收起左侧

[网络技术] EC Council Certified Ethical Hacker v9.0

[复制链接]
查看: 24|回复: 2

6万

主题

6万

帖子

32

威望

积分
68237
发表于 2017-1-6 16:47:56 | 显示全部楼层 |阅读模式
EC理事会认证的道德黑客v9.0(2016)
0042128f.jpg
WEBRip |英语| MP4 | 1280 x 720 | AVC〜500kbps | 15帧
AAC | 64 Kbps | 22.05 KHz | 1信道| 19:34:42 | 4.66 GB
类型:视频教程/网络与安全
此认证道德黑客(CEH)v9.0视频培训课程教您如何改善您的网络的安全态势所需的道德黑客工具和技术。 CBT掘金训练师Keith Barker带领您建立自己的练习实验室,包括使用评估软件,并鼓励您不仅观看和欣赏视频,而且在您自己的实验室环境中实践一切实践。

对于对认证感兴趣的个人,观看和实践本课程所教授的技术,将为您准备EC-Council认证的道德黑客(CEH)考试。请参阅EC理事会网站,了解他们参加考试的要求和程序。

推荐体验
网络基础(CompTIA网络+知识水平或更好)
熟悉多个版本的Windows
熟悉Linux不是必需的,但建议
熟悉VMware Workstation
了解CompTIA Network +和Security +级别的网络和安全性,或更好
推荐设备
主机运行VMware Workstation,可以支持64位虚拟机。
相关认证
认证的道德黑客v9(#312-50)
相关作业函数
网络/系统管理员/工程师
安全人员
审计员
安全专业人员
网站管理员
那些关注网络基础设施的安全性
Keith Barker自2012年以来一直是CBT掘金训练师,自1985年以来一直从事网络和安全工作。Keith拥有多项与安全相关的认证,包括思科CCIE安全,Palo Alto CNSE,Check Point CCSA,CISSP等。

内容:

欢迎(4分钟)
2.构建LAB:概念(6分钟)
3.构建LAB:网络(9分钟)
4.部署Kali Linux VM(14分钟)
5.添加Metasploitable到你的实验室(11分钟)
6.将Windows添加到实验室(14分钟)
7.在Kali上配置静态IP(5分钟)
8. Windows评估(7分钟)
9.部署Windows 8.1(15分钟)
10.部署Windows 2012(11分钟)
11.部署Windows 10(7分钟)
12.部署Windows 2016(7分钟)
13.伦理与黑客(10分钟)
黑客词汇(6分钟)
15. InfoSec概念(5分钟)
16.攻击类别,类型和向量(5分钟)
五阶段黑客(5分钟)
18.脚印和侦察概念(11分钟)
19.搜索引擎工具(8分钟)
20.使用Google攻击(12分钟)
21.网站调查工具(13分钟)
22. Metagoofil元数据工具(3分钟)
23.电子邮件标题脚印(5分钟)
24.使用WHOIS进行研究(4分钟)
25. DNS工具(12分钟)
26.网络扫描概述(3分钟)
27.网络扫描方法(9分钟)
28.端口发现(11分钟)
29.网络扫描工具(3分钟)
隐形空闲扫描(10分钟)
31.操作系统和应用程序指纹识别(10分钟)
32.脆弱性扫描(8分钟)
33.网络映射工具(5分钟)
代理服务器(8分钟)
35.使用公共代理服务(6分钟)
36.枚举概念(5分钟)
37. NetBIOS枚举(11分钟)
38. SNMP枚举概念(10分钟)
39. SNMP枚举工具(10分钟)
40. LDAP枚举概念(5分钟)
41. LDAP枚举示例(7分钟)
42. NTP枚举(7分钟)
43. SMTP枚举(8分钟)
44.系统黑客概述(9分钟)
密码破解概念(10分钟)
46.密码攻击示例:MITM和嗅探(13分钟)
47.彩虹裂纹实验室设置(8分钟)
彩虹裂纹示范(8分钟)
49.密码重置黑客(8分钟)
50. DHCP饥饿(10分钟)
远程访问(15分钟)
52.间谍软件(9分钟)
53. NTFS备用数据流漏洞(9分钟)
54.使用OpenPuff进行隐写(7分钟)
55.使用SNOW的隐写术(5分钟)
覆盖轨道(7分钟)
57.恶意软件概述(10分钟)
58.木马概述(10分钟)
59.创建木马(11分钟)
60.病毒概述(13分钟)
病毒产生(8分钟)
62.检测恶意软件(17分钟)
恶意软件分析(10分钟)
64.哈希文件验证(8分钟)
65.嗅探概述(12分钟)
66. CAM表攻击和端口安全(10分钟)
DHCP Snooping(14分钟)
68.动态ARP检测(DAI)(14分钟)
69.社会工程(15分钟)
70.拒绝服务(DoS)攻击(19分钟)
71.会话劫持(18分钟)
黑客Web服务器(10分钟)
缓冲液溢流(13分钟)
74. OWASP破坏的Web应用程序项目(13分钟)
Shellshock(6分钟)
76. SQL简介(9分钟)
77. SQL注入(16分钟)
78. Web应用程序漏洞:WordPress(10分钟)
无线黑客(18分钟)
80.使用Android VM(4分钟)
81.恶意软件(11分钟)
82.移动设备风险和最佳做法(13分钟)
防火墙回避(19分钟)
84.防火墙ACL示例(15分钟)
85. NAT和PAT基本原理(11分钟)
86. IDS / IPS逃避(17分钟)
蜜罐(12分钟)
88.云计算(23分钟)
89. CIA:保密,完整性和可用性(3分钟)
90.政策(9分钟)
91.量化风险(6分钟)
92.分离职责(13分钟)
EC Council Certified Ethical Hacker v9.0 (2016)
WEBRip | English | MP4 | 1280 x 720 | AVC ~500 kbps | 15 fps
AAC | 64 Kbps | 22.05 KHz | 1 channel | 19:34:42 | 4.66 GB
Genre: Video Tutorial / Networking & Security
This Certified Ethical Hacker (CEH) v9.0 video training course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. CBT Nuggets trainer Keith Barker walks you through building your own practice lab, including using evaluation software, and encourages you to not only watch and enjoy the videos, but practice everything hands-on in your own lab environment.

