دوره 13 CEH ای سی کانسیل | EC-Council Certified Ethical Hacker

مروری بر دوره

دوره 13 CEH ای سی کانسیل | EC-Council Certified Ethical Hacker، یکی از دوره‌های امنیتی در زمینه نفوذ به شبکه بوده و هدف آن آشنایی افراد با متدهای نفوذ به شبکه است. شرکت‌کنندگان در این دوره می‌توانند با به کارگیری انواع متدهایی که آموخته‌اند، امنیت یک شرکت یا سازمان را تا حد زیادی افزایش دهند.

.

آنچه خواهید آموخت

  • آشنایی با مفاهیم Ethical Hacking
  • آشنایی با مفاهیم Footprinting
  • آشنایی با مفاهیم Scanning
  • آشنایی با مفاهیم Enumeration
  • آشنایی با مفاهیم System Hacking

سرفصل ها

Module 01: Introduction to Ethical Hacking

Information Security Overview

Hacking Methodologies and Frameworks

Hacking Concepts

Ethical Hacking Concepts

Information Security Controls

Information Security Laws and Standards

Module 02: Footprinting and Reconnaissance

Footprinting Concepts

Footprinting through Search Engines

Footprinting through Web Services

Footprinting through Social Networking Sites

Website Footprinting          

Email Footprinting

Whois Footprinting

DNS Footprinting

Network Footprinting

Footprinting through Social Engineering

Footprinting Tools

Footprinting Countermeasures

Module 03: Scanning Networks

Network Scanning Concepts

Scanning Tools

Host Discovery

Port and Service Discovery

OS Discovery (Banner Grabbing/OS Fingerprinting)

Scanning Beyond IDS and Firewall

Network Scanning Countermeasures

Module 04: Enumeration

Enumeration Concepts

NetBIOS Enumeration

Page XI

Ethical Hacking and Count

All Rights Resent

SNMP Enumeration

LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques

Enumeration Countermeasures

Module 05: Vulnerability Analysis

Vulnerability Assessment Concepts

Vulnerability Classification and Assessment Types

Vulnerability Assessment Tools

Vulnerability Assessment Reports

Module 06: System Hacking

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

Module 07: Malware Threats

Malware Concepts

APT Concepts

Trojan Concepts

Virus and Worm Concepts

Fileless Malware Concepts

Malware Analysis

Malware Countermeasures

Anti-Malware Software

Module 08: Sniffing

Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Page XII

Ethical Hacking and Counte

All Rights Reser

Sniffing Tools

Snifing Countermeasures

Module 09: Social Engineering

Social Engineering Concepts

Social Engineering Techniques

Insider Threats

Impersonation on Social Networking Sites

Identity Theft

Social Engineering Countermeasures

Module 10: Denial-of-Service

DoS/DDoS Concepts

Botnets

Dos/DDoS Attack Techniques

DDoS Case Study

DoS/DDoS Attack Countermeasures

Module 11: Session Hijacking

Session Hijacking Concepts

Application-Level Session Hijacking

Network-Level Session Hijacking

Session Hijacking Tools

Session Hijacking Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots

IDS, IPS, Firewall, and Honeypot Concepts

IDS, IPS, Firewall, and Honeypot Solutions Evading IDS

Evading Firewalls

Evading NAC and Endpoint Security

IDS/Firewall Evading Tools

Detecting Honeypots

IDS/Firewall Evasion Countermeasures

Page XIII

Ethical Hacking and Countel

All Rights Reserve

Module 13: Hacking Web Servers

Web Server Concepts

Web Server Attacks

Web Server Attack Methodology

Web Server Attack Countermeasures

Patch Management

Module 14: Hacking Web Applications

Web Application Concepts

Web Application Threats

Web Application Hacking Methodology

Web API, Webhooks, and Web Shell Web Application Security

Module 15: SQL Injection

SQL Injection Concepts

Types of SQL Injection

SQL Injection Methodology

SQL Injection Tools

Evasion Techniques

SQL Iniection Countermeasures

Module 16: Hacking Wireless Networks

Wireless Concepts

Wireless Encryption

Wireless Threats

Wireless Hacking Methodology

Wireless Hacking Tools

Bluetooth Hacking

Wireless Attack Countermeasures

Wireless Security Tools

Module 17: Hacking Mobile Platforms

Mobile Platform Attack Vectors

Hacking Android OS

Hacking iOS

Page XIV

Ethical Hacking and Counte

All Rights Reserve

Mobile Device Management

Mobile Security Guidelines and Tools

Module 18: loT and OT Hacking

loT Concepts loT Attacks

loT Hacking Methodology loT Attack Countermeasures

OT Concepts

OT Attacks

OT Hacking Methodology

OT Attack Countermeasures

Module 19: Cloud Computing

Cloud Computing Concepts

Container Technology

Serverless Computing

Cloud Computing Threats

Cloud Hacking

Cloud Security

Module 20: Cryptography

Cryptography Concepts

Encryption Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Email Encryption

Disk Encryption

Cryptanalysis

Cryptography Attack Countermeasures

مخاطبان دوره

  • مدیران شبکه سازمان ها و شرکت های دولتی و خصوصی
  • کارشناسان شبکه
  • کارشناسان مخابرات

تقویم دوره

در حال حاضر تقویمی برای این دوره تعریف نشده است.

نظرات

به عنوان اولین نفر، نظر خود را بنویسید!

متن ساده

  • تگ‌های HTML مجاز نیستند.
  • خطوط و پاراگراف‌ها بطور خودکار اعمال می‌شوند.
  • Web page addresses and email addresses turn into links automatically.