Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    The Complete Ethical Hacker Certification Exam Prep Course

    Posted By: ELK1nG
    The Complete Ethical Hacker Certification Exam Prep Course

    The Complete Ethical Hacker Certification Exam Prep Course
    Last updated 3/2021
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.78 GB | Duration: 16h 17m

    This Course WILL provide EVERYTHING Needed to allow you to Pass your Ethical Hacking Exam v11

    What you'll learn
    Master the topics needed to pass the Certified Ethical Hacker Exam from EC-Council.
    Discover the why behind security administrators’ work and secure your corporate and/or home-based network.
    Build your career towards becoming a professional penetration tester.
    Get paid for providing a valuable service for companies with sensitive data.
    Requirements
    You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
    In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
    I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
    The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.
    Description
    If you are curious about new technologies and passionate about jump-starting your career as an ethical hacker, then this course is for you!  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.    In this course, you will: Learn the business and technical logistics behind penetration testingIdentify evolving threats from different types of hackersReveal shocking truths about the information operating systems can divulgeRealize the power of footprinting on the InternetDetect live systems by inferenceGet by a step-by-step, no-nonsense introduction to cryptographyIdentify differences between vulnerability assessments and penetration testsMaster ways to prevent and disable system hackingProtect yourself from malware, including Trojans, backdoor, viruses, and moreThwart hackers attacking wireless networks and mobile devicesUnderstand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewallsImplement countermeasures to stop SQL injections and other database attacksAnd more!Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 700 exam questions. More than any other course on Udemy!  IT's like buying 2 courses for the price of one! Each question comes with a carefully crafted explanation of why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace to test your knowledge.Take a look at the many students who have already used this course to ACE their Ethical Hacker Exam.  Don't take my word for it, ask questions to them directly in the forums.               Just as Brayden and many others did…               Do you want to pass on your first attempt?               I did. So I did what Tim told me and I just got my Certification today!!               Thanks, Instructor TIM! This course made all the difference.Why Learn Ethical HackingA growing number of companies today seek ethical hackers to protect their most sensitive information. A very few days go by without breaking news, revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking as a certified course has quickly become one of the most sought-after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development. Why Learn From MeThe ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the  [Certified] Ethical Hacker (TM) [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 35 years of experience as a technical trainer, consultant, and pen tester into this course material. I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a course containing the spot-on knowledge of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to master the concepts covered and complete the assignments and quizzes, you will set yourself up for exam day success.I took a lighthearted approach during the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future. Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.  By the end of the course, you’ll have everything you need to ace the Ethical Hacker Certification [1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.Join me on this journey, and enroll in the course today.References:  [1] "Certified Ethical Hacker" and "CEH" are Registered Trademarks of EC-Council, Note: "Ethical Hacker" is not a registered trademark.This course prepares you to take the Certified Ethical Hacker v11 Exam from EC Council.

    Overview

    Section 1: Opening Section

    Lecture 1 Orientation

    Lecture 2 Purpose of this Course

    Section 2: Build Your Lab - In the Future We will offer an Online Solution

    Lecture 3 Create A VeraCrypt Container to Protect Your Laptop or Desktop

    Lecture 4 Utilities, Cheat Sheets, Various Items You really only Want to Download Once

    Lecture 5 Build a Manual Lab 01

    Lecture 6 Lab Legalities

    Lecture 7 Housekeeping

    Lecture 8 Getting to Know Your XPAttacker VM

    Lecture 9 Getting to Know Your Win2k VM

    Lecture 10 Getting to Know You Win7 VM

    Lecture 11 Getting to Know Your Win2k3-AD

    Lecture 12 Getting to Know Your WebApp

    Lecture 13 Putting Our Lab Together Step By Step

    Lecture 14 Tying everything together in our Lab

    Section 3: Ethical Hacking Overview

    Lecture 15 Introduction to Pentesting and Ethical Hacking

    Lecture 16 Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro

    Lecture 17 Defintion of a Penetration Test

    Lecture 18 The Evolving Threat

    Lecture 19 The Vulnerabilty Lifecycle

    Lecture 20 Map.Norsecorp.com

    Lecture 21 Botnet Definition

    Lecture 22 Defense in Depth

    Lecture 23 MetaData

    Lecture 24 Types of PenTests

    Lecture 25 Types of Hackers

    Lecture 26 Common Definitions

    Lecture 27 Hacker vs. Penetration Tester

    Lecture 28 Penetration Testing Terminology

    Lecture 29 Essential Terminology

    Lecture 30 OSSTMM Methodology

    Lecture 31 Tools vs Technique

    Lecture 32 Things are not always as they seem

    Lecture 33 Calculating Risk & Formulas

    Lecture 34 Analyzing Findings

    Lecture 35 Calculating SLE, ARO, ALE

    Lecture 36 Other Penetration Testing Methodologies

    Section 4: FootPrinting - Reconnaissance and Information Gathering

    Lecture 37 Introduction to Footprinting

    Lecture 38 What Information is Gathered by the Hacker

    Lecture 39 Methods of Obtaining Information And Physical Access

    Lecture 40 Social Access

    Lecture 41 Digital Access

    Lecture 42 Passive vs Active Reconnaissance

    Lecture 43 Footprinting Defined

    Lecture 44 Exercise: Footprinting Tool: Maltego

    Lecture 45 Most Powerful Hacking Tool on the Internet Today

    Lecture 46 Instructor Demonstration - The Power of Google -A

    Lecture 47 Instructor Demonstration - The Power of Google -B

    Lecture 48 Instructor Demo: GoogleAlerts

    Lecture 49 Removing Searchable Content

    Lecture 50 Internet Archive: The WayBack Machine

    Lecture 51 Domain Name Registration-WhoIs Information

    Lecture 52 Instructor Demonstation - CentralOps

    Lecture 53 DNS Databases

    Lecture 54 Traceroute Operation

    Lecture 55 InstructorDemonstration: Online Tools

    Lecture 56 Spokeo - No Refuge for the Wealthy

    Lecture 57 Netcraft, DoaminsbyProxy, Countermeasures

    Section 5: Linux Overview

    Lecture 58 Introduction to Linux

    Lecture 59 Linux History - Linus + Minux = Linux

    Lecture 60 Linux GUI Desktops

    Lecture 61 Linux Shell Linux Bash Shell

    Lecture 62 Passwd & Shadow File Formats

    Lecture 63 InstructorDemo:User Account Management

    Lecture 64 Tarballs & Zips & Installing VMware Tools

    Lecture 65 Compiling Programs in Linux, Shell Shock, Poodle Vulnerability

    Lecture 66 Most Popular Linux Security Distribution

    Section 6: Detecting Live Systems - Port Scanning

    Lecture 67 Introduction to Port Scanning

    Lecture 68 Introduction to Port Scanning

    Lecture 69 TCP/IP Stack

    Lecture 70 TCP 3-Way HandShake

    Lecture 71 NMap ServiceVersion Detection And Demo

    Lecture 72 Instructor Demonstration-Engage, NmapScans

    Lecture 73 Hping3, NMap -O

    Lecture 74 Fuzzy Logic

    Lecture 75 Countermeasures: Scanning

    Section 7: Enumeration - What Can We Get For Free?

    Lecture 76 Intro to Enumeration

    Lecture 77 Grabbing Banners

    Lecture 78 Shodan

    Lecture 79 ZoneTransfers

    Lecture 80 SNMP Enumeration.

    Lecture 81 SNMP Countermeasures, AD and AD Countermeasures

    Lecture 82 Null Sessions

    Section 8: Cryptography

    Lecture 83 Intro Into Cryptography

    Lecture 84 Beginings of Cryptography

    Lecture 85 Implementation, Stream Cipher, Block Cipher and the Enigima

    Lecture 86 Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange

    Lecture 87 Hashing, Hashing Collisions, Common Hash Algorithms

    Lecture 88 Ransomware

    Lecture 89 IPSec and SSH

    Lecture 90 PKI Applications, Quantum Crypto and VeraCrypt

    Section 9: Malware - Sofware Goes Undercover

    Lecture 91 Introduction to Malware and How The Internet Makes Money

    Lecture 92 Things that make the World Go Around - Well as far as the Internet is concerned

    Lecture 93 Trojans and Back Doors

    Lecture 94 Defining Malware: Viruses and Worms

    Lecture 95 Defining Malware: Spyware

    Lecture 96 Data Loss Prevention (DLP) and other Creepy things

    Lecture 97 Distributing Malware

    Lecture 98 Malware Capabilities

    Lecture 99 Auto Starting Malware

    Lecture 100 Tool: Netcat

    Lecture 101 Demo: NetCat Procedure

    Lecture 102 Executable Wrappers

    Lecture 103 Instructor Demo: Executeable Wrappers 1

    Lecture 104 Instructor Demo: Executeable Wrappers 2

    Lecture 105 Malware Avoiding Detection

    Lecture 106 Malware Countermeasures 1

    Lecture 107 Malware Countermeasures 2

    Section 10: System Hacking

    Lecture 108 Introduction to System Hacking Introduction

    Lecture 109 Types of Password Attacks, Keystroke Loggers

    Lecture 110 Password Guessing Online

    Lecture 111 Cracking Windows Passwords - A

    Lecture 112 Cracking Windows Passwords - B

    Lecture 113 Cracking Windows Passwords - C

    Lecture 114 Cracking Windows Passwords - D

    Lecture 115 Cracking Windows Passwords - E

    Lecture 116 Countermeasures: Stealing the Passwords, Syskey, Salting

    Lecture 117 Cloud Cracking Techniques

    Lecture 118 Generating Rainbow Tables, Free Rainbow Tables

    Lecture 119 Password Hash Insertion Attack

    Lecture 120 Demonstration MimiKatz

    Lecture 121 Privilege Escalation, Countermeasures

    Lecture 122 Covering Tracks, Disable Auditing, Clearing the Event Log

    Lecture 123 Alternate Data Streams Demonstration - A

    Lecture 124 Alternate Data Streams Demonstration - B

    Lecture 125 Alternate Data Streams Demonstration - C

    Lecture 126 Anonymizers - JAP

    Lecture 127 Steganography

    Lecture 128 Virtually Complete Secrecy, TOR

    Lecture 129 RootKits - Overview

    Lecture 130 RootKits - Frightening Demo

    Lecture 131 Root Kit Countermeasures, Tokens and Smart Cards

    Section 11: Advanced Hacking and Explotiation Techniques

    Lecture 132 Introduction to Advanced System Explotation

    Lecture 133 How do Exploits Work?

    Lecture 134 Buffer Over Flows Introduction I do when Speaking at a Conference

    Lecture 135 Processors and Stacks

    Lecture 136 Basic Types of Buffer Overflows And Demo 01

    Lecture 137 Basic Types of Buffer Overflows And Demo 02

    Lecture 138 Basic Types of Buffer Overflows And Demo 03

    Lecture 139 Stages of Exploit Development

    Lecture 140 Buffer Overflow Prevention

    Lecture 141 The Metasploit Project

    Lecture 142 Core Impact Overview

    Lecture 143 Core Impact Demo with Narrative Comments

    Section 12: Attacking Databases

    Lecture 144 Introduction to Database Management Systems

    Lecture 145 Overview of Databases, Types of Databases, Relations of Databases

    Lecture 146 View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties

    Lecture 147 SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info

    Lecture 148 Hardening SQL Server

    Lecture 149 SQL Injection Demo 1

    Lecture 150 SQL Injection Demo 2

    Lecture 151 SQL Injection Demo 3

    Section 13: Attacking Wireless Networks and Mobile Phones

    Lecture 152 Introduction to WiFi and Mobile Hacking

    Lecture 153 WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,

    Lecture 154 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets

    Lecture 155 XOR Basics, WEP Weaknesses

    Lecture 156 TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption

    Lecture 157 Kismet, Aircrack-ng, Aireplay

    Lecture 158 EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network

    Lecture 159 Exercise/Assignment; Cracking WPA/WPA2 Password Preparation

    Lecture 160 Exercise/Assignment; Cracking WPA/WPA2 Password - Solution

    Section 14: Networks - Sniffing, ARP Poisioning, and Breaking SSL

    Lecture 161 Introduction to Sniffing

    Lecture 162 Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer

    Lecture 163 TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing

    Lecture 164 Active Sniffing & Methods, Switch Table Flooding

    Lecture 165 Arp Cache Posioning

    Lecture 166 Arp Cache Posioning Tools and Countermeasures

    Lecture 167 Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M

    Lecture 168 Exercise/Assignment Breaking SSL - Preparation

    Lecture 169 Exercise/Assignment Breaking SSL - Solution

    Section 15: Firewalls, IDS and IPS and some New Age Protection

    Lecture 170 Introduction tp Firewalls, IDS and IPS WAF

    Lecture 171 Firewall - Your First Line of Defense

    Lecture 172 IDS Your Second Line of Defense

    Lecture 173 Web Application Firewall and Evasion Techniques'

    Lecture 174 Behavioural Firewalls and IPS Systems

    Section 16: Attacking Web Technologies

    Lecture 175 Introduction to Web Application

    Lecture 176 Common Security Threats, Need for Monitoring, SANS Seven MGT Errors

    Lecture 177 Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets

    Lecture 178 Logs Cancanolization and Other Attacks

    Lecture 179 Web App Scanner, HTTrack,HTTPrint, Proxies

    Lecture 180 Directory Traversal & Other Common Vulnerabilties

    Lecture 181 XSS Demo and Countermeasures

    Lecture 182 Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)

    Lecture 183 Cross Site Request Forgery

    Lecture 184 Cookies and Session Management

    Lecture 185 OWASP Top 10

    Section 17: So Your Ready To Take Your Test

    Lecture 186 So your Ready To Take Your Test 1?

    Lecture 187 So Your Ready To Take Your Test 2?

    Section 18: Bonus Section

    Lecture 188 Backing Up our Veracrypt Storage Enclosure for Saftey

    Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network,This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.,This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.,People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.