43 小时内完成真正的道德黑客认证 CSEH+CEH 2024
上次更新时间:2024-12-06
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
1. Introduction and First Steps
2. Operating System
3. Creating our ethical hacking lab
4. Introduction to Networking
5. Bypassing Network Access Control
6. Cybersecurity - Beginning
7. Vulnerability Assassment
8. OSINT
- 1. Introduction to Passive Information Gathering
- 2. Differences Between Recon and Footprinting
- 3. Understanding Passive Information Gathering and OSINT
- 4. Introduction to OSINT
- 5. Principles of Recon
- 6. Offensive OSINT
- 7. Using SBLSTR for Finding Subdomains
- 8. USUFY as Osint Tool
- 9. Finding Deleted WebPages
- 10. THRVSTR as Osint Tool
- 11. Reverse Image Search
- 12. GHDB
- 13. GHDB Part 2
9. Storage Media - Module 1
10. Storage Media - Module 2
11. Storage Media - Module 3
12. Starting with Basic Linux Commands - CSEH
13. Starting with Linux Terminal - CSEH
14. Starting with Linux Shell - CSEH
15. Exploring the Linux System - CSEH
16. Starting with Linux Shell - CSEH
17. Permissions - CSEH
18. Processes in Linux - CSEH
19. Packet Management Systems in Linux - CSEH
20. Network Security Cyber Security
21. Network Security Concepts
22. Getting Started with Networking - CSEH
23. Linux - File System
24. Linux - Working with Archive files
25. Linux - Working With Files and Permissions
26. Linux - Working with Processes
27. Linux - Working With USER Enviroment Variables
28. Linux - Networking
29. Linux - Software Control
30. Networking
31. Wireshark Ninja - Fundamentals
32. Networking - Capturing Network Traffic
33. Starting with Wireshark
34. Advanced Networking Topics for Wireshark
35. Android Hacking - Mobile Hacking - IOS Hacking
36. Information Gathering
37. Starting Practical with Nmap
38. Being Real Nmap Pro
39. Reconnaissance with Nmap
40. Scanning Web Servers with Nmap
41. Detecting Firewalls
42. The Importance of Programming and Thinking in Hacking
- 1. Why C++ Is Important for Ethical Hacking
- 2. A1 - CPP Newlines,Tabs and Spaces
- 3. A1 - Initializers in CPP
- 4. A2 - CPP Writing Styles
- 5. A3 - Statements and Expressions, RVALUE and LVALUE
- 6. A4 - Comma
- 7. A5 - Types and Variables
- 8. A6 - Literals in CPP
- 9. A7 - Defining Constants
- 10. A8 - Const Expressions
- 11. Beginning to Pointers
- 12. A11 - Namespaces in CPP
- 13. A12 - Scoping Variables and Static Keyword
- 14. Conditional Statements
43. Types and Conditional Statements in C++
- 1. A1 - Types in CPP - Binary, Octal and Hex
- 2. A2 - Floating Point types in CPP - Float, Double, Long Double
- 3. A3 - Char types in CPP
- 4. A4 - Enum Types
- 5. A4 - Boolean Types and Comparison Operators
- 6. A5 - Void Type and Void Function
- 7. A6 - 1 Operators 101
- 8. A7 - Default Values in CPP
- 9. A1 - Switch Statement with ENUM
- 10. A2 - Conditional Statements in CPP
- 11. A3 - For Loop
- 12. A4 - Continue Keyword
- 13. A5 - Do-While Loop
- 14. A6 - Goto
44. Classes and Pointers in C++
- 1. A1 - POD Data Classes
- 2. A2 - Unions in CPP
- 3. A3 - Methods in Struct
- 4. A4 - Access Controls in CPP
- 5. A5 - Classes and Initializing Class Member
- 6. A6 - Constructors
- 7. A7 - Destructors in CPP
- 8. A8 - Initializers in CPP
- 9. 11 - Pointers in CPP
- 10. A1 - C++ Beginning to Pointers
- 11. A2 - Dereference Operator in CPP
- 12. A3 - Pointers and Arrays
- 13. B2 - nullptr
- 14. B3 - Pointer arithmetic in CPP
- 15. C1 - Arrays out of bounds and Deallocating Pointers=
- 16. C2 - Consts and Casts with Pointers
- 17. C3 - Allocating Memory
- 18. C4 - Allocating memory as arrays
- 19. C5 - Lifetime of Memory
45. STL, References, Pointers in C++
- 1. A1 - STL, Vectors and Arrays
- 2. A1 - References
- 3. A2 - Example Project With References
- 4. A3 - Code Example with AUTO, TUPLE and FOR LOOP
- 5. A4 - Range Based for Loop
- 6. A1 - Pointers in Practice
- 7. A2 - Pointers in Practice - Part 2
- 8. A3 - Pointers in Practice - Part 3
- 9. A4- Pointers in Practice - Part 4
46. Functions in C++
47. Data Structures in C++
- 1. A1 - Introduction to Basic CPP Programming
- 2. A2 - Creating Random Card Generator Using Enum and rand
- 3. A3 - Developing main Function and using static_cast
- 4. A1 - Introduction to ADT
- 5. A2 - Creating ADT Class and using Constructors
- 6. A3 - Virtual Methods and Overriding from Class
- 7. A4 - Controlling Copy Operations with ADT
- 8. A1 - Starting with Templates
- 9. A2 - Class Templates in CPP
- 10. A1 - Introduction to STL
- 11. A2 - Algorithm Analysis
