نویسنده: Hide Zero One

CEH is a great place to start your career in Cyber Security, but you are required to have some requisite knowledge before getting into CEH. It’s recommended you have a minimum of 2 Years IT Security experience before attempting the C|EH. If you don’t have the experience and you are just getting started on this path, we recommend taking our Free Cyber Security Essentials Series, find more

Syllabus

1 . Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. loT and OT Hacking
19. Cloud Computing
20. Cryptography

EC-Council: Certified Ethical Hacker (CEH v12)

ادامه مطلب

EC-Council’s Hacking Forensic Investigator (C|HFI) is the only comprehensive ANSI accredited, lab-focused program on the market that gives organizations vendor-neutral training in digital forensics. C|HFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital  forensics and evidence analysis that also pivots around the Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

ادامه مطلب

EC-Council’s Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals. Understand, Exploit, And Defend Yourself Against Topmost Web Vulnerabilities With A Comprehensive Hands-On, Lab-Based, Guided, Mastery Course Designed By The Team That Brought You CEH

  • Advanced Web Application Penetration Testing
  • Advanced SQL Injection (SQLi)
  • Reflected, Stored and DOM-based Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF) – GET and POST Methods
  • Server-Side Request Forgery (SSRF)
  • Security Misconfigurations
  • Directory Browsing/Bruteforcing
  • CMS Vulnerability Scanning
  • Network Scanning
  • Auth Bypass
  • Web App Enumeration
  • Dictionary Attack
  • Insecure Direct Object Reference Prevention (IDOR)
  • Broken Access Control
  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Arbitrary File Download
  • Arbitrary File Upload
  • Using Components with Known Vulnerabilities
  • Command Injection
  • Remote Code Execution
  • File Tampering
  • Privilege Escalation
  • Log Poisoning
  • Weak SSL Ciphers
  • Cookie Modification
  • Source Code Analysis
  • HTTP Header modification
  • Session Fixation
  • Clickjacking

EC-Council Web Application Hacking and Security

ادامه مطلب

SEC595 provides students with a crash-course introduction to practical data science, statistics, probability, and machine learning. The course is structured as a series of short discussions with extensive hands-on labs that help students to develop useful intuitive understandings of how these concepts relate and can be used to solve real-world problems. If you’ve never done anything with data science or machine learning but want to use these techniques, this is definitely the course for you! 30 Hands-on Labs

Syllabus

SEC595.1: Data Acquisition, Cleaning, and Manipulation
SEC595.2: Data Exploration and Statistics
SEC595.3: Essentials of Machine Learning
SEC595.4: Essentials of Machine Learning
SEC595.5: Essentials of Machine Learning
SEC595.6: Essentials of Machine Learning

SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

ادامه مطلب

The ability to perform digital investigations and incident response is a critical skill for many occupations. Unfortunately, digital investigators frequently lack the training or experience to take advantage of the volatile artifacts found in physical memory. Volatile memory contains valuable information about the runtime state of the system, provides the ability to link artifacts from traditional forensic analysis (network, file system, registry), and provides the ability to ascertain investigative leads that have been unbeknownst to most analysts. Malicious adversaries have been leveraging this knowledge disparity to undermine many aspects of the digital investigation process with such things as anti-forensics techniques, memory resident malware, kernel rootkits, and encryption (file systems, network traffic, etc.). The only way to turn-the-tables and defeat a creative digital human adversary is through talented analysts.

This course demonstrates why memory forensics is a critical component of the digital investigation process and how investigators can gain the upper hand. The course will consist of lectures on specific topics in Windows, Linux, and Mac OS X memory forensics followed by intense hands-on exercises to put the topics into real world contexts. Our goal is to give you practical experience with all the major facets of memory analysis. For example, you’ll defeat disk encryption, recover cached passwords, investigate insider theft, compliment network forensics with data you find in memory, and hunt for attackers throughout corporate networks. We still leave enough room for detecting common RATs and hacker tools, reversing packed/compressed malicious code, and generating timelines from memory. You’ll even customize your own automated memory artifact scanner and engage in a fast-paced, challenging CTF that involves corroborating evidence across multiple memory samples (i.e., Windows PCs, Linux servers).

Memory Analysis: Malware and Memory Forensics Training

ادامه مطلب