Advanced Network Attacks, Web Hacking, and Cryptography
This course is part of Certified Ethical Hacker (CEH) v.12 Specialization
Instructor: Packt - Course Instructors
What you'll learn
Skills you'll gain
There are 10 modules in this course
The course begins by delving into network and perimeter hacking techniques, exploring methods to bypass security systems, and demonstrating countermeasures. Progressing further, you’ll navigate web application hacking strategies, covering web servers, common vulnerabilities, and ethical hacking methodologies, including the OWASP Top 10. Dive deep into SQL injection techniques and wireless network exploitation, mastering tools, methods, and defenses for each. Explore cutting-edge topics like mobile platform vulnerabilities, IoT device exploitation, and operational technology security. The course concludes with an extensive study of cryptography, from foundational concepts to practical tools and cryptanalysis, preparing you to implement robust encryption strategies and mitigate cryptographic attacks effectively. Ideal for cybersecurity professionals, ethical hackers, and IT specialists, this course requires a foundational knowledge of networking and basic cybersecurity concepts. It is best suited for intermediate-level learners aiming to advance their skills in offensive and defensive security strategies.
Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots
Web Application Hacking - Hacking Web Servers
Web Application Hacking - Hacking Web Applications
Web Application Hacking - SQL Injection
Wireless Network Hacking - Hacking Wireless Networks
Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms
Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking
Cloud Computing
Cryptography
Explore more from Security
©2025 ementorhub.com. All rights reserved