Ethical Hacking Pro Online Bundle, 15 Courses

Become a certified cyber security expert


NOW ONLY

AU$649

Save AU$400 (38%)
OFF RRP AU$1049
Get Info Pack

Become a certified cyber security expert

Ethical hacking/cyber security is among the most in demand and high paying jobs in the world of IT. But... in order to get into this field you'll need to pass some certification exams - specifically these:

  • EC-Council Certified Ethical Hacker v. 9
  • CompTIA Security+.

Both of these certifications are included in this bundle.

We've also included other topics that cyber security professionals need to know, such as Digital Forensics, Wireless Hacking and Incident Response.

If you want to get into the field of cyber security, this is THE bundle that will prepare you to pass the certification exams that will lead to real life job interviews. Don't wait any longer. Enroll today.

Course Fast Facts:

  1. All courses are easy to follow and understand
  2. Unlimited lifetime access to course materials
  3. Study as many courses as you want
  4. Delivered 100% on-line and accessible 24/7 from any computer or smartphone
  5. You can study from home or at work, at your own pace, in your own time
  6. Download printer friendly course content

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion per course and will be issued a certificate via email.

Course 1: Certificate In CompTIA Security+ Certification (Exam number SY0-501) Online Course

Network Security Domain

  • Networking 101
  • LAN Security
  • Firewalls
  • IDS - Video
  • Transport Layer Security
  • IPSec
  • NAC
  • Advanced IDS
  • Advanced Perimeter Security

Compliance and Operational Security Domain

  • Principles of Security
  • Risk Management
  • Physical Security
  • Environmental Security
  • Data Classification
  • Operational Security
  • Incident Response
  • Change Management
  • Disaster Recovery
  • Forensics

Threats and Vulnerabilities Domain

  • Malware 101
  • Cyberattacks
  • DNS Security
  • Social Engineering
  • Wireless Attacks
  • Advanced Wireless Security
  • Cross Site Scripting – XSS Attacks
  • Buffer Overflows
  • Security Testing Tools
  • Security Information and Event Management
  • Platform Hardening and Baselining
  • Honeypots
  • SW Vulnerability Assessment and Pen Testing

Applications, Data and Host Security Domain

  • Application Design Flaws and Bugs
  • Mobile Security and Device Management
  • Key Management
  • Virtualization and Cloud Security
  • Securing Storage and Storage Platforms
  • Information Lifecycle Management
  • Hacking IoT
  • Securing the Power Grid

Access Control and Identity Management Domain

  • Access Controls
  • Kerberos
  • Single Sign On
  • Identity Federation
  • Id Governance

Cryptography Domain

  • Encryption
  • Advanced Cryptography
  • Message Authentication Codes
  • Crypto Algorithms
  • A Note On Salting
  • Public Key Infrastructure
  • PKI Management

Course 2: Certificate In Intro to EC-Council Certified Ethical Hacker - CEHv9 Online Course

Introduction

  • Ethical Hacking - Vulnerability Assessment

The First Steps in an Ethical Hack

  • Footprinting with Maltego

Penetration Testing

  • Cyber Attacks
  • Vulnerability Scanning Websites using Zed Attack

Wireless Hacking

  • Wireless Hacking

Incident Response

  • Incident Response
  • Network Sniffing Tools - Wireshark

Course 3: Certificate In Digital Forensics for Cyber Professionals Online Course

The Digital Forensics Field

  • Course Introduction
  • Forensics HD and Branded with Title

Recovery and Reconstruction

  • Recovering Deleted Files
  • Windows RegistryE-Mail Reconstruction
  • Deconstructing Files of Unknown Origin

Reversing and Malware Analysis

  • Reverse Engineering Windows Executables
  • Windows Live Response
  • Linux Live Response
  • Sandboxing and Malware Analysis

Forensics Tools and Storage

  • CAINE
  • USB Forensic Analysis
  • Storage Encryption
  • Windows Encrypting File System

Course 4: Certificate In Wireless Hacking for Cyber Professionals Online Course

  • Advanced Wireless Security
  • Wireless Security Course Vat
  • Wifi Pineapple - Unbranded
  • Bluetooth Hacking with Ubertooth
  • Bluetooth-Low-Energy-Unbranded
  • Bluetooth Scanning
  • Software Defined Radio
  • Hacking Over Wireless with Metasploit

