وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: System Hacking

سرفصل های دوره

Ethical hacking involves testing to see if an organization's network is vulnerable to outside attacks. It's one of the most desired skills in an IT security professional. In this course, security ambassador Lisa Bock guides you through the System Hacking competency from the CEH Body of Knowledge. Find out how hackers are able to hack into a system and gain access. Learn about privilege escalation, keyloggers, and spyware. Plus, explore countermeasures that IT security professionals can take to prevent these attacks.


01 - Introduction
  • 01 - Hacking the system
  • 02 - Getting the most out of this course
  • 03 - Hacking ethically

  • 02 - 1. Understanding System Hacking
  • 01 - Setting the stage
  • 02 - Getting a foothold
  • 03 - Authenticating a user
  • 04 - Challenge Reviewing Entra ID authentication methods
  • 05 - Solution Reviewing Entra ID authentication methods

  • 03 - 2. Gaining Access
  • 01 - Acquiring passwords
  • 02 - Discovering password tools
  • 03 - Cracking passwords
  • 04 - Employing rainbow tables
  • 05 - Defending against password attacks

  • 04 - 3. Exploiting Vulnerabilities
  • 01 - Leveraging security flaws
  • 02 - Overflowing the buffer
  • 03 - Enhancing software security

  • 05 - 4. Escalating Privileges
  • 01 - Understanding privilege escalation
  • 02 - Obtaining administrator privileges
  • 03 - Defending against privilege escalation

  • 06 - 5. Maintaining Access
  • 01 - Dissecting rootkits
  • 02 - User Mode and Kernel Mode
  • 03 - Using rootkits
  • 04 - Detect, remove, and avoid rootkits

  • 07 - 6. Grasping Keyloggers
  • 01 - Outlining keystroke loggers
  • 02 - Protecting against keylogging

  • 08 - 7. Recognizing Spyware
  • 01 - Explaining spyware behavior
  • 02 - Mobile spyware and invasive apps
  • 03 - Defending against spyware

  • 09 - 8. Hiding in Plain Sight
  • 01 - Using steganography
  • 02 - Swimming in the NTFS data stream
  • 03 - Using whitespace steganography
  • 04 - Detecting steganography

  • 10 - 9. Maintaining Persistence
  • 01 - Remaining in the system
  • 02 - Staying under the radar
  • 03 - Defend against persistence attacks

  • 11 - 10. Covering Tracks
  • 01 - Disabling logging and hiding files
  • 02 - Outlining ways to cover your tracks
  • 03 - Summarize the course and whats next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42081
    حجم: 236 مگابایت
    مدت زمان: 134 دقیقه
    تاریخ انتشار: 21 آذر 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید