Sale!

Mohamed Atef – The Complete Ethical Hacker Course

Original price was: ₹60,000.00.Current price is: ₹7,636.00.

-87%

Description

The Complete Ethical Hacker Course, Mohamed Atef – The Complete Ethical Hacker Course, The Complete Ethical Hacker Course download, Mohamed Atef – The Complete Ethical Hacker Course review, The Complete Ethical Hacker Course free torent
Mohamed Atef – The Complete Ethical Hacker Course
In the course, you will learn:

Key issues plaguing the information security world, incident management process, and penetration testing
Various types of foot-printing, foot-printing tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
System hacking methodology, steganography, steganalysis attacks, and covering tracks
Different types of Trojans, Trojan analysis, and Trojan countermeasures
Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
Packet sniffring techniques and how to defend against sniffring
Social Engineering techniques, identify theft, and social engineering countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Different types of webserver attacks, attack methodology, and countermeasures
SQL injection attacks and injection detection tools
Wi-Fi Hacking, wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
Various cloud computing concepts, threats, attacks, and security techniques and tools
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Various types of penetration testing, security audit, vulnerability assessment, and penetration testing road map

Make This Investment in Yourself
COURSE CURRICULUM

Materials and extra resources

 
Preview
How to get access to the students portal (3:28)

Introduction

 
Preview
CEH v10 (11:16)
 
Preview
Introduction (6:31)
 
Preview
CEH v10 Course Outline (11:16)
 
Preview
2.Is PT EH a real job (4:16)
 
Start
3.CEH Exam (6:00)

Build your lab

 
Start
4.Build your virtual lab (7:15)
 
Start
5.Download Windows ISO Images (9:38)
 
Start
6.Configure Windows VM (13:48)
 
Start
7.Download Kali Linux (10:01)
 
Start
8.Configure Kali Linux (5:41)
 
Start
9.Download OWASBWA and Metasploitable (11:36)

Get Familiar with Kali Linux

 
Start
10.Get Familiar with Kali Linux (12:34)
 
Start
11.File Management (8:58)
 
Start
12. Find,Locate (6:40)

Important Definations

 
Start
13.Essential Terminology (13:19)
 
Start
14.CIA (4:01)

Footprinting and Reconnaissance

 
Start
15.Footprinting Introduction (7:28)
 
Start
16.Footprinting and Reconnaissance (14:12)
 
Start
17.Email Harvest (9:51)
 
Start
18. Google Hacking (10:36)
 
Start
19.Metagoofil (10:18)
 
Start
20.People Search Engine (6:13)
 
Start
21.Maltego (Intelligence Tool) (8:38)
 
Start
22.Internet Archives and Alerts (7:04)

Network Scanning

 
Start
23.Network Scanning Overview (5:21)
 
Start
24.Important Scanning Defination (13:18)
 
Start
25. Network Scanning Methology (2:55)
 
Start
26.Identifying Live system (6:40)
 
Start
27.Port Scanning (14:23)
 
Start
28.Advanced Scanning Techniques (7:23)
 
Start
29.Get more information about your victim (7:15)
 
Start
30.NMAP NSE Scripts (1:40)
 
Start
31.Zenmap (5:43)
 
Start
32.Netcat (7:59)
 
Start
33.Grabbing Banner (2:24)
 
Start
34.Network Mapping (11:41)
 
Start
35.Vulnerability Scanning (13:51)

Hiding your Identity

 
Start
36.Proxy Server (9:29)
 
Start
37.Configure a local proxy (10:38)
 
Start
38.Using Public Proxy (8:28)

Enumeration

 
Start
39.Enumeration Overview (3:16)
 
Start
NetBios Enumeration (13:50)
 
Start
SNMP Enumeration (15:04)
 
Start
DNS Enumeration (4:31)
 
Start
DNS Zone Transfer (6:19)
 
Start
Enum4Linux (3:05)

System Hacking

 
Start
Introduction to System Hacking (8:23)
 
Start
Password Hacking techniques (8:50)
 
Start
Default Password (5:40)
 
Start
Important Tool (14:33)
 
Start
Cain in Action (18:22)
 
Start
Xhydra (7:33)
 
Start
SSH Cracking (3:29)
 
Start
Ncrack (8:44)
 
Start
Ncrack different OS (4:07)
 
Start
The right worldlist (4:30)
 
Start
Crunch (6:04)
 
Start
The most amazing and effect wordlsit (6:22)
 
Start
Password Reset Hack (15:57)
 
Start
Offline Password attack (5:58)

Malware Threats

 
Start
59.Introduction to Maleware (5:12)
 
Start
60.Types of Malware (10:11)
 
Start
61.Create a virus (6:25)
 
Start
62.Creating a Virus using a Tool (2:45)
 
Start
63.Creating a Trojan 1 (R) (16:40)
 
Start
64.64. Creating a Trojan 2. (R) (8:14)
 
Start
64.1 Using the Meterpreter Sessions (9:27)
 
Start
64.2 Can I Bypass the AV (4:27)

Sniffring

 
Start
65. Introduction to Sniffring (9:33)
 
Start
65.1 MITM Attack (Proof of Concept) (13:07)
 
Start
66. Enable Routing (3:37)
 
Start
67.MITM Attack using Ettercap and Xplico (9:07)
 
Start
68. Start Xplico (1:46)
 
Start
69. Ettercap and Xplico attack (9:34)
 
Start
70. DNS Spoofing 2 (10:58)
 
