lovewarez Posted December 17, 2021 Report Share Posted December 17, 2021 [img]https://i5.imageban.ru/out/2021/12/15/0df34912c4631eb02406f10a82ccec25.jpg[/img] [b]Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition | 3.92 GB[/b] The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help you better understand the world of hacking so you can act to defend attacks, as well as pass the CEH exam. This complete video course is your full resource for passing the CEH exam. Included are real-world demos and labs so you can see how to use tools, tactics, exploits, and technologies using Parrot Security OS. You also will find step-by-step examples of security penetration testing methodologies and concepts for each topic covered in the exam. Introduction Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition: Introduction Module 1: Information Security, Cybersecurity, and Ethical Hacking Overview Module 1: Introduction Lesson 1: Introduction to Ethical Hacking Learning objectives 1.1 Introducing Information Security and Cybersecurity 1.2 Understanding the Cyber Kill Chain and Hacking Concepts 1.3 Surveying Ethical Hacking Methodologies 1.4 Understanding Information Security Controls, Laws, and Standards Module 2: Reconnaissance Techniques Module 2: Introduction Lesson 2: Footprinting and Reconnaissance Learning objectives 2.1 Introducing Footprinting Concepts and Methodologies 2.2 Performing Footprinting through Search Engines 2.3 Performing Footprinting through Web Services and Websites 2.4 Performing Footprinting through Social Networking Sites 2.5 Exploring Shodan 2.6 Understanding Email Footprinting 2.7 Understanding Whois Footprinting 2.8 Understanding DNS Footprinting 2.9 Understanding Network Footprinting 2.10 Surveying Footprinting Tools 2.11 Understanding Footprinting Countermeasures Lesson 3: Scanning Networks Learning objectives 3.1 Surveying Network Scanning Concepts 3.2 Exploiting Scanning Tools 3.3 Understanding Host Discovery 3.4 Network Scanning Overview 3.5 Network Scanning Methods 3.6 Network Scanning Demo 3.7 Performing OS Discovery (Banner Grabbing/OS Fingerprinting) 3.8 Scanning Beyond IDS and Firewall 3.9 Creating Network Diagrams Lesson 4: Enumeration Learning objectives 4.1 Introducing Enumeration Techniques 4.2 Performing NetBIOS Enumeration 4.3 Performing SNMP Enumeration 4.4 Performing LDAP Enumeration 4.5 Performing NTP and NFS Enumeration 4.6 Performing SMTP and DNS Enumeration 4.7 Conducting Additional Enumeration Techniques 4.8 Surveying Enumeration Countermeasures Module 3: Network and Perimeter Hacking Module 3: Introduction Lesson 5: Sniffing Learning objectives 5.1 Introducing Sniffing Concepts 5.2 Performing MAC Attacks 5.3 Conducting DHCP Attacks 5.4 Performing ARP Poisoning 5.5 Performing Spoofing Attacks 5.6 Performing DNS Poisoning 5.7 Surveying Sniffing Tools 5.8 Exploring Sniffing Countermeasures and Detection Techniques Lesson 6: Social Engineering Learning objectives 6.1 Introducing Social Engineering Concepts 6.2 Exploring Social Engineering Techniques 6.3 Understanding the Insider Threat 6.4 Impersonation on Social Networking Sites 6.5 Understanding Identity Theft 6.6 Understanding Social Engineering Countermeasures Lesson 7: Denial-of-Service Learning objectives 7.1 Introducing DoS/DDoS Concepts and Attack Techniques 7.2 Defining what are Botnets 7.3 Exploring DDoS Case Studies 7.4 Surveying DoS/DDoS Attack Tools 7.5 Understanding DoS/DDoS Countermeasures and Protection Tools Lesson 8: Session Hijacking Learning objectives 8.1 Introducing Session Hijacking Concepts 8.2 Understanding Application Level Session Hijacking 8.3 Understanding Network Level Session Hijacking 8.4 Surveying Session Hijacking Tools 8.5 Understanding Session Hijacking Countermeasures Lesson 9: Evading IDS, Firewalls, and Honeypots Learning objectives 9.1 Introducing IDS, IPS, Firewall, and Honeypot Concepts 9.2 Exploring IDS, IPS, Firewall, and Honeypot Solutions 9.3 Evading IDS and Firewalls 9.4 Surveying IDS/Firewall Evading Tools 9.5 Detecting Honeypots and Sandboxes Module 4: Web Application Hacking Module 4: Introduction Lesson 10: Hacking Web Servers Learning objectives 10.1 Introducing Web Server Concepts 10.2 Exploring Web Server Attacks and Methodologies 10.3 Surveying Web Server Attack Tools 10.4 Understanding Patch Management 10.5 Surveying Web Server Security Tools Lesson 11: Hacking Web Applications Learning objectives 11.1 Introducing Web Application Concepts 11.2 Understanding Web App Threats and Hacking Methodologies 11.3 Footprinting Web Infrastructures 11.4 Analyzing Web Applications 11.5 Introducing the OWASP Top 10 11.6 Attacking Authentication, Authorization, and Access Controls - Part 1 11.7 Attacking Authentication, Authorization, and Access Controls - Part 2 11.8 Performing Command Injection Attacks 11.9 Exploiting Directory/Path Traversal Vulnerabilities 11.10 Input Validation and Sanitation 11.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities 11.12 Exploiting XML External Entities 11.13 Attacking Web Services, APIs, and Understanding Webhooks Lesson 12: SQL Injection Learning objectives 12.1 Introducing SQL Injection Concepts 12.2 Understanding the Types of SQL Injection 12.3 Exploring the SQL Injection Methodologies 12.4 Exploring SQL Injection Tools 12.5 Exploring Evasion Techniques 12.6 Understanding SQL Injection Countermeasures Module 5: Wireless, Mobile, IoT, and OT Hacking Module 5: Introduction Lesson 13: Hacking Wireless Networks Learning objectives 13.1 Introducing Wireless Concepts 13.2 Understanding Wireless Encryption 13.3 Exploring Wireless Threats 13.4 Understanding Wireless Hacking Methodologies 13.5 Surveying Wireless Hacking Tools 13.6 Hacking Bluetooth 13.7 Introducing Wireless Countermeasures Lesson 14: Hacking Mobile Platforms Learning objectives 14.1 Understanding Mobile Platform Attack Vectors 14.2 Hacking iOS 14.3 Hacking Android OS 14.4 Understanding Mobile Device Management 14.5 Surveying Mobile Security Guidelines and Tools Lesson 15: IoT and OT Hacking Learning objectives 15.1 Introducing IoT Concepts - Part 1 15.2 Introducing IoT Concepts - Part 2 15.3 Understanding IoT Attacks 15.4 Understanding IoT Hacking Methodologies 15.5 Surveying IoT Hacking Tools 15.6 Understanding IoT Countermeasures 15.7 Introducing OT Concepts 15.8 Performing OT Attacks 15.9 Understanding OT Hacking Methodologies 15.10 Surveying OT Hacking Tools 15.11 Understanding OT Countermeasures Module 6: Cloud Computing and Cryptography Module 6: Introduction Lesson 16: Cloud Computing Learning objectives 16.1 Introducing Cloud Computing Concepts 16.2 Introducing Agile, DevOps, and CI/CD Pipelines 16.3 Exploring Container Technology 16.4 Understanding Serverless Computing 16.5 Surveying Cloud Computing Threats 16.6 Introduction to Kubernetes 16.7 Introduction to Docker and Kubernetes Security Lesson 17: Cryptography Learning objectives 17.1 Introducing Cryptography Concepts 17.2 Understanding the Different Encryption Algorithms 17.3 Surveying Cryptography Tools 17.4 Understanding Public Key Infrastructure (PKI) 17.5 Understanding Email Encryption 17.6 Understanding Disk Encryption 17.7 Introducing Cryptanalysis and Countermeasures Summary Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition: Summary[code]https://www.oreilly.com/videos/certified-ethical-hacker/9780137446797/[/code][code] https://nitro.download/view/6851092C30A2E3D/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part1.rar https://nitro.download/view/CC4B4C31F898D30/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part2.rar https://nitro.download/view/E40B27DBE408D73/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part3.rar https://nitro.download/view/C900D225B7617CC/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part4.rar https://rapidgator.net/file/8538e62a6d6279b1467d97364f9864b2/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part1.rar.html https://rapidgator.net/file/88e47a613bd7d1fc2fb3b22ea55c34f1/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part2.rar.html https://rapidgator.net/file/1584511b88f19ae95a4fd9b5279a52e6/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part3.rar.html https://rapidgator.net/file/23f8285949f78ce2adad1542d0708ce5/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part4.rar.html https://uploadgig.com/file/download/95B29b5927f1A39a/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part1.rar https://uploadgig.com/file/download/fec46F4280d6a5F8/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part2.rar https://uploadgig.com/file/download/eae438f29d4143B2/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part3.rar https://uploadgig.com/file/download/3BB2Edb8551a87d6/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part4.rar [/code] Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now