Certified Ethical Hacker (CEH), 4th Edition
Год выпуска: November 2024
Производитель: Published by Pearson via O'Reilly Learning
Сайт производителя:
https://learning.oreilly.com/course/certified-ethical-hacker/9780135395646/
Автор: Omar Santos / Nick Garner
Продолжительность: 19h 21m
Тип раздаваемого материала: Видеоурок
Язык: Английский + субтитры
Описание:
Prepare for the Certified Ethical Hacker (CEH) certification exam.
Overview
15+ hours of video training
• Get exam topics and skills to successfully prepare for the Certified Ethical Hacker (CEH) certification exam
• Step-by-step examples of security penetration testing methodologies and concepts
• Sample questions for each of the topics covered in the exam
Certified Ethical Hacker (CEH), 4th Edition gives a complete overview of the topics in the EC-Council’s updated Certified Ethical Hacker (CEH) exam. This video course has seven modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking, including fundamentals; reconnaissance techniques; network and perimeter hacking; System Hacking Phases and Attack Techniques; web application hacking; wireless, mobile, IoT and OT hacking; cloud computing, and cryptography. Taught by experienced security experts Omar Santos and Nick Garner, this full-featured video course will help learners better understand the world of hacking so they can act to defend attacks, as well as pass the CEH exam.
Содержание
Introduction
Module 1 - Information Security, Cybersecurity, and Ethical Hacking Overview
Lesson 01 - Introduction to Ethical Hacking
Module 2 - Reconnaissance Techniques
Lesson 02 - Footprinting and Reconnaissance
Lesson 03 - Scanning Networks
Lesson 04 - Enumeration
Module 3 - System Hacking Phases and Attack Techniques
Lesson 05 - Vulnerability Analysis
Lesson 06 - System Hacking
Lesson 07 - Malware Threats
Module 4 - Network and Perimeter Hacking
Lesson 08 - Sniffing
Lesson 09 - Social Engineering
Lesson 10 - Denial-of-Service
Lesson 11 - Session Hijacking
Lesson 12 - Evading IDS, Firewalls, and Honeypots
Module 5 - Web Application Hacking
Lesson 13 - Hacking Web Servers
Lesson 14 - Hacking Web Applications
Lesson 15 - SQL Injection
Module 6 - Wireless, Mobile, IoT, and OT Hacking
Lesson 16 - Hacking Wireless Networks
Lesson 17 - Hacking Mobile Platforms
Lesson 18 - IoT and OT Hacking
Module 7 - Cloud Computing and Cryptography
Lesson 19 - Cloud Computing
Lesson 20 - Cryptography
Module 8 - Securing Generative AI
Lesson 21 - Introduction to AI Threats and LLM Security
Lesson 22 - Understanding Prompt Injection & Insecure Output Handling
Lesson 23 - Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities
Lesson 24 - Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency
Lesson 25 - Overreliance, Model Theft, and Red Teaming AI Models
Lesson 26 - Protecting Retrieval Augmented Generation (RAG) Implementations
Summary
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280×720, 16:9, 30.000 fps, 3 000 kb/s (0.017 bit/pixel)
Аудио: AAC, 44.1 KHz, 2 channels, 128 kb/s, CBR
UPD 2025-10-29 раздача поделена на 8 модулей, добавлены модули 6-8 (уроки 16-26). Также добавлены английские субтитры.