Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    EC Council Certified Ethical Hacker v9.0 [repost]

    Posted By: ParRus
    EC Council Certified Ethical Hacker v9.0 [repost]

    EC Council Certified Ethical Hacker v9.0 (2016)
    WEBRip | English | MP4 | 1280 x 720 | AVC ~500 kbps | 15 fps
    AAC | 64 Kbps | 22.05 KHz | 1 channel | 19:34:42 | 4.66 GB
    Genre: Video Tutorial / Networking & Security

    This Certified Ethical Hacker (CEH) v9.0 video training course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. CBT Nuggets trainer Keith Barker walks you through building your own practice lab, including using evaluation software, and encourages you to not only watch and enjoy the videos, but practice everything hands-on in your own lab environment.
    For individuals interested in certification, watching and practicing the techniques taught in this course prepares you for EC-Council Certified Ethical Hacker (CEH) exam. Please visit the EC Council website for their requirements and procedures for taking the exam.

    Recommended Experience
    Networking fundamentals (CompTIA Network+ level of knowledge or better)
    Familiarity with multiple versions of Windows
    Familiarity with Linux is not necessary but recommended
    Familiarity with VMware Workstation
    Knowledge of Networking and Security at the CompTIA Network+ and Security+ levels, or better
    Recommended Equipment
    Host running VMware Workstation, that can support 64bit VMs.
    Related Certifications
    Certified Ethical Hacker v9 (#312-50)
    Related Job Functions
    Network/System Administrators/Engineers
    Security officers
    Auditors
    Security professionals
    Site administrators
    Those concerned about the security of the network infrastructure
    Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith holds several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more.

    Content:

    1. Welcome (4 min)
    2. Building a LAB: Concepts (6 min)
    3. Building a LAB: Networking (9 min)
    4. Deploy a Kali Linux VM (14 min)
    5. Adding Metasploitable to Your Lab (11 min)
    6. Adding Windows to Your Lab (14 min)
    7. Configure a Static IP on Kali (5 min)
    8. Windows Evaluations (7 min)
    9. Deploy Windows 8.1 (15 min)
    10. Deploy Windows 2012 (11 min)
    11. Deploy Windows 10 (7 min)
    12. Deploy Windows 2016 (7 min)
    13. Ethics and Hacking (10 min)
    14. Hacking Vocabulary (6 min)
    15. InfoSec Concepts (5 min)
    16. Attack Categories, Types, and Vectors (5 min)
    17. Five Phases of Hacking (5 min)
    18. Footprinting and Reconnaissance Concepts (11 min)
    19. Search Engine Tools (8 min)
    20. Hacking using Google (12 min)
    21. Website Recon Tools (13 min)
    22. Metagoofil Metadata Tool (3 min)
    23. Email Headers for Footprinting (5 min)
    24. Using WHOIS for Recon (4 min)
    25. DNS Tools (12 min)
    26. Network Scanning Overview (3 min)
    27. Network Scanning Methodology (9 min)
    28. Port Discovery (11 min)
    29. Network Scanning Tools (3 min)
    30. Stealth Idle Scanning (10 min)
    31. OS and Application Fingerprinting (10 min)
    32. Vulnerability Scanning (8 min)
    33. Network Mapping Tools (5 min)
    34. Proxy Servers (8 min)
    35. Using Public Proxy Services (6 min)
    36. Enumeration Concepts (5 min)
    37. NetBIOS Enumeration (11 min)
    38. SNMP Enumeration Concepts (10 min)
    39. SNMP Enumeration Tools (10 min)
    40. LDAP Enumeration Concepts (5 min)
    41. LDAP Enumeration Example (7 min)
    42. NTP Enumeration (7 min)
    43. SMTP Enumeration (8 min)
    44. System Hacking Overview (9 min)
    45. Password Cracking Concepts (10 min)
    46. Password Attack Example: MITM and Sniffing (13 min)
    47. Rainbow Crack Lab Setup (8 min)
    48. Rainbow Crack Demonstration (8 min)
    49. Password Reset Hacking (8 min)
    50. DHCP Starvation (10 min)
    51. Remote Access (15 min)
    52. Spyware (9 min)
    53. NTFS Alternate Data Streams Exploit (9 min)
    54. Steganography with OpenPuff (7 min)
    55. Steganography with SNOW (5 min)
    56. Covering Tracks (7 min)
    57. Malware Overview (10 min)
    58. Trojan Overview (10 min)
    59. Creating a Trojan (11 min)
    60. Virus Overview (13 min)
    61. Virus Creation (8 min)
    62. Detecting Malware (17 min)
    63. Malware Analysis (10 min)
    64. Hash File Verification (8 min)
    65. Sniffing Overview (12 min)
    66. CAM Table Attack and Port Security (10 min)
    67. DHCP Snooping (14 min)
    68. Dynamic ARP Inspection (DAI) (14 min)
    69. Social Engineering (15 min)
    70. Denial of Service (DoS) Attacks (19 min)
    71. Session Hijacking (18 min)
    72. Hacking Web Servers (10 min)
    73. Buffer Overflow (13 min)
    74. OWASP Broken Web Application Project (13 min)
    75. Shellshock (6 min)
    76. SQL Introduction (9 min)
    77. SQL Injection (16 min)
    78. Web App Vulnerabilities: WordPress (10 min)
    79. Wireless Hacking (18 min)
    80. Using an Android VM (4 min)
    81. Malware for Mobile (11 min)
    82. Mobile Device Risks and Best Practices (13 min)
    83. Firewall Evasion (19 min)
    84. Firewall ACL Example (15 min)
    85. NAT and PAT fundamentals (11 min)
    86. IDS/IPS Evasion (17 min)
    87. Honeypots (12 min)
    88. Cloud Computing (23 min)
    89. CIA: Confidentiality, Integrity, and Availability (3 min)
    90. Policies (9 min)
    91. Quantifying Risk (6 min)
    92. Separation of Duties (13 min)
    93. Symmetrical Encryption Concepts (14 min)
    94. Asymmetrical Encryption Concepts (16 min)
    95. Control Types (11 min)
    96. Multifactor Authentication (12 min)
    97. Centralized Identity Management (13 min)
    98. Kerberos and Single Sign On (SSO) (17 min)
    99. Backups and Media Management (9 min)
    100. Operations Security Controls (14 min)
    101. Physical Security Controls (11 min)
    102. Incident Response (12 min)
    103. VPNs (21 min)
    104. Disaster Recovery Planning (13 min)
    105. Pen Testing Tips (10 min)
    106. Useful Tools (11 min)
    107. Case Study (21 min)
    108. Additional Resources and Exam Prep (8 min)

