مروری بر دوره
دوره 12 CEH ای سی کانسیل | EC-Council Certified Ethical Hacker، یکی از دورههای امنیتی در زمینه نفوذ به شبکه بوده و هدف آن آشنایی افراد با متدهای نفوذ به شبکه است. شرکتکنندگان در این دوره میتوانند با به کارگیری انواع متدهایی که آموختهاند، امنیت یک شرکت یا سازمان را تا حد زیادی افزایش دهند.
.
سرفصل ها
Module 01: Introduction to Ethical Hacking
Information Security Overview
Hacking Methodologies and Frameworks
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Module 03: Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures
Module 04: Enumeration
Enumeration Concepts
NetBIOS Enumeration
Page XI
Ethical Hacking and Count
All Rights Resent
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Module 05: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Classification and Assessment Types
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Module 07: Malware Threats
Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
Malware Analysis
Malware Countermeasures
Anti-Malware Software
Module 08: Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Page XII
Ethical Hacking and Counte
All Rights Reser
Sniffing Tools
Snifing Countermeasures
Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Module 10: Denial-of-Service
DoS/DDoS Concepts
Botnets
Dos/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
IDS, IPS, Firewall, and Honeypot Concepts
IDS, IPS, Firewall, and Honeypot Solutions Evading IDS
Evading Firewalls
Evading NAC and Endpoint Security
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Page XIII
Ethical Hacking and Countel
All Rights Reserve
Module 13: Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Countermeasures
Patch Management
Module 14: Hacking Web Applications
Web Application Concepts
Web Application Threats
Web Application Hacking Methodology
Web API, Webhooks, and Web Shell Web Application Security
Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
SQL Iniection Countermeasures
Module 16: Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Wireless Attack Countermeasures
Wireless Security Tools
Module 17: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Page XIV
Ethical Hacking and Counte
All Rights Reserve
Mobile Device Management
Mobile Security Guidelines and Tools
Module 18: loT and OT Hacking
loT Concepts loT Attacks
loT Hacking Methodology loT Attack Countermeasures
OT Concepts
OT Attacks
OT Hacking Methodology
OT Attack Countermeasures
Module 19: Cloud Computing
Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Hacking
Cloud Security
Module 20: Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Cryptography Attack Countermeasures
تقویم دوره
وضعیت | کد دوره | نام اساتید | نوع برگزاری | محل | طول دوره | شهریه | روزهای هفته | تاریخ شروع | ساعت کلاس | ||
---|---|---|---|---|---|---|---|---|---|---|---|
...
|
Tra2472 | آنلاین (لایو) | ارژنگ دوره های حضوری در محل شعبه اصلی مؤسسه آموزش عالی ارژنگ برگزار میگردند. | 40 ساعت | 55,000,000 ریال | شنبه، دوشنبه، چهارشنبه | چهارشنبه, 1404/05/29 | از 13:0 تا 17:0 | ثبت نام | ||
سلام
دوره بصورت مجازی هست یا حضوری ؟
در آخر دوره مدرک هم ارائه میشه یا خیر ؟
با سلام
شما این امکان رو دارید تا به هنگام انتخاب نوع حضور در دوره را بنا به تمایل خودتون انتخاب کنید. در پایان دوره نیز مدرک معتبر ارژنگ زیر نظر وزارت علوم تحقیقات و فناوری به شما رائه خواهد شد.
با احترام
شما نیز نظر خود را بنویسید: