exercise 3 - Antimalware Programs
- Exercise 4 - Malware Analysis & Countermeasures
- Review
Network Resource Discovery Methods - Part 1
- Introduction
- Lab Topology
- Exercise 1 - Network Scanning Concepts and Scanning Tools
- Exercise 2 - Host Discovery
- Exercise 3 - Port and Service Discovery
- Review
Web Application Exploitation Attacks - Part 2
- Introduction
- Lab Topology
- Exercise 1 - Web Application Attack Methods
- Exercise 2 - Web API, Webhooks, and Web Shell
- Exercise 3 - Web Application Security
- Review
System Hacking & Manipulation
- Introduction
- Lab Topology
- Exercise 1 - System Hacking Concepts
- Exercise 2- Performing Online Password Attacks
- Review
Footprinting & Reconnaissance - Part 1
- Introduction
- Lab Topology
- Exercise 1 - Footprinting and Reconnaissance
- Exercise 2 - Footprinting Using Search Engines
- Exercise 3 - Footprinting Using Web Services
- Exercise 4 - Footprinting through Social Networking Sites
- Exercise 5 - Website Footprinting
- Review
NetBIOS, SNMP & LDAP Network Enumeration
- Introduction
- Lab Topology
- Exercise 1 - Enumeration Concepts
- Exercise 2 - NetBIOS Enumeration
- Exercise 3 - SNMP Enumeration
- Exercise 4 - LDAP Enumeration
- Review
Network Sniffing Techniques & Attacks
- Introduction
- Lab Topology
- Exercise 1 - Sniffing Concepts
- Exercise 2 - Sniffing Tools
- Exercise 3 - Sniffing Technique: MAC Attacks
- Exercise 4 - Sniffing Technique: DHCP Attacks
- Exercise 5 - Sniffing Technique: DNS Poisoning
- Exercise 6 - Sniffing Countermeasures and Detection Methods
- Review
Compromising IoT & OT platforms
- Introduction
- Lab Topology
- Exercise 1 - IoT Concepts
- Exercise 2 - IoT Device Exploitation and Prevention
- Exercise 3 - OT Concepts, Attacks, and Countermeasures
- Review
Compromising SQL Injection Attacks
- Introduction
- Lab Topology
- Exercise 1 - Conduct SQL Injection Attacks
- Exercise 2 - Prevent SQL Injection Attacks
- Review
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.

Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.