Course Contains The Truth About Living in a Technology Based World Overview of the CEH Certification Program How to Build a Lab to Hack Safely Installing and Configuring Your Windows Server VMs Installing and Configuring Your Desktop VMs Information Security Overview Security Threats and Attack Hacking Concepts Hacking Phases Attack Types Information Security Controls How to Prepare for the Certified Ethical