312-50: CEH Certified Ethical Hacker (312-50v9)

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 181 : Lectures
  • 15h 39m 46s : Duration
video-file-formats

$14.99/24.99


Lectures
1. Create A VeraCrypt Container to Protect Your Laptop or Desktop- 10m 48s
2. Build a Manual Lab 01- 3m 48s
3. Lab Legalities- 2m 44s
4. Getting to Know Your Win2k VM- 5m 25s
5. Getting to Know Your XPAttacker VM- 3m 4s
6. Getting to Know You Win7 VM- 3m 57s
7. Getting to Know Your Win2k3-AD- 1m 27s
8. Getting to Know Your WebApp- 1m 31s
9. Putting Our Lab Together Step By Step- 12m 30s
10. Tying everying together in our Lab- 5m 44s

Lectures
1. Introduction to Pentesting and Ethical Hacking- 31s
2. Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro- 4m 58s
3. Defintion of a Penetration Test- 1m 46s
4. The Evolving Threat- 1m 49s
5. The Vulnerabilty Lifecycle- 2m 16s
6. Map.Norsecorp.com- 1m 56s
7. Botnet Definition- 5m 12s
8. Defense in Depth- 4m 47s
9. MetaData- 3m 30s
10. Types of PenTests- 4m 47s
11. Types of Hackers- 1m 32s
12. Common Definitions- 1m 43s
13. Hacker vs- 5m 27s
14. Penetration Testing Terminology- 3m 10s
15. Essential Terminology- 3m 51s
16. OSSTMM Methodology- 8m 43s
17. Tools vs Technique- 4m 45s
18. Things are not always as they seem- 1m 13s
19. Calculating Risk & Formulas- 2m 48s
20. Analyzing Findings- 45s
21. Calculating SLE, ARO, ALE- 1m 6s
22. Other Penetration Testing Methodologies- 3m 15s

Lectures
1. Introduction to Footprinting- 43s
2. What Information is Gathered by the Hacker- 5m 37s
3. Methods of Obtaining Information And Physical Access- 1m 24s
4. Social Access- 4m 27s
5. Digital Access- 3m 2s
6. Passive vs Active Reconnaissance- 2m 14s
7. Footprinting Defined- 1m 32s
8. Exercise: Footprinting Tool: Maltego- 2m 3s
9. Most Powerful Hacking Tool on the Internet Today- 4m 16s
10. Instructor Demonstration - The Power of Google -A- 5m 44s
11. Instructor Demonstration - The Power of Google -B- 10m 16s
12. Instructor Demo: GoogleAlerts- 4m 24s
13. Removing Searchable Content- 4m 55s
14. Internet Archive: The WayBack Machine- 6m 44s
15. Domain Name Registration-WhoIs Information- 1m 20s
16. Instructor Demonstation - CentralOps- 6m 14s
17. DNS Databases- 3m 21s
18. Traceroute Operation- 5m 30s
19. InstructorDemonstration: Online Tools- 4m 19s
20. Spokeo - No Refuge for the Wealthy- 4m 59s
21. Netcraft, DoaminsbyProxy, Countermeasures- 8m 43s

Lectures
1. Introduction to Linux- 24s
2. Linux History - Linus + Minux = Linux- 2m 29s
3. Linux GUI Desktops- 2m 9s
4. Linux Shell Linux Bash Shell- 2m 31s
5. Passwd & Shadow File Formats- 1m 52s
6. InstructorDemo:User Account Management- 6m 20s
7. Tarballs & Zips & Installing VMware Tools- 5m 30s
8. Compiling Programs in Linux, Shell Shock, Poodle Vulnerability- 2m 44s
9. Most Popular Linux Security Distribution- 1m 58s

Lectures
1. Introduction to Port Scanning- 15s
3. TCP/IP Stack- 6m 22s
4. TCP 3-Way HandShake- 7m
5. NMap ServiceVersion Detection And Demo- 1m 44s
6. Instructor Demonstration-Engage, NmapScans- 1m 24s
7. Hping3, NMap -O- 1m 32s
8. Fuzzy Logic- 1m 30s
9. Countermeasures: Scanning- 2m 21s

Lectures
1. Intro to Enumeration- 17s
2. Grabbing Banners- 4m 25s
3. Shodan- 5m 20s
4. ZoneTransfers- 5m 1s
5. DNS Enumeration- 4m 26s
6. SNMP Countermeasures, AD and AD Countermeasures- 4m 13s
7. Null Sessions- 8m 40s

Lectures
1. Intro Into Cryptography- 31s
2. Beginings of Cryptography- 4m 36s
3. Implementation, Stream Cipher, Block Cipher and the Enigima- 8m 54s
4. Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange- 5m 7s
5. Hashing, Hashing Collisions, Common Hash Algorithms- 9m 38s
6. Ransomware- 3m 7s
7. IPSec and SSH- 3m 46s
8. PKI Applications, Quantum Crypto and VeraCrypt- 3m 27s

