Certified Ethical Hacker (CEH) v11 312 - 50 Exam Guide

booksz

U P L O A D E R
4e83f3d2efb1f8f44ffc468313d350c8.jpg

Free Download Christopher Rees, "Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities"
English | 2022 | ISBN: 1801813094 | EPUB | pages: 664 | 11.9 mb
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam

Key Features
- Learn how to look at technology from the standpoint of an attacker
- Understand the methods that attackers use to infiltrate networks
- Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests
Book Description
With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.
This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.
By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.
What you will learn
- Get to grips with information security and ethical hacking
- Undertake footprinting and reconnaissance to gain primary information about a potential target
- Perform vulnerability analysis as a means of gaining visibility of known security weaknesses
- Become familiar with the tools and techniques used by an attacker to hack into a target system
- Discover how network sniffing works and ways to keep your information secure
- Explore the social engineering techniques attackers use to compromise systems
Who this book is for
This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.
Table of Contents
- Understanding Ethical Hacking
- Introduction to Reconnaissance
- Reconnaissance - A Deeper Dive
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Social Engineering
- Malware and Other Digital Attacks
- Sniffing and Evading IDS, Firewalls, and Honeypots
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Hacking Web Servers and Web Apps
- Hacking IoT and OT
- Cloud Computing
- Using Cryptography
- CEH Exam Practice Questions


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Links are Interchangeable - Single Extraction
 
Kommentar

e9913678d67683d9525ba78e443f1b61.jpg

Certified Ethical Hacker (Ceh) V11
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 46.18 GB | Duration: 41h 52m​

Exam Preparatory Course

What you'll learn

Understand the Principles of Ethical Hacking

Identify Vulnerabilities in Network Systems

Exploit Vulnerabilities in Network Systems

Understand Malware Threats

Analyze Network Traffic

Understand Social Engineering Techniques

Exploit Web Application Vulnerabilities

Hack Wireless Networks

Understand Cryptography Principles

Address Cloud Security Risks

Requirements

It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.

Description

The Certified Ethical Hacker (CEH) v11 is a comprehensive course that provides in-depth knowledge and practical skills in ethical hacking and network security. The course is designed to help learners understand the latest tools and techniques used by ethical hackers to test and secure network systems.The CEH v11 course is an excellent program for individuals looking to enhance their skills and knowledge in ethical hacking and network security. Upon completion of the course, learners can take the certification exam to become a Certified Ethical Hacker, which can open up various career opportunities in the field. Understand the Principles of Ethical HackingIdentify Vulnerabilities in Network SystemsExploit Vulnerabilities in Network SystemsUnderstand Malware ThreatsAnalyze Network TrafficUnderstand Social Engineering TechniquesExploit Web Application VulnerabilitiesHack Wireless NetworksUnderstand Cryptography PrinciplesAddress Cloud Security Risks It is recommended that learners complete relevant foundational courses or certifications before enrolling in the CEH v11 course, such as CompTIA Network+, CompTIA Security+, or the EC-Council Certified Security Specialist (ECSS) course. This will provide learners with the necessary foundational knowledge and skills required to successfully complete the CEH v11 course.The course is suitable for Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel.

Overview

Section 1: Intro to Ethical Hacking

Lecture 1 Overview

Lecture 2 CEH v11 EC-Council Certification Overview

Lecture 3 Basic Cybersecurity Concepts

Lecture 4 Attacker Motives, Goals, and Objectives

Lecture 5 Attack Classifications

Lecture 6 Information Warfare

Lecture 7 Cyber Kill Chain

Lecture 8 Tactics Techniques and Procedures

Lecture 9 Common Adversarial Behaviors

Lecture 10 Threat Hunting Concepts

Lecture 11 Hacking Phases

Lecture 12 Ethical Hacking Concepts

Lecture 13 Risk

Lecture 14 Risk Management

Lecture 15 Cyber Threat Intelligence

Lecture 16 Threat Modeling

Lecture 17 Incident Management

Lecture 18 Incident Handling and Response

Lecture 19 ML and AI

Lecture 20 Standards and Regulations

Section 2: Recon Techniques - Footprinting and Recon

Lecture 21 Footprinting Concepts

Lecture 22 Google Dorks

Lecture 23 Shodan Censys and Thingful

Lecture 24 Sub-Domain Enumeration

Lecture 25 Geolocation Recon

Lecture 26 Social Networking Recon

Lecture 27 Job Board Recon

Lecture 28 Deep-Dark Web Recon

Lecture 29 Metadata Recon

Lecture 30 Email Tracking

Lecture 31 WHOIS Recon and DNS Recon

Lecture 32 Public Network Footprinting

Lecture 33 Social Engineering Recon

Lecture 34 Footprinting and Recon Countermeasures

Lecture 35 Custom Wordlists

Lecture 36 Other Footprinting Tools

Section 3: Recon Techniques - Scanning

Lecture 37 Network Scanning Types

Lecture 38 TCP Communication

Lecture 39 Network Scanning Tools

Lecture 40 Host Discovery

Lecture 41 Port and Service Scanning

Lecture 42 Nmap: TCP Connect Scan

Lecture 43 Nmap Stealth Scan

Lecture 44 Nmap Inverse TCP XMAS and Maimon Scans

Lecture 45 Nmap ACK Scan

Lecture 46 Nmap IDLE IPID Scan

Lecture 47 Nmap UDP Scan

Lecture 48 Nmap SCTP INIT and COOKIE ECHO Scans

Lecture 49 Nmap IPv6 List and Version Scans

Lecture 50 Nmap Scan Optimizations

Lecture 51 Target OS Identification Techniques

Lecture 52 IDS and Firewall Evasion

Section 4: Recon Techniques - Enumeration

Lecture 53 Enumeration Basics

Lecture 54 NetBIOS and SMB Enumeration

Lecture 55 SNMP Enumeration

Lecture 56 LDAP Enumeration

Lecture 57 NTP Enumeration

Lecture 58 NFS Enumeration

Lecture 59 SMTP and FTP Enumeration

Section 5: System Hacking Phases and Attack Techniques - Vulnerability Analysis

Lecture 60 Vulnerability Assessment Concepts and Resources

Lecture 61 Vulnerability Management Life-Cycle

Lecture 62 Vulnerability Classification

Lecture 63 Vulnerability Assessment Types

Lecture 64 Vulnerability Assessment Models and Tools

Lecture 65 Vulnerability Assessment Reports

Section 6: System Hacking Phases and Attack Techniques - System Hacking

Lecture 66 CEH Hacking Methodology and Goals

Lecture 67 Windows Authentication

Lecture 68 Password Attacks - Basic Concepts

Lecture 69 Password Extraction and Cracking

Lecture 70 Password Attacks Cracking Enhancement Techniques

Lecture 71 Exploitation Buffer Overflows

Lecture 72 Privilege Escalation

Lecture 73 Maintaining Access

Lecture 74 Steganography

Lecture 75 Covering Tracks

Section 7: System Hacking Phases and Attack Techniques - Malware Threats

Lecture 76 Malware Concepts and Components

Lecture 77 APT

Lecture 78 Trojans

Lecture 79 Viruses and Worms

Lecture 80 Fileless Malware

Lecture 81 Malware Analysis

Lecture 82 Malware Countermeasures

Section 8: Network and Perimeter Hacking - Sniffing

Lecture 83 Network Sniffing Basics

Lecture 84 DHCP Sniffing Attacks

Lecture 85 ARP Poisoning

Lecture 86 DNS Poisoning

Lecture 87 Sniffing Defenses

Section 9: Network and Perimeter Hacking - Social Engineering

Lecture 88 Social Engineering Concepts

Lecture 89 Insider Threats

Lecture 90 Identity Theft

Section 10: Network and Perimeter Hacking - Denial of Service

Lecture 91 DoS and DDoS Attacks

Lecture 92 Volumetric Attacks

Lecture 93 Protocol Attacks

Lecture 94 Application Layer Attacks

Lecture 95 Botnets

Lecture 96 DoS and DDoS Countermeasures

Section 11: Network and Perimeter Hacking - Session Hijacking

Lecture 97 Session Hijacking Concepts

Lecture 98 Network Level Session Hijacking

Lecture 99 Application Level Session Hijacking

Lecture 100 Session Hijacking Countermeasures

Section 12: Network and Perimeter Hacking - Evading Firewalls, IDS, and Honeypots

Lecture 101 IDS and IPS

Lecture 102 Firewalls

Lecture 103 Honeypots

Section 13: Web Application Hacking - Hacking Web Servers

Lecture 104 Web Server Hacking Concepts

Lecture 105 Web Server Attacks

Lecture 106 Web Server Attack Methodology

Section 14: Web Application Hacking - Hacking Web Applications

Lecture 107 Web App Basics

Lecture 108 OWASP Top 10 Web Application Attacks 2017

Lecture 109 Unvalidated Redirects and Forwards

Lecture 110 CSRF

Lecture 111 IDOR

Lecture 112 LFI RFI

Lecture 113 Web App Hacking Methodology

Lecture 114 Web App Hacking Tools

Lecture 115 Web App Login Attacks

Lecture 116 XSS Filtering Evasion

Lecture 117 Web Shell Backdoors

Lecture 118 APIs and Webhooks

Section 15: Web Application Hacking - SQL Injection

Lecture 119 SQLi Concepts

Lecture 120 Error-Based SQLi Attacks

Lecture 121 Blind-Based SQLi Attacks

Lecture 122 SQLi to System Access

Lecture 123 SQLMap

Section 16: Wireless Network Hacking - Hacking Wireless Networks

Lecture 124 Wireless Basics

Lecture 125 Wireless Threats

Lecture 126 Wireless Hacking Tools

Lecture 127 Wireless Hacking

Lecture 128 Wireless Hacking Countermeasures

Section 17: Mobile Platform, IoT, and OT Hacking - Hacking Mobile Platforms

Lecture 129 Mobile Hacking Basics

Lecture 130 Android Security

Lecture 131 iOS Security

Lecture 132 Mobile Device Management and Security Tools

Section 18: Mobile Platform, IoT, and OT Hacking - IoT and OT Hacking

Lecture 133 IoT Basics

Lecture 134 IoT Threats and Vulnerabilities

Lecture 135 IoT Attacks Tools and Countermeasures

Lecture 136 OT Basics

Lecture 137 OT Attacks Tools and Countermeasures

Section 19: Cloud Computing - Cloud Computing

Lecture 138 Cloud Computing Basics

Lecture 139 Container Basics

Lecture 140 Hacking Cloud Services

Lecture 141 Cloud Security Controls

Section 20: Cryptography - Cryptography

Lecture 142 Cryptography Basics

Lecture 143 Crypto Algorithms and Implementations

Lecture 144 Cryptography Tools

Lecture 145 Public Key Infrastructure

Lecture 146 Cryptanalysis

Lecture 147 Crypto-Attack Countermeasures

Cybersecurity Professionals,IT Managers,Network Administrators,Penetration Testers,Security Officers,Law Enforcement Personnel



RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
NitroFlare
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
DDownload
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten