Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Ethical Hacker (Ceh) V11

    Posted By: ELK1nG
    Certified Ethical Hacker (Ceh) V11

    Certified Ethical Hacker (Ceh) V11
    Published 4/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 46.18 GB | Duration: 41h 52m

    Exam Preparatory Course

    What you'll learn

    Understand the Principles of Ethical Hacking

    Identify Vulnerabilities in Network Systems

    Exploit Vulnerabilities in Network Systems

    Understand Malware Threats

    Analyze Network Traffic

    Understand Social Engineering Techniques

    Exploit Web Application Vulnerabilities

    Hack Wireless Networks

    Understand Cryptography Principles

    Address Cloud Security Risks

    Requirements

    It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.

    Description

    The Certified Ethical Hacker (CEH) v11 is a comprehensive course that provides in-depth knowledge and practical skills in ethical hacking and network security. The course is designed to help learners understand the latest tools and techniques used by ethical hackers to test and secure network systems.The CEH v11 course is an excellent program for individuals looking to enhance their skills and knowledge in ethical hacking and network security. Upon completion of the course, learners can take the certification exam to become a Certified Ethical Hacker, which can open up various career opportunities in the field. Understand the Principles of Ethical HackingIdentify Vulnerabilities in Network SystemsExploit Vulnerabilities in Network SystemsUnderstand Malware ThreatsAnalyze Network TrafficUnderstand Social Engineering TechniquesExploit Web Application VulnerabilitiesHack Wireless NetworksUnderstand Cryptography PrinciplesAddress Cloud Security Risks It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.The course is suitable for Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel.

