CEH is a great place to start your career in Cyber Security, but you are required to have some requisite knowledge before getting into CEH. It’s recommended you have a minimum of 2 Years IT Security experience before attempting the C|EH. If you don’t have the experience and you are just getting started on this path, we recommend taking our Free Cyber Security Essentials Series, find more

Syllabus

1 . Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. loT and OT Hacking
19. Cloud Computing
20. Cryptography

EC-Council: Certified Ethical Hacker (CEH v12)

ادامه مطلب

EC-Council’s Hacking Forensic Investigator (C|HFI) is the only comprehensive ANSI accredited, lab-focused program on the market that gives organizations vendor-neutral training in digital forensics. C|HFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital  forensics and evidence analysis that also pivots around the Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

Syllabus

Module 01: Computer Forensics in Today’s World

Module 02: Computer Forensics Investigation Process

Module 03: Understanding Hard Disks and File Systems

Module 04: Data Acquisition and Duplication

Module 05: Defeating Anti-Forensics Techniques

Module 06: Windows Forensics

Module 07: Linux and Mac Forensics

Module 08: Network Forensics

Module 09: Investigating Web Attacks

Module 10: Dark Web Forensics

Module 11: Database Forensics

Module 12: Cloud Forensics

Module 13: Investigating Email Crimes

Module 14: Malware Forensics

Module 15: Mobile Forensics

Module 16: IoT Forensics

EC-Council: Computer Hacking Forensic Investigator (CHFI v10)

ادامه مطلب

EC-Council’s Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals. Understand, Exploit, And Defend Yourself Against Topmost Web Vulnerabilities With A Comprehensive Hands-On, Lab-Based, Guided, Mastery Course Designed By The Team That Brought You CEH

  • Advanced Web Application Penetration Testing
  • Advanced SQL Injection (SQLi)
  • Reflected, Stored and DOM-based Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF) – GET and POST Methods
  • Server-Side Request Forgery (SSRF)
  • Security Misconfigurations
  • Directory Browsing/Bruteforcing
  • CMS Vulnerability Scanning
  • Network Scanning
  • Auth Bypass
  • Web App Enumeration
  • Dictionary Attack
  • Insecure Direct Object Reference Prevention (IDOR)
  • Broken Access Control
  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Arbitrary File Download
  • Arbitrary File Upload
  • Using Components with Known Vulnerabilities
  • Command Injection
  • Remote Code Execution
  • File Tampering
  • Privilege Escalation
  • Log Poisoning
  • Weak SSL Ciphers
  • Cookie Modification
  • Source Code Analysis
  • HTTP Header modification
  • Session Fixation
  • Clickjacking

EC-Council Web Application Hacking and Security

ادامه مطلب

SEC595 provides students with a crash-course introduction to practical data science, statistics, probability, and machine learning. The course is structured as a series of short discussions with extensive hands-on labs that help students to develop useful intuitive understandings of how these concepts relate and can be used to solve real-world problems. If you’ve never done anything with data science or machine learning but want to use these techniques, this is definitely the course for you! 30 Hands-on Labs

Syllabus

SEC595.1: Data Acquisition, Cleaning, and Manipulation
SEC595.2: Data Exploration and Statistics
SEC595.3: Essentials of Machine Learning
SEC595.4: Essentials of Machine Learning
SEC595.5: Essentials of Machine Learning
SEC595.6: Essentials of Machine Learning

SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

ادامه مطلب

The ability to perform digital investigations and incident response is a critical skill for many occupations. Unfortunately, digital investigators frequently lack the training or experience to take advantage of the volatile artifacts found in physical memory. Volatile memory contains valuable information about the runtime state of the system, provides the ability to link artifacts from traditional forensic analysis (network, file system, registry), and provides the ability to ascertain investigative leads that have been unbeknownst to most analysts. Malicious adversaries have been leveraging this knowledge disparity to undermine many aspects of the digital investigation process with such things as anti-forensics techniques, memory resident malware, kernel rootkits, and encryption (file systems, network traffic, etc.). The only way to turn-the-tables and defeat a creative digital human adversary is through talented analysts.

This course demonstrates why memory forensics is a critical component of the digital investigation process and how investigators can gain the upper hand. The course will consist of lectures on specific topics in Windows, Linux, and Mac OS X memory forensics followed by intense hands-on exercises to put the topics into real world contexts. Our goal is to give you practical experience with all the major facets of memory analysis. For example, you’ll defeat disk encryption, recover cached passwords, investigate insider theft, compliment network forensics with data you find in memory, and hunt for attackers throughout corporate networks. We still leave enough room for detecting common RATs and hacker tools, reversing packed/compressed malicious code, and generating timelines from memory. You’ll even customize your own automated memory artifact scanner and engage in a fast-paced, challenging CTF that involves corroborating evidence across multiple memory samples (i.e., Windows PCs, Linux servers).

Memory Analysis: Malware and Memory Forensics Training

ادامه مطلب