Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition | 3.92 GB
The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help you better understand the world of hacking so you can act to defend attacks, as well as pass the CEH exam.
This complete video course is your full resource for passing the CEH exam. Included are real-world demos and labs so you can see how to use tools, tactics, exploits, and technologies using Parrot Security OS. You also will find step-by-step examples of security penetration testing methodologies and concepts for each topic covered in the exam.
Introduction
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition: Introduction
Module 1: Information Security, Cybersecurity, and Ethical Hacking Overview
Module 1: Introduction
Lesson 1: Introduction to Ethical Hacking
Learning objectives
1.1 Introducing Information Security and Cybersecurity
1.2 Understanding the Cyber Kill Chain and Hacking Concepts
1.3 Surveying Ethical Hacking Methodologies
1.4 Understanding Information Security Controls, Laws, and Standards
Module 2: Reconnaissance Techniques
Module 2: Introduction
Lesson 2: Footprinting and Reconnaissance
Learning objectives
2.1 Introducing Footprinting Concepts and Methodologies
2.2 Performing Footprinting through Search Engines
2.3 Performing Footprinting through Web Services and Websites
2.4 Performing Footprinting through Social Networking Sites
2.5 Exploring Shodan
2.6 Understanding Email Footprinting
2.7 Understanding Whois Footprinting
2.8 Understanding DNS Footprinting
2.9 Understanding Network Footprinting
2.10 Surveying Footprinting Tools
2.11 Understanding Footprinting Countermeasures
Lesson 3: Scanning Networks
Learning objectives
3.1 Surveying Network Scanning Concepts
3.2 Exploiting Scanning Tools
3.3 Understanding Host Discovery
3.4 Network Scanning Overview
3.5 Network Scanning Methods
3.6 Network Scanning Demo
3.7 Performing OS Discovery (Banner Grabbing/OS Fingerprinting)
3.8 Scanning Beyond IDS and Firewall
3.9 Creating Network Diagrams
Lesson 4: Enumeration
Learning objectives
4.1 Introducing Enumeration Techniques
4.2 Performing NetBIOS Enumeration
4.3 Performing SNMP Enumeration
4.4 Performing LDAP Enumeration
4.5 Performing NTP and NFS Enumeration
4.6 Performing SMTP and DNS Enumeration
4.7 Conducting Additional Enumeration Techniques
4.8 Surveying Enumeration Countermeasures
Module 3: Network and Perimeter Hacking
Module 3: Introduction
Lesson 5: Sniffing
Learning objectives
5.1 Introducing Sniffing Concepts
5.2 Performing MAC Attacks
5.3 Conducting DHCP Attacks
5.4 Performing ARP Poisoning
5.5 Performing Spoofing Attacks
5.6 Performing DNS Poisoning
5.7 Surveying Sniffing Tools
5.8 Exploring Sniffing Countermeasures and Detection Techniques
Lesson 6: Social Engineering
Learning objectives
6.1 Introducing Social Engineering Concepts
6.2 Exploring Social Engineering Techniques
6.3 Understanding the Insider Threat
6.4 Impersonation on Social Networking Sites
6.5 Understanding Identity Theft
6.6 Understanding Social Engineering Countermeasures
Lesson 7: Denial-of-Service
Learning objectives
7.1 Introducing DoS/DDoS Concepts and Attack Techniques
7.2 Defining what are Botnets
7.3 Exploring DDoS Case Studies
7.4 Surveying DoS/DDoS Attack Tools
7.5 Understanding DoS/DDoS Countermeasures and Protection Tools
Lesson 8: Session Hijacking
Learning objectives
8.1 Introducing Session Hijacking Concepts
8.2 Understanding Application Level Session Hijacking
8.3 Understanding Network Level Session Hijacking
8.4 Surveying Session Hijacking Tools
8.5 Understanding Session Hijacking Countermeasures
Lesson 9: Evading IDS, Firewalls, and Honeypots
Learning objectives
9.1 Introducing IDS, IPS, Firewall, and Honeypot Concepts
9.2 Exploring IDS, IPS, Firewall, and Honeypot Solutions
9.3 Evading IDS and Firewalls
9.4 Surveying IDS/Firewall Evading Tools
9.5 Detecting Honeypots and Sandboxes
Module 4: Web Application Hacking
Module 4: Introduction
Lesson 10: Hacking Web Servers
Learning objectives
10.1 Introducing Web Server Concepts
10.2 Exploring Web Server Attacks and Methodologies
10.3 Surveying Web Server Attack Tools
10.4 Understanding Patch Management
10.5 Surveying Web Server Security Tools
Lesson 11: Hacking Web Applications
Learning objectives
11.1 Introducing Web Application Concepts
11.2 Understanding Web App Threats and Hacking Methodologies
