- Certification Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Security
Ethical Hacking (C|EH Prep)
Pluralsight is not an official partner or accredited training center of EC-Council. This series can be used to prepare for the EC-Council® CEH® (Certified Ethical Hacker) examination, with coverage of CEH for 312-50 (ECC EXAM), 312-50 (VUE).
Content in this path
Ethical Hacking (C|EH Prep)
Pluralsight is not an official partner or accredited training center of EC-Council. This series provides the foundational knowledge needed to ethically and effectively discover and exploit vulnerabilities in systems by assuming both the mindset and toolset of an attacker. Through learning how systems are attacked you will gain an understanding of how best to protect systems and improve your organization’s security. This series of courses and labs can be used to prepare for the EC-Council® C|EH® (Certified Ethical Hacker) examination, with coverage of C|EH for 312-50 (ECC EXAM), 312-50 (VUE).
Ethical Hacking (C|EH Prep) Hands-on Labs
This series can be used to gain hands-on learning for the EC-Council® C|EH® (Certified Ethical Hacker) exam.
Build confidence to ace your certification exam with a variety of prep tools, including video courses, labs, and practice exams.
- You will learn the following domains of ethical hacking:
- Information Security and Ethical Hacking Overview
- Reconnaissance Techniques
- System Hacking Phases and Attack Techniques
- Network and Perimeter Hacking
- Web Application Hacking
- Wireless Network Hacking
- Mobile Platform, IoT, and OT Hacking
- Cloud Computing
- Cryptography
- No ethical hacking experience is required for this series, but it is recommended that you possess a strong understanding of TCP/IP and operating systems and have at least one year of experience working with networking technologies.
- penetration testing
- ethical hacking
- CEH
- Certified Ethical Hacker
- EC Council
- Pentesting
- Attacks and Exploits