Description
Certified Ethical Hacker (CEH) course v.12. It is designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. Vulnerability assessments are designed to provide the student with the knowledge and skill base necessary for their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing. have Vulnerability assessments
What you’ll learn in the CompTIA A+ Core 2 (1102-220) course
- Tactics and methods
- Common hostile behaviors
- Concepts of threat hunting
- Risk and risk management
- Cyber threat information
- Threat modeling
- Incident management and response
- Concepts of footprints
- Google Dorks
- Shodan And Censys
- Count subdomains
- Recon social networks
- Work board review
- Recon Deep Dark Web
- Email tracking
- WHOIS and DNS Recon
- Recon social engineering
- Types of network scanning
- Network scanning tools
- Discover the host
- Port and scan services
- TCP connection scan
- Secret scan
- XMAS and Maimon TCP reverse scan
- ACK Scan
- IDLE IPID SCAN
- UDP scan
- And …
CompTIA A+ Core 2 course specifications (220-1102)
- Publisher: ITProTV
- teacher: Kill Chain
- Training level: beginner to advanced
- Training duration: 48 hours and 17 minutes
- Number of courses: 138
Course headings
Intro to Ethical Hacking
- Course Overview
- Basic Cybersecurity Concepts
- The Attacker Motives and Objectives
- Attack Categories
- Information Warfare
- Cyber Kill Chain
- Tactics Techniques And Procedures
- Common Adversarial Behaviors
- Threat Hunting Concepts
- Risk And Risk Management
- Cyber Threat Intelligence
- Threat Modeling
- Incident Management Handling And Response
- ML And AI
- Standards And Regulations
- CEH Hacking Methodology
- MITER ATT&CK Framework
- Diamond Model Of Intrusion Analysis
RECON TECHNIQUES – FOOTPRINTING AND RECON
- Footprinting Concepts
- Google Dorks
- Shodan And Censys
- Sub-Domain Enumeration
- Social Networking Recon
- Job Board Recon
- Deep-Dark Web Recon
- Email Tracking
- WHOIS And DNS Recon
- Social Engineering Recon
- Other Footprinting Tools
- Footprinting And Recon Countermeasures
RECON TECHNIQUES – SCANNING
Course images
Sample video of the course
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 1080p
download link
File(s) password: www.downloadly.ir
Size
43.5 GB
Be the first to comment