Start with 7 free days of training.

Gain instant access to our entire IT training library, free for your first week.
Train anytime on your desktop, tablet, or mobile devices.


This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more. In addition to learning about these vital topics, you also can prepare for CEH certification!...
This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more. In addition to learning about these vital topics, you also can prepare for CEH certification!

Most IT professionals are far too busy with daily tasks and projects to commit themselves to a serious study of security. Problem is, hackers are quite serious about your security and how to exploit it. If a security breach occurs at a company, it can cost millions of dollars, the loss of a priceless reputation, private customer information, and the very jobs of the IT professionals who often get blamed for weak security practices. One of the best ways to ensure good security is to know what hackers do to circumvent it. Security concepts and facts alone do not protect your systems. However, knowledge and experience in exactly how hackers exploit weaknesses will help you to potentially avoid embarrassing security breaches in the future. Earning CEH certification in conjunction with this training validates your ethical hacking skills and can make you a more desired IT security pro.

Recommended Experience
  • Familiarity with Windows of all versions, back to Windows XP and Windows Server 2003
  • Familiarity with Linux is not necessary but recommended (a video early in the course provides basic Kali Linux training that is sufficient for the learner to complete the course)
Recommended Equipment
  • Whatever equipment is being used to view the videos (except a smartphone or tablet) is sufficient to create a basic lab environment in which the learner can mirror demonstrations in the videos. This would also require installation of any virtualization software such as Parallels, VMware, Hyper-V, or VirtualBox.
  • High-speed internet is recommended to download Kali Linux and some of the additional tools.
Related Job Functions
  • Network Administrator
  • Systems Administrator
  • Systems Engineer
  • Help Desk
James Conrad has been a CBT Nuggets trainer since 2003 and holds a variety of certifications including CompTIA A+ and Server+, Certified Ethical Hacker, Microsoft MCSA, MCSE, MCITP, and MCTS.
 show less
1. Course Introduction (4 min)
2. Introduction to Ethical Hacking (20 min)
3. Terms and Types of Hackers (27 min)
4. Virtualization (26 min)
5. Linux (37 min)
6. Reconnaissance: Overview (17 min)
7. Reconnaissance: Powerful Resources (32 min)
8. Footprinting and Countermeasures (28 min)
9. Social Engineering (37 min)
10. Scanning Overview (38 min)
11. Scanning Demos (48 min)
12. Enumeration (47 min)
13. Cracking Windows Passwords (37 min)
14. Password Principles and Cracking Linux Passwords (27 min)
15. System Hacking: ADS and Steganography (23 min)
16. System Hacking: Keyloggers and Metasploit (25 min)
17. Malware (36 min)
18. Hack-O-Rama: Armitage, RAT and Netcat (39 min)
19. Hack-O-Rama: Rootkits and Trojans (25 min)
20. Sniffing Overview (25 min)
21. Sniffing Demos (21 min)
22. Denial of Service (34 min)
23. Hijacking (26 min)
24. Hacking Websites and Web Apps: Overview (26 min)
25. Hacking Websites and Web Apps: Demos (30 min)
26. Cryptography (39 min)
27. IDS (18 min)
28. Snort and Honeypots (21 min)
29. Wireless Overview (28 min)
30. Wireless Demos (14 min)
31. Mobile Technologies (14 min)

Course Introduction


Hello. My name's James Conrad, and it's my pleasure to be here with you for the Certified Ethical Hacker series. This is going to be a great bunch of fun, folks. We have a lot of different things to do, a lot of hacking to do, and some very interesting things that are going on in the security landscape these days.


We'll take a look at all of that. But we'll start with an introduction to ethical hacking-- in particular, the ethical part of that. Oh, it's so constraining to be honest, people, but we really must be. Among other things, it may help keep you out of jail.


So we'll take a look at some guidelines that we really have to bear in mind as ethical hackers. And then we'll take a look at some terms and types of hackers and key things that are important for certified ethical hackers to know about. We'll take a look at virtualization.


Just about everybody's using virtualization now instead of just individual physical machines. You'll probably have one or more host machines. And inside of that, you'll have a whole bunch of virtual machines to work with. We'll get an overview of that and get your feet wet with it if you're not used to that.


Then we'll take a look at Linux, because a lot of people aren't really that familiar with Linux either. But it's really a very favorite platform of hackers, so we'll take a look at some basics there. And that will take us through, by the way, the rest of the series as well.