Course 5: Certificate In Incident Response for Cyber Professionals Online Course

Incident Response for Cyber Professionals

  • Incident Response
  • Cyber Attacks
  • Virtualization and Cloud Security
  • Malware
  • Operational Security
  • Disaster Recovery
  • Platform Hardening and Baselining
  • Advanced Perimeter Security
  • Static Malware Analysis
  • IDS
  • Advanced IDS
  • Snort and Bro
  • Honeypots and Honeynets
  • Firewalls
  • Apache Security logging
  • SIM

Course 6: Certificate In Database Security for Cyber Professionals Online Course

Database Security for Cyber Professionals

  • Database Core Security Part 1
  • Database Core Security Part 2
  • Database Core Security Part 3
  • Database Core Security Part 4
  • Platform Hardening
  • MySQL Security Lab Build
  • MySQL Architecture and Exploits
  • Locking Down MySQL
  • Oracle Exploitation and Security Best Practices
  • PostgreSQL Architecture, Exploits and Hardening
  • Storage Encryption
  • Key Management
  • Big Data

Course 7: Certificate In Ethical Hacking: Social Engineering Online Course

Social Engineering

  • Introduction
  • Paypal Phishing
  • Browser Exploitation Framework (BeeF)
  • Rubber Ducky
  • Cyber Attacks
  • HR and Personnel Security

Course 8: Certificate In Ethical Hacking: Hacking Applications Online Course

Hacking Applications

  • Application Architecture and Security
  • Hamster and Ferret
  • Morpheus
  • Heap Spraying Demonstration
  • OWASP Zed Attack Proxy
  • Persistent XSS Demo
  • Buffer Overflow Demonstration
  • Buffer Overflows Explained
  • Hacking AJAX

Course 9: Certificate In Ethical Hacking: Hacking Databases Online Course

Hacking Databases

  • Database Security
  • First Order SQL Injection
  • Bodgeit Store – ZAP Data Collection for SQLMap
  • Shodan
  • MySQL Lab Buildout
  • MySQL Security Architecture and Exploits
  • MySQL Lockdown
  • Operating System Hardening
  • Big Data Security

Course 10: Certificate In Ethical Hacking: Honeypots, IDS and FW's Online Course

Honeypots, IDS and FW's

  • Intrusion Detection Systems
  • Snort
  • Advanced IDS
  • Honeypots
  • Honeydrive Installation
  • Kippo SSH Honeypot
  • Firewalls
  • Advanced Perimeter Security
  • LAN Security
  • Threat Management
  • DNSSec

Course 11: Certificate In Ethical Hacking: Cryptography for Hackers Online Course

Cryptography for Hackers

  • Introduction
  • Advanced Crypto
  • Message Authentication Codes and Hashes
  • Transport Layer Security
  • Virtual Private Networking
  • Windows Encryption
  • Apache SSL
  • Web Encoding
  • Key Management
  • Storage Encryption

Course 12: Certificate InEthical Hacking: Recon and Footprinting Online Course

Recon and Footprinting

  • Website and E-Mail Footprinting
  • Port Inspection with Netstat
  • Nmap and Metasploit
  • Maltego
  • Who is and Nslookup
  • Shodan and IoT Enumeration
  • NTP Enumeration
  • Probing SNMP
  • Inspecting SMTP
  • SMB Discovery
  • Commonly used network ports and protocols

Course 13: Certificate In Ethical Hacking: Wireless Hacking Online Course

Wireless Hacking Ninja

  • Introduction
  • Wireless Hacking with Aircrack and Reaver
  • Man-in-the-Middle Attacks with Wi-Fi Pineapple
  • Advanced Wireless Security
  • Bluetooth Low Energy Hacks
  • Ubertooth
  • Software Defined Radio
  • Kismac
  • Pwning over Wireless with Metasploit

Course 14: Certificate In Ethical Hacking: Cyber Anonymity Online Course

Anonymizers

  • TOR
  • Tortilla
  • Private VPN’s
  • Proxy Chains

Network Anonymity

  • ARP Poisoning
  • ICMP Tunneling
  • Fragrouting

Host and Data Privacy

  • E-Mail Privacy
  • TAILS
  • Data Privacy
  • Storage Encryption
  • Windows Encrypting File System

Course 15: Certificate In Ethical Hacking: Malware Development Online Course

Malware Development

  • Malware 101
  • Internet Worm Maker
  • JPS Virus Maker
  • Ghost Eye
  • Custom Trojan
  • Static Malware Analysis
  • Sandboxing and Malware Analysis
  • MSFVenom and Malware Payload Generation

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Become a certified cyber security expert

Ethical hacking/cyber security is among the most in demand and high paying jobs in the world of IT. But... in order to get into this field you'll need to pass some certification exams - specifically these:

  • EC-Council Certified Ethical Hacker v. 9
  • CompTIA Security+.

