Certified Ethical Hacker (CEH), 4th Edition

دوره Certified Ethical Hacker (CEH), 4th Edition یکی از دوره‌های امنیتی در زمینه نفوذ به شبکه بوده و هدف آن آشنایی افراد با متدهای نفوذ به شبکه است. شرکت‌کنندگان در این دوره می‌توانند با به کارگیری انواع متدهایی که آموخته‌اند، امنیت یک شرکت یا سازمان را تا حد زیادی افزایش دهند. شما چگونگی “کشف آسیب پذیری‌ها و حفره‌های موجود در سیستم هدف با استفاده از معلومات و ابزارهای یک هکر کلاه سیاه“ را به صورت قدم به قدم آموزش می‌دهد.

لینک دانلود دوره آموزشی Certified Ethical Hacker (CEH), 4th Edition

 

حجم: 2.9 گیگابایت

دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم

  • Copyright 2024
  • Edition: 4st
  • Price: $549.99
  • ISBN-10: 013539564X
  • ISBN-13: 978-0-13-835797-9
  • By: Omar Santos / Nick Garner
  • Published by Pearson IT Certification – Addison-Wesley Professional

Introduction
Certified Ethical Hacker (CEH): Introduction
Lesson 1: Introduction to Ethical Hacking
Learning objectives
1.1 Introducing Information Security and Cybersecurity
1.2 Understanding the Cyber Kill Chain and Hacking Concepts
1.3 Surveying Ethical Hacking Methodologies
1.4 Undertanding Information Security Controls
1.5 Understanding Security Laws and Standards
1.6 Planning and Scoping a Penetration Testing Assessment
1.7 Building Your Own Hacking Lab with WebSploit Labs
Lesson 2: Footprinting and Reconnaissance
Learning objectives
2.1 Understanding Information Gathering and Vulnerability Identification
2.2 Introducing Open Source Intelligence (OSINT) Techniques
2.3 Exploring Footprinting Methodologies
2.4 Utilizing Search Engines for Footprinting
2.5 Footprinting Web Services
2.6 Exploiting Social Networking Sites for Footprinting
2.7 Surveying Password Dumps, File Metadata, and Public Source-code Repositories
2.9 Implementing DNS Footprinting
2.10 Executing Network Footprinting
2.11 Applying Social Engineering for Footprinting
2.12 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools
2.13 Identifying Cloud vs. Self-hosted Assets
Lesson 3: Scanning Networks
Learning objectives
3.1 Surveying Network Scanning Concepts
3.2 Exploiting Scanning Tools
3.3 Understanding Host Discovery
3.4 Performing Website and Web Application Reconnaissance
3.5 Performing OS Discovery (Banner Grabbing/OS Fingerprinting)
3.6 Scanning Beyond IDS and Firewall
3.7 Creating Network Diagrams
3.8 Discovering Cloud Assets
3.9 Crafting Packets with Scapy to Perform Reconnaissance
Lesson 4: Enumeration
Learning objectives
4.1 Introducing Enumeration Techniques
4.2 Performing NetBIOS Enumeration
4.3 Performing SNMP Enumeration
4.4 Performing LDAP Enumeration
4.5 Performing NTP and NFS Enumeration
4.6 Performing SMTP and DNS Enumeration
4.7 Conducting Additional Enumeration Techniques
4.8 Surveying Enumeration Countermeasures
Lesson 5: Vulnerability Analysis
Learning objectives
5.1 Understanding Vulnerability Assessment Concepts
5.2 Classifying and Assessing Vulnerability Types
5.3 Utilizing Vulnerability Assessment Tools
5.4 Generating Vulnerability Assessment Reports
Lesson 6: System Hacking
Learning objectives
6.1 Understanding System Hacking Concepts
6.2 Gaining System Access
6.3 Cracking Passwords
6.4 Exploiting Known and Zero-Day Vulnerabilities
6.5 Escalating Privileges
6.6 Maintaining Access, Command and Control, and Exfiltration
6.7 Executing Applications
6.8 Hiding Files
6.9 Clearing Logs
6.10 Performing On-Path Attacks
6.11 Introduction to Lateral Movement and Exfiltration
6.12 Understanding Post-Engagement Cleanup
Lesson 7: Malware Threats
Learning objectives
7.1 Understanding Malware Concepts
7.2 Comprehending APT Concepts
7.3 Grasping Trojan Concepts
7.4 Exploring Virus and Worm Concepts
7.5 Examining Fileless Malware and Living off the Land Techniques
7.6 Analyzing Malware
7.7 Implementing Malware Countermeasures
Lesson 8: Sniffing
Learning objectives
8.1 Introducing Sniffing Concepts
8.2 Performing MAC Attacks
8.3 Conducting DHCP Attacks
8.4 Performing ARP Poisoning
8.5 Performing Spoofing Attacks
8.6 Performing DNS Poisoning
8.7 Surveying Sniffing Tools
8.8 Exploring Sniffing Countermeasures and Detection Techniques
Lesson 9: Social Engineering
Learning objectives
9.1 Introducing Social Engineering Concepts and Techniques
9.2 Understanding the Insider Threat
9.3 Impersonation on Social Networking Sites
9.4 Understanding Identity Theft
9.5 Understanding Social Engineering Countermeasures
Lesson 10: Denial-of-Service
Learning objectives
10.1 Introducing DoS/DDoS Concepts and Attack Techniques
10.2 Defining what are Botnets
10.3 Exploring DDoS Case Studies
10.4 Surveying DoS/DDoS Attack Tools
10.5 Understanding DoS/DDoS Countermeasures and Protection Tools
Lesson 11: Session Hijacking
Learning objectives
11.1 Introducing Session Hijacking Concepts
11.2 Performing Application Level Session Hijacking
11.3 Understanding Network Level Session Hijacking
11.4 Surveying Session Hijacking Tools
11.5 Understanding Session Hijacking Countermeasures
Lesson 12: Evading IDS, Firewalls, and Honeypots
Learning objectives
12.1 Introducing IDS, IPS, Firewall, and Honeypot Concepts
12.2 Exploring IDS, IPS, Firewall, and Honeypot Solutions
12.3 Evading IDS and Firewalls
12.4 Surveying IDS/Firewall Evading Tools
12.5 Detecting Honeypots and Sandboxes
12.6 Understanding IDS/Firewall Evasion Countermeasures
Lesson 13: Hacking Web Servers
Learning objectives
13.1 Introducing Web Server Concepts
13.2 Exploring Web Server Attacks
13.3 Surveying Web Server Attack Methodologies
13.4 Understanding Web Server Countermeasures
13.5 Understanding Patch Management
Lesson 14: Hacking Web Applications
Learning objectives
14.1 Understanding Web App Concepts and Identifying Web App Threats
14.2 Exploring the OWASP Top 10 for Web Applications
14.3 Applying Web App Hacking Methodologies and Footprinting Web Infrastructure
14.4 Analyzing Web Applications and Bypassing Client-Side Controls
14.5 Attacking Authentication Mechanisms
14.6 Attacking Session Management Mechanisms
14.7 Exploiting Authorization Schemes and Access Controls Flaws
14.8 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
14.9 Understanding Server-side Request Forgery (SSRF) Vulnerabilities
14.10 Exploiting Buffer Overflows and Creating Payloads
14.11 Attacking Application Logic Flaws and Shared Environments
14.12 Attacking Database Connectivity and Web App Clients
14.13 Attacking Web Services, Exploiting Web APIs, Webhooks, and Web Shells
14.14 Ensuring Web App Security
Lesson 15: SQL Injection
Learning objectives
15.1 Introducing SQL Injection Concepts
15.2 Understanding the Types of SQL Injection
15.3 Exploring the SQL Injection Methodologies
15.4 Exploring SQL Injection Tools
15.5 Exploring SQL Injection Evasion Techniques
15.6 Understanding SQL Injection Countermeasures

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.