    Overview

    Section 1: Intro to Ethical Hacking

    Lecture 1 Overview

    Lecture 2 CEH v11 EC-Council Certification Overview

    Lecture 3 Basic Cybersecurity Concepts

    Lecture 4 Attacker Motives, Goals, and Objectives

    Lecture 5 Attack Classifications

    Lecture 6 Information Warfare

    Lecture 7 Cyber Kill Chain

    Lecture 8 Tactics Techniques and Procedures

    Lecture 9 Common Adversarial Behaviors

    Lecture 10 Threat Hunting Concepts

    Lecture 11 Hacking Phases

    Lecture 12 Ethical Hacking Concepts

    Lecture 13 Risk

    Lecture 14 Risk Management

    Lecture 15 Cyber Threat Intelligence

    Lecture 16 Threat Modeling

    Lecture 17 Incident Management

    Lecture 18 Incident Handling and Response

    Lecture 19 ML and AI

    Lecture 20 Standards and Regulations

    Section 2: Recon Techniques - Footprinting and Recon

    Lecture 21 Footprinting Concepts

    Lecture 22 Google Dorks

    Lecture 23 Shodan Censys and Thingful

    Lecture 24 Sub-Domain Enumeration

    Lecture 25 Geolocation Recon

    Lecture 26 Social Networking Recon

    Lecture 27 Job Board Recon

    Lecture 28 Deep-Dark Web Recon

    Lecture 29 Metadata Recon

    Lecture 30 Email Tracking

    Lecture 31 WHOIS Recon and DNS Recon

    Lecture 32 Public Network Footprinting

    Lecture 33 Social Engineering Recon

    Lecture 34 Footprinting and Recon Countermeasures

    Lecture 35 Custom Wordlists

    Lecture 36 Other Footprinting Tools

    Section 3: Recon Techniques - Scanning

    Lecture 37 Network Scanning Types

    Lecture 38 TCP Communication

    Lecture 39 Network Scanning Tools

    Lecture 40 Host Discovery

    Lecture 41 Port and Service Scanning

    Lecture 42 Nmap: TCP Connect Scan

    Lecture 43 Nmap Stealth Scan

    Lecture 44 Nmap Inverse TCP XMAS and Maimon Scans

    Lecture 45 Nmap ACK Scan

    Lecture 46 Nmap IDLE IPID Scan

    Lecture 47 Nmap UDP Scan

    Lecture 48 Nmap SCTP INIT and COOKIE ECHO Scans

    Lecture 49 Nmap IPv6 List and Version Scans

    Lecture 50 Nmap Scan Optimizations

    Lecture 51 Target OS Identification Techniques

    Lecture 52 IDS and Firewall Evasion

    Section 4: Recon Techniques - Enumeration

    Lecture 53 Enumeration Basics

    Lecture 54 NetBIOS and SMB Enumeration

    Lecture 55 SNMP Enumeration

    Lecture 56 LDAP Enumeration

    Lecture 57 NTP Enumeration

    Lecture 58 NFS Enumeration

    Lecture 59 SMTP and FTP Enumeration

    Section 5: System Hacking Phases and Attack Techniques - Vulnerability Analysis

    Lecture 60 Vulnerability Assessment Concepts and Resources

    Lecture 61 Vulnerability Management Life-Cycle

    Lecture 62 Vulnerability Classification

    Lecture 63 Vulnerability Assessment Types

    Lecture 64 Vulnerability Assessment Models and Tools

    Lecture 65 Vulnerability Assessment Reports

    Section 6: System Hacking Phases and Attack Techniques - System Hacking

    Lecture 66 CEH Hacking Methodology and Goals

    Lecture 67 Windows Authentication

    Lecture 68 Password Attacks - Basic Concepts

    Lecture 69 Password Extraction and Cracking

    Lecture 70 Password Attacks Cracking Enhancement Techniques

    Lecture 71 Exploitation Buffer Overflows

    Lecture 72 Privilege Escalation

    Lecture 73 Maintaining Access

    Lecture 74 Steganography

    Lecture 75 Covering Tracks

    Section 7: System Hacking Phases and Attack Techniques - Malware Threats

    Lecture 76 Malware Concepts and Components

    Lecture 77 APT

    Lecture 78 Trojans

    Lecture 79 Viruses and Worms

    Lecture 80 Fileless Malware

    Lecture 81 Malware Analysis

    Lecture 82 Malware Countermeasures

    Section 8: Network and Perimeter Hacking - Sniffing

    Lecture 83 Network Sniffing Basics

    Lecture 84 DHCP Sniffing Attacks

    Lecture 85 ARP Poisoning

    Lecture 86 DNS Poisoning

    Lecture 87 Sniffing Defenses

    Section 9: Network and Perimeter Hacking - Social Engineering

    Lecture 88 Social Engineering Concepts

    Lecture 89 Insider Threats

    Lecture 90 Identity Theft

    Section 10: Network and Perimeter Hacking - Denial of Service

    Lecture 91 DoS and DDoS Attacks

    Lecture 92 Volumetric Attacks

    Lecture 93 Protocol Attacks

    Lecture 94 Application Layer Attacks

    Lecture 95 Botnets

    Lecture 96 DoS and DDoS Countermeasures

    Section 11: Network and Perimeter Hacking - Session Hijacking

    Lecture 97 Session Hijacking Concepts

    Lecture 98 Network Level Session Hijacking

    Lecture 99 Application Level Session Hijacking

    Lecture 100 Session Hijacking Countermeasures

    Section 12: Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots

    Lecture 101 IDS and IPS

    Lecture 102 Firewalls

    Lecture 103 Honeypots

    Section 13: Web Application Hacking - Hacking Web Servers

    Lecture 104 Web Server Hacking Concepts

    Lecture 105 Web Server Attacks

    Lecture 106 Web Server Attack Methodology

    Section 14: Web Application Hacking - Hacking Web Applications

    Lecture 107 Web App Basics

    Lecture 108 OWASP Top 10 Web Application Attacks 2017

    Lecture 109 Unvalidated Redirects and Forwards

    Lecture 110 CSRF

    Lecture 111 IDOR

    Lecture 112 LFI RFI

    Lecture 113 Web App Hacking Methodology

    Lecture 114 Web App Hacking Tools

    Lecture 115 Web App Login Attacks

    Lecture 116 XSS Filtering Evasion

    Lecture 117 Web Shell Backdoors

    Lecture 118 APIs and Webhooks

    Section 15: Web Application Hacking - SQL Injection

    Lecture 119 SQLi Concepts

    Lecture 120 Error-Based SQLi Attacks

    Lecture 121 Blind-Based SQLi Attacks

    Lecture 122 SQLi to System Access

    Lecture 123 SQLMap

    Section 16: Wireless Network Hacking - Hacking Wireless Networks

    Lecture 124 Wireless Basics

    Lecture 125 Wireless Threats

    Lecture 126 Wireless Hacking Tools

    Lecture 127 Wireless Hacking

    Lecture 128 Wireless Hacking Countermeasures

    Section 17: Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms

    Lecture 129 Mobile Hacking Basics

    Lecture 130 Android Security

    Lecture 131 iOS Security

    Lecture 132 Mobile Device Management and Security Tools

    Section 18: Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking

    Lecture 133 IoT Basics

    Lecture 134 IoT Threats and Vulnerabilities

    Lecture 135 IoT Attacks Tools and Countermeasures

    Lecture 136 OT Basics

    Lecture 137 OT Attacks Tools and Countermeasures

    Section 19: Cloud Computing - Cloud Computing

    Lecture 138 Cloud Computing Basics

    Lecture 139 Container Basics

    Lecture 140 Hacking Cloud Services

    Lecture 141 Cloud Security Controls

    Section 20: Cryptography - Cryptography

    Lecture 142 Cryptography Basics

    Lecture 143 Crypto Algorithms and Implementations

    Lecture 144 Cryptography Tools

    Lecture 145 Public Key Infrastructure

    Lecture 146 Cryptanalysis

    Lecture 147 Crypto-Attack Countermeasures

    Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel