Coursera - Certified Ethical Hacking (v12) Specialization

dkmdkm

U P L O A D E R
9c25ea152737eb49539942bf83dcf078.jpg

Free Download Coursera - Certified Ethical Hacking (v12) Specialization
Released 9/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + subtitle | Duration: 160 Lessons ( 9h 57m ) | Size: 1.6 GB
Master Industry-Standard Cybersecurity Skills. Learn the concept of ethical hacking, including penetration testing, footprinting, and reconnaissance, scanning networks, enumeration, system hacking, malware threats, sniffing, social engineering, web application hacking, and much more required for Certified Ethical Hacker (CEH) v12 exam.

What you'll learn
Ethical principles, legal frameworks, and importance of ethical hacking
Techniques for reconnaissance, scanning, enumeration, and vulnerability analysis to identify system weaknesses
Methods for system hacking, malware identification, sniffing, social engineering, and evading security measures
Penetration testing, web application security, wireless network hacking, and reporting findings to stakeholders
Skills you'll gain
Cryptography
Network Security
Penetration Testing
Cyber Security
Ethical Hacking
Sniffing
Reconnaissance
Social Engineering
Footprinting
Enumeration
System Hacking
Malware Threats
This specialization is designed for individuals aiming to master the skills of ethical hacking and cybersecurity. The course aligns with the Certified Ethical Hacker (CEH) v12 exam structure and prepares you thoroughly for the certification.
Ethical hacking is the authorized practice of probing systems to identify and fix security vulnerabilities. Organizations rely on ethical hackers to safeguard their networks and data, making this expertise crucial in today's digital landscape.
This is a 4-course series. Through these courses, you will explore topics such as information gathering, scanning networks, system hacking, malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, and more.
The specialization is designed for both beginners and professionals seeking to enhance their cybersecurity skills. It includes practical labs, quizzes, and an exam simulator to provide hands-on experience and prepare you effectively for the CEH v12 exam, alongside high-quality theoretical content created by industry experts.
Tools Covered: NMAP Tool, Advanced IP Scanner, Social Engineer Toolkit, Manual Web Attacks, Havij Tool, Metasploit, SNOW Tool, Quick Stego, BVM Tool for Virus, Cam Hacker Tool, LOIC Tool
Disclaimer: CEH, Certified Ethical Hacker, and CEHv12 are registered trademarks of the International Council of E-Commerce Consultants (EC-Council).
Applied Learning Project
The Certified Ethical Hacking (v12) program features 14 hands-on demos, covering information gathering, network and port scanning, phishing attacks, authentication bypass, password cracking, mobile hacking, cryptography, steganography, DoS attacks, and SQL injection. Key projects include automated phishing with Kali Linux, SQL injection using Havij, and authentication bypass. Tools used include NMAP, Burp Suite, and John the Ripper. The course is suitable for beginner to advanced levels, requiring basic networking, CLI familiarity, and introductory cybersecurity knowledge. Learners will gain practical skills to identify and mitigate security vulnerabilities effectively.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
359020115_tuto.jpg

1.58 GB | 00:23:26 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
01 introduction-to-cloud-computing (8.26 MB)
02 types-of-cloud-computing-services (6.61 MB)
03 responsibilities-in-on-premises (10.12 MB)
04 responsibilities-in-cloud (7.97 MB)
05 cloud-deployment-models (6.69 MB)
06 understanding-virtualization (6.36 MB)
07 cloud-security-control-layers (11.5 MB)
08 benefits-of-virtualization-in-the-cloud (4.88 MB)
09 cloud-computing-threats (9.85 MB)
10 cloud-computing-attacks (7.74 MB)
11 cloud-computing-security-tools (4.22 MB)
01 hacking-mobile-platforms (4.3 MB)
02 vulnerable-areas-for-mobiles (7.13 MB)
03 mobile-platform-vulnerabilities-and-risks (16.21 MB)
04 demo-hacking-mobile-phone (40.46 MB)
05 android-os (6.63 MB)
06 architecture-of-android-os (9.14 MB)
07 android-rooting-tools (7.8 MB)
08 android-pen-testing (5.1 MB)
09 counter-measures-for-mobile-security (14.24 MB)
01 what-is-cryptography (5.12 MB)
02 types-of-cryptography (16.35 MB)
03 demo-cryptographic-techniques (22.09 MB)
04 rsa-algorithm (8.92 MB)
05 steganography-and-its-types (9.45 MB)
06 how-steganography-works (8.77 MB)
07 use-of-algorithms-and-transformation (4.64 MB)
08 demo-perform-stegnography-using-open-stego (21.06 MB)
09 demo-perform-stegnography-using-snow-tool (17.46 MB)
01 denial-of-service-dos-attack (4.8 MB)
02 distributed-denial-of-service-ddos-attack (5.06 MB)
03 symptoms-of-dos-and-ddos-attacks (3 MB)
04 how-ddos-attacks-work (2.6 MB)
05 demo-perform-a-dos-attack-on-a-virtual-machine (27.97 MB)
06 categories-of-dos-and-ddos-attack-vectors (5.97 MB)
07 techniques-of-dos-and-ddos-attacks (12 MB)
08 what-is-botnet (5.52 MB)
09 techniques-to-protect-against-botnets (4.65 MB)
10 dos-and-ddos-protection-tools (3.87 MB)
01 sql-injection (4.79 MB)
02 scope-of-sql-injections (7.93 MB)
03 how-sql-query-works (10.46 MB)
04 types-of-sql-injection (6.46 MB)
05 demo-sql-injections (31.35 MB)
06 extract-information-through-error-messages (5.05 MB)
07 sql-injection-tools (8.85 MB)
08 how-to-defend-from-an-sql-injection-attack (12.36 MB)
09 demo-sql-injection-using-havij-tool (27.49 MB)
03 certificate-introduction-and-exam-details (17.01 MB)
04 course-introduction (8.65 MB)
05 course-outline (9.75 MB)
01 what-is-hacking (12.76 MB)
02 types-of-hackers (12.32 MB)
03 hacking-legal-or-illegal (7.59 MB)
01 introduction-to-cyber-security (9.22 MB)
02 stages-of-hacking (15.09 MB)
03 terminology-in-cyber-security-and-hacking (11.68 MB)
04 security-elements-in-cyber-security (9.41 MB)
05 penetration-testing (7.71 MB)
01 footprinting-or-reconnaissance (4.09 MB)
02 demo-gathering-information-from-various-online-resources (59.45 MB)
03 types-of-footprinting (8.16 MB)
04 website-footprinting (11.1 MB)
05 footprinting-methodology (9.43 MB)
06 e-mail-footprinting-methodology (10.87 MB)
07 finding-a-companys-public-and-restricted-data (12.59 MB)
08 footprinting-through-job-sites (6.33 MB)
09 archive-org-and-google-dorks (3.92 MB)
10 footprinting-pen-test-process (12.88 MB)
01 introduction-to-network-scanning (8.1 MB)
02 identify-targets-from-system-os (6.61 MB)
03 objectives-of-network-scanning (4.91 MB)
04 check-for-live-system (5.58 MB)
05 network-scanning-tool (3.22 MB)
06 demo-networking-scanning-with-advanced-ip-scanner-tool (13.59 MB)
