English | Size: 43.5 GB
Genre: eLearning
The Certified Ethical Hacker(CEH) v12 course is designed to give the student a foundational knowledge base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.
Here are the topics we’ll cover.
Intro to Ethical Hacking
Recon Techniques – Footprinting and Recon
Recon Techniques – Scanning
Recon Techniques – Enumeration
System Hacking Phases and Attack Techniques – Vulnerability Analysis
System Hacking Phases and Attack Techniques – System Hacking
System Hacking Phases and Attack Techniques – Malware Threats
Network and Perimeter Hacking – Sniffing
Network and Perimeter Hacking – Social Engineering
Network and Perimeter Hacking – Denial of Service
Network and Perimeter Hacking – Session Hijacking
Network and Perimeter Hacking – Evading Firewalls, IDS, and Honeypots
Web Application Hacking – Hacking Web Servers
Web Application Hacking – Hacking Web Applications
Web Application Hacking – SQL Injection
Wireless Network Hacking – Hacking Wireless Networks
Mobile Platform, IoT, and OT Hacking – Hacking Mobile Platforms
Mobile Platform, IoT, and OT Hacking – IoT and OT Hacking
Cloud Computing – Cloud Computing
Cryptography – Cryptography
Link:
Last edited: