"Ethical Hacking training course"-Ref.:Udemy.com, Ethical Hacking, Network & Security, IT Security

put ads here


LEGAL INFO: We use cookies and we have affiliate and other relations with advertisers and entities whose links being published. We earn commission for valid traffic, sale etc. Advertiser/Source: UDEMY (udemy.com), ShawAcademy (ShawAcademy.co.uk), Shaw Academy Ltd (ShawAcademy.com)

Udemy Online Course, Free Coupon, Discount Code, Online Deal
"Ethical Hacking training course"-Ref.:Udemy.com
Reference: https://www.udemy.com/cbtu-ethical-hacking-course/
Advertiser: Shaw Academy Ltd
Shaw Academy Ltd
   
" Learning made easy by CBTU - gain ethical hacking skills to get CEH certified What Will I Learn? Bulding ethical hacking skills for acquiring Certified Ethical Hacker certification from Ec-council Requirements Hey - Just computer operation is enough and your zeal is the tool required to get on success yacht! Description Security is major concern for an individuals and enterprises alike. Gaining ethical skills helps one from protecting himself and his/her organization. The CEH course by EC council is organized structure of course contents and we have addressed almost all contents, technologies and tools. This course may be updated with the additional course videos as and when available and same is available for students Who is the target audience? Anyone - who is interested in their own security or someone else's. Curriculum For This Course Collapse All 98 Lectures 09:07:07 – Module 1 - Introduction to Hacking 53:12 1.1 Introduction to Hacking 10:24 1.2 Ethical hacker 04:40 1.3 Information Security Laws and Standards 10:19 1.4 Information Security 05:28 1.5 Incident Management 05:49 1.6 Data breaches and malware trends 04:40 1.7 Threat modelling 06:57 1.8 EISA, Vulnerability Assessment, VA research, info warfare 04:55 – Module 2 - Footprinting (Reconnaissance) 01:03:46 2.1 Footprinting (Reconnaissance) introduction 05:06 2.2-Fp through Search engines 03:41 2.3-Google hacking-dorking 04:59 2.4 Web crawler / Spider 08:55 2.5 Footprinting through Websites 05:16 2.6 Whois lookup 03:51 2.7 Traceroute, Looking glass server, BGP Tools 08:16 2.8 NSLookup 02:20 2.9 SNMP - Simple Network Management Protocol 07:52 2.10 Maltego - Visual link analysis tool: part 1 06:00 2.11 Recon-ng reconnaissance framework 02:20 2.12 Footprinting through email tracking 05:10 – Module 3 - Network scanning 01:19:10 3.1 Introduction to Network scanning 04:13 3.2 Network port scanning 07:00 3.3 Network scanning tools 03:24 3.4 Nmap - Network mapper - scanner 10:22 3.5 Network monitoring tools – Open source 06:00 3.6 Network monitoring tools – Commercial 07:30 3.7 Ping - Ping sweep 06:21 3.8a HPing and FPing demo on Kali Linux 03:40 3.8 HPing and FPing 03:35 3.9 Proxy Servers 1 07:54 3.10 Proxy server tools - 2 08:00 3.11 Tor project Tor proxy - (The Onion Routing) 11:11 – Module 4 - Network Enumeration 22:29 4.1 Network Enumeration introduction 04:42 4.2 Network enumeration tools 10:39 4.3 Scanning and Enumeration Countermeasures 07:08 – Module 5 - System Hacking 43:40 5.1 Hacking Methodology 06:00 5.2 Password cracking 05:36 5.8 Brute-force attack 04:09 5.15 Ophcrack - Windows password cracker 03:17 5.16 CeWL - Custom Word List generator 04:27 5.17 Crunch wordlist generator 02:35 5.18 John the Ripper 04:28 5.19 Pwdump - Password Dumper and Hash Suite 08:12 5.20 Hashcat - advanced password recovery tool 04:56 – Module 6 - Malware Trojans 27:33 6.1 Trojan horse (Trojan) introduction 08:36 6.3 Beast trojan - Remote Administration Tool (RAT) 02:37 6.4 Beast Trojan demo - Educational purpose ONLY 03:50 6.5 Process explorer 05:15 6.7 Malware countermeasures 07:15 – Module 7 - Malwares - Virus and Worms 20:11 7.1 Virus introduction 05:44 7.2 How virus works 04:05 7.4 Virus removal 02:15 7.5 Stealth techniques 03:22 7.6 Virus maker tools - bvm 04:45 – Module 8 - Packet Sniffers 23:14 8.1 - Packet Sniffers 05:46 8.2 - Wireshark 04:03 8.3 - Wireshark - demo 05:12 8.4 - Countermeasures-Sniffing 04:13 8.5 Xplico 04:00 – Module 9 - Social engineering / networking 15:23 9.1 Social engineering introduction 04:43 9.2 Social engineering techniques 07:13 9.3 Social engineering countermeasures 03:27 – Module 10 - DoS/DDoS attacks 13:13 10.1 DoS-DDoS attacks Introduction Processing.. 10.2 DoS-DDoS attack Types 03:18 10.3 DoS-DDoS attack techniques and tools 09:55 - Module 11 - SessionHijacking 34:27 11.1 Session hijacking 05:00 11.2 Cookies 04:41 11.3 Session hijacking tools 08:23 11.4-Burp Suite - Proxy 05:53 11.5-Firesheep and HTTPS Anywhere 05:12 11.6-Session hijacking - Countermeasures 05:18 - Module 12 - Hacking Web Servers 12:48 12.1 Introduction 06:41 12.2 Attack Types 06:07 - Module 13 - Hacking Web Applications 17:58 13.1 Hacking web apps Introduction Processing.. 13.2 OWASP 03:09 13.3 OWASP-Top 10 06:49 13.4 Tools and countermeasures 04:23 13.5 OWASP WebGoat 03:37 - Module 14 - SQL Injection 17:46 14.2 - SQL Injection attacks 07:17 14.3 - SQL Injection mitigation 04:46 14.4 - SQL Injection Tools 05:43 - Module 15 - Hacking Wireless networks 06:46 Fern Wifi Cracker 06:46 - Module 16 - Mobile hacking 23:04 16.1 - Mobile hacking 08:49 16.2 - Mobile hacking tools 04:49 16.3 - Mobile hacking countermeasures 05:10 16.4 - Mobile hacking tools2 04:16 - Module 18 - Cloud Computing security 19:31 18.1 Cloud Computing 08:40 18.2 Cloud Computing Security 06:30 18.3 Cloud Security Alliance (CSA) 04:21 - Module 19 - Cryptography 38:19 19.1-Cryptography 06:22 19.2-Cryptography attacks 06:20 19.3 - PKI 07:45 19.4 Cryptographic protocol 06:58 19.5 Cryptography tools 05:44 19.6 - Public-key cryptography 05:10 - Module 20 - Penetration Testing 14:37 20.1 Penetration Testing 06:41 20.2 Linux Distro for PenTest 05:34 20.3 PenTest - Reporting templates 02:22 " - Ref.: Udemy.com 


HOT DEALS
Advertiser: RoseGal, FocalPrice, 1&1 Internet Inc., Daily Steals, The iPage Affiliate Program, FashionMia, Skyscanner USA
Get It Free All Gadgets Under $2 Daily Steals Up to 95% Off! 1and1.com | Hosting, Domains, Website Services & Servers iPage site builder banner








enter coupon code here