EC-Council Ethical Hacking Essentials (EHE)

Ethical Hacking به معنای استفاده از ابزارها، روش‌ها و تکنیک‌هایی میباشد که توسط آنها حفره‌ها و نقاط آسیب‌پذیر شبکه یا نرم افزار یا سیستم هدف را از دید امنیتی کشف می کنیم. سپس اقداماتی در جهت امن سازی و برطرف کردن این آسیب‌ پذیری ها انجام می‌دهیم تا فرد دیگری نتواند از آنها مخالف منافع ما و شرکت و یا سازمان ما سوء استفاده کند. دوره Ethical Hacking Essentials (EHE) محصول شرکت EC-Council می باشد که شامل کتاب آموزشی PDF و 15 ساعت ویدئو آموزشی می باشد.

لینک دانلود کتاب و ویدئو آموزشی EC-Council Ethical Hacking Essentials (EHE)


حجم: 5.4 گیگابایت

دانلود – PDF
دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
دانلود – بخش چهارم
دانلود – بخش پنجم
دانلود – بخش ششم

رمز فايل:

Date: 2021
Publisher: EC-Council
Format: MP4 + PDF
Ethical Hacking Essentials (EHE)

Learn the fundamentals of ethical hacking and penetration testing and prepare for a career in cybersecurity.

Course Overview

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.

This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.

EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.

What You Will Learn

Fundamentals of information security and ethical hacking

Information security threats and vulnerabilities, types of malwares, and vulnerability assessments

Password cracking techniques, tools, and countermeasures

Social engineering concepts, its phases, techniques, and countermeasures

Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures

Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures

Wireless encryption, attacks, and countermeasures

Mobile, IoT, and OT attacks, and countermeasures

Cloud computing threats and countermeasures

Penetration testing fundamentals, its benefits, strategies, and phase

Course Syllabus

Module 1 – Information Security Fundamentals
Module 2 – Ethical Hacking Fundamentals
Module 3 – Information Security Threats and Vulnerability Assessment
Module 4 – Password Cracking Techniques and Countermeasures
Module 5 – Social Engineering Techniques and Countermeasures
Module 6 – Network Level Attacks and Countermeasures
Module 7 – Web Application Attacks and Countermeasures
Module 8 – Wireless Attacks and Countermeasures
Module 9 – Mobile Attacks and Countermeasures
Module 10 – IOT & OT Attacks and Countermeasures
Module 11 – Cloud Computing Threats and Countermeasures
Module 12 – Penetration Testing Fundamentals

دیدگاه 1
  1. آتشی نسب says



آدرس ایمیل شما منتشر نخواهد شد.