Lectures
1. Introduction to Malware and How The Internet Makes Money- 23s
2. Things that make the World Go Around - Well as far as the Internet is concerned- 9m 10s
3. Trojans and Back Doors- 6m 17s
4. Defining Malware: Viruses and Worms- 7m 14s
5. Defining Malware: Spyware- 5m 35s
6. Data Loss Prevention (DLP) and other Creepy things- 10m 31s
7. Distributing Malware- 6m 19s
8. Malware Capabilities- 5m 27s
9. Auto Starting Malware- 1m 44s
10. Tool: Netcat- 3m 41s
11. Demo: NetCat Procedure- 10m 28s
12. Executable Wrappers- 4m 22s
13. Instructor Demo: Executeable Wrappers 1- 8m 51s
14. Instructor Demo: Executeable Wrappers 2- 1m 53s
15. Malware Avoiding Detection- 4m 33s
16. Malware Countermeasures 1- 8m 10s
17. Malware Countermeasures 2- 6m 39s

Lectures
1. Introduction to System Hacking Introduction- 1m
2. Types of Password Attacks, Keystroke Loggers- 5m 44s
3. Password Guessing Online- 7m 44s
4. Cracking Windows Passwords - A- 3m 25s
5. Cracking Windows Passwords - B- 8m 32s
6. Cracking Windows Passwords - C- 7m
7. Cracking Windows Passwords - D- 8m
8. Cracking Windows Passwords - E- 8m 25s
9. Countermeasures: Stealing the Passwords, Syskey, Salting- 8m 41s
10. Cloud Cracking Techniques- 1m 55s
11. Generating Rainbow Tables, Free Rainbow Tables- 3m 17s
12. Password Hash Insertion Attack- 9m 21s
13. Demonstration MimiKatz- 10m 59s
14. Privilege Escalation, Countermeasures- 5m 37s
15. Covering Tracks, Disable Auditing, Clearing the Event Log- 3m 4s
16. Alternate Data Streams Demonstration - A- 8m 7s
17. Alternate Data Streams Demonstration - B- 11m 55s
18. Alternate Data Streams Demonstration - C- 10m 39s
19. Anonymizers - JAP- 3m 42s
20. Steganography- 11m 41s
21. Virtually Complete Secrecy, TOR- 11m 2s
22. RootKits - Overview- 8m 39s
23. RootKits - Frightening Demo- 13m 22s
24. Root Kit Countermeasures, Tokens and Smart Cards- 11m 19s

Lectures
1. Introduction to Advanced System Explotation- 1m
2. How do Exploits Work?- 5m 8s
3. Buffer Over Flows Introduction I do when Speaking at a Conference- 5m 59s
4. Processors and Stacks- 10m 23s
5. Basic Types of Buffer Overflows And Demo 01- 11m 12s
6. Basic Types of Buffer Overflows And Demo 02- 9m 27s
7. Basic Types of Buffer Overflows And Demo 03- 1m 37s
8. Stages of Exploit Development- 7m 54s
9. Buffer Overflow Prevention- 5m 8s
10. The Metasploit Project- 5m 10s
11. Core Impact Overview- 12m 54s

Lectures
1. Introduction to Database Management Systems- 23s
2. Overview of Databases, Types of Databases, Relations of Databases- 7m 16s
3. View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties- 6m 40s
4. SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info- 9m 21s
5. Hardening SQL Server- 9m 21s
6. SQL Injection Demo 1- 9m 54s
7. SQL Injection Demo 2- 6m 10s
8. SQL Injection Demo 3- 4m 3s

Lectures
1. Introduction to WiFi and Mobile Hacking- 26s
2. WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,- 4m 9s
3. 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets- 5m 44s
4. XOR Basics, WEP Weaknesses- 3m 26s
5. TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption- 3m 26s
6. Kismet, Aircrack-ng, Aireplay- 2m 54s
7. EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network- 2m 47s
8. Exercise/Assignment; Cracking WPA/WPA2 Password Preparation- 12m 45s
9. Exercise/Assignment; Cracking WPA/WPA2 Password - Solution- 5m 19s

Lectures
1. Introduction to Sniffing- 17s
2. Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer- 7m 34s
3. TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing- 4m 16s
4. Active Sniffing & Methods, Switch Table Flooding- 4m 22s
5. Arp Cache Posioning- 6m
6. Arp Cache Posioning Tools and Countermeasures- 5m 35s
7. Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M- 6m 18s
8. Exercise/Assignment Breaking SSL - Preparation- 9m 3s
9. Exercise/Assignment Breaking SSL - Solution- 5m 19s

Lectures
1. Introduction tp Firewalls, IDS and IPS WAF- 8s
2. Firewall - Your First Line of Defense- 6m 35s
3. IDS Your Second Line of Defense- 4m 55s
4. Web Application Firewall and Evasion Techniques'- 7m 45s
5. Behavioural Firewalls and IPS Systems- 3m 35s

Lectures
1. Introduction to Web Application- 42s
2. Common Security Threats, Need for Monitoring, SANS Seven MGT Errors- 6m 35s
3. Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets- 5m 12s
4. Logs Cancanolization and Other Attacks- 3m 36s
5. Web App Scanner, HTTrack,HTTPrint, Proxies- 7m 7s
6. Directory Traversal & Other Common Vulnerabilties- 9m 44s
7. XSS Demo and Countermeasures- 8m 50s
8. Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)- 8m 50s
9. Cross Site Request Forgery- 6m 3s
10. Cookies and Session Management- 5m 19s
11. OWASP Top 10- 7m 5s

Lectures
1. So your Ready To Take Your Test 1?- 7m 16s

Lectures
1. Backing Up our Veracrypt Storage Enclosure for Saftey- 5m 14s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.