Download ITProTV – Certified Ethical Hacker (CEH) v.12 2022-11

Description

Certified Ethical Hacker (CEH) course v.12. It is designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. Vulnerability assessments are designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. have Vulnerability assessments

What you’ll learn in the CompTIA A+ Core 2 (1102-220) course

  • Tactics and methods
  • Common hostile behaviors
  • Concepts of threat hunting
  • Risk and risk management
  • Cyber ​​threat information
  • Threat modeling
  • Incident management and response
  • Concepts of footprints
  • Google Dorks
  • Shodan And Censys
  • Count subdomains
  • Recon social networks
  • Work board review
  • Recon Deep Dark Web
  • Email tracking
  • WHOIS and DNS Recon
  • Recon social engineering
  • Types of network scanning
  • Network scanning tools
  • Discover the host
  • Port and scan services
  • TCP connection scan
  • Secret scan
  • XMAS and Maimon TCP reverse scan
  • ACK Scan
  • IDLE IPID SCAN
  • UDP scan
  • And …

CompTIA A+ Core 2 course specifications (220-1102)

  • Publisher: ITProTV
  • teacher: Kill Chain
  • Training level: beginner to advanced
  • Training duration: 48 hours and 17 minutes
  • Number of courses: 138

Course headings

Intro to Ethical Hacking

  1. Course Overview
  2. Basic Cybersecurity Concepts
  3. The Attacker Motives and Objectives
  4. Attack Categories
  5. Information Warfare
  6. Cyber ​​Kill Chain
  7. Tactics Techniques And Procedures
  8. Common Adversarial Behaviors
  9. Threat Hunting Concepts
  10. Risk And Risk Management
  11. Cyber ​​Threat Intelligence
  12. Threat Modeling
  13. Incident Management Handling And Response
  14. ML And AI
  15. Standards And Regulations
  16. CEH Hacking Methodology
  17. MITER ATT&CK Framework
  18. Diamond Model Of Intrusion Analysis

RECON TECHNIQUES – FOOTPRINTING AND RECON

  1. Footprinting Concepts
  2. Google Dorks
  3. Shodan And Censys
  4. Sub-Domain Enumeration
  5. Social Networking Recon
  6. Job Board Recon
  7. Deep-Dark Web Recon
  8. Email Tracking
  9. WHOIS And DNS Recon
  10. Social Engineering Recon
  11. Other Footprinting Tools
  12. Footprinting And Recon Countermeasures

RECON TECHNIQUES – SCANNING

Course images

Sample video of the course

Installation guide

After Extract, view with your favorite Player.

English subtitle

Quality: 1080p

download link

Download part 1 – 5 GB

Download part 2 – 5 GB

Download part 3 – 5 GB

Download part 4-5 GB

Download part 5 – 5 GB

Download part 6 – 5 GB

Download part 7 – 5 GB

Download part 8 – 5 GB

Download part 9 – 3.51 GB

File(s) password: www.downloadly.ir

Size

43.5 GB

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top