Ethical Hacking به معنای استفاده از ابزارها، روشها و تکنیکهایی میباشد که توسط آنها حفرهها و نقاط آسیبپذیر شبکه یا نرم افزار یا سیستم هدف را از دید امنیتی کشف می کنیم. سپس اقداماتی در جهت امن سازی و برطرف کردن این آسیب پذیری ها انجام میدهیم تا فرد دیگری نتواند از آنها مخالف منافع ما و شرکت و یا سازمان ما سوء استفاده کند. دوره Ethical Hacking Essentials (EHE) محصول شرکت EC-Council می باشد که شامل کتاب آموزشی PDF و 15 ساعت ویدئو آموزشی می باشد.
لینک دانلود کتاب و ویدئو آموزشی EC-Council Ethical Hacking Essentials (EHE)
حجم: 5.4 گیگابایت
دانلود – PDF
دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
دانلود – بخش چهارم
دانلود – بخش پنجم
دانلود – بخش ششم
رمز فايل: technet24.ir
Date: 2021
Publisher: EC-Council
Format: MP4 + PDF
Ethical Hacking Essentials (EHE)
Learn the fundamentals of ethical hacking and penetration testing and prepare for a career in cybersecurity.
Course Overview
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.
This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.
EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.
What You Will Learn
Fundamentals of information security and ethical hacking
Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
Password cracking techniques, tools, and countermeasures
Social engineering concepts, its phases, techniques, and countermeasures
Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
Wireless encryption, attacks, and countermeasures
Mobile, IoT, and OT attacks, and countermeasures
Cloud computing threats and countermeasures
Penetration testing fundamentals, its benefits, strategies, and phase
Course Syllabus
Module 1 – Information Security Fundamentals
Module 2 – Ethical Hacking Fundamentals
Module 3 – Information Security Threats and Vulnerability Assessment
Module 4 – Password Cracking Techniques and Countermeasures
Module 5 – Social Engineering Techniques and Countermeasures
Module 6 – Network Level Attacks and Countermeasures
Module 7 – Web Application Attacks and Countermeasures
Module 8 – Wireless Attacks and Countermeasures
Module 9 – Mobile Attacks and Countermeasures
Module 10 – IOT & OT Attacks and Countermeasures
Module 11 – Cloud Computing Threats and Countermeasures
Module 12 – Penetration Testing Fundamentals
عااللیییی