ITPro – Certified Ethical Hacker (CEH) v.12 2022-11
ITPro – Certified Ethical Hacker (CEH) v.12 2022-11 Downloadly IRSpace
Certified Ethical Hacker (CEH) course v.12. It is designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. Vulnerability assessments are designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. have Vulnerability assessments
What you’ll learn in the CompTIA A+ Core 2 (220-1102) course
- Tactics and methods
- Common hostile behaviors
- Concepts of threat hunting
- Risk and risk management
- Cyber threat information
- Threat modeling
- Incident management and response
- Concepts of footprints
- Google Dorks
- Shodan And Censys
- Count subdomains
- Recon social networks
- Work board review
- Recon Deep Dark Web
- Email tracking
- WHOIS و DNS Recon
- Recon social engineering
- Types of network scanning
- Network scanning tools
- Discover the host
- Port and scan services
- TCP connection scan
- Secret scan
- XMAS and Maimon TCP reverse scan
- ACK Scan
- IDLE IPID SCAN
- UDP scan
- And …
CompTIA A+ Core 2 course specifications (220-1102)
- Publisher: ITProTV
- Instructor: Kill Chain
- Training level: beginner to advanced
- Training duration: 48 hours and 17 minutes
- Number of courses: 138
Course headings
Intro to Ethical Hacking
- Course Overview
- Basic Cybersecurity Concepts
- The Attacker Motives and Objectives
- Attack Categories
- Information Warfare
- Cyber Kill Chain
- Tactics Techniques And Procedures
- Common Adversarial Behaviors
- Threat Hunting Concepts
- Risk And Risk Management
- Cyber Threat Intelligence
- Threat Modeling
- Incident Management Handling And Response
- ML And AI
- Standards And Regulations
- CEH Hacking Methodology
- MITER ATT&CK Framework
- Diamond Model Of Intrusion Analysis
RECON TECHNIQUES – FOOTPRINTING AND RECON
- Footprinting Concepts
- Google Dorks
- Shodan And Censys
- Sub-Domain Enumeration
- Social Networking Recon
- Job Board Recon
- Deep-Dark Web Recon
- Email Tracking
- WHOIS And DNS Recon
- Social Engineering Recon
- Other Footprinting Tools
- Footprinting And Recon Countermeasures
RECON TECHNIQUES – SCANNING
- Network Scanning Types
- Network Scanning Tools
- Host Discovery
- Port And Service Scanning
- TCP Connect Scan
- Stealth Scan
- Inverse TCP XMAS And Maimon Scans
- ACK Scan
- IDLE IPID Scan
- UDP Scan
- SCTP INIT And COOKIE ECHO Scans
- Scan Optimizations
- Target OS Identification Techniques
- IDS And Firewall Evasion
RECON TECHNIQUES – ENUMERATION
- NetBIOS And SMB Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- NFS Enumeration
- SMTP Enumeration
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – VULNERABILITY ANALYSIS
- Vulnerability Assessment Concepts And Resources
- Vulnerability Management Life-Cycle
- Vulnerability Classification
- Vulnerability Assessment Types
- Vulnerability Assessment Models And Tools
- Vulnerability Assessment Reports
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – SYSTEM HACKING
- CEH Hacking Methodology And Goals
- Windows Authentication
- Password Attacks – Basic Concepts
- Password Extraction And Cracking
- Password Attacks Cracking Enhancement Techniques
- Buffer Overflows
- Privilege Escalation
- Maintaining Access
- Steganography
- Covering Tracks
- AD Enumeration
- Mimikatz
- Pivoting
SYSTEM HACKING PHASES AND ATTACK TECHNIQUES – MALWARE THREATS
- Malware Concepts And Components
- APT
- Trojans
- Viruses And Worms
- Fileless Malware
- Malware Analysis
- Malware Countermeasures
NETWORK AND PERIMETER HACKING – SNIFFING
- Network Sniffing Basics
- DHCP Sniffing Attacks
- ARP Poisoning
- DNS Poisoning
- Sniffing Defenses
NETWORK AND PERIMETER HACKING – SOCIAL ENGINEERING
- Social Engineering Concepts And Attacks
- Insider Threats
- Identity Theft
NETWORK AND PERIMETER HACKING – DENIAL OF SERVICE
- DoS And DDoS Attacks
- Volumetric Attacks
- Protocol Attacks
- Application Layer Attacks
- Botnets
- DoS And DDoS Countermeasures
NETWORK AND PERIMETER HACKING – SESSION HIJACKING
- Session Hijacking Concepts
- Network Level Session Hijacking
- Application Level Session Hijacking
- Session Hijacking Countermeasures
NETWORK AND PERIMETER HACKING – EVADING FIREWALLS, IDS, AND HONEYPOTS
- IDS And IPS
- Firewalls
- Honeypots
WEB APPLICATION HACKING – HACKING WEB SERVERS
- Web Server Basics
- Web Server Attacks
- Web Server Hacking Methodology
WEB APPLICATION HACKING – HACKING WEB APPLICATIONS
- Web App Basics
- OWASP Top 10 Web Application Attacks 2021
- Web App Hacking Methodology
- Unvalidated Redirects And Forwards
- XSS And CSRF
- Input Filtering Evasion
- DRY
- LFI RFI
- APIs And Webhooks
WEB APPLICATION HACKING – SQL INJECTION
- SQLi Concepts
- Error-Based SQLi Attacks
- Blind-Based SQLi Attacks
- SQLi To System Access
- SQLMap
WIRELESS NETWORK HACKING – HACKING WIRELESS NETWORKS
- Wireless Basics
- Wireless Threats
- Wireless Hacking Tools
- Wireless Hacking
- Wireless Hacking Countermeasures
MOBILE PLATFORM, IOT, AND OT HACKING – HACKING MOBILE PLATFORMS
- Mobile Hacking Basics
- Android Security
- IOS Security
- Mobile Device Management
MOBILE PLATFORM, IOT, AND OT HACKING – IOT AND OT HACKING
- Basics of Iot
- IoT Threats And Vulnerabilities
- IoT Attacks Tools And Countermeasures
- Basics of OT
- Attacks Tools And Countermeasures of OT
CLOUD COMPUTING – CLOUD COMPUTING
- Basics of Cloud Computing
- Basics of Container
- Hacking Cloud Services
- Cloud Security Controls
CRYPTOGRAPHY – CRYPTOGRAPHY
- Basics of Cryptography
- Algorithms And Implementations of Crypto
- Tools of Cryptography
- Public Key Infrastructure
- Cryptanalysis
- Crypto-Attack Countermeasures
Course images
Sample video of the course
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 1080p
download link
File(s) password: www.downloadly.ir
Size
43.5 GB
Super Admin 