Torrent details for "EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 8-13. 2022 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
981.01 MB
Info Hash:
acc7e536380c4d51c8b21e8400e0dc46b9679c2e
Added By:
Added:  
31-12-2022 14:41
Views:
613
Health:
Seeds:
6
Leechers:
0
Completed:
581
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

The C|EH v12 training program includes 20 modules covering various technologies, tactics,
and procedures, providing prospective ethical hackers with the core knowledge needed to
thrive in cybersecurity. Delivered through a carefully curated training plan that typically
spans five days, the 12th version of the C|EH continues to evolve to keep up with the
latest OS, exploits, tools, and techniques. The concepts covered in the training program
are split 50/50 between knowledge-based training and hands-on application through our
cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab
technology, every participant will have comprehensive hands-on practice to learn and apply
their knowledge.”
Module 08. Sniffing
Learn about packet-sniffing techniques and how to use them to discover
network vulnerabilities, as well as countermeasures to defend against
sniffing attacks.
Module 09. Social Engineering
Learn social engineering concepts and techniques, including how to
identify theft attempts, audit human-level vulnerabilities, and suggest
social engineering countermeasures.
Module 10. Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS
(DDoS) attack techniques, as well as the tools used to audit a target and
devise DoS and DDoS countermeasures and protections.
Module 11. Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures.
Module 12. Evading IDS, Firewalls, and Honeypots
Get introduced to firewall, intrusion detection system (IDS), and
honeypot evasion techniques the tools used to audit a network
perimeter for weaknesses and countermeasures.
Module 13. Hacking Web Servers
Learn about web server attacks, including a comprehensive attack
methodology used to audit vulnerabilities in web server infrastructures
and countermeasures

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes