Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

The Complete Ethical Hacker Certification Exam Prep Course

Posted By: ELK1nG
The Complete Ethical Hacker Certification Exam Prep Course

The Complete Ethical Hacker Certification Exam Prep Course
Last updated 3/2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.78 GB | Duration: 16h 17m

This Course WILL provide EVERYTHING Needed to allow you to Pass your Ethical Hacking Exam v11

What you'll learn
Master the topics needed to pass the Certified Ethical Hacker Exam from EC-Council.
Discover the why behind security administrators’ work and secure your corporate and/or home-based network.
Build your career towards becoming a professional penetration tester.
Get paid for providing a valuable service for companies with sensitive data.
Requirements
You should have a fundamental working knowledge of computers and basic experience doing system administration or help desk work to succeed in this course. You should be familiar with standards system administrator concepts such as firewalls, antiviruses, intrusion detection systems, and access control lists.
In this course, I’ll help you install the necessary software on your computer. If you prefer, you can use the Online Lab in your browser to complete the assignments in this course.
I’ll use mostly Windows as our base operating system in this course. While we do have a section on Linux in the course, I will not delve too deeply into it. That’s because in my teaching experience, students generally find it easier to use tools in an operating system they are familiar with before moving on to a new platform such as Linux.
The ideal student should be passionate and inquisitive about learning new technologies and diving into hands-on projects.
Description
If you are curious about new technologies and passionate about jump-starting your career as an ethical hacker, then this course is for you!  The Complete Ethical Hacker Certification Exam Prep Course[1] gives you a solid foundation in all the topics you need to master to pass the Ethical Hacker Certification [1] Exam. Dive into hands-on projects, and defend yourself from would-be-attackers. This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe.    In this course, you will: Learn the business and technical logistics behind penetration testingIdentify evolving threats from different types of hackersReveal shocking truths about the information operating systems can divulgeRealize the power of footprinting on the InternetDetect live systems by inferenceGet by a step-by-step, no-nonsense introduction to cryptographyIdentify differences between vulnerability assessments and penetration testsMaster ways to prevent and disable system hackingProtect yourself from malware, including Trojans, backdoor, viruses, and moreThwart hackers attacking wireless networks and mobile devicesUnderstand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewallsImplement countermeasures to stop SQL injections and other database attacksAnd more!Along the way, you’ll also watch 15+ special instructor demos and take 15 practice quizzes featuring over 700 exam questions. More than any other course on Udemy!  IT's like buying 2 courses for the price of one! Each question comes with a carefully crafted explanation of why each answer choice is right or wrong. Set yourself up for success by working towards exam mastery: I highly encourage you to work through these questions at your own pace to test your knowledge.Take a look at the many students who have already used this course to ACE their Ethical Hacker Exam.  Don't take my word for it, ask questions to them directly in the forums.               Just as Brayden and many others did…               Do you want to pass on your first attempt?               I did. So I did what Tim told me and I just got my Certification today!!               Thanks, Instructor TIM! This course made all the difference.Why Learn Ethical HackingA growing number of companies today seek ethical hackers to protect their most sensitive information. A very few days go by without breaking news, revealing break-ins, security breaches, and massive quantities of data stolen from major business organizations. Companies that house this data are the ones most at risk: therefore, ethical hacking as a certified course has quickly become one of the most sought-after qualifications in multiple industries including government, banking, research and development, retail, real estate, healthcare, and more. Learn an in-demand skill while making the world a safer place. You’ll also find that ethical hacking is a surefire way to increase your income and work towards professional development. Why Learn From MeThe ethical hacking landscape is huge and not for the faint of heart. To become a successful ethical hacker, you don’t just need the knowledge to pass the  [Certified] Ethical Hacker (TM) [1]  exam; you also need the real-world skills to excel as a practicing security professional. That’s why this course has been so carefully crafted; I have distilled my 35 years of experience as a technical trainer, consultant, and pen tester into this course material. I have personally taught my Ethical Hacker Exam prep course in person well over 300 times and have developed a course containing the spot-on knowledge of the required skill sets necessary to pass the exam. Whether you take a defensive approach against the would-be attacker or whether you wish to become a penetration tester yourself, the Ethical Hacker exam is designed to assess the tools that are in your security toolbox. If you commit the time and effort to master the concepts covered and complete the assignments and quizzes, you will set yourself up for exam day success.I took a lighthearted approach during the course–just like I do in my regular classes–to make the course more interesting and humorous for you. I greatly enjoy hearing from my students and hope to hear about your success in the future. Preparing for an upcoming exam date? Make sure to check out the “So You’re Ready to Take Your Test” lecture to gain insights on how to answer questions more accurately–even if you’re not sure of the answer.  By the end of the course, you’ll have everything you need to ace the Ethical Hacker Certification [1] exam and hopefully encourage new students to take this course. I look forward to sharing my knowledge with you.Join me on this journey, and enroll in the course today.References:  [1] "Certified Ethical Hacker" and "CEH" are Registered Trademarks of EC-Council, Note: "Ethical Hacker" is not a registered trademark.This course prepares you to take the Certified Ethical Hacker v11 Exam from EC Council.

Overview

Section 1: Opening Section

Lecture 1 Orientation

Lecture 2 Purpose of this Course

Section 2: Build Your Lab - In the Future We will offer an Online Solution

Lecture 3 Create A VeraCrypt Container to Protect Your Laptop or Desktop

Lecture 4 Utilities, Cheat Sheets, Various Items You really only Want to Download Once

Lecture 5 Build a Manual Lab 01

Lecture 6 Lab Legalities

Lecture 7 Housekeeping

Lecture 8 Getting to Know Your XPAttacker VM

Lecture 9 Getting to Know Your Win2k VM

Lecture 10 Getting to Know You Win7 VM

Lecture 11 Getting to Know Your Win2k3-AD

Lecture 12 Getting to Know Your WebApp

Lecture 13 Putting Our Lab Together Step By Step

Lecture 14 Tying everything together in our Lab

Section 3: Ethical Hacking Overview

Lecture 15 Introduction to Pentesting and Ethical Hacking

Lecture 16 Teaser-How Hackers Obtain Serial Numbers Even VMware Workstation Pro

Lecture 17 Defintion of a Penetration Test

Lecture 18 The Evolving Threat

Lecture 19 The Vulnerabilty Lifecycle

Lecture 20 Map.Norsecorp.com

Lecture 21 Botnet Definition

Lecture 22 Defense in Depth

Lecture 23 MetaData

Lecture 24 Types of PenTests

Lecture 25 Types of Hackers

Lecture 26 Common Definitions

Lecture 27 Hacker vs. Penetration Tester

Lecture 28 Penetration Testing Terminology

Lecture 29 Essential Terminology

Lecture 30 OSSTMM Methodology

Lecture 31 Tools vs Technique

Lecture 32 Things are not always as they seem

Lecture 33 Calculating Risk & Formulas

Lecture 34 Analyzing Findings

Lecture 35 Calculating SLE, ARO, ALE

Lecture 36 Other Penetration Testing Methodologies

Section 4: FootPrinting - Reconnaissance and Information Gathering

Lecture 37 Introduction to Footprinting

Lecture 38 What Information is Gathered by the Hacker

Lecture 39 Methods of Obtaining Information And Physical Access

Lecture 40 Social Access

Lecture 41 Digital Access

Lecture 42 Passive vs Active Reconnaissance

Lecture 43 Footprinting Defined

Lecture 44 Exercise: Footprinting Tool: Maltego

Lecture 45 Most Powerful Hacking Tool on the Internet Today

Lecture 46 Instructor Demonstration - The Power of Google -A

Lecture 47 Instructor Demonstration - The Power of Google -B

Lecture 48 Instructor Demo: GoogleAlerts

Lecture 49 Removing Searchable Content

Lecture 50 Internet Archive: The WayBack Machine

Lecture 51 Domain Name Registration-WhoIs Information

Lecture 52 Instructor Demonstation - CentralOps

Lecture 53 DNS Databases

Lecture 54 Traceroute Operation

Lecture 55 InstructorDemonstration: Online Tools

Lecture 56 Spokeo - No Refuge for the Wealthy

Lecture 57 Netcraft, DoaminsbyProxy, Countermeasures

Section 5: Linux Overview

Lecture 58 Introduction to Linux

Lecture 59 Linux History - Linus + Minux = Linux

Lecture 60 Linux GUI Desktops

Lecture 61 Linux Shell Linux Bash Shell

Lecture 62 Passwd & Shadow File Formats

Lecture 63 InstructorDemo:User Account Management

Lecture 64 Tarballs & Zips & Installing VMware Tools

Lecture 65 Compiling Programs in Linux, Shell Shock, Poodle Vulnerability

Lecture 66 Most Popular Linux Security Distribution

Section 6: Detecting Live Systems - Port Scanning

Lecture 67 Introduction to Port Scanning

Lecture 68 Introduction to Port Scanning

Lecture 69 TCP/IP Stack

Lecture 70 TCP 3-Way HandShake

Lecture 71 NMap ServiceVersion Detection And Demo

Lecture 72 Instructor Demonstration-Engage, NmapScans

Lecture 73 Hping3, NMap -O

Lecture 74 Fuzzy Logic

Lecture 75 Countermeasures: Scanning

Section 7: Enumeration - What Can We Get For Free?

Lecture 76 Intro to Enumeration

Lecture 77 Grabbing Banners

Lecture 78 Shodan

Lecture 79 ZoneTransfers

Lecture 80 SNMP Enumeration.

Lecture 81 SNMP Countermeasures, AD and AD Countermeasures

Lecture 82 Null Sessions

Section 8: Cryptography

Lecture 83 Intro Into Cryptography

Lecture 84 Beginings of Cryptography

Lecture 85 Implementation, Stream Cipher, Block Cipher and the Enigima

Lecture 86 Asymetric Encryption, Hybrid Encryption, Comparison of Algorithims, Key Exchange

Lecture 87 Hashing, Hashing Collisions, Common Hash Algorithms

Lecture 88 Ransomware

Lecture 89 IPSec and SSH

Lecture 90 PKI Applications, Quantum Crypto and VeraCrypt

Section 9: Malware - Sofware Goes Undercover

Lecture 91 Introduction to Malware and How The Internet Makes Money

Lecture 92 Things that make the World Go Around - Well as far as the Internet is concerned

Lecture 93 Trojans and Back Doors

Lecture 94 Defining Malware: Viruses and Worms

Lecture 95 Defining Malware: Spyware

Lecture 96 Data Loss Prevention (DLP) and other Creepy things

Lecture 97 Distributing Malware

Lecture 98 Malware Capabilities

Lecture 99 Auto Starting Malware

Lecture 100 Tool: Netcat

Lecture 101 Demo: NetCat Procedure

Lecture 102 Executable Wrappers

Lecture 103 Instructor Demo: Executeable Wrappers 1

Lecture 104 Instructor Demo: Executeable Wrappers 2

Lecture 105 Malware Avoiding Detection

Lecture 106 Malware Countermeasures 1

Lecture 107 Malware Countermeasures 2

Section 10: System Hacking

Lecture 108 Introduction to System Hacking Introduction

Lecture 109 Types of Password Attacks, Keystroke Loggers

Lecture 110 Password Guessing Online

Lecture 111 Cracking Windows Passwords - A

Lecture 112 Cracking Windows Passwords - B

Lecture 113 Cracking Windows Passwords - C

Lecture 114 Cracking Windows Passwords - D

Lecture 115 Cracking Windows Passwords - E

Lecture 116 Countermeasures: Stealing the Passwords, Syskey, Salting

Lecture 117 Cloud Cracking Techniques

Lecture 118 Generating Rainbow Tables, Free Rainbow Tables

Lecture 119 Password Hash Insertion Attack

Lecture 120 Demonstration MimiKatz

Lecture 121 Privilege Escalation, Countermeasures

Lecture 122 Covering Tracks, Disable Auditing, Clearing the Event Log

Lecture 123 Alternate Data Streams Demonstration - A

Lecture 124 Alternate Data Streams Demonstration - B

Lecture 125 Alternate Data Streams Demonstration - C

Lecture 126 Anonymizers - JAP

Lecture 127 Steganography

Lecture 128 Virtually Complete Secrecy, TOR

Lecture 129 RootKits - Overview

Lecture 130 RootKits - Frightening Demo

Lecture 131 Root Kit Countermeasures, Tokens and Smart Cards

Section 11: Advanced Hacking and Explotiation Techniques

Lecture 132 Introduction to Advanced System Explotation

Lecture 133 How do Exploits Work?

