Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
The C|EH v12 training program includes 20 modules covering various technologies, tactics,
and procedures, providing prospective ethical hackers with the core knowledge needed to
thrive in cybersecurity. Delivered through a carefully curated training plan that typically
spans five days, the 12th version of the C|EH continues to evolve to keep up with the
latest OS, exploits, tools, and techniques. The concepts covered in the training program
are split 50/50 between knowledge-based training and hands-on application through our
cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab
technology, every participant will have comprehensive hands-on practice to learn and apply
their knowledge.”
Module 14. Hacking Web Applications
Learn about web application attacks, including a comprehensive web
application hacking methodology used to audit vulnerabilities in web
applications and countermeasures.
Module 15. SQL Injection
Learn about SQL injection attacks, evasion techniques, and SQL
injection countermeasures.
Module 16. Hacking Wireless Networks
Understand different types of wireless technologies, including
encryption, threats, hacking methodologies, hacking tools, Wi-Fi
sedcurity tools, and countermeasures.
Module 17. Hacking Mobile Platforms
Learn Mobile platform attack vector, android and iOS hacking, mobile
device management, mobile security guidelines, and security tools.
Module 18. IoT Hacking
Learn different types of IoT and OT attacks, hacking methodology,
hacking tools, and countermeasures.
Module 19. Cloud Computing
Learn different cloud computing concepts, such as container technologies
and server less computing, various cloud computing threats, attacks,
hacking methodology, and cloud security techniques and tools.
Module 20. Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures