A propos de ce cours
##What you will learn
You will learn the following domains of ethical hacking
Information Security and Ethical Hacking Overview
Reconnaissance Techniques
System Hacking Phases and Attack Techniques
Network and Perimeter Hacking
Web Application Hacking
Wireless Network Hacking
Mobile Platform, IoT, and OT Hacking
Cloud Computing
Cryptography
Experience
No ethical hacking experience is required for this series, but it is recommended that you possess a strong understanding of TCP/IP and operating systems and have at least one year of experience working with networking technologies.
Commentaires (0)
1. Course Overview
1 Parties
1. Course Overview
4.56 MB
2. Classifying Information Security
9 Parties
1. Classifying Information Security
16.16 MB
2. CEH Exam Study Tips
7.38 MB
3. Ethical Hacking
5.15 MB
4. A Little About the CEH Program
4.38 MB
5. Whats Expected of You
4.13 MB
6. Understanding Information Security
7.92 MB
7. Types of Attacks
9.12 MB
8. The Technology Triangle
4.91 MB
9. Learning Check
2.50 MB
3. Understanding the Attackers and Their Methods
5 Parties
1. Hacking Frameworks
17.94 MB
2. Tactics, Techniques, and Procedures (TTPs)
7.24 MB
3. Adversary Behavioral Identification
10.78 MB
4. Indicators of Compromise (IoC)
5.40 MB
5. Learning Check
3.35 MB
4. Comparing Hacking and Ethical Hacking
9 Parties
1. Hacking Concepts
19.48 MB
2. Phase 1 - Reconnaissance
18.40 MB
3. Phase 2 - Scanning
6.09 MB
4. Phase 3 - Gaining Access
1.78 MB
5. Phase 4 - Maintaining Access
2.98 MB
6. Phase 5 - Clearing Tracks
2.45 MB
7. So Whats Ethical Hacking
9.54 MB
8. Lets Talk About Labs
4.97 MB
9. Learning Check
3.53 MB
05. Describing Information Security Controls
10 Parties
01. What Ethical Hackers Do
8.14 MB
02. What Is Defense in Depth
18.17 MB
03. The Levels of Defense in Depth
4.75 MB
04. What Is the Risk
2.14 MB
05. Threat Modeling
5.30 MB
06. Incident Management
6.58 MB
07. The Incident Handling and Response (IH&R)
5.48 MB
08. The Role of AI and MI
9.15 MB
09. Can AI and MI Stop Attacks
4.53 MB
10. Learning Check
3.52 MB
6. Differentiate Information Security Laws and Standards
3 Parties
1. The Basics
20.86 MB
2. GDPR and DPA
4.43 MB
3. Learning Check
12.02 MB
7. Domain Summary
1 Parties
1. Domain Summary
4.57 MB
0
0 Avis