Lecture 134 Buffer Over Flows Introduction I do when Speaking at a Conference

Lecture 135 Processors and Stacks

Lecture 136 Basic Types of Buffer Overflows And Demo 01

Lecture 137 Basic Types of Buffer Overflows And Demo 02

Lecture 138 Basic Types of Buffer Overflows And Demo 03

Lecture 139 Stages of Exploit Development

Lecture 140 Buffer Overflow Prevention

Lecture 141 The Metasploit Project

Lecture 142 Core Impact Overview

Lecture 143 Core Impact Demo with Narrative Comments

Section 12: Attacking Databases

Lecture 144 Introduction to Database Management Systems

Lecture 145 Overview of Databases, Types of Databases, Relations of Databases

Lecture 146 View of DBMS, Injecting a DBMS, Why SQL Injection, SQL Connection Properties

Lecture 147 SQL Injection Types, Stored Procedures, Shutdown, Locating SQL, Sensitive Info

Lecture 148 Hardening SQL Server

Lecture 149 SQL Injection Demo 1

Lecture 150 SQL Injection Demo 2

Lecture 151 SQL Injection Demo 3

Section 13: Attacking Wireless Networks and Mobile Phones

Lecture 152 Introduction to WiFi and Mobile Hacking

Lecture 153 WiFiNetwork Types, Widely Deployed Standards, A, B, G, 802.11n - MIMO, 802.11ac,

Lecture 154 802.11n - MIMO, 802.11ac, SSID, MAC Filtering, WEP, Weak IV Packets

Lecture 155 XOR Basics, WEP Weaknesses

Lecture 156 TKIP, WPA vs WEP, WPA MIC Vulnerabilty, WPA-PSK Encryption

Lecture 157 Kismet, Aircrack-ng, Aireplay

Lecture 158 EAP Types, EAP Advantages/DisAdvantages, Typical Wired/Wireless Network

Lecture 159 Exercise/Assignment; Cracking WPA/WPA2 Password Preparation

Lecture 160 Exercise/Assignment; Cracking WPA/WPA2 Password - Solution

Section 14: Networks - Sniffing, ARP Poisioning, and Breaking SSL

Lecture 161 Introduction to Sniffing

Lecture 162 Packet Sniffers, PCap & WinPcap, Wireshark, TCP Reassembly, Packetyzer

Lecture 163 TCP Dump & WinDump, Network Miner Wildpackets, Cain and Able, Passive Sniffing

Lecture 164 Active Sniffing & Methods, Switch Table Flooding

Lecture 165 Arp Cache Posioning

Lecture 166 Arp Cache Posioning Tools and Countermeasures

Lecture 167 Breaking SSL Traffic, Intercepting VoIP, Routing Protocols, RDP, Passwords and M

Lecture 168 Exercise/Assignment Breaking SSL - Preparation

Lecture 169 Exercise/Assignment Breaking SSL - Solution

Section 15: Firewalls, IDS and IPS and some New Age Protection

Lecture 170 Introduction tp Firewalls, IDS and IPS WAF

Lecture 171 Firewall - Your First Line of Defense

Lecture 172 IDS Your Second Line of Defense

Lecture 173 Web Application Firewall and Evasion Techniques'

Lecture 174 Behavioural Firewalls and IPS Systems

Section 16: Attacking Web Technologies

Lecture 175 Introduction to Web Application

Lecture 176 Common Security Threats, Need for Monitoring, SANS Seven MGT Errors

Lecture 177 Anatomy of a Web Attack, Web Attack Techniques, Typical Web App Componets

Lecture 178 Logs Cancanolization and Other Attacks

Lecture 179 Web App Scanner, HTTrack,HTTPrint, Proxies

Lecture 180 Directory Traversal & Other Common Vulnerabilties

Lecture 181 XSS Demo and Countermeasures

Lecture 182 Common Ways to Attack Web Technologies, Cross Site Scripting (XSS)

Lecture 183 Cross Site Request Forgery

Lecture 184 Cookies and Session Management

Lecture 185 OWASP Top 10

Section 17: So Your Ready To Take Your Test

Lecture 186 So your Ready To Take Your Test 1?

Lecture 187 So Your Ready To Take Your Test 2?

Section 18: Bonus Section

Lecture 188 Backing Up our Veracrypt Storage Enclosure for Saftey

Anyone who wants to pass the Certified Ethical Hacker Exam and become responsible for securing a home or enterprise network,This course is a good fit for aspiring professional pen testers–including system administrators or IT professionals interested in making a career change. Current professional pen testers will be too advanced for this course.,This course is best suited for those who operate with or have privileged access in their company’s network. You’ll learn about the latest security vulnerabilities and how to protect your assets.,People who are interested in hands-on learning and developing their own protection solutions will benefit the most from this course. If you’re the type of person who likes taking things apart to see how they work, then you’ll love this course.