Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Certified Ethical Hacker (Ceh) V11

Posted By: ELK1nG
Certified Ethical Hacker (Ceh) V11

Certified Ethical Hacker (Ceh) V11
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 46.18 GB | Duration: 41h 52m

Exam Preparatory Course

What you'll learn

Understand the Principles of Ethical Hacking

Identify Vulnerabilities in Network Systems

Exploit Vulnerabilities in Network Systems

Understand Malware Threats

Analyze Network Traffic

Understand Social Engineering Techniques

Exploit Web Application Vulnerabilities

Hack Wireless Networks

Understand Cryptography Principles

Address Cloud Security Risks

Requirements

It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.

Description

The Certified Ethical Hacker (CEH) v11 is a comprehensive course that provides in-depth knowledge and practical skills in ethical hacking and network security. The course is designed to help learners understand the latest tools and techniques used by ethical hackers to test and secure network systems.The CEH v11 course is an excellent program for individuals looking to enhance their skills and knowledge in ethical hacking and network security. Upon completion of the course, learners can take the certification exam to become a Certified Ethical Hacker, which can open up various career opportunities in the field. Understand the Principles of Ethical HackingIdentify Vulnerabilities in Network SystemsExploit Vulnerabilities in Network SystemsUnderstand Malware ThreatsAnalyze Network TrafficUnderstand Social Engineering TechniquesExploit Web Application VulnerabilitiesHack Wireless NetworksUnderstand Cryptography PrinciplesAddress Cloud Security Risks It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.The course is suitable for Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel.

Overview

Section 1: Intro to Ethical Hacking

Lecture 1 Overview

Lecture 2 CEH v11 EC-Council Certification Overview

Lecture 3 Basic Cybersecurity Concepts

Lecture 4 Attacker Motives, Goals, and Objectives

Lecture 5 Attack Classifications

Lecture 6 Information Warfare

Lecture 7 Cyber Kill Chain

Lecture 8 Tactics Techniques and Procedures

Lecture 9 Common Adversarial Behaviors

Lecture 10 Threat Hunting Concepts

Lecture 11 Hacking Phases

Lecture 12 Ethical Hacking Concepts

Lecture 13 Risk

Lecture 14 Risk Management

Lecture 15 Cyber Threat Intelligence

Lecture 16 Threat Modeling

Lecture 17 Incident Management

Lecture 18 Incident Handling and Response

Lecture 19 ML and AI

Lecture 20 Standards and Regulations

Section 2: Recon Techniques - Footprinting and Recon

Lecture 21 Footprinting Concepts

Lecture 22 Google Dorks

Lecture 23 Shodan Censys and Thingful

Lecture 24 Sub-Domain Enumeration

Lecture 25 Geolocation Recon

Lecture 26 Social Networking Recon

Lecture 27 Job Board Recon

Lecture 28 Deep-Dark Web Recon

Lecture 29 Metadata Recon

Lecture 30 Email Tracking

Lecture 31 WHOIS Recon and DNS Recon

Lecture 32 Public Network Footprinting

Lecture 33 Social Engineering Recon

Lecture 34 Footprinting and Recon Countermeasures

Lecture 35 Custom Wordlists

Lecture 36 Other Footprinting Tools

Section 3: Recon Techniques - Scanning

Lecture 37 Network Scanning Types

Lecture 38 TCP Communication

Lecture 39 Network Scanning Tools

Lecture 40 Host Discovery

Lecture 41 Port and Service Scanning

Lecture 42 Nmap: TCP Connect Scan

Lecture 43 Nmap Stealth Scan

Lecture 44 Nmap Inverse TCP XMAS and Maimon Scans

Lecture 45 Nmap ACK Scan

Lecture 46 Nmap IDLE IPID Scan

Lecture 47 Nmap UDP Scan

Lecture 48 Nmap SCTP INIT and COOKIE ECHO Scans

Lecture 49 Nmap IPv6 List and Version Scans

Lecture 50 Nmap Scan Optimizations

Lecture 51 Target OS Identification Techniques

Lecture 52 IDS and Firewall Evasion

Section 4: Recon Techniques - Enumeration

Lecture 53 Enumeration Basics

Lecture 54 NetBIOS and SMB Enumeration

Lecture 55 SNMP Enumeration

Lecture 56 LDAP Enumeration

Lecture 57 NTP Enumeration

Lecture 58 NFS Enumeration

Lecture 59 SMTP and FTP Enumeration

Section 5: System Hacking Phases and Attack Techniques - Vulnerability Analysis

Lecture 60 Vulnerability Assessment Concepts and Resources

Lecture 61 Vulnerability Management Life-Cycle

Lecture 62 Vulnerability Classification

Lecture 63 Vulnerability Assessment Types

Lecture 64 Vulnerability Assessment Models and Tools

Lecture 65 Vulnerability Assessment Reports

Section 6: System Hacking Phases and Attack Techniques - System Hacking

Lecture 66 CEH Hacking Methodology and Goals

Lecture 67 Windows Authentication

Lecture 68 Password Attacks - Basic Concepts

Lecture 69 Password Extraction and Cracking

Lecture 70 Password Attacks Cracking Enhancement Techniques

Lecture 71 Exploitation Buffer Overflows

Lecture 72 Privilege Escalation

Lecture 73 Maintaining Access

Lecture 74 Steganography

Lecture 75 Covering Tracks

Section 7: System Hacking Phases and Attack Techniques - Malware Threats

Lecture 76 Malware Concepts and Components

Lecture 77 APT

Lecture 78 Trojans

Lecture 79 Viruses and Worms

Lecture 80 Fileless Malware

Lecture 81 Malware Analysis

Lecture 82 Malware Countermeasures

Section 8: Network and Perimeter Hacking - Sniffing

Lecture 83 Network Sniffing Basics

Lecture 84 DHCP Sniffing Attacks

Lecture 85 ARP Poisoning

Lecture 86 DNS Poisoning

Lecture 87 Sniffing Defenses

Section 9: Network and Perimeter Hacking - Social Engineering

Lecture 88 Social Engineering Concepts

Lecture 89 Insider Threats

Lecture 90 Identity Theft

Section 10: Network and Perimeter Hacking - Denial of Service

Lecture 91 DoS and DDoS Attacks

Lecture 92 Volumetric Attacks

Lecture 93 Protocol Attacks

Lecture 94 Application Layer Attacks

Lecture 95 Botnets

Lecture 96 DoS and DDoS Countermeasures

Section 11: Network and Perimeter Hacking - Session Hijacking

Lecture 97 Session Hijacking Concepts

Lecture 98 Network Level Session Hijacking

Lecture 99 Application Level Session Hijacking

Lecture 100 Session Hijacking Countermeasures

Section 12: Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots

Lecture 101 IDS and IPS

Lecture 102 Firewalls

Lecture 103 Honeypots

Section 13: Web Application Hacking - Hacking Web Servers

Lecture 104 Web Server Hacking Concepts

Lecture 105 Web Server Attacks

Lecture 106 Web Server Attack Methodology

Section 14: Web Application Hacking - Hacking Web Applications

Lecture 107 Web App Basics

Lecture 108 OWASP Top 10 Web Application Attacks 2017

Lecture 109 Unvalidated Redirects and Forwards

Lecture 110 CSRF

Lecture 111 IDOR

Lecture 112 LFI RFI

Lecture 113 Web App Hacking Methodology

Lecture 114 Web App Hacking Tools

Lecture 115 Web App Login Attacks

Lecture 116 XSS Filtering Evasion

Lecture 117 Web Shell Backdoors

Lecture 118 APIs and Webhooks

Section 15: Web Application Hacking - SQL Injection

Lecture 119 SQLi Concepts

Lecture 120 Error-Based SQLi Attacks

Lecture 121 Blind-Based SQLi Attacks

Lecture 122 SQLi to System Access

Lecture 123 SQLMap

Section 16: Wireless Network Hacking - Hacking Wireless Networks

Lecture 124 Wireless Basics

Lecture 125 Wireless Threats

Lecture 126 Wireless Hacking Tools

Lecture 127 Wireless Hacking

Lecture 128 Wireless Hacking Countermeasures

Section 17: Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms

Lecture 129 Mobile Hacking Basics

Lecture 130 Android Security

Lecture 131 iOS Security

Lecture 132 Mobile Device Management and Security Tools

Section 18: Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking

Lecture 133 IoT Basics

Lecture 134 IoT Threats and Vulnerabilities

Lecture 135 IoT Attacks Tools and Countermeasures

Lecture 136 OT Basics

Lecture 137 OT Attacks Tools and Countermeasures

Section 19: Cloud Computing - Cloud Computing

Lecture 138 Cloud Computing Basics

Lecture 139 Container Basics

Lecture 140 Hacking Cloud Services

Lecture 141 Cloud Security Controls

Section 20: Cryptography - Cryptography

Lecture 142 Cryptography Basics

Lecture 143 Crypto Algorithms and Implementations

Lecture 144 Cryptography Tools

Lecture 145 Public Key Infrastructure

Lecture 146 Cryptanalysis

Lecture 147 Crypto-Attack Countermeasures

Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel