Certified Ethical Hacker (CEH) V9 Technology Course

Certified Ethical Hacker (CEH) V9 Technology Course

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 19h 39m | 3.08 GB

This series will prepare you to understand both the theoretical and practical aspects of offensive security and prepare you to obtain the CEH certification that’s regarde by both the private sector and the government when hiring security engineers and consultants.

The completed series will take you through the hacking lifecycle, from the initial research activities to the exploitation and owning of private systems and networks using diverse techniques and tools. Included in each module are questions to validate your knowledge and throughout the different demonstration labs which are easy to set up with a home computer or a laptop, you will get the experience needed to consolidate your new skills.

Topics include:

  1. Introduction To Ethical Hacking
  2. Footprinting And Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Malware Threats
  7. Sniffing
Table of Contents

Module 1 – Introduction To Ethical Hacking
1 Intro to Certified Ethical Hacker Course
2 Cyber Attacks in Real Life
3 Ethical Hacking Overview
4 Concepts and Terminology
5 InfoSec Practices

Module 2 – Footprinting And Reconnaissance
6 Course Introduction
7 Search Engines – Part 1
8 Search Engines – Part 2
9 Google Hacking
10 Websites
11 Email
12 Networking
13 Social Engineering

Module 3 – Scanning Networks
14 Introduction
15 Finding Live Systems
16 Port Scanning
17 IPS and Firewall Evasion
18 Vulnerability Scanning
19 OS Fingerprinting and Banner Grabbing
20 Network Discovery and Diagramming
21 Proxies and Anonimizers

Module 4 – Enumeration
22 Introduction to Enumeration
23 NetBIOS Enumeration
24 LDAP Enumeration
25 DNS Enumeration
26 SNMP Enumeration
27 NTP Enumeration
28 SMTP Enumeration

Module 5 – System Hacking
29 Introduction
30 System Authentication
31 Password Cracking
32 Password Cracking Lab
33 Password Reset Lab
34 Privilege Escalation
35 Executing Applications
36 Hiding Files
37 Covering Tracks

Module 6 – Malware Threats
38 Introduction
39 Trojans
40 Trojans – Lab
41 Viruses and Worms
42 Viruses and Worms – Lab
43 Malware Analysis
44 Malware Detection

Module 7 – Sniffing
45 Introduction
46 Introduction Lab
47 MAC Attacks
48 DHCP Attacks
49 ARP Poisoning
50 ARP Poisoning Lab
51 DNS Poisoning
52 MAC Spoofing