Start
71. DNS Spoofing attack (10:07)

Cryptography

 
Start
72. Cryptography Basics (12:15)
 
Start
73. Symmetric Encryption (7:43)
 
Start
74. Asymmetric Encryption (8:43)
 
Start
75. Digital Signature (3:14)
 
Start
76. Hash (5:21)
 
Start
77. Steganography (10:18)
 
Start
78. Cryptography Attacks (4:23)

Social Engineering

 
Start
79. Introduction to Social Engineering (3:13)
 
Start
80. Social Engineering Proof of Concept (10:02)
 
Start
81. Phishing Attack (16:17)
 
Start
82. How far you can go with SE (7:40)
 
Start
83.Vishing Attack using Fake Call (5:51)
 
Start
84. Vishing using Fake SMS (4:53)
 
Start
85. Important Countermeasures (8:29)
 
Start
86. Other SET Attack (9:11)

Denial Of Service

 
Start
87.Introduction to Denail of Service (13:31)
 
Start
88.Denial of Service Attack Demonstration 1 (10:58)
 
Start
89. Denial of Service Attack Demonstration 2 (9:14)
 
Start
90. Denial of Service Attack Demonstration 3 (6:48)
 
Start
91. Distributed Denial of Service (DDOS) (5:57)

Hacking Web Server

 
Start
92. Hacking web server (15:44)
 
Start
93.Hacking an Apache Server (11:07)
 
Start
94 . Hacking a Windows Server (5:42)
 
Start
95.Practice (1:32)
 
Start
96.Working with Exploit (4:34)
 
Start
97.MetaSploit (7:30)
 
Start
98. Armitage (2:49)
 
Start
99. Armitage in Action (7:48)
 
Start
100.Armitage Example 2 (7:38)

SQL Injection

 
Start
101.SQL Injection Introduction (2:28)
 
Start
102.What is SQL Injection (9:52)
 
Start
103.Setup your web application lab (9:54)
 
Start
104.Is the site infected with SQLI (4:47)
 
Start
105.The amazing SQLMAP (10:27)
 
Start
106.Live Example (7:04)

Important Definition for the Exam

 
Start
107.Risk Assessment (16:31)
 
Start
108.Information Asset Register (4:50)
 
Start
109.Policy and Procedure (4:13)
 
Start
110.Security in Layers (3:17)

Hacking Mobile Platform

 
Start
111.Introduction to Mobile Hacking (2:18)
 
Start
112.Setting up Your Android Platform (3:07)
 
Start
113.Creating a Fake APP-1 (8:05)
 
Start
114.Creating a Fake APP-2 (12:04)
 
Start
115.Android attack using Armitage (4:09)
 
Start
116.Stagefright Attack (9:05)

Buffer Overflow

 
Start
117.1Introduction to Buffer Overflow (13:27)
 
Start
117.How to search for Buffer Overflow (14:09)
 
Start
118. Buffer overflow 1 (48:31)
 
Start
119. Buffer overflow 2 (16:37)
 
Start
120.Buffer Overflow 3 (26:09)
 
Start
121.Another Buffer Overflow Demonstration (6:33)
 
Start
122.Practice (1:51)

Cloud Computing

 
Start
123.Introduction to Cloud Computing (3:03)
 
Start
124.IaaS vs PaaS vs SaaS (2:25)
 
Start
125.SaaS (4:24)
 
Start
126.PaaS (2:04)
 
Start
127.IaaS (1:59)
 
Start
128.Cloud Deployment (0:49)
 
Start
129.Private Cloud (3:03)
 
Start
130.Public Cloud (8:04)
 
Start
131.Hybrid Cloud (1:30)
 
Start
132.NIST SP 800 -145 (1:45)

Evading IDS, Firewalls and Honeyhots

 
Start
133.Introduction to Evading IDS, Firewalls, Honeypots (2:50)
 
Start
134.Honeypots (10:12)
 
Start
135.Firewalls (12:06)
 
Start
136.Access Control List – ACL (3:24)
 
Start
137.Standard Access Control list (8:18)
 
Start
138.Intrusion Detection System – IDS (4:23)

Hacking Wireless Network

 
Start
139.Introduction to Wireless – Part 1 (26:04)
 
Start
140.Introduction to Wireless – Part 2 (8:05)
 
Start
141.WEP cracking (20:52)
 
Start
142.WPA WPA2 Cracking (27:56)
 
Start
143.Advanced WPA.WPA2 attacks (6:44)

Attack Remote Target

 
Start
146.Port Forwarding (9:29)
 
Start
147.Hacking Remotely Demonstration (11:43)

Vulnerability Analysis

 
Start
PT and VA Tools (11:26)
 
Start
Vulnerability asessment (6:32)
 
Start
Nessus VA Report (14:05)
 
Start
Nessus Report 2 (5:20)
 
Start
Nessus (13:21)
 
Start
OWASP ZAP VA (5:06)
 
Start
Nexpose VA (11:25)

IoT Security

 
Start
What is IoT (10:16)
 
Start
IoT Implementation (10:16)
 
Start
IoT Hardware (10:16)
 
Start
IoT Software (10:16)
 
Start
159. Self Driving Vehicles – SDV (10:16)
 
Start
Anatomy of an IoT Attack (10:16)
 
Start
IoT Attack Demonstration (10:16)

Physical Security

 
Start
148.What is Physical Security (11:03)

Operations Security

 
Start
149.Operations Security Control Methods (9:11)