Both of these certifications are included in this bundle.

We've also included other topics that cyber security professionals need to know, such as Digital Forensics, Wireless Hacking and Incident Response.

If you want to get into the field of cyber security, this is THE bundle that will prepare you to pass the certification exams that will lead to real life job interviews. Don't wait any longer. Enroll today.

Course Fast Facts:

  1. All courses are easy to follow and understand
  2. Unlimited lifetime access to course materials
  3. Study as many courses as you want
  4. Delivered 100% on-line and accessible 24/7 from any computer or smartphone
  5. You can study from home or at work, at your own pace, in your own time
  6. Download printer friendly course content

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion per course and will be issued a certificate via email.

Course 1: Certificate In CompTIA Security+ Certification (Exam number SY0-501) Online Course

Network Security Domain

  • Networking 101
  • LAN Security
  • Firewalls
  • IDS - Video
  • Transport Layer Security
  • IPSec
  • NAC
  • Advanced IDS
  • Advanced Perimeter Security

Compliance and Operational Security Domain

  • Principles of Security
  • Risk Management
  • Physical Security
  • Environmental Security
  • Data Classification
  • Operational Security
  • Incident Response
  • Change Management
  • Disaster Recovery
  • Forensics

Threats and Vulnerabilities Domain

  • Malware 101
  • Cyberattacks
  • DNS Security
  • Social Engineering
  • Wireless Attacks
  • Advanced Wireless Security
  • Cross Site Scripting – XSS Attacks
  • Buffer Overflows
  • Security Testing Tools
  • Security Information and Event Management
  • Platform Hardening and Baselining
  • Honeypots
  • SW Vulnerability Assessment and Pen Testing

Applications, Data and Host Security Domain

  • Application Design Flaws and Bugs
  • Mobile Security and Device Management
  • Key Management
  • Virtualization and Cloud Security
  • Securing Storage and Storage Platforms
  • Information Lifecycle Management
  • Hacking IoT
  • Securing the Power Grid

Access Control and Identity Management Domain

  • Access Controls
  • Kerberos
  • Single Sign On
  • Identity Federation
  • Id Governance

Cryptography Domain

  • Encryption
  • Advanced Cryptography
  • Message Authentication Codes
  • Crypto Algorithms
  • A Note On Salting
  • Public Key Infrastructure
  • PKI Management

Course 2: Certificate In Intro to EC-Council Certified Ethical Hacker - CEHv9 Online Course

Introduction

  • Ethical Hacking - Vulnerability Assessment

The First Steps in an Ethical Hack

  • Footprinting with Maltego

Penetration Testing

  • Cyber Attacks
  • Vulnerability Scanning Websites using Zed Attack

Wireless Hacking

  • Wireless Hacking

Incident Response

  • Incident Response
  • Network Sniffing Tools - Wireshark

Course 3: Certificate In Digital Forensics for Cyber Professionals Online Course

The Digital Forensics Field

  • Course Introduction
  • Forensics HD and Branded with Title

Recovery and Reconstruction

  • Recovering Deleted Files
  • Windows RegistryE-Mail Reconstruction
  • Deconstructing Files of Unknown Origin

Reversing and Malware Analysis

  • Reverse Engineering Windows Executables
  • Windows Live Response
  • Linux Live Response
  • Sandboxing and Malware Analysis

Forensics Tools and Storage

  • CAINE
  • USB Forensic Analysis
  • Storage Encryption
  • Windows Encrypting File System

Course 4: Certificate In Wireless Hacking for Cyber Professionals Online Course

  • Advanced Wireless Security
  • Wireless Security Course Vat
  • Wifi Pineapple - Unbranded
  • Bluetooth Hacking with Ubertooth
  • Bluetooth-Low-Energy-Unbranded
  • Bluetooth Scanning
  • Software Defined Radio
  • Hacking Over Wireless with Metasploit

Course 5: Certificate In Incident Response for Cyber Professionals Online Course

Incident Response for Cyber Professionals

  • Incident Response
  • Cyber Attacks
  • Virtualization and Cloud Security
  • Malware
  • Operational Security
  • Disaster Recovery
  • Platform Hardening and Baselining
  • Advanced Perimeter Security
  • Static Malware Analysis
  • IDS
  • Advanced IDS
  • Snort and Bro
  • Honeypots and Honeynets
  • Firewalls
  • Apache Security logging
  • SIM

