17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Instructors: Dale Meredith
7 sections • Nov 29, 2021 • 2h 37m
Video: MP4 1280x720 44 KHz | English
Level: Beginner | Size: 313 MB
A Certified Ethical Hacker is a security professional who understands how to look for weaknesses in target systems and uses the same knowledge and tools as a malicious hacker. This course will teach you the foundations of this knowledge needed for the CEH 312-50 exam.
What you'll learn
New cyberattack techniques are constantly evolving, which requires security professionals to ensure they’re always on the cutting edge. In this course, Ethical Hacking: Understanding Ethical Hacking, you’ll learn the foundational terms, boundaries, concepts, and expectations that all ethical hackers should adhere to. First, you’ll explore the current trends that are happening in security. Next, you’ll discover Indicators of Compromise (IOC). Finally, you’ll learn the five phases of hacking. When you’re finished with this course, you’ll have the skills and knowledge of the basics of an ethical hacker needed for the CEH 312-50 exam.
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4
4.6 MB
~Get Your Files Here !/02. Classifying Information Security/02. Classifying Information Security.mp4
16.1 MB
~Get Your Files Here !/02. Classifying Information Security/03. CEH Exam Study Tips.mp4
7.4 MB
~Get Your Files Here !/02. Classifying Information Security/04. Ethical Hacking.mp4
5.1 MB
~Get Your Files Here !/02. Classifying Information Security/05. A Little About the CEH Program.mp4
4.4 MB
~Get Your Files Here !/02. Classifying Information Security/06. Whats Expected of You.mp4
4.1 MB
~Get Your Files Here !/02. Classifying Information Security/07. Understanding Information Security.mp4
7.9 MB
~Get Your Files Here !/02. Classifying Information Security/08. Types of Attacks.mp4
9.1 MB
~Get Your Files Here !/02. Classifying Information Security/09. The Technology Triangle.mp4
4.9 MB
~Get Your Files Here !/02. Classifying Information Security/10. Learning Check.mp4
2.5 MB
~Get Your Files Here !/03. Understanding the Attackers and Their Methods/11. Cyber Kill Chain Methodology.mp4
9.5 MB
~Get Your Files Here !/03. Understanding the Attackers and Their Methods/12. Tactics Techniques and Procedures TTPs.mp4
7.2 MB
~Get Your Files Here !/03. Understanding the Attackers and Their Methods/13. Adversary Behavioral Identification.mp4
10.7 MB
~Get Your Files Here !/03. Understanding the Attackers and Their Methods/14. Indicators of Compromise IoC.mp4
5.4 MB
~Get Your Files Here !/03. Understanding the Attackers and Their Methods/15. Learning Check.mp4
3.3 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/16. Hacking Concepts.mp4
19.4 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/17. Phase 1-Reconnaissance.mp4
18.4 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/18. Phase 2-Scanning.mp4
6.1 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/19. Phase 3-Gaining Access.mp4
1.8 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/20. Phase 4-Maintaining Access.mp4
3 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/21. Phase 5-Clearing Tracks.mp4
2.4 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/22. So Whats Ethical Hacking.mp4
9.5 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/23. Lets Talk About Labs.mp4
5 MB
~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/24. Learning Check.mp4
3.5 MB
~Get Your Files Here !/05. Describing Information Security Controls/25. What Ethical Hackers Do.mp4
8.1 MB
~Get Your Files Here !/05. Describing Information Security Controls/26. What Is Defense in Depth.mp4
18.1 MB
~Get Your Files Here !/05. Describing Information Security Controls/27. The Levels of Defense in Depth.mp4
4.7 MB
~Get Your Files Here !/05. Describing Information Security Controls/28. What Is the Risk.mp4
2.1 MB
~Get Your Files Here !/05. Describing Information Security Controls/29. Threat Modeling.mp4
5.3 MB
~Get Your Files Here !/05. Describing Information Security Controls/30. Incident Management.mp4
6.6 MB
~Get Your Files Here !/05. Describing Information Security Controls/31. The Incident Handling and Response IHR.mp4
5.5 MB
~Get Your Files Here !/05. Describing Information Security Controls/32. The Role of AI and MI.mp4
9.1 MB
~Get Your Files Here !/05. Describing Information Security Controls/33. Can AI and MI Stop Attacks.mp4
4.5 MB
~Get Your Files Here !/05. Describing Information Security Controls/34. Learning Check.mp4
3.5 MB
~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/35. The Basics.mp4
20.8 MB
~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/36. GDPR and DPA.mp4
4.4 MB
~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/37. Learning Check.mp4
12 MB
~Get Your Files Here !/07. Domain Summary/38. Domain Summary.mp4
4.6 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Exercise Files/02/classifying-information-security-slides.pdf
7.8 MB
~Get Your Files Here !/Exercise Files/03/understanding-the-attackers-and-their-methods-slides.pdf
3.8 MB
~Get Your Files Here !/Exercise Files/04/comparing-hacking-and-ethical-hacking-slides.pdf
12 MB
~Get Your Files Here !/Exercise Files/05/describing-information-security-controls-slides.pdf
5.9 MB
~Get Your Files Here !/Exercise Files/06/differentiate-information-security-laws-and-standards-slides.pdf
2.3 MB
~Get Your Files Here !/Exercise Files/07/domain-summary-slides.pdf
565.3 KB
~Get Your Files Here !/Exercise Files/Study Guide.docx