وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
4

Mastering Ethical Hacking (2024)

سرفصل های دوره

1. Welcome to the Course!
  • 1. Welcome to the Course!
  • 2.1 Course Tools and Resource Links.pdf
  • 2. Course Tools

  • 2. Creating a Virtual Lab
  • 1.1 Course Tools and Resource Links.pdf
  • 1. Creating a Virtual Lab
  • 2. VMware Player
  • 3. VirtualBox
  • 4. Parrot OS
  • 5. OWASP BWA
  • 6. VM Snapshots

  • 3. MODULE 1 - INTRODUCTION Information Security and Ethical Hacking
  • 1. Information Security and Ethical Hacking

  • 4. MODULE 1 - LESSON 1 Introduction to Ethical Hacking
  • 1. Introduction to Ethical Hacking
  • 2. Information Security
  • 3. Cyber Kill Chain
  • 4. Five Phases of Hacking
  • 5. Ethical Hacking Explained
  • 6. Documentation Considerations
  • 7. MODULE 1 - LESSON 1 - QUIZ.html

  • 5. MODULE 2 - INTRODUCTION Reconnaissance Techniques
  • 1. Reconnaissance Techniques

  • 6. MODULE 2 - LESSON 1 Footprinting and Reconnaissance
  • 1. Footprinting and Reconnaissance
  • 2. Footprinting Explained
  • 3. Leveraging the Internet
  • 4. Domain and Subdomain Footprinting
  • 5. Leveraging Social Networking
  • 6. Email Footprinting
  • 7. Whois and DNS Footprinting
  • 8. Network Footprinting
  • 9. Social Engineering
  • 10. Documentation Tools
  • 11. Preventing Footprinting
  • 12. MODULE 2 - LESSON 1 - QUIZ.html

  • 7. MODULE 2 -LESSON 2 Scanning Networks
  • 1. Scanning Networks
  • 2. Network Scanning Tools
  • 3. Host Discovery
  • 4. Port Discovery
  • 5. Operating System Discovery
  • 6. Evading Security Appliances
  • 7. Creating Network Maps
  • 8. MODULE 2 - LESSON 2 - QUIZ.html

  • 8. MODULE 2 - LESSON 3 Enumeration
  • 1. Enumeration
  • 2. Common Enumeration Tactics
  • 3. NetBIOS Enumeration
  • 4. SNMP Enumeration
  • 5. LDAP Enumeration
  • 6. Enumerating Linux
  • 7. Enumerating FTP and TFTP
  • 8. MODULE 2 - LESSON 3 - QUIZ.html

  • 9. MODULE 3 - INTRODUCTION Hacking Phases and Attack Techniques
  • 1. Hacking Phases and Attack Techniques

  • 10. MODULE 3 - LESSON 1 Vulnerability Analysis
  • 1. Vulnerability Analysis
  • 2. Vulnerability Management Lifecycle
  • 3. Vulnerability Information
  • 4. Vulnerability Assessment Tools
  • 5. Creating Reports
  • 6. MODULE 3 - LESSON 1 - QUIZ.html

  • 11. MODULE 3 - LESSON 2 Hacking Methodology
  • 1. Hacking Methodology
  • 2. Gaining Access
  • 3. Password Cracking
  • 4. Vulnerability Exploitation
  • 5. Privilege Escalation
  • 6. Maintaining Access
  • 7. Executing Applications
  • 8. Hiding Files
  • 9. Clearing Logs
  • 10. MODULE 3 - LESSON 2 - QUIZ.html

  • 12. MODULE 3 - LESSON 3 Malware Threats
  • 1. Malware Threats
  • 2. Components of Malware
  • 3. Advanced Persistent Threats
  • 4. Trojans
  • 5. Viruses and Worms
  • 6. File-less Malware
  • 7. Malware Analysis
  • 8. Malware Countermeasures
  • 9. Anti-Malware Software
  • 10. MODULE 3 - LESSON 3 - QUIZ.html

  • 13. MODULE 4 - INTRODUCTION Network and Perimeter Hacking
  • 1. Network and Perimeter Hacking

  • 14. MODULE 4 - LESSON 1 Sniffing Techniques
  • 1. Sniffing Techniques
  • 2. Types of Sniffing
  • 3. MAC Attacks
  • 4. DHCP Attacks
  • 5. ARP Poisoning
  • 6. MAC Spoofing
  • 7. DNS Poisoning
  • 8. Mitigating Sniffing Attacks
  • 9. MODULE 4 - LESSON 1 - QUIZ.html

  • 15. MODULE 4 - LESSON 2 Social Engineering
  • 1. Social Engineering
  • 2. Understanding the Phases of Social Engineering
  • 3. Considering Examples of Social Engineering
  • 4. Leveraging Common Internet Sites
  • 5. Stealing Someones Identity
  • 6. Protecting Users from Social Engineering
  • 7. MODULE 4 - LESSON 2 - QUIZ.html

  • 16. MODULE 4 - LESSON 3 Denial-of-Service
  • 1. Denial-of-Service
  • 2. DoS vs. DDoS
  • 3. DoS and DDoS Attack Techniques
  • 4. DoS and DDoS Attack Tools
  • 5. DoS and DDoS Attack Defense
  • 6. MODULE 4 - LESSON 3 - QUIZ.html

  • 17. MODULE 4 - LESSON 4 Session Hijacking
  • 1. Session Hijacking
  • 2. Understanding Session Hijacking
  • 3. Application Level Session Hijacking
  • 4. Network Level Session Hijacking
  • 5. Session Hijacking Tools
  • 6. Session Hijacking Countermeasures
  • 7. MODULE 4 - LESSON 4 - QUIZ.html

