Torrent details for "EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 14-20. 2022 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
1.22 GB
Info Hash:
96db054bb07ea854b6e05419f2605b6cd0d64897
Added By:
Added:  
31-12-2022 14:38
Views:
456
Health:
Seeds:
4
Leechers:
0
Completed:
341
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

The C|EH v12 training program includes 20 modules covering various technologies, tactics,
and procedures, providing prospective ethical hackers with the core knowledge needed to
thrive in cybersecurity. Delivered through a carefully curated training plan that typically
spans five days, the 12th version of the C|EH continues to evolve to keep up with the
latest OS, exploits, tools, and techniques. The concepts covered in the training program
are split 50/50 between knowledge-based training and hands-on application through our
cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab
technology, every participant will have comprehensive hands-on practice to learn and apply
their knowledge.”
Module 14. Hacking Web Applications
Learn about web application attacks, including a comprehensive web
application hacking methodology used to audit vulnerabilities in web
applications and countermeasures.
Module 15. SQL Injection
Learn about SQL injection attacks, evasion techniques, and SQL
injection countermeasures.
Module 16. Hacking Wireless Networks
Understand different types of wireless technologies, including
encryption, threats, hacking methodologies, hacking tools, Wi-Fi
sedcurity tools, and countermeasures.
Module 17. Hacking Mobile Platforms
Learn Mobile platform attack vector, android and iOS hacking, mobile
device management, mobile security guidelines, and security tools.
Module 18. IoT Hacking
Learn different types of IoT and OT attacks, hacking methodology,
hacking tools, and countermeasures.
Module 19. Cloud Computing
Learn different cloud computing concepts, such as container technologies
and server less computing, various cloud computing threats, attacks,
hacking methodology, and cloud security techniques and tools.
Module 20. Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes