منتظر باشید

(CEH(EC Council Certified Ethical Hacker v11.0

(CEH(EC Council Certified Ethical Hacker v11.0

  • بررسی نقاط ضعف و آسیب پذیری های شبکه
  • مبانی نفوذ به شبکه های کامپیوتری و بدست آوردن اطلاعات
  • تشریح حملات و مکانیزم های رایج نفوذ

توضیحات

·         NTFS Alternate Data Streams Exploit

·         Steganography with OpenPuff

·         Steganography with SNOW

·         Covering Tracks

·         Malware Overview

·         Trojan Overview

·         Creating a Trojan

·         Virus Overview

·         Virus Creation

·         Detecting Malware

·         Malware Analysis

·         Hash File Verification

·         Sniffing Overview

·         CAM Table Attack and Port Security

·         DHCP Snooping

·         Dynamic ARP Inspection (DAI)

·         Social Engineering

·         Denial of Service (DoS) Attacks

·         Session Hijacking

·         Hacking Web Servers

·         Buffer Overflow

·         OWASP Broken Web Application Project

·         Shellshock

·         SQL Introduction

·         SQL Injection

·         Wireless Hacking

·         Firewall Evasion

·         Firewall ACL Example

·         NAT and PAT fundamentals

·         IDS IPS Evasion

·         Honeypots

·         Cloud Computing

·         CIA Confidentiality, Integrity, and Availability

·         Policies

·         Quantifying Risk

·         Separation of Duties

·         Symmetrical Encryption Concepts

·         Asymmetrical Encryption Concepts

·         Control Types

·         Multifactor Authentication

·         Centralized Identity Management

·         Kerberos and Single Sign On (SSO)

·         Backups and Media Management

·         Operations Security Controls

·         Physical Security Controls

·         Incident Response

·         VPNs

·         Disaster Recovery Planning

 

·         What is CEH all about

·         Building a LAB Networking

·         Deploy a Kali Linux VM

·         Adding Metasploitable to Your Lab

·         Adding Windows to Your Lab

·         Configure a Static IP on Kali

·         Deploy Windows OS

·         Ethics and Hacking

·         Hacking Vocabulary

·         InfoSec Concepts

·         Attack Categories, Types, and Vectors

·         5 Phases of Hacking

·         Footprinting and Reconnaissance Concepts

·         Search Engine Tools

·         Hacking using Google

·         Website Recon Tools

·         Metagoofil Metadata Tool

·         Email Headers for Footprinting

·         Using WHOIS for Recon

·         DNS Tools

·         Network Scanning Overview

·         Network Scanning Methodology

·         Port Discovery

·         Network Scanning Tools

·         Stealth Idle Scanning

·         OS and Application Fingerprinting

·         Vulnerability Scanning

·         Network Mapping Tools

·         Proxy Servers

·         Using Public Proxy Services

·         Enumeration Concepts

·         NetBIOS Enumeration

·         SNMP Enumeration Concepts

·         SNMP Enumeration Tools

·         LDAP Enumeration Concepts

·         LDAP Enumeration Example

·         NTP Enumeration

·         SMTP Enumeration

·         System Hacking Overview

·         Password Cracking Concepts

·         Password Attack Example MITM and Sniffing

·         Rainbow Crack Lab Setup

·         Rainbow Crack Demonstration

·         Password Reset Hacking

·         DHCP Starvation

·         Remote Access

·         Spyware

توضیحات تکمیلی

عنوان فارسی

دوره هکر قانونمند (CEH)

کد دوره

I9102

مدت زمان دوره

40 ساعت

پیش نیاز های دوره

Network+

مخاطبان دوره

داوطلبان آزمون EC-Council, علاقه مندان به مباحث Hack, کارشناسان IT

نقد و بررسی‌ها

هنوز بررسی‌ای ثبت نشده است.


اولین کسی باشید که دیدگاهی می نویسد “(CEH(EC Council Certified Ethical Hacker v11.0”

به سبد خرید اضافه شد.:
پرداخت