Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
The C|EH v12 training program includes 20 modules covering various technologies, tactics,
and procedures, providing prospective ethical hackers with the core knowledge needed to
thrive in cybersecurity. Delivered through a carefully curated training plan that typically
spans five days, the 12th version of the C|EH continues to evolve to keep up with the
latest OS, exploits, tools, and techniques. The concepts covered in the training program
are split 50/50 between knowledge-based training and hands-on application through our
cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab
technology, every participant will have comprehensive hands-on practice to learn and apply
their knowledge.”
Module 02. Foot Printing and Reconnaissance
Learn how to use the latest techniques and tools to perform foot
printing and reconnaissance, a critical pre-attack phase of the ethical
hacking process.
Module 03. Scanning Networks
Learn different network scanning techniques and countermeasures.
Module 04. Enumeration
Learn various enumeration techniques, such as Border Gateway
Protocol (BGP) and Network File Sharing (NFS) exploits, and associated
countermeasures.
Module 05. Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s
network, communication infrastructure, and end systems. Different
types of vulnerability assessment and vulnerability assessment tools