ITPro – Certified Ethical Hacker (CEH) v.12 2022-11

ITPro – Certified Ethical Hacker (CEH) v.12 2022-11 Downloadly IRSpace

ITPro – Certified Ethical Hacker (CEH) v.12 2022-11
ITPro – Certified Ethical Hacker (CEH) v.12 2022-11

Certified Ethical Hacker (CEH) course v.12. It is designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. Vulnerability assessments are designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. have Vulnerability assessments

What you’ll learn in the CompTIA A+ Core 2 (220-1102) course

  •  Tactics and methods
  •  Common hostile behaviors
  •  Concepts of threat hunting
  • Risk and risk management
  • Cyber ​​threat information
  •  Threat modeling
  • Incident management and response
  • Concepts of footprints
  • Google Dorks
  • Shodan And Censys
  • Count subdomains
  • Recon social networks
  • Work board review
  • Recon Deep Dark Web
  • Email tracking
  • WHOIS و DNS Recon
  • Recon social engineering
  • Types of network scanning
  • Network scanning tools
  • Discover the host
  • Port and scan services
  • TCP connection scan
  • Secret scan
  • XMAS and Maimon TCP reverse scan
  • ACK Scan
  • IDLE IPID SCAN
  • UDP scan
  • And …

CompTIA A+ Core 2 course specifications (220-1102)

  • Publisher: ITProTV
  • Instructor: Kill Chain
  • Training level: beginner to advanced
  • Training duration: 48 hours and 17 minutes
  • Number of courses: 138

Course headings

Intro to Ethical Hacking

  1. Course Overview
  2. Basic Cybersecurity Concepts
  3.  The Attacker Motives and Objectives
  4.  Attack Categories
  5.  Information Warfare
  6.  Cyber Kill Chain
  7.  Tactics Techniques And Procedures
  8.  Common Adversarial Behaviors
  9.  Threat Hunting Concepts
  10. Risk And Risk Management
  11. Cyber Threat Intelligence
  12.  Threat Modeling
  13. Incident Management Handling And Response
  14. ML And AI
  15. Standards And Regulations
  16. CEH Hacking Methodology
  17. MITER ATT&CK Framework
  18. Diamond Model Of Intrusion Analysis

RECON TECHNIQUES – FOOTPRINTING AND RECON

  1. Footprinting Concepts
  2. Google Dorks
  3. Shodan And Censys
  4. Sub-Domain Enumeration
  5. Social Networking Recon
  6. Job Board Recon
  7. Deep-Dark Web Recon
  8. Email Tracking
  9. WHOIS And DNS Recon
  10. Social Engineering Recon
  11. Other Footprinting Tools
  12. Footprinting And Recon Countermeasures

RECON TECHNIQUES – SCANNING

  1. Network Scanning Types
  2. Network Scanning Tools
  3. Host Discovery
  4. Port And Service Scanning
  5. TCP Connect Scan
  6. Stealth Scan
  7. Inverse TCP XMAS And Maimon Scans
  8. ACK Scan
  9. IDLE IPID Scan
  10. UDP Scan
  11. SCTP INIT And COOKIE ECHO Scans
  12. Scan Optimizations
  13. Target OS Identification Techniques
  14. IDS And Firewall Evasion

RECON TECHNIQUES – ENUMERATION

  1. NetBIOS And SMB Enumeration
  2. SNMP Enumeration
  3. LDAP Enumeration
  4. NTP Enumeration
  5. NFS Enumeration
  6. SMTP Enumeration

SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – VULNERABILITY ANALYSIS

  1. Vulnerability Assessment Concepts And Resources
  2. Vulnerability Management Life-Cycle
  3. Vulnerability Classification
  4. Vulnerability Assessment Types
  5. Vulnerability Assessment Models And Tools
  6. Vulnerability Assessment Reports

SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – SYSTEM HACKING

  1. CEH Hacking Methodology And Goals
  2. Windows Authentication
  3. Password Attacks – Basic Concepts
  4. Password Extraction And Cracking
  5. Password Attacks Cracking Enhancement Techniques
  6. Buffer Overflows
  7. Privilege Escalation
  8. Maintaining Access
  9. Steganography
  10. Covering Tracks
  11. AD Enumeration
  12. Mimikatz
  13. Pivoting

SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – MALWARE THREATS

  1. Malware Concepts And Components
  2. APT
  3. Trojans
  4. Viruses And Worms
  5. Fileless Malware
  6. Malware Analysis
  7. Malware Countermeasures

NETWORK AND PERIMETER HACKING – SNIFFING

  1. Network Sniffing Basics
  2. DHCP Sniffing Attacks
  3. ARP Poisoning
  4. DNS Poisoning
  5. Sniffing Defenses

NETWORK AND PERIMETER HACKING – SOCIAL ENGINEERING

  1. Social Engineering Concepts And Attacks
  2. Insider Threats
  3. Identity Theft

NETWORK AND PERIMETER HACKING – DENIAL OF SERVICE

  1. DoS And DDoS Attacks
  2. Volumetric Attacks
  3. Protocol Attacks
  4. Application Layer Attacks
  5. Botnets
  6. DoS And DDoS Countermeasures

NETWORK AND PERIMETER HACKING – SESSION HIJACKING

  1. Session Hijacking Concepts
  2. Network Level Session Hijacking
  3. Application Level Session Hijacking
  4. Session Hijacking Countermeasures

NETWORK AND PERIMETER HACKING – EVADING FIREWALLS, IDS, AND HONEYPOTS

  1. IDS And IPS
  2. Firewalls
  3. Honeypots

WEB APPLICATION HACKING – HACKING WEB SERVERS

  1. Web Server Basics
  2. Web Server Attacks
  3. Web Server Hacking Methodology

WEB APPLICATION HACKING – HACKING WEB APPLICATIONS

  1. Web App Basics
  2. OWASP Top 10 Web Application Attacks 2021
  3. Web App Hacking Methodology
  4. Unvalidated Redirects And Forwards
  5. XSS And CSRF
  6. Input Filtering Evasion
  7. DRY
  8. LFI RFI
  9. APIs And Webhooks

WEB APPLICATION HACKING – SQL INJECTION

  1. SQLi Concepts
  2. Error-Based SQLi Attacks
  3. Blind-Based SQLi Attacks
  4. SQLi To System Access
  5. SQLMap

WIRELESS NETWORK HACKING – HACKING WIRELESS NETWORKS

  1. Wireless Basics
  2. Wireless Threats
  3. Wireless Hacking Tools
  4. Wireless Hacking
  5. Wireless Hacking Countermeasures

MOBILE PLATFORM, IOT, AND OT HACKING – HACKING MOBILE PLATFORMS

  1. Mobile Hacking Basics
  2. Android Security
  3. IOS Security
  4. Mobile Device Management

MOBILE PLATFORM, IOT, AND OT HACKING – IOT AND OT HACKING

  1. Basics of Iot
  2. IoT Threats And Vulnerabilities
  3. IoT Attacks Tools And Countermeasures
  4. Basics of OT
  5. Attacks Tools And Countermeasures of OT

CLOUD COMPUTING – CLOUD COMPUTING

  1. Basics of Cloud Computing
  2. Basics of Container
  3. Hacking Cloud Services
  4. Cloud Security Controls

CRYPTOGRAPHY – CRYPTOGRAPHY

  1. Basics of Cryptography
  2. Algorithms And Implementations of Crypto
  3. Tools of Cryptography
  4. Public Key Infrastructure
  5. Cryptanalysis
  6. Crypto-Attack Countermeasures

Course images

Certified Ethical Hacker (CEH) v.12

Sample video of the course

Installation guide

After Extract, view with your favorite Player.

English subtitle

Quality: 1080p

download link

Download part 1 – 5 GB

Download part 2 – 5 GB

Download part 3 – 5 GB

Download part 4 – 5 GB

Download part 5 – 5 GB

Download part 6 – 5 GB

Download part 7 – 5 GB

Download part 8 – 5 GB

Download part 9 – 3.51 GB

File(s) password: www.downloadly.ir

Size

43.5 GB