For individuals interested in certification, watching and practicing the techniques taught in this course prepares you for EC-Council Certified Ethical Hacker (CEH) exam. Please visit the EC Council website for their requirements and procedures for taking the exam.

Recommended Experience
Networking fundamentals (CompTIA Network+ level of knowledge or better)
Familiarity with multiple versions of Windows
Familiarity with Linux is not necessary but recommended
Familiarity with VMware Workstation
Knowledge of Networking and Security at the CompTIA Network+ and Security+ levels, or better
Recommended Equipment
Host running VMware Workstation, that can support 64bit VMs.
Related Certifications
Certified Ethical Hacker v9 (#312-50)
Related Job Functions
Network/System Administrators/Engineers
Security officers
Auditors
Security professionals
Site administrators
Those concerned about the security of the network infrastructure
Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith holds several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more.

Content:

1. Welcome (4 min)
2. Building a LAB: Concepts (6 min)
3. Building a LAB: Networking (9 min)
4. Deploy a Kali Linux VM (14 min)
5. Adding Metasploitable to Your Lab (11 min)
6. Adding Windows to Your Lab (14 min)
7. Configure a Static IP on Kali (5 min)
8. Windows Evaluations (7 min)
9. Deploy Windows 8.1 (15 min)
10. Deploy Windows 2012 (11 min)
11. Deploy Windows 10 (7 min)
12. Deploy Windows 2016 (7 min)
13. Ethics and Hacking (10 min)
14. Hacking Vocabulary (6 min)
15. InfoSec Concepts (5 min)
16. Attack Categories, Types, and Vectors (5 min)
17. Five Phases of Hacking (5 min)
18. Footprinting and Reconnaissance Concepts (11 min)
19. Search Engine Tools (8 min)
20. Hacking using Google (12 min)
21. Website Recon Tools (13 min)
22. Metagoofil Metadata Tool (3 min)
23. Email Headers for Footprinting (5 min)
24. Using WHOIS for Recon (4 min)
25. DNS Tools (12 min)
26. Network Scanning Overview (3 min)
27. Network Scanning Methodology (9 min)
28. Port Discovery (11 min)
29. Network Scanning Tools (3 min)
30. Stealth Idle Scanning (10 min)
31. OS and Application Fingerprinting (10 min)
32. Vulnerability Scanning (8 min)
33. Network Mapping Tools (5 min)
34. Proxy Servers (8 min)
35. Using Public Proxy Services (6 min)
36. Enumeration Concepts (5 min)
37. NetBIOS Enumeration (11 min)
38. SNMP Enumeration Concepts (10 min)
39. SNMP Enumeration Tools (10 min)
40. LDAP Enumeration Concepts (5 min)
41. LDAP Enumeration Example (7 min)
42. NTP Enumeration (7 min)
43. SMTP Enumeration (8 min)
44. System Hacking Overview (9 min)
45. Password Cracking Concepts (10 min)
46. Password Attack Example: MITM and Sniffing (13 min)
47. Rainbow Crack Lab Setup (8 min)
48. Rainbow Crack Demonstration (8 min)
49. Password Reset Hacking (8 min)
50. DHCP Starvation (10 min)
51. Remote Access (15 min)
52. Spyware (9 min)
53. NTFS Alternate Data Streams Exploit (9 min)
54. Steganography with OpenPuff (7 min)
55. Steganography with SNOW (5 min)
56. Covering Tracks (7 min)
57. Malware Overview (10 min)
58. Trojan Overview (10 min)
59. Creating a Trojan (11 min)
60. Virus Overview (13 min)
61. Virus Creation (8 min)
62. Detecting Malware (17 min)
63. Malware Analysis (10 min)
64. Hash File Verification (8 min)
65. Sniffing Overview (12 min)
66. CAM Table Attack and Port Security (10 min)
67. DHCP Snooping (14 min)
68. Dynamic ARP Inspection (DAI) (14 min)
69. Social Engineering (15 min)
70. Denial of Service (DoS) Attacks (19 min)
71. Session Hijacking (18 min)
72. Hacking Web Servers (10 min)
73. Buffer Overflow (13 min)
74. OWASP Broken Web Application Project (13 min)
75. Shellshock (6 min)
76. SQL Introduction (9 min)
77. SQL Injection (16 min)
78. Web App Vulnerabilities: WordPress (10 min)
79. Wireless Hacking (18 min)
80. Using an Android VM (4 min)
81. Malware for Mobile (11 min)
82. Mobile Device Risks and Best Practices (13 min)
83. Firewall Evasion (19 min)
84. Firewall ACL Example (15 min)
85. NAT and PAT fundamentals (11 min)
86. IDS/IPS Evasion (17 min)
87. Honeypots (12 min)
88. Cloud Computing (23 min)
89. CIA: Confidentiality, Integrity, and Availability (3 min)
90. Policies (9 min)
91. Quantifying Risk (6 min)
92. Separation of Duties (13 min)
93. Symmetrical Encryption Concepts (14 min)
94. Asymmetrical Encryption Concepts (16 min)
95. Control Types (11 min)
96. Multifactor Authentication (12 min)
97. Centralized Identity Management (13 min)
98. Kerberos and Single Sign On (SSO) (17 min)
99. Backups and Media Management (9 min)
100. Operations Security Controls (14 min)
101. Physical Security Controls (11 min)
102. Incident Response (12 min)
103. VPNs (21 min)
104. Disaster Recovery Planning (13 min)
105. Pen Testing Tips (10 min)
106. Useful Tools (11 min)
107. Case Study (21 min)
108. Additional Resources and Exam Prep (8 min)
004212a6.png 004212a7.png
Download uploaded
http://uploaded.net/file/dbnkuom6/EC-Council-Certified-Ethical-Hacker-v9.0.part1.rar
http://uploaded.net/file/bn503q4a/EC-Council-Certified-Ethical-Hacker-v9.0.part2.rar
http://uploaded.net/file/zd0hq2lm/EC-Council-Certified-Ethical-Hacker-v9.0.part3.rar
http://uploaded.net/file/hlmh2ffv/EC-Council-Certified-Ethical-Hacker-v9.0.part4.rar
http://uploaded.net/file/k33mv06x/EC-Council-Certified-Ethical-Hacker-v9.0.part5.rar

Download nitroflare
http://nitroflare.com/view/9252711025B6094/EC-Council-Certified-Ethical-Hacker-v9.0.part1.rar
http://nitroflare.com/view/D6F638381452B85/EC-Council-Certified-Ethical-Hacker-v9.0.part2.rar
http://nitroflare.com/view/48530AF19E39AA0/EC-Council-Certified-Ethical-Hacker-v9.0.part3.rar
http://nitroflare.com/view/1DB16FFC5CD7125/EC-Council-Certified-Ethical-Hacker-v9.0.part4.rar
http://nitroflare.com/view/0FBD2D7708DEF64/EC-Council-Certified-Ethical-Hacker-v9.0.part5.rar

Download 百度云
请点击此处下载

请先注册会员后在进行下载

已注册会员,请先登录后下载

下载次数:274    售价:50CG币
下载权限: 不限 以上或 VIP会员   [购买VIP]   [充值CG币]
资源反馈: 失效反馈   建议反馈   版权反馈


oday资源社区 - 严正声明1、禁止发布任何违法违规的言论;
2、本贴所有内容纯属发帖者个人意见,与本社区立场无关;
3、本社区仅提供学习交流平台,但不对本帖真实性和权益负责;
4、如本帖侵犯到任何第三方权益,请立即邮件[email protected]告知本社区,社区将及时予与删除。

回复

使用道具 举报

0

主题

1857

帖子

0

威望

积分
1919
发表于 2017-1-6 16:49:16 | 显示全部楼层
精品,很好!
回复 支持 反对

使用道具 举报

0

主题

305

帖子

0

威望

积分
0
发表于 前天 01:24 | 显示全部楼层
教程太棒了  感谢分享
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

精彩图文
QQ在线客服(工作时间:9:00-22:00)
QQ:2900020342
扫一扫关注我们

Copyright   ©2015-2016  ABC素材网  Powered by©Discuz!  技术支持:ab素材网    安全联盟  ( 新ICP备15001038号-2 )