Certified Ethical Hacker 

Live Training Resources by Omar Santos

This training explores the CEH exam objectives. No matter where you are in your study plan this course is for you! Learn how to craft exploits used by ethical hackers to perform real world penetration testing engagements. Understand the methods for conducting wired and wireless network assessments, hacking web servers, and web applications. Explore attack techniques against mobile devices, IoT devices, and cloud deployments.


Prepare for the Exam! This live and interactive training is designed to help you prepare for the EC-Council Certified Ethical Hacker (CEH) version version 11 certification exams. In this training we will review the main topics and methodologies that you need to master the CEHv11 exam objectives. You will learn security penetration testing methodologies and concepts by going over step-by-step examples. Sample questions for each of the topics covered in the exam will be reviewed in each lesson.


  1. (OPTIONAL) DOWNLOAD AND PRACTICE WITH WEBSPLOIT - Download WebSploit from: https://websploit.org This is a virtual machine (VM) created by Omar Santos for different Cybersecurity Ethical Hacking (Web Penetration Testing) training sessions .The purpose of this VM is to have a single VM lab environment with several vulnerable applications running in Docker containers; the tools that come in Kali Linux; a few additional tools; and a mobile device emulator.
  2. ACCESS THE GUIDE - Access the new CEH Cert Guide HERE and follow along during class. The guide explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know for the exam.
  3. ON-DEMAND VIDEO COURSES - Take advantage of the large selection of comprehensive ethical hacking (penetration testing) video courses below (free with your O'Reilly subscription!).
  4. PRACTICE QUESTIONS - This practice test contains four full practice exams with hundreds of review questions. It provides unique sets of exam practice questions that you can mix and match to test your knowledge. Includes a flash card feature that challenges you to answer questions from memory, without the benefit of seeing potential answers.
  5. ADDITIONAL MATERIAL -  Access over 10,000 references, sample code, and detailed resources related to cybersecurity at Omar's GitHub repository. Star the repository to keep up with new updates and additions.


CERTIFICATION AND COURSE GUIDE! Access the new CEH Cert Guide HERE and follow along during class. This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker (CEH) exam and advance your career in cybersecurity.
This guide explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery.

CEH Book by Omar Santos


CEH course by Omar Santos

On Demand Training! The Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 18 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam.

Build your ethical hacking skills with the foundations of reconnaissance, footprinting, enumeration, and vulnerability analysis and dive into hacking web servers, applications, wireless networks, IoT devices, and mobile platforms. This intensive training provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam.

Regardless of your level of experience, this video course explores all sides of a multi-pronged cybersecurity attack to ensure that you are prepared to combat attack threats. 

Additional On-Demand Training: The Art of Hacking Series


Security Penetration Testing

You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques..


Hacking Web Applications

More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities.
Provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities.


Wireless Networks, IoT, and Mobile Devices Hacking

Provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of IoT technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.


Enterprise Penetration Testing and Continuous Monitoring

 Learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities.

Stay in Touch with Omar!

© Copyright 2020 Omar Santos - All Rights Reserved

Site was started with Mobirise site template