  • 18. MODULE 4 - LESSON 5 - Evading Security Measures
  • 1. Evading Security Measures
  • 2. Overview of IDS Sensors, Firewalls, and Honeypots
  • 3. IDS Sensor and Firewall Evasion
  • 4. Preventing IDS Sensor and Firewall Evasion
  • 5. Detecting Honeypots
  • 6. MODULE 4 - LESSON 5 - QUIZ.html

  • 19. MODULE 5 - INTRODUCTION Web Application Hacking
  • 1. Web Application Hacking

  • 20. MODULE 5 - LESSON 1 Hacking Web Servers
  • 1. Hacking Web Servers
  • 2. Web Server Attacks
  • 3. Web Server Attack Methodology
  • 4. Web Server Attack Tools
  • 5. Web Server Attack Countermeasures
  • 6. Patch Management
  • 7. MODULE 5 - LESSON 1 - QUIZ.html

  • 21. MODULE 5 - LESSON 2 Hacking Web Applications
  • 1. Hacking Web Applications
  • 2. Web Application Threats
  • 3. Web Application Hacking Methods
  • 4. Footprint Web Infrastructure
  • 5. Analyze Web Applications
  • 6. Bypassing Client-Side Controls
  • 7. Authentication Mechanisms
  • 8. Authorization Schemes
  • 9. Access Controls
  • 10. Session Management Mechanism
  • 11. Injection Attacks
  • 12. Application Logic Flaws
  • 13. Shared Environments
  • 14. Database Connectivity
  • 15. Web Application Clients
  • 16. Web Services
  • 17. Web Application Security
  • 18. MODULE 5 - LESSON 2 - QUIZ.html

  • 22. MODULE 5 - LESSON 3 SQL Injection
  • 1. SQL Injection
  • 2. Types of SQL Injection
  • 3. SQL Injection Methodology
  • 4. SQL Injection Tools
  • 5. SQL Injection Evasion Techniques
  • 6. SQL Injection Countermeasures
  • 7. MODULE 5 - LESSON 3 - QUIZ.html

  • 23. MODULE 6 - INTRODUCTION Wireless Network Hacking
  • 1. Wireless Network Hacking

  • 24. MODULE 6 - LESSON 1 Hacking Wireless Networks
  • 1. Hacking Wireless Networks
  • 2. Wireless Standards
  • 3. Wireless Authentication and Encryption
  • 4. Types of Wireless Antennas
  • 5. Wireless Threats
  • 6. Wireless Hacking Tools and Methodology
  • 7. Bluetooth Hacking
  • 8. Wireless Hacking Countermeasures
  • 9. MODULE 6 - LESSON 1 - QUIZ.html

  • 25. MODULE 7 - INTRODUCTION Mobile, IoT and OT Hacking
  • 1. Mobile, IoT and OT Hacking

  • 26. MODULE 7 - LESSON 1 Mobile Platform Hacking
  • 1. Mobile Platform Hacking
  • 2. Mobile Attack Vectors
  • 3. Hacking Android OS
  • 4. Hacking iOS
  • 5. Mobile Device Management
  • 6. Mobile Security Guidelines and Tools
  • 7. MODULE 7 - LESSON 1 - QUIZ.html

  • 27. MODULE 7 - LESSON 2 IoT Hacking
  • 1. IoT Hacking
  • 2. IoT Attacks
  • 3. IoT Hacking Methodology
  • 4. IoT Hacking Tools
  • 5. IoT Hacking Countermeasures
  • 6. MODULE 7 - LESSON 2 - QUIZ.html

  • 28. MODULE 7 - LESSON 3 OT Hacking
  • 1. OT Hacking
  • 2. OT Attacks
  • 3. OT Hacking Methodology and Tools
  • 4. OT Hacking Countermeasures
  • 5. MODULE 7 - LESSON 3 - QUIZ.html

  • 29. MODULE 8 - INTRODUCTION Cloud Computing
  • 1. Cloud Computing

  • 30. MODULE 8 - LESSON 1 Cloud Computing Security
  • 1. Cloud Computing Security
  • 2. Cloud Service Models
  • 3. Cloud Deployment Models
  • 4. Separation of Cloud Responsibilities
  • 5. NIST Cloud Deployment Reference Architecture
  • 6. Container Technology
  • 7. Serverless Computing
  • 8. Cloud Computing Threats
  • 9. Cloud Hacking
  • 10. Cloud Security
  • 11. MODULE 8 - LESSON 1 - QUIZ.html

  • 31. MODULE 9 - INTRODUCTION Cryptography
  • 1. Cryptography

  • 32. MODULE 9 - LESSON 1 Foundations of Cryptography
  • 1. Foundations of Cryptography
  • 2. Cryptography Basics
  • 3. Cryptography Tools
  • 4. Public Key Infrastructure (PKI)
  • 5. Email Encryption
  • 6. Disk Encryption
  • 7. Cryptographic Attacks
  • 8. Cryptographic Attack Countermeasures
  • 9. MODULE 9 - LESSON 1 - QUIZ.html

  • 33. Course Wrap-Up
  • 1. Course Wrap-Up
  • 189,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 39267
    حجم: 7134 مگابایت
    مدت زمان: 1042 دقیقه
    تاریخ انتشار: ۲۹ تیر ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    189,000 تومان
    افزودن به سبد خرید