    General
    Complete name : 102 - Incident Response.mp4
    Format : MPEG-4
    Format profile : Base Media
    Codec ID : isom
    File size : 52.0 MiB
    Duration : 12mn 46s
    Overall bit rate mode : Variable
    Overall bit rate : 569 Kbps
    Writing application : Lavf55.33.100

    Video
    ID : 1
    Format : AVC
    Format/Info : Advanced Video Codec
    Format profile : Main@L3.1
    Format settings, CABAC : Yes
    Format settings, ReFrames : 5 frames
    Codec ID : avc1
    Codec ID/Info : Advanced Video Coding
    Duration : 12mn 46s
    Bit rate mode : Constant
    Bit rate : 500 Kbps / 500 Kbps
    Width : 1 280 pixels
    Height : 720 pixels
    Display aspect ratio : 16:9
    Frame rate mode : Constant
    Frame rate : 15.000 fps
    Color space : YUV
    Chroma subsampling : 4:2:0
    Bit depth : 8 bits
    Scan type : Progressive
    Bits/(Pixel*Frame) : 0.036
    Stream size : 45.8 MiB (88%)
    Writing library : x264 core 142 r2389 956c8d8
    Encoding settings : cabac=1 / ref=5 / deblock=1:0:0 / analyse=0x1:0x131 / me=umh / subme=10 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=1 / me_range=24 / chroma_me=1 / trellis=2 / 8x8dct=0 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=-2 / threads=12 / lookahead_threads=2 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / constrained_intra=0 / bframes=8 / b_pyramid=2 / b_adapt=2 / b_bias=0 / direct=3 / weightb=1 / open_gop=0 / weightp=1 / keyint=30 / keyint_min=16 / scenecut=0 / intra_refresh=0 / rc_lookahead=60 / rc=2pass / mbtree=1 / bitrate=500 / ratetol=1.0 / qcomp=0.60 / qpmin=0 / qpmax=51 / qpstep=4 / cplxblur=20.0 / qblur=0.5 / vbv_maxrate=500 / vbv_bufsize=2000 / nal_hrd=cbr / filler=1 / ip_ratio=1.40 / aq=1:1.00

    Audio
    ID : 2
    Format : AAC
    Format/Info : Advanced Audio Codec
    Format profile : LC
    Codec ID : 40
    Duration : 12mn 46s
    Duration_LastFrame : 87ms
    Bit rate mode : Variable
    Bit rate : 64.0 Kbps
    Maximum bit rate : 500 Kbps
    Channel(s) : 2 channels
    Channel(s)_Original : 1 channel
    Channel positions : Front: C
    Sampling rate : 22.05 KHz
    Compression mode : Lossy
    Stream size : 5.85 MiB (11%)

    Screenshots

    EC Council Certified Ethical Hacker v9.0 [repost]

    EC Council Certified Ethical Hacker v9.0 [repost]

    EC Council Certified Ethical Hacker v9.0 [repost]

    EC Council Certified Ethical Hacker v9.0 [repost]

    EC Council Certified Ethical Hacker v9.0 [repost]

    Exclusive eLearning Videos ParRus-blogadd to bookmarks

    EC Council Certified Ethical Hacker v9.0 [repost]