develop your own website

Certified Ethical Hacker (CEHv10)

Training Resources by Omar Santos

This training explores the CEH exam objectives. No matter where you are in your study plan this course is for you! Learn how to craft exploits used by ethical hackers to perform real world penetration testing engagements. Understand the methods for conducting wired and wireless network assessments, hacking web servers, and web applications. Explore attack techniques against mobile devices, IoT devices, and cloud deployments.

Mobirise

Prepare for the Exam! This live and interactive training is designed to help you prepare for the EC-Council Certified Ethical Hacker (CEH) version 10 certification exam. In this training we will review the main topics and methodologies that you need to master the CEHv10 exam objectives. You will learn security penetration testing methodologies and concepts by going over step-by-step examples. Sample questions for each of the topics covered in the exam will be reviewed in each lesson.

COURSE SETUP

  1. DOWNLOAD AND PRACTICE WITH WEBSPLOIT - Download WebSploit from: https://websploit.h4cker.org This is a virtual machine (VM) created by Omar Santos for different Cybersecurity Ethical Hacking (Web Penetration Testing) training sessions .The purpose of this VM is to have a single VM lab environment with several vulnerable applications running in Docker containers; the tools that come in Kali Linux; a few additional tools; and a mobile device emulator.
  2. ACCESS THE GUIDE - Access the new CEH Cert Guide HERE and follow along during class. The guide explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know for the exam.
  3. REVIEW ADDITIONAL MATERIAL BELOW - Take advantage of the large selection of comprehensive ethical hacking (penentration testing) video courses below (free with your Safari subscription!). Access over 7000 references, sample code and detailed resources related to cybersecurity at Omar's GitHub repository. Star the repository to keep up with new updates and additions.

CEH GUIDE - BOOK

CERTIFICATION AND COURSE GUIDE! Access the new CEH Cert Guide HERE and follow along during class. This best-of-breed study guide helps you master all the topics you need to know to succeed on your Certified Ethical Hacker (CEH) exam and advance your career in cybersecurity.
This guide explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery.

Mobirise

ON DEMAND TRAINING

Mobirise

Security Penetration Testing

You will learn the key tenets and fundamentals of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, exploitation, and post-exploitation techniques..

Mobirise

Hacking Web Applications

More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities.
Provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities.

Mobirise

Wireless Networks, IoT, and Mobile Devices Hacking

Provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of IoT technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables.

Mobirise

Enterprise Penetration Testing and Continuous Monitoring

 Learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities.

Stay in Touch with Omar!

© Copyright 2019 Omar Santos - All Rights Reserved