11.3 Footprinting Web Infrastructures
11.4 Analyzing Web Applications
11.5 Introducing the OWASP Top 10
11.6 Attacking Authentication, Authorization, and Access Controls - Part 1
11.7 Attacking Authentication, Authorization, and Access Controls - Part 2
11.8 Performing Command Injection Attacks
11.9 Exploiting Directory/Path Traversal Vulnerabilities
11.10 Input Validation and Sanitation
11.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities
11.12 Exploiting XML External Entities
11.13 Attacking Web Services, APIs, and Understanding Webhooks
Lesson 12: SQL Injection
Learning objectives
12.1 Introducing SQL Injection Concepts
12.2 Understanding the Types of SQL Injection
12.3 Exploring the SQL Injection Methodologies
12.4 Exploring SQL Injection Tools
12.5 Exploring Evasion Techniques
12.6 Understanding SQL Injection Countermeasures
Module 5: Wireless, Mobile, IoT, and OT Hacking
Module 5: Introduction
Lesson 13: Hacking Wireless Networks
Learning objectives
13.1 Introducing Wireless Concepts
13.2 Understanding Wireless Encryption
13.3 Exploring Wireless Threats
13.4 Understanding Wireless Hacking Methodologies
13.5 Surveying Wireless Hacking Tools
13.6 Hacking Bluetooth
13.7 Introducing Wireless Countermeasures
Lesson 14: Hacking Mobile Platforms
Learning objectives
14.1 Understanding Mobile Platform Attack Vectors
14.2 Hacking iOS
14.3 Hacking Android OS
14.4 Understanding Mobile Device Management
14.5 Surveying Mobile Security Guidelines and Tools
Lesson 15: IoT and OT Hacking
Learning objectives
15.1 Introducing IoT Concepts - Part 1
15.2 Introducing IoT Concepts - Part 2
15.3 Understanding IoT Attacks
15.4 Understanding IoT Hacking Methodologies
15.5 Surveying IoT Hacking Tools
15.6 Understanding IoT Countermeasures
15.7 Introducing OT Concepts
15.8 Performing OT Attacks
15.9 Understanding OT Hacking Methodologies
15.10 Surveying OT Hacking Tools
15.11 Understanding OT Countermeasures
Module 6: Cloud Computing and Cryptography
Module 6: Introduction
Lesson 16: Cloud Computing
Learning objectives
16.1 Introducing Cloud Computing Concepts
16.2 Introducing Agile, DevOps, and CI/CD Pipelines
16.3 Exploring Container Technology
16.4 Understanding Serverless Computing
16.5 Surveying Cloud Computing Threats
16.6 Introduction to Kubernetes
16.7 Introduction to Docker and Kubernetes Security
Lesson 17: Cryptography
Learning objectives
17.1 Introducing Cryptography Concepts
17.2 Understanding the Different Encryption Algorithms
17.3 Surveying Cryptography Tools
17.4 Understanding Public Key Infrastructure (PKI)
17.5 Understanding Email Encryption
17.6 Understanding Disk Encryption
17.7 Introducing Cryptanalysis and Countermeasures
Summary
Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition: Summary
https://www.oreilly.com/videos/certified-ethical-hacker/9780137446797/
https://nitro.download/view/6851092C30A2E3D/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part1.rar
https://nitro.download/view/CC4B4C31F898D30/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part2.rar
https://nitro.download/view/E40B27DBE408D73/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part3.rar
https://nitro.download/view/C900D225B7617CC/O%60REILLY_-_Certified_Ethical_Hacker_%28CEH%29_Complete_Video_Course%2C_3rd_Edition.part4.rar
https://rapidgator.net/file/8538e62a6d6279b1467d97364f9864b2/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part1.rar.html
https://rapidgator.net/file/88e47a613bd7d1fc2fb3b22ea55c34f1/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part2.rar.html
https://rapidgator.net/file/1584511b88f19ae95a4fd9b5279a52e6/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part3.rar.html
https://rapidgator.net/file/23f8285949f78ce2adad1542d0708ce5/O`REILLY_-_Certified_Ethical_Hacker_(CEH)_Complete_Video_Course,_3rd_Edition.part4.rar.html
https://uploadgig.com/file/download/95B29b5927f1A39a/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part1.rar
https://uploadgig.com/file/download/fec46F4280d6a5F8/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part2.rar
https://uploadgig.com/file/download/eae438f29d4143B2/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part3.rar
https://uploadgig.com/file/download/3BB2Edb8551a87d6/OREILLY%20-%20Certified%20Ethical%20Hacker%20CEH%20Complete%20Video%20Course%203rd%20Edition.part4.rar