وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
5

Certified Ethical Hacker (CEH), 4th Edition

سرفصل های دوره

Introduction
  • 001. Certified Ethical Hacker (CEH) Introduction
  • 002. Certified Ethical Hacker (CEH) Introduction

  • Lesson 1 Introduction to Ethical Hacking
  • 001. Learning objectives
  • 002. 1.1 Introducing Information Security and Cybersecurity
  • 003. 1.2 Understanding the Cyber Kill Chain and Hacking Concepts
  • 004. 1.3 Surveying Ethical Hacking Methodologies
  • 005. 1.4 Undertanding Information Security Controls
  • 006. 1.5 Understanding Security Laws and Standards
  • 007. 1.6 Planning and Scoping a Penetration Testing Assessment
  • 008. 1.7 Building Your Own Hacking Lab with WebSploit Labs

  • Lesson 2 Footprinting and Reconnaissance
  • 001. Learning objectives
  • 002. 2.1 Understanding Information Gathering and Vulnerability Identification
  • 003. 2.2 Introducing Open Source Intelligence (OSINT) Techniques
  • 004. 2.3 Exploring Footprinting Methodologies
  • 005. 2.4 Utilizing Search Engines for Footprinting
  • 006. 2.5 Footprinting Web Services
  • 007. 2.6 Exploiting Social Networking Sites for Footprinting
  • 008. 2.7 Surveying Password Dumps, File Metadata, and Public Source-code Repositories
  • 009. 2.9 Implementing DNS Footprinting
  • 010. 2.10 Executing Network Footprinting
  • 011. 2.11 Applying Social Engineering for Footprinting
  • 012. 2.12 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools
  • 013. 2.13 Identifying Cloud vs. Self-hosted Assets

  • Lesson 3 Scanning Networks
  • 001. Learning objectives
  • 002. 3.1 Surveying Network Scanning Concepts
  • 003. 3.2 Exploiting Scanning Tools
  • 004. 3.3 Understanding Host Discovery
  • 005. 3.4 Performing Website and Web Application Reconnaissance
  • 006. 3.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting)
  • 007. 3.6 Scanning Beyond IDS and Firewall
  • 008. 3.7 Creating Network Diagrams
  • 009. 3.8 Discovering Cloud Assets
  • 010. 3.9 Crafting Packets with Scapy to Perform Reconnaissance

  • Lesson 4 Enumeration
  • 001. Learning objectives
  • 002. 4.1 Introducing Enumeration Techniques
  • 003. 4.2 Performing NetBIOS Enumeration
  • 004. 4.3 Performing SNMP Enumeration
  • 005. 4.4 Performing LDAP Enumeration
  • 006. 4.5 Performing NTP and NFS Enumeration
  • 007. 4.6 Performing SMTP and DNS Enumeration
  • 008. 4.7 Conducting Additional Enumeration Techniques
  • 009. 4.8 Surveying Enumeration Countermeasures

  • Lesson 5 Vulnerability Analysis
  • 001. Learning objectives
  • 002. 5.1 Understanding Vulnerability Assessment Concepts
  • 003. 5.2 Classifying and Assessing Vulnerability Types
  • 004. 5.3 Utilizing Vulnerability Assessment Tools
  • 005. 5.4 Generating Vulnerability Assessment Reports

  • Lesson 6 System Hacking
  • 001. Learning objectives
  • 002. 6.1 Understanding System Hacking Concepts
  • 003. 6.2 Gaining System Access
  • 004. 6.3 Cracking Passwords
  • 005. 6.4 Exploiting Known and Zero-Day Vulnerabilities
  • 006. 6.5 Escalating Privileges
  • 007. 6.6 Maintaining Access, Command and Control, and Exfiltration
  • 008. 6.7 Executing Applications
  • 009. 6.8 Hiding Files
  • 010. 6.9 Clearing Logs
  • 011. 6.10 Performing On-Path Attacks
  • 012. 6.11 Introduction to Lateral Movement and Exfiltration
  • 013. 6.12 Understanding Post-Engagement Cleanup

  • Lesson 7 Malware Threats
  • 001. Learning objectives
  • 002. 7.1 Understanding Malware Concepts
  • 003. 7.2 Comprehending APT Concepts
  • 004. 7.3 Grasping Trojan Concepts
  • 005. 7.4 Exploring Virus and Worm Concepts
  • 006. 7.5 Examining Fileless Malware and Living off the Land Techniques
  • 007. 7.6 Analyzing Malware
  • 008. 7.7 Implementing Malware Countermeasures

  • Lesson 8 Sniffing
  • 001. Learning objectives
  • 002. 8.1 Introducing Sniffing Concepts
  • 003. 8.2 Performing MAC Attacks
  • 004. 8.3 Conducting DHCP Attacks
  • 005. 8.4 Performing ARP Poisoning
  • 006. 8.5 Performing Spoofing Attacks
  • 007. 8.6 Performing DNS Poisoning
  • 008. 8.7 Surveying Sniffing Tools
  • 009. 8.8 Exploring Sniffing Countermeasures and Detection Techniques

  • Lesson 9 Social Engineering
  • 001. Learning objectives
  • 002. 9.1 Introducing Social Engineering Concepts and Techniques
  • 003. 9.2 Understanding the Insider Threat
  • 004. 9.3 Impersonation on Social Networking Sites
  • 005. 9.4 Understanding Identity Theft
  • 006. 9.5 Understanding Social Engineering Countermeasures

  • Lesson 10 Denial-of-Service
  • 001. Learning objectives
  • 002. 10.1 Introducing DoSDDoS Concepts and Attack Techniques
  • 003. 10.2 Defining what are Botnets
  • 004. 10.3 Exploring DDoS Case Studies
  • 005. 10.4 Surveying DoSDDoS Attack Tools
  • 006. 10.5 Understanding DoSDDoS Countermeasures and Protection Tools
  • Read me First.txt
  • freeeducationweb - link to website.url
  • freeeducationweb - link to website.zip

  • Lesson 11 Session Hijacking
  • 001. Learning objectives
  • 002. 11.1 Introducing Session Hijacking Concepts
  • 003. 11.2 Performing Application Level Session Hijacking
  • 004. 11.3 Understanding Network Level Session Hijacking
  • 005. 11.4 Surveying Session Hijacking Tools
  • 006. 11.5 Understanding Session Hijacking Countermeasures

  • Lesson 12 Evading IDS, Firewalls, and Honeypots
  • 001. Learning objectives
  • 002. 12.1 Introducing IDS, IPS, Firewall, and Honeypot Concepts
  • 003. 12.2 Exploring IDS, IPS, Firewall, and Honeypot Solutions
  • 004. 12.3 Evading IDS and Firewalls
  • 005. 12.4 Surveying IDSFirewall Evading Tools
  • 006. 12.5 Detecting Honeypots and Sandboxes
  • 007. 12.6 Understanding IDSFirewall Evasion Countermeasures

  • Lesson 13 Hacking Web Servers
  • 001. Learning objectives
  • 002. 13.1 Introducing Web Server Concepts
  • 003. 13.2 Exploring Web Server Attacks
  • 004. 13.3 Surveying Web Server Attack Methodologies
  • 005. 13.4 Understanding Web Server Countermeasures
  • 006. 13.5 Understanding Patch Management

  • Lesson 14 Hacking Web Applications
  • 001. Learning objectives
  • 002. 14.1 Understanding Web App Concepts and Identifying Web App Threats
  • 003. 14.2 Exploring the OWASP Top 10 for Web Applications
  • 004. 14.3 Applying Web App Hacking Methodologies and Footprinting Web Infrastructure
  • 005. 14.4 Analyzing Web Applications and Bypassing Client-Side Controls
  • 006. 14.5 Attacking Authentication Mechanisms
  • 007. 14.6 Attacking Session Management Mechanisms
  • 008. 14.7 Exploiting Authorization Schemes and Access Controls Flaws
  • 009. 14.8 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
  • 010. 14.9 Understanding Server-side Request Forgery (SSRF) Vulnerabilities
  • 011. 14.10 Exploiting Buffer Overflows and Creating Payloads
  • 012. 14.11 Attacking Application Logic Flaws and Shared Environments
  • 013. 14.12 Attacking Database Connectivity and Web App Clients
  • 014. 14.13 Attacking Web Services, Exploiting Web APIs, Webhooks, and Web Shells
  • 015. 14.14 Ensuring Web App Security

  • Lesson 15 SQL Injection
  • 001. Learning objectives
  • 002. 15.1 Introducing SQL Injection Concepts
  • 003. 15.2 Understanding the Types of SQL Injection
  • 004. 15.3 Exploring the SQL Injection Methodologies
  • 005. 15.4 Exploring SQL Injection Tools
  • 006. 15.5 Exploring SQL Injection Evasion Techniques
  • 007. 15.6 Understanding SQL Injection Countermeasures
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42552
    حجم: 3140 مگابایت
    مدت زمان: 724 دقیقه
    تاریخ انتشار: ۲۷ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید