(CEH(EC Council Certified Ethical Hacker v11.0
- بررسی نقاط ضعف و آسیب پذیری های شبکه
- مبانی نفوذ به شبکه های کامپیوتری و بدست آوردن اطلاعات
- تشریح حملات و مکانیزم های رایج نفوذ
- توضیحات
- توضیحات تکمیلی
- نظرات (0)
توضیحات
· NTFS Alternate Data Streams Exploit
· Steganography with OpenPuff · Steganography with SNOW · Covering Tracks · Malware Overview · Trojan Overview · Creating a Trojan · Virus Overview · Virus Creation · Detecting Malware · Malware Analysis · Hash File Verification · Sniffing Overview · CAM Table Attack and Port Security · DHCP Snooping · Dynamic ARP Inspection (DAI) · Social Engineering · Denial of Service (DoS) Attacks · Session Hijacking · Hacking Web Servers · Buffer Overflow · OWASP Broken Web Application Project · Shellshock · SQL Introduction · SQL Injection · Wireless Hacking · Firewall Evasion · Firewall ACL Example · NAT and PAT fundamentals · IDS IPS Evasion · Honeypots · Cloud Computing · CIA Confidentiality, Integrity, and Availability · Policies · Quantifying Risk · Separation of Duties · Symmetrical Encryption Concepts · Asymmetrical Encryption Concepts · Control Types · Multifactor Authentication · Centralized Identity Management · Kerberos and Single Sign On (SSO) · Backups and Media Management · Operations Security Controls · Physical Security Controls · Incident Response · VPNs · Disaster Recovery Planning |
· What is CEH all about · Building a LAB Networking · Deploy a Kali Linux VM · Adding Metasploitable to Your Lab · Adding Windows to Your Lab · Configure a Static IP on Kali · Deploy Windows OS · Ethics and Hacking · Hacking Vocabulary · InfoSec Concepts · Attack Categories, Types, and Vectors · 5 Phases of Hacking · Footprinting and Reconnaissance Concepts · Search Engine Tools · Hacking using Google · Website Recon Tools · Metagoofil Metadata Tool · Email Headers for Footprinting · Using WHOIS for Recon · DNS Tools · Network Scanning Overview · Network Scanning Methodology · Port Discovery · Network Scanning Tools · Stealth Idle Scanning · OS and Application Fingerprinting · Vulnerability Scanning · Network Mapping Tools · Proxy Servers · Using Public Proxy Services · Enumeration Concepts · NetBIOS Enumeration · SNMP Enumeration Concepts · SNMP Enumeration Tools · LDAP Enumeration Concepts · LDAP Enumeration Example · NTP Enumeration · SMTP Enumeration · System Hacking Overview · Password Cracking Concepts · Password Attack Example MITM and Sniffing · Rainbow Crack Lab Setup · Rainbow Crack Demonstration · Password Reset Hacking · DHCP Starvation · Remote Access · Spyware |
توضیحات تکمیلی
عنوان فارسی | دوره هکر قانونمند (CEH) |
---|---|
کد دوره | I9102 |
مدت زمان دوره | 40 ساعت |
پیش نیاز های دوره | Network+ |
مخاطبان دوره | داوطلبان آزمون EC-Council, علاقه مندان به مباحث Hack, کارشناسان IT |
نقد و بررسیها
هنوز بررسیای ثبت نشده است.