Description
Certified Ethical Hacker (CEH) v.12 course. It is designed to provide the student with the knowledge and skills required for their current organization as a security analyst or to become an effective member of a security team involved in offensive security testing. Vulnerability Assessments The goal of Vulnerability Assessments is to provide the student with the knowledge and skills required for their current organization as a security analyst or to become an effective member of a security team involved in offensive security testing. Vulnerability Assessments
What you will learn in the CompTIA A+ Core 2 (220-1102) course
- Tactics and methods
- Frequent hostile behavior
- Concepts of threat hunting
- Risk and risk management
- Information on cyber threats
- Threat modeling
- Incident management and response
- Concepts of footprints
- Google Dorks
- Shodan and Censys
- Subdomains count
- Social network education
- Review of the Working Committee
- Recon Deep Dark Web
- Email tracking
- WHOIS and DNS Recon
- Enlightenment social engineering
- Types of network scanning
- Network scanning tools
- Discover the host
- Port and scanning services
- TCP connection scan
- Secret scan
- XMAS and Maimon TCP reverse scan
- ACK scan
- IPID SCAN in idle
- UDP scan
- And…
CompTIA A+ Core 2 Course Specifications (220-1102)
- Editor: ITProTV
- Teacher: Killing chain
- Training level: beginner to advanced
- Training duration: 48 hours and 17 minutes
- Number of courses: 138
Course headings
Introduction to Ethical Hacking
- Course overview
- Basic cybersecurity concepts
- The attacker’s motives and goals
- Attack categories
- Information war
- Cyber Kill Chain
- Tactical techniques and procedures
- Common controversial behaviors
- Threat hunting concepts
- Risk and risk management
- Cyber threat intelligence
- Threat modeling
- Incident management handling and response
- ML and AI
- Standards and regulations
- CEH Hacking Methodology
- MITRE ATT&CK Framework
- Diamond model of intrusion analysis
Reconnaissance techniques – footprinting and reconnaissance
- Footprinting concepts
- Google Dorks
- Shodan and Censys
- Subdomain enumeration
- Education about social networks
- Job board Recon
- Deep Dark Web Reconnaissance
- Email tracking
- WHOIS and DNS reconnaissance
- Social Engineering Recon
- Other footprinting tools
- Footprinting and reconnaissance countermeasures
RECONNALIZATION TECHNIQUES – SCANNING
Course pictures
Sample video of the course
installation Guide
After extracting, you can watch it with your favorite player.
English subtitles
Quality: 1080p
Download link
free download software
Size
43.5GB