07 vulnerability-scanning (6.38 MB)
08 what-is-enumeration (12.14 MB)
09 vulnerability-assessment (9.42 MB)
10 scanning-pen-testing (8.3 MB)
11 countermeasures-for-port-scanning (4.4 MB)
12 demo-port-scanning-using-nmap-tool (27.57 MB)
01 social-engineering (3.74 MB)
02 types-of-social-engineering (5 MB)
03 human-based-social-engineering (8 MB)
04 phishing (10.07 MB)
05 computer-based-social-engineering (4.86 MB)
06 mobile-based-social-engineering (13.95 MB)
08 phases-of-social-engineering-attacks (4.94 MB)
09 insider-threats (5.44 MB)
10 common-social-engineering-targets-and-defense-strategies (6.76 MB)
11 risk-of-social-engineering (4.23 MB)
12 demo-manual-phishing-attacks (31.86 MB)
13 tools-to-detect-phishing (4.24 MB)
14 how-to-detect-phishing-e-mails (5.15 MB)
15 how-to-defend-against-phishing-attacks (3.71 MB)
16 demo-phishing-attacks-using-kali-linux-automation-tools (24.17 MB)
01 web-penetration-testing (3.61 MB)
02 web-server-layers (13.78 MB)
03 web-application-attacks (6.78 MB)
04 why-do-web-servers-get-hacked (7.99 MB)
05 web-servers-architecture (7.8 MB)
06 web-application (6.91 MB)
07 web-application-architecture (11.34 MB)
08 demo-bypass-authentication (33.62 MB)
02 problem-statement (24.22 MB)
03 task-1 (11.81 MB)
04 task-2 (21.94 MB)
05 task-3 (13.53 MB)
06 task-4 (26.51 MB)
07 task-5 (18.14 MB)
08 task-6 (7.73 MB)
09 task-7 (21.77 MB)
10 task-8 (5.6 MB)
11 task-9 (10.04 MB)
12 task-10 (7.09 MB)
01 introduction-to-system-hacking (5.16 MB)
02 system-hacking-methodology (11.39 MB)
03 types-of-password-attacks (15.44 MB)
04 tools-for-password-attack (3.11 MB)
05 microsoft-authentication (7.84 MB)
06 password-salting (5.23 MB)
07 demo-how-attackers-crack-passwords-with-virtual-machines (44.3 MB)
01 malware-threats (6.38 MB)
02 ways-of-malware-propagation (8.65 MB)
03 what-is-a-virus (4.35 MB)
04 types-of-virus (7.28 MB)
05 how-does-a-computer-get-infected (4.91 MB)
06 how-to-defend-against-a-virus-attack (7.91 MB)
07 what-is-rootkit (5.95 MB)
08 what-is-a-worm (4.66 MB)
09 difference-between-worm-and-virus (4.64 MB)
10 trojan-and-trojan-horse (4.75 MB)
11 types-of-trojan (6.78 MB)
12 how-to-infect-systems-using-trojan (5.82 MB)
13 how-to-identify-trojan-infections (8.18 MB)
14 how-to-protect-from-trojans (3.92 MB)
15 malware-pen-testing (4.19 MB)
16 introduction-to-network-sniffing (6.98 MB)
17 working-of-network-sniffing (4.08 MB)
18 types-of-sniffing (5.88 MB)
19 vulnerable-protocols-in-sniffing (4.89 MB)
20 arp-poisoning (6.88 MB)
01 firewall-evading-ids-and-honeypots (6.25 MB)
02 types-of-firewalls (13.48 MB)
03 uses-of-firewall (10.35 MB)
04 what-is-an-ids-intrusion-detection-system (14.49 MB)
05 general-indications-of-system-intrusions (3.9 MB)
06 types-of-ids (5.8 MB)
07 intrusion-detection-tool-snort (5.23 MB)
08 what-is-honeypot (2.75 MB)
09 types-of-honeypots (6.78 MB)
10 detecting-honeypots (5.69 MB)
01 iot-hacking (3.69 MB)
02 how-does-iot-work (5.47 MB)
03 architecture-of-iot (5.4 MB)
04 iot-technologies-and-protocols (8.09 MB)
05 iot-communication-models (9.4 MB)
06 understanding-iot-attacks (10.66 MB)
07 iot-attack (9.77 MB)
08 iot-hacking-methodology (11.42 MB)

Screenshot
CppcQukr_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten