دسته: EC-Council

EC-Council’s Certified Penetration Testing Professional program teaches you how to perform an effective penetration testing in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, C|PENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

ادامه مطلب

Certified Network Defender v2 [CND v2] has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. is a network security course designed to help organizations create and deploy the most comprehensive network defense system.

ادامه مطلب

The EC-Council Certified Ethical Hacker (CEH) v13 course is designed to build expertise in ethical hacking methodologies, focusing on key areas like network security, threat intelligence, vulnerability assessment, and hacking techniques. With hands-on labs and real-world scenarios, the course prepares cybersecurity professionals to think like hackers, enabling them to protect networks effectively. The updated v13 covers critical areas such as malware threats, cloud security, and IoT. Ideal for cybersecurity roles, CEH v13 is globally recognized and equips participants with essential tools for safeguarding information systems.

ادامه مطلب

EC-Council’s Hacking Forensic Investigator (C|HFI) is the only comprehensive ANSI accredited, lab-focused program on the market that gives organizations vendor-neutral training in digital forensics. C|HFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital  forensics and evidence analysis that also pivots around the Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

ادامه مطلب

EC-Council’s Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals. Understand, Exploit, And Defend Yourself Against Topmost Web Vulnerabilities With A Comprehensive Hands-On, Lab-Based, Guided, Mastery Course Designed By The Team That Brought You CEH

  • Advanced Web Application Penetration Testing
  • Advanced SQL Injection (SQLi)
  • Reflected, Stored and DOM-based Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF) – GET and POST Methods
  • Server-Side Request Forgery (SSRF)
  • Security Misconfigurations
  • Directory Browsing/Bruteforcing
  • CMS Vulnerability Scanning
  • Network Scanning
  • Auth Bypass
  • Web App Enumeration
  • Dictionary Attack
  • Insecure Direct Object Reference Prevention (IDOR)
  • Broken Access Control
  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Arbitrary File Download
  • Arbitrary File Upload
  • Using Components with Known Vulnerabilities
  • Command Injection
  • Remote Code Execution
  • File Tampering
  • Privilege Escalation
  • Log Poisoning
  • Weak SSL Ciphers
  • Cookie Modification
  • Source Code Analysis
  • HTTP Header modification
  • Session Fixation
  • Clickjacking

EC-Council Web Application Hacking and Security

ادامه مطلب

EC-Council Certified DevSecOps Engineer (ECDE) is a hands-on, instructor-led comprehensive DevSecOps certification program which helps professionals to build essential knowledge and abilities in designing, developing, maintaining a secure applications and infrastructure. This course is blended with both theoretical knowledge as well as the practical implementation of DevSecOps in your on-prem and cloud-native (AWS and Azure) environment The course covers integration and automation of all the major and widely used tools, processes, and methodologies of DevSecOps that help organizations to build secure applications rapidly in a DevOps environment

Syllabus

Module 01: Understanding DevOps Culture
Module 02: Introduction to DevSecOps
Module 03: DevSecOps Pipeline-Plan Stage
Module 04: DevSecOps Pipeline-Code Stage
Module 05: DevSecOps Pipeline-Build and Test Stage
Module 06: DevSecOps Pipeline-Release and Deploy Stage
Module 07: DevSecOps Pipeline-Operate and Monitor Stage

EC-Council: Certified DevSecOps Engineer

ادامه مطلب