Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
The C|EH v12 training program includes 20 modules covering various technologies, tactics,
and procedures, providing prospective ethical hackers with the core knowledge needed to
thrive in cybersecurity. Delivered through a carefully curated training plan that typically
spans five days, the 12th version of the C|EH continues to evolve to keep up with the
latest OS, exploits, tools, and techniques. The concepts covered in the training program
are split 50/50 between knowledge-based training and hands-on application through our
cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab
technology, every participant will have comprehensive hands-on practice to learn and apply
their knowledge.”
Module 08. Sniffing
Learn about packet-sniffing techniques and how to use them to discover
network vulnerabilities, as well as countermeasures to defend against
sniffing attacks.
Module 09. Social Engineering
Learn social engineering concepts and techniques, including how to
identify theft attempts, audit human-level vulnerabilities, and suggest
social engineering countermeasures.
Module 10. Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS
(DDoS) attack techniques, as well as the tools used to audit a target and
devise DoS and DDoS countermeasures and protections.
Module 11. Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures.
Module 12. Evading IDS, Firewalls, and Honeypots
Get introduced to firewall, intrusion detection system (IDS), and
honeypot evasion techniques the tools used to audit a network
perimeter for weaknesses and countermeasures.
Module 13. Hacking Web Servers
Learn about web server attacks, including a comprehensive attack
methodology used to audit vulnerabilities in web server infrastructures
and countermeasures