We'll look at reconnaissance. We'll look at footprinting. These are great ways to identify who your target is and what you should focus on as you start to narrow down your hacking attempts. And from there, we move into social engineering. This is really kind of scary, because a lot of this is con jobs.


But it also relates to a lot of electronic methods as well. We'll look at some very interesting ways to make that work. And that's going to derive information from people that they wouldn't otherwise give to us that might be very useful. We also take a look here at scanning and enumeration.


This will help us to identify what kinds of hosts are on the network, what roles they play, what services they might be running, and what operating systems are there. We take a look at everybody's favorite, cracking passwords. This is embarrassingly easy to do, and I'll show you all the steps you need to have an effective password cracking session.


We'll take a look also at system hacking. There's actually several subtopics underneath that. We'll take a look at alternate data streams, steganography-- fee which is a great way to hide secret messages inside of image files like JPEGs, for example.


We'll look at key loggers, Metasploit, lots of things under system hacking. That's going to be a lot of fun. Next up is a hack-o-rama. It's just a bunch of hacks about how to control somebody's computer. In fact, we can so totally own their machine that they probably will never know that we own it, and there's no way their antivirus will ever detect that we're there.


So it's a pretty powerful session or two that we have there. We take a look at sniffing as well. Now, this is going to be really important, because on most networks these days, the network equipment prevents us from sniffing the way that we want to. I'll show you how you can get around that, though.


Then we'll take a look at denial of service. So this is going to be pretty important in some respects. It's pretty noisy an obvious, but sometimes you just have to bring a server down-- if for no other reason, just because you don't like that server.


Who knows? And then we'll take a look at hijacking. This is where somebody has established a session, maybe even to a secure server-- maybe over a TLS session, for example-- but you can still derive information out of it, even maybe their passwords. Then we take a look at hacking webs and hacking websites and web applications.


There's a lot involved with this as well, things such as cross site scripting. A big part of this will be SQL injection. Then we'll move on to cryptography. This is a very important part of certified ethical hacker, because you have to understand a lot of the cryptographic mechanisms that are involved to protect files, hard drives, and even websites.


We look at intrusion detection systems and intrusion prevention systems to protect ourselves from intruders. We also look at ways to get around those things if we're on the offensive. There's a great tool out there called Snort, which we'll take a look at how to configure.


And we also look at honey pots, which are a way to distract hackers to hacking after pretty much red herrings. We look at wireless networking as well-- and in particular, how to crack Wi-Fi password such as WPA or WPA2. And we'll also look at how to uncover hidden SSIDs.


Well folks, this whole series has been so much fun to record. I know it's packed full of information that you're really going to love. Let's go ahead and get started with our very first Nugget.

Introduction to Ethical Hacking

Terms and Types of Hackers



Reconnaissance: Overview

Reconnaissance: Powerful Resources

Footprinting and Countermeasures

Social Engineering

Scanning Overview

Scanning Demos


Cracking Windows Passwords

Password Principles and Cracking Linux Passwords

System Hacking: ADS and Steganography

System Hacking: Keyloggers and Metasploit


Hack-O-Rama: Armitage, RAT and Netcat

Hack-O-Rama: Rootkits and Trojans

Sniffing Overview

Sniffing Demos

Denial of Service


Hacking Websites and Web Apps: Overview

Hacking Websites and Web Apps: Demos



Snort and Honeypots

Wireless Overview

Wireless Demos

Mobile Technologies

Please help us improve by sharing your feedback on training courses and videos. For customer service questions, please contact our support team. The views expressed in comments reflect those of the author and not of CBT Nuggets. We reserve the right to remove comments that do not adhere to our community standards.

comments powered by Disqus
Intermediate 15 hrs 31 videos


Training Features

Practice Exams
These practice tests help you review your knowledge and prepare you for exams.

Virtual Lab
Use a virtual environment to reinforce what you are learning and get hands-on experience.

Offline Training
Our iOS and Android mobile apps offer the ability to download videos and train anytime, anywhere offline.

Accountability Coaching
Develop and maintain a study plan with one-to-one assistance from coaches.

Supplemental Files
Files/materials that supplement the video training.

Speed Control
Play videos at a faster or slower pace.

Included in this course
Pick up where you left off watching a video.

Included in this course
Jot down information to refer back to at a later time.

Closed Captions
Follow what the trainers are saying with ease.
James Conrad
Nugget trainer since 2003