A propos de ce cours
##What you will learn
You will learn the following domains of ethical hacking
Information Security and Ethical Hacking Overview
Reconnaissance Techniques
System Hacking Phases and Attack Techniques
Network and Perimeter Hacking
Web Application Hacking
Wireless Network Hacking
Mobile Platform, IoT, and OT Hacking
Cloud Computing
Cryptography
Experience
No ethical hacking experience is required for this series, but it is recommended that you possess a strong understanding of TCP/IP and operating systems and have at least one year of experience working with networking technologies.
Commentaires (0)
1. Course Overview
1 Parties
1. Course Overview
4.74 MB
02. Comparing Wireless Terminologies
10 Parties
01. The Method to My Madness
2.77 MB
02. CEH Exam Study Tips
15.45 MB
03. Key Terms
14.31 MB
04. Advantages and Disadvantages
8.18 MB
05. Types of Wi-Fi Networks
2.43 MB
06. Standards
14.58 MB
07. Wi-Fi Authentication Modes
3.56 MB
08. Chalking
8.42 MB
09. Antenna Types
13.83 MB
10. Learning Check
2.59 MB
3. Summarizing Wireless Encryption
7 Parties
1. WEP Encryption
7.85 MB
2. WPA and WPA2 Encryption
14.13 MB
3. WPA3 - The New Kid on the Block
7.04 MB
4. Breaking Encryption
9.73 MB
5. Defense Measures
3.08 MB
6. Demo - Examining the Encryption Options
10.11 MB
7. Learning Check
2.14 MB
4. Appraising Wireless Threats
6 Parties
1. Type of Attacks
16.09 MB
2. Demo - WarDriving
109.97 MB
3. Access Point Attacks
7.58 MB
4. Demo - Looking Known Networks
4.55 MB
5. Client Attacks
11.19 MB
6. Learning Check
2.90 MB
05. Illustrating the Wireless Attack Methodology
13 Parties
01. Step 1 - Discovery
7.11 MB
02. Demo - Finding WPS-enabled APs
8.75 MB
03. Step 2 - GPS Mapping
46.26 MB
04. Step 3 - Wireless Traffic Analysis
8.23 MB
05. Demo - Using Your Phone and Wi-Fi Analyzer
4.43 MB
06. Step 4 - Launching an Attack
2.45 MB
07. Demo - Finding Hidden SSIDs
4.61 MB
08. Evil Twin Attacks
3.42 MB
09. Demo - Evil Twins
24.72 MB
10. Wi-Jacking Attack
3.15 MB
11. Step 5 - Cracking Encryption
1.95 MB
12. Demo - Cracking WPA Using Aircrack-ng
23.04 MB
13. Learning Check
2.67 MB
6. Explaining Bluetooth Hacking
5 Parties
1. Explaining Bluetooth
4.22 MB
2. Methods of Attack
6.46 MB
3. Bluetooth Threats
2.38 MB
4. Demo - Using BluetoothView to Scan for Devices
10.33 MB
5. Learning Check
1.93 MB
7. Distinguishing Wireless Countermeasures
7 Parties
1. The Six Layers of Security
3.15 MB
2. Defending WPAs
4.44 MB
3. Stopping KRACK and aLTEr Attacks
2.59 MB
4. Countermeasures for Rogue APs
1.87 MB
5. Overall Best Practices
4.31 MB
6. Bluetooth Attack Countermeasures
2.64 MB
7. Learning Check
8.15 MB
8. Domain Summary
1 Parties
1. Domain Summary
5.05 MB
0
0 Avis