Für diesen Artikel ist leider kein Bild verfügbar.

Certified Ethical Hacker Complete Video Course, 3rd Edition

Software / Digital Media
2022 | CEH
Pearson Education (US) (Hersteller)
978-0-13-744679-7 (ISBN)
Preis auf Anfrage
  • Titel nicht im Sortiment
  • Artikel merken
13+ Hours of Video Instruction


Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam.


Overview:
The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help you better understand the world of hacking so you can act to defend attacks, as well as pass the CEH exam.


This complete video course is your full resource for passing the CEH exam. Included are real-world demos and labs so you can see how to use tools, tactics, exploits, and technologies using Parrot Security OS. You also will find step-by-step examples of security penetration testing methodologies and concepts for each topic covered in the exam.

Topics include
* Information security, cybersecurity, and ethical hacking overview
* Reconnaissance techniques
* Network and perimeter hacking
* Web application hacking
* Wireless, mobile, IoT, and OT hacking
* Cloud computing and cryptography


Skill level:
Intermediate


Learn How To
* Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware
* Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration
* Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access
* Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications
* Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors
* Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms


Who Should Take This Course:
* Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam
* Anyone interested in becoming a cybersecurity professional
* Anyone interested in ethical hacking (penetration testing)


Course Requirements:
Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience.


About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.


Video Lessons are available for download for offline viewing within the streaming format. Look for the green arrow in each lesson.

Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cybersecurity vulnerabilities. He is the author of several cybersecurity books and video courses. You can obtain additional information about Omar's projects at omarsantos.io and h4cker.org. Nick Garner, CCIE No. 17871, is a solutions integration architect for Cisco. He has been in Cisco advanced services supporting customers in both transactional and subscription engagements for eight years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside data center routing and switching designs is security and multicast.