Course 6: Certificate In Database Security for Cyber Professionals Online Course

Database Security for Cyber Professionals

  • Database Core Security Part 1
  • Database Core Security Part 2
  • Database Core Security Part 3
  • Database Core Security Part 4
  • Platform Hardening
  • MySQL Security Lab Build
  • MySQL Architecture and Exploits
  • Locking Down MySQL
  • Oracle Exploitation and Security Best Practices
  • PostgreSQL Architecture, Exploits and Hardening
  • Storage Encryption
  • Key Management
  • Big Data

Course 7: Certificate In Ethical Hacking: Social Engineering Online Course

Social Engineering

  • Introduction
  • Paypal Phishing
  • Browser Exploitation Framework (BeeF)
  • Rubber Ducky
  • Cyber Attacks
  • HR and Personnel Security

Course 8: Certificate In Ethical Hacking: Hacking Applications Online Course

Hacking Applications

  • Application Architecture and Security
  • Hamster and Ferret
  • Morpheus
  • Heap Spraying Demonstration
  • OWASP Zed Attack Proxy
  • Persistent XSS Demo
  • Buffer Overflow Demonstration
  • Buffer Overflows Explained
  • Hacking AJAX

Course 9: Certificate In Ethical Hacking: Hacking Databases Online Course

Hacking Databases

  • Database Security
  • First Order SQL Injection
  • Bodgeit Store – ZAP Data Collection for SQLMap
  • Shodan
  • MySQL Lab Buildout
  • MySQL Security Architecture and Exploits
  • MySQL Lockdown
  • Operating System Hardening
  • Big Data Security

Course 10: Certificate In Ethical Hacking: Honeypots, IDS and FW's Online Course

Honeypots, IDS and FW's

  • Intrusion Detection Systems
  • Snort
  • Advanced IDS
  • Honeypots
  • Honeydrive Installation
  • Kippo SSH Honeypot
  • Firewalls
  • Advanced Perimeter Security
  • LAN Security
  • Threat Management
  • DNSSec

Course 11: Certificate In Ethical Hacking: Cryptography for Hackers Online Course

Cryptography for Hackers

  • Introduction
  • Advanced Crypto
  • Message Authentication Codes and Hashes
  • Transport Layer Security
  • Virtual Private Networking
  • Windows Encryption
  • Apache SSL
  • Web Encoding
  • Key Management
  • Storage Encryption

Course 12: Certificate InEthical Hacking: Recon and Footprinting Online Course

Recon and Footprinting

  • Website and E-Mail Footprinting
  • Port Inspection with Netstat
  • Nmap and Metasploit
  • Maltego
  • Who is and Nslookup
  • Shodan and IoT Enumeration
  • NTP Enumeration
  • Probing SNMP
  • Inspecting SMTP
  • SMB Discovery
  • Commonly used network ports and protocols

Course 13: Certificate In Ethical Hacking: Wireless Hacking Online Course

Wireless Hacking Ninja

  • Introduction
  • Wireless Hacking with Aircrack and Reaver
  • Man-in-the-Middle Attacks with Wi-Fi Pineapple
  • Advanced Wireless Security
  • Bluetooth Low Energy Hacks
  • Ubertooth
  • Software Defined Radio
  • Kismac
  • Pwning over Wireless with Metasploit

Course 14: Certificate In Ethical Hacking: Cyber Anonymity Online Course

Anonymizers

  • TOR
  • Tortilla
  • Private VPN’s
  • Proxy Chains

Network Anonymity

  • ARP Poisoning
  • ICMP Tunneling
  • Fragrouting

Host and Data Privacy

  • E-Mail Privacy
  • TAILS
  • Data Privacy
  • Storage Encryption
  • Windows Encrypting File System

Course 15: Certificate In Ethical Hacking: Malware Development Online Course

Malware Development

  • Malware 101
  • Internet Worm Maker
  • JPS Virus Maker
  • Ghost Eye
  • Custom Trojan
  • Static Malware Analysis
  • Sandboxing and Malware Analysis
  • MSFVenom and Malware Payload Generation

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only AU$649 Save AU$400 (38%)
OFF RRP AU$1049
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SREHP15CB
Delivery Mode: Online
Course Access: Unlimited lifetime access-Study at your own pace
Tutor Support: Yes
Course Duration: 39 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles