A propos de ce cours
##What you will learn
You will learn the following domains of ethical hacking
Information Security and Ethical Hacking Overview
Reconnaissance Techniques
System Hacking Phases and Attack Techniques
Network and Perimeter Hacking
Web Application Hacking
Wireless Network Hacking
Mobile Platform, IoT, and OT Hacking
Cloud Computing
Cryptography
Experience
No ethical hacking experience is required for this series, but it is recommended that you possess a strong understanding of TCP/IP and operating systems and have at least one year of experience working with networking technologies.
Commentaires (0)
1. Course Overview
1 Parties
1. Course Overview
4.56 MB
2. Discovering Mobile Platform Attack Vectors
6 Parties
1. Laying a Foundation
2.38 MB
2. CEH Exam Study Tips
5.71 MB
3. Top 10 Risks for Mobile Devices
14.20 MB
4. Attack Vectors and Vulnerabilities
13.08 MB
5. Agent Smith, SS7, and Simjacking
7.16 MB
6. Learning Check
2.33 MB
3. Investigating Android Devices
8 Parties
1. Android Security
13.67 MB
2. Rooting
7.30 MB
3. Demo - Hacking a Device Using PhoneSploit
18.07 MB
4. Other Hacking Techniques
7.13 MB
5. Demo - Analyzing a Suspicious App
22.39 MB
6. Demo - Using Fing to Identify devices
6.46 MB
7. Locking Down Android Devices
10.34 MB
8. Learning Check
1.93 MB
4. Explaining iOS Devices Weaknesses
5 Parties
1. iOS Architecture
4.82 MB
2. Jailbreaking
3.52 MB
3. Types of Jailbreaking
4.78 MB
4. Securing Apples Platform
4.19 MB
5. Learning Check
2.46 MB
5. Outlining Mobile Device Management (MDM)
5 Parties
1. What MDM Can Offer
5.84 MB
2. BYOD (Bring Your Own Device)
8.14 MB
3. Implementing a BYOD Policy
8.70 MB
4. Demo - Miradore
8.06 MB
5. Learning Check
1.64 MB
6. Pointing Out Security Guidelines
4 Parties
1. OWASP Top 10 Mobile Controls
13.64 MB
2. Continuing OWASP Top 10 Mobile Controls
8.87 MB
3. Mobile Control Guidelines
13.86 MB
4. Learning Check
8.73 MB
7. Domain Summary
1 Parties
1. Domain Summary
2.24 MB
0
0 Avis