Module 1: Information Security, Cybersecurity, and Ethical Hacking Overview
Lesson 1 Introduction to Ethical Hacking
1.1 Introducing Information Security and Cybersecurity
1.2 Understanding the Cyber Kill Chain and Hacking Concepts
1.3 Surveying Ethical Hacking Methodologies
1.4 Understanding Information Security Controls, Laws, and Standards
Module 2: Reconnaissance Techniques
Lesson 2 Footprinting and Reconnaissance
2.1 Introducing Footprinting Concepts and Methodologies
2.2 Performing Footprinting through Search Engines
2.3 Performing Footprinting through Web Services
2.4 Performing Footprinting through Social Networking Sites
2.5 Understanding Website Footprinting
2.6 Understanding Email Footprinting
2.7 Understanding Whois Footprinting
2.8 Understanding DNS Footprinting
2.9 Understanding Network Footprinting
2.10 Performing Footprinting through Social Engineering
2.11 Surveying Footprinting Tools
2.12 Understanding Footprinting Countermeasures
Lesson 3 Scanning Networks
3.1 Surveying Network Scanning Concepts
3.2 Exploiting Scanning Tools
3.3 Understanding Host Discovery
3.4 Understanding Port and Service Discovery
3.5 Performing OS Discovery (Banner Grabbing/OS Fingerprinting)
3.6 Scanning Beyond IDS and Firewall
3.7 Creating Network Diagrams
Lesson 4 Enumeration
4.1 Introducing Enumeration Techniques
4.2 Performing NetBIOS Enumeration
4.3 Performing SNMP Enumeration
4.4 Performing LDAP Enumeration
4.5 Performing NTP and NFS Enumeration
4.6 Performing SMTP and DNS Enumeration
4.7 Conducting Additional Enumeration Techniques
4.8 Surveying Enumeration Countermeasures
Module 3: Network and Perimeter Hacking
Lesson 5 Sniffing
5.1 Introducing Sniffing Concepts
5.2 Performing MAC Attacks
5.3 Conducting DHCP Attacks
5.4 Performing ARP Poisoning
5.5 Performing Spoofing Attacks
5.6 Performing DNS Poisoning
5.7 Surveying Sniffing Tools
5.8 Exploring Sniffing Countermeasures and Detection Techniques
Lesson 6 Social Engineering
6.1 Introducing Social Engineering Concepts
6.2 Exploring Social Engineering Techniques
6.3 Understanding the Insider Threat
6.4 Impersonation on Social Networking Sites
6.5 Understanding Identity Theft
6.6 Understanding Social Engineering Countermeasures
Lesson 7 Denial-of-Service
7.1 Introduction DoS/DDoS Concepts and Attack Techniques
7.2 Defining what are Botnets
7.3 Exploring DDoS Case Studies
7.4 Surveying DoS/DDoS Attack Tools
7.5 Understand DoS/DDoS Countermeasures and Protection Tools
Lesson 8 Session Hijacking
8.1 Introducing Session Hijacking Concepts
8.2 Understanding Application Level Session Hijacking
8.3 Understanding Network Level Session Hijacking
8.4 Surveying Session Hijacking Tools
8.5 Understanding Session Hijacking Countermeasures
Lesson 9 Evading IDS, Firewalls, and Honeypots
9.1 Introducing IDS, IPS, Firewall, and Honeypot Concepts
9.2 Exploring IDS, IPS, Firewall, and Honeypot Solutions
9.3 Evading IDS and Firewalls
9.4 Surveying IDS/Firewall Evading Tools
9.5 Detecting Honeypots
9.6 Understanding IDS/Firewall Evasion Countermeasures
Module 4: Web Application Hacking
Lesson 10 Hacking Web Servers
10.1 Introducing Web Server Concepts
10.2 Exploring Web Server Attacks and Methodologies
10.3 Surveying Web Server Attack Tools
10.4 Understanding Web Server Countermeasures
10.5 Understanding Patch Management
10.6 Surveying Web Server Security Tools
Lesson 11 Hacking Web Applications
11.1 Introducing Web Application Concepts
11.2 Understanding Web App Threats and Hacking Methodologies
11.3 Footprinting Web Infrastructures
11.4 Analyzing Web Applications
11.5 Bypassing Client-Side Controls
11.6 Attacking Authentication Mechanism
11.7 Attacking Authorization Schemes
11.8 Attacking Access Controls
11.9 Attacking Session Management Mechanism
11.10 Performing Injection Attacks
11.11 Attacking Application Logic Flaws
11.12 Attacking Shared Environments
11.13 Attacking Database Connectivity
11.14 Attacking Web App Client
11.15 Attacking Web Services, APIs, and Understanding Webhooks
Lesson 12 SQL Injection
12.1 Introducing SQL Injection Concepts
12.2 Understanding the Types of SQL Injection
12.3 Exploring the SQL Injection Methodologies
12.4 Exploring SQL Injection Tools
12.5 Exploring Evasion Techniques
12.6 Understanding SQL Injection Countermeasures
Module 5: Wireless, Mobile, IoT, and OT Hacking
Lesson 13 Hacking Wireless Networks
13.1 Introducing Wireless Concepts
13.2 Understanding Wireless Encryption
13.3 Exploring Wireless Threats
13.4 Understanding Wireless Hacking Methodologies
13.5 Surveying Wireless Hacking Tools
13.6 Hacking Bluetooth
13.7 Introducing Wireless Countermeasures
Lesson 14 Hacking Mobile Platforms
14.1 Understanding Mobile Platform Attack Vectors
14.2 Hacking iOS
14.3 Hacking Android OS
14.4 Understanding Mobile Device Management
14.5 Surveying Mobile Security Guidelines and Tools
Lesson 15 IoT and OT Hacking
15.1 Introducing IoT Concepts
15.2 Understanding IoT Attacks
15.3 Understanding IoT Hacking Methodologies
15.4 Surveying IoT Hacking Tools
15.5 Understanding IoT Countermeasures
15.6 Introducing OT Concepts
15.7 Performing OT Attacks
15.8 Understanding OT Hacking Methodologies
15.9 Surveying OT Hacking Tools
15.10 Understanding OT Countermeasures
Module 6: Cloud Computing and Cryptography
Lesson 16 Cloud Computing
16.1 Introducing Cloud Computing Concepts
16.2 Exploring Container Technology
16.3 Understanding Serverless Computing
16.4 Surveying Cloud Computing Threats
16.5 Understanding Cloud Hacking and Cloud Security Implementations
Lesson 17 Cryptography
17.1 Introducing Cryptography Concepts
17.2 Understanding the Different Encryption Algorithms
17.3 Surveying Cryptography Tools
17.4 Understanding Public Key Infrastructure (PKI)
17.5 Understanding Email Encryption
17.6 Understanding Disk Encryption
17.7 Introducing Cryptanalysis and Countermeasures

Erscheint lt. Verlag 30.4.2022
Verlagsort Upper Saddle River
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Zertifizierung
ISBN-10 0-13-744679-9 / 0137446799
ISBN-13 978-0-13-744679-7 / 9780137446797
Zustand Neuware
Haben Sie eine Frage zum Produkt?