عن الدورة
translator

- Afrikaans
- Albanian – shqipe
- Arabic – العربية
- Armenian – Հայերէն
- Azerbaijani – azərbaycanca
- Basque – euskara
- Belarusian – беларуская
- Bengali – বাংলা
- Bulgarian – български
- Catalan – català
- Chinese – 中文(简体中文)
- Chinese – 中文 (繁體中文)
- Croatian – hrvatski
- Czech – čeština
- Danish – dansk
- Dutch – Nederlands
- English
- Esperanto – esperanto
- Estonian – eesti
- Filipino
- Finnish – suomi
- French – français
- Galician – galego
- Georgian – ქართული
- German – Deutsch
- Greek – Ελληνικά
- Gujarati – ગુજરાતી
- Haitian Creole – kreyòl ayisyen
- Hebrew – עברית
- Hindi – हिन्दी
- Hungarian – magyar
- Icelandic – íslenska
- Indonesian – Bahasa Indonesia
- Irish – Gaeilge
- Italian – italiano
- Japanese – 日本語
- Kannada – ಕನ್ನಡ
- Korean – 한국어
- Latin – Lingua Latina
- Latvian – latviešu
- Lithuanian – lietuvių
- Macedonian – македонски
- Malay – Bahasa Melayu
- Maltese – Malti
- Norwegian – norsk
- Persian – فارسی
- Polish – polski
- Portuguese – português
- Romanian – română
- Russian – русский
- Serbian – Српски
- Slovak – slovenčina
- Slovenian – slovenščina
- Spanish – español
- Swahili – Kiswahili
- Swedish – svenska
- Tamil – தமிழ்
- Telugu – తెలుగు
- Thai – ไทย
- Turkish – Türkçe
- Ukrainian – українська
- Urdu – اردو
- Vietnamese – Tiếng Việt
- Welsh – Cymraeg
- Yiddish – יידיש
Double-click
Select to translate
ماذا سوف تتعلم؟
- ستتعلم منهجية الهاكرز خطوة بخطوة، وهي:
- التجسس وجمع المعلومات: معرفة كل شيء عن الهدف قبل البدء بالهجوم.
- الاختراق: استخدام الأدوات والتقنيات (مثل حقن SQL) للدخول إلى الأنظمة والشبكات.
- إخفاء الآثار: مسح السجلات وإخفاء وجودك بعد الاختراق.
محتوى الدورة
Introduction To CEH
- 11:53
What is Virtual Machines & Virtualisation Concept
12:45
Setup Hacking Lab
Why Linux
05:45Install Vbox & Kali linux
04:11Install Kali linux installer image
10:26Navigation Through Linux
10:10Full Screen Mode & Network Settings
11:07
Kali Linux Operating System
Create Files & Directories
11:16Network Commands & Sudo Privileges In Kali
06:17
Reconnaissance & information Gathering
Introduction To information gathering
16:20Obtaining IP Address, Physical Address
08:34Aggressive Website Technology Discovering on IP Range
12:21Gathering Emails Using theHarvester & prospeo io
11:06How To Download Tools Online
12:37Finding Usernames With Sherlock
05:01Bonus – Email Scraper Tool In Python 3
08:28
Scanning
Theory Behind Scanning
06:32TCP & UDP
09:19Installing Vulnerable Virtual Machine (Metasploitable 2)
04:24Netdiscover
06:55Performing First Nmap Scan
15:53Different Nmap Scan Types
14:55Different Nmap Scan Types Part 2
21:33Different Nmap Scan Types Part 3
17:59Different Nmap Scan Types Part 4
23:02
Vulnerability Analysis
Nessus Part 1
20:44Nessus Part 2
20:49Nessus Part 3
16:21Nessus Part 4
18:44OpenVAS Part 1
23:34OpenVAS Part 2
27:17OpenVAS Part 3
26:08Nikto Tool
22:51
Exploitation
Exploitation and Core Cybersecurity Concepts
21:47Exploitation and Core Cybersecurity Concepts
Metasploit Framework
16:31Going Through Metasploit Framework
23:12Our First Exploitation (VSFTPD 2.3.4)
18:24Exploit SSH & Telnet Protocol (BruteForce)
17:53SMB Protocol (Samba) Exploitation
17:06Challenge 5 Different Exploitation
18:57
SMBGhost CVE 2020-0796 – Windows 10 Manual Exploitation
Download Windows 7 Environment For Exploit
13:41EternalBlue Vulnerability (CVE-2017-0144)
24:12BlueKeep Vulnerability (CVE-2019-0708)
23:00
Gaining Access (Viruses, Trojans, Payloads …)
Generating Basic Payload With Msfvenom
28:12Advance Msfvenom Usage Part 1
16:05Advance Msfvenom Usage Part 2
13:39Generating Powershell Payload Using Veil
26:44TheFatRat Payload Creation
11:14Hexeditor & Making Payload Open An Image
25:35
Post Exploitation – Elevating Privileges, Extracting Data, Running Keyloggers
Post Exploitation Theory
21:02Meterpreter Basic Commands Part 1
19:59Meterpreter Basic Commands Part 2
14:03Elevating Privileges With Different Modules
12:08Post Exploitation Modules
17:20
Web Application Penetration Testing
Web Application Pentesting Theory Part 1
23:32Web Application Pentesting Theory Part 2
21:31
تقييمات ومراجعات الطلاب
لا يوجد تقييم حتى الآن