(CEH(EC Council Certified Ethical Hacker v11.0

(CEH(EC Council Certified Ethical Hacker v11.0

  • بررسی نقاط ضعف و آسیب پذیری های شبکه
  • مبانی نفوذ به شبکه های کامپیوتری و بدست آوردن اطلاعات
  • تشریح حملات و مکانیزم های رایج نفوذ

توضیحات

·         NTFS Alternate Data Streams Exploit

·         Steganography with OpenPuff

·         Steganography with SNOW

·         Covering Tracks

·         Malware Overview

·         Trojan Overview

·         Creating a Trojan

·         Virus Overview

·         Virus Creation

·         Detecting Malware

·         Malware Analysis

·         Hash File Verification

·         Sniffing Overview

·         CAM Table Attack and Port Security

·         DHCP Snooping

·         Dynamic ARP Inspection (DAI)

·         Social Engineering

·         Denial of Service (DoS) Attacks

·         Session Hijacking

·         Hacking Web Servers

·         Buffer Overflow

·         OWASP Broken Web Application Project

·         Shellshock

·         SQL Introduction

·         SQL Injection

·         Wireless Hacking

·         Firewall Evasion

·         Firewall ACL Example

·         NAT and PAT fundamentals

·         IDS IPS Evasion

·         Honeypots

·         Cloud Computing

·         CIA Confidentiality, Integrity, and Availability

·         Policies

·         Quantifying Risk

·         Separation of Duties

·         Symmetrical Encryption Concepts

·         Asymmetrical Encryption Concepts

·         Control Types

·         Multifactor Authentication

·         Centralized Identity Management

·         Kerberos and Single Sign On (SSO)

·         Backups and Media Management

·         Operations Security Controls

·         Physical Security Controls

·         Incident Response

·         VPNs

·         Disaster Recovery Planning

 

·         What is CEH all about

·         Building a LAB Networking

·         Deploy a Kali Linux VM

·         Adding Metasploitable to Your Lab

·         Adding Windows to Your Lab

·         Configure a Static IP on Kali

·         Deploy Windows OS

·         Ethics and Hacking

·         Hacking Vocabulary

·         InfoSec Concepts

·         Attack Categories, Types, and Vectors

·         5 Phases of Hacking

·         Footprinting and Reconnaissance Concepts

·         Search Engine Tools

·         Hacking using Google

·         Website Recon Tools

·         Metagoofil Metadata Tool

·         Email Headers for Footprinting

·         Using WHOIS for Recon

·         DNS Tools

·         Network Scanning Overview

·         Network Scanning Methodology

·         Port Discovery

·         Network Scanning Tools

·         Stealth Idle Scanning

·         OS and Application Fingerprinting

·         Vulnerability Scanning

·         Network Mapping Tools

·         Proxy Servers

·         Using Public Proxy Services

·         Enumeration Concepts

·         NetBIOS Enumeration

·         SNMP Enumeration Concepts

·         SNMP Enumeration Tools

·         LDAP Enumeration Concepts

·         LDAP Enumeration Example

·         NTP Enumeration

·         SMTP Enumeration

·         System Hacking Overview

·         Password Cracking Concepts

·         Password Attack Example MITM and Sniffing

·         Rainbow Crack Lab Setup

·         Rainbow Crack Demonstration

·         Password Reset Hacking

·         DHCP Starvation

·         Remote Access

·         Spyware

توضیحات تکمیلی

عنوان فارسی

دوره هکر قانونمند (CEH)

کد دوره

I9102

مدت زمان دوره

40 ساعت

پیش نیاز های دوره

Network+

مخاطبان دوره

داوطلبان آزمون EC-Council, علاقه مندان به مباحث Hack, کارشناسان IT

دیدگاهها

هیچ دیدگاهی برای این محصول نوشته نشده است.


اولین نفری باشید که دیدگاهی را ارسال می کنید برای “(CEH(EC Council Certified Ethical Hacker v11.0”

به سبد خرید اضافه شد.:
ثبت نام