- 12. A3 - Scenario Analysis
- 13. A4 - Developing Main
- 14. A5 - Factorial Method
- 15. A1 - Understanding Arrays
- 16. A2 - Manipulating Arrays
- 17. A3 - Starting with Array Pointers
- 18. A4 - Pointer Increment vs Array Indexing
- 19. A1 - Creating List ADT
- 20. A2 - Developing Get and Insert Methods
- 21. A3 - Developing Search and Remove Methods
- 22. A4 - Testing ADT List
- 23. A1 - Node and Chaining Example
- 24. A2 - Creating and Chaining nodes with Different data types
- 25. A1 - Creating Custom Linked List
- 26. A2 - Get Method
- 27. A3 - Developing InsertHead, InsertTail and Insert Methods
- 28. A4 - Developing Search Operation
- 29. A4 - Removing Items
48. SQL Training for Ethical Hacking - Introduction
49. SQL for Ethical Hacking Creating our first Database and Table
50. SQL for Ethical Hacking Datatypes in SQL
51. Ethical Hacking for SQL Dates and Times in SQL
52. Learning Python for Ethical Hacking - Variables and Strings in Python
53. Learning Python for Ethical Hacking - Numbers in Python
54. Learning Python for Ethical Hacking - Lists in Python
55. Python for Ethical Hacking - Looping in Python
56. If, Else, Else If
57. Creating Hacking Tools with Python from Zero - Network
58. Mastering Metasploit
- 1. Installing Metasploit
- 2. Metasploit Basics - Part 1
- 3. Metasploit Basics - Part 2
- 4. Metasploit Basics - Part 3
- 5. Running NMAP in Metasploit and Port Scanning
- 6. Metasploit Passive Information Gathering - Part 1
- 7. Metasploit - Finding Subdomains
- 8. Metasploit - TCP Port Scanning
- 9. Metasploit - TCP SYN Port Scanning
- 10. Metasploit - Passive Information Gathering - Part 2
- 11. Metasploit - Version Detection
- 12. DONE
59. Mastering Volatility Framework for Ethical Hacking and Digital Forensics
- 1. Introduction to Volatility Framework
- 2. Downloading and Installing Volatility
- 3. Downloading and Unrar Sample Images for Volatility
- 4. Volatility Plugins - Part 1
- 5. Volatility Plugins Part 2 - Network Analysis
- 6. Network Analysis
- 7. DLL Analysis
- 8. Volatility Registry Analysis
- 9. Password Extraction and Timeliner Plugin
- 10. Volatility Plugins Part 3
- 11. Analysis of the Malware Using Volatility
- 12. DLL and Memory Dump using Volatility
- 13. EXE Dump and Last lecture of section
课程内容
59个章节 , 325个讲座
1. Introduction and First Steps
2. Operating System
3. Creating our ethical hacking lab
4. Introduction to Networking
5. Bypassing Network Access Control
6. Cybersecurity - Beginning
7. Vulnerability Assassment
8. OSINT
- 1. Introduction to Passive Information Gathering
- 2. Differences Between Recon and Footprinting
- 3. Understanding Passive Information Gathering and OSINT
- 4. Introduction to OSINT
- 5. Principles of Recon
- 6. Offensive OSINT
- 7. Using SBLSTR for Finding Subdomains
- 8. USUFY as Osint Tool
- 9. Finding Deleted WebPages
- 10. THRVSTR as Osint Tool
- 11. Reverse Image Search
- 12. GHDB
- 13. GHDB Part 2
9. Storage Media - Module 1
10. Storage Media - Module 2
11. Storage Media - Module 3
12. Starting with Basic Linux Commands - CSEH
13. Starting with Linux Terminal - CSEH
14. Starting with Linux Shell - CSEH
15. Exploring the Linux System - CSEH
16. Starting with Linux Shell - CSEH
17. Permissions - CSEH
18. Processes in Linux - CSEH
19. Packet Management Systems in Linux - CSEH
20. Network Security Cyber Security
21. Network Security Concepts
22. Getting Started with Networking - CSEH
23. Linux - File System
24. Linux - Working with Archive files
25. Linux - Working With Files and Permissions
26. Linux - Working with Processes
27. Linux - Working With USER Enviroment Variables
28. Linux - Networking
29. Linux - Software Control
30. Networking
31. Wireshark Ninja - Fundamentals
32. Networking - Capturing Network Traffic
33. Starting with Wireshark
34. Advanced Networking Topics for Wireshark
35. Android Hacking - Mobile Hacking - IOS Hacking
36. Information Gathering
37. Starting Practical with Nmap
38. Being Real Nmap Pro
39. Reconnaissance with Nmap
40. Scanning Web Servers with Nmap
41. Detecting Firewalls
42. The Importance of Programming and Thinking in Hacking
- 1. Why C++ Is Important for Ethical Hacking
- 2. A1 - CPP Newlines,Tabs and Spaces
- 3. A1 - Initializers in CPP
- 4. A2 - CPP Writing Styles
- 5. A3 - Statements and Expressions, RVALUE and LVALUE
- 6. A4 - Comma
- 7. A5 - Types and Variables
- 8. A6 - Literals in CPP
- 9. A7 - Defining Constants
- 10. A8 - Const Expressions
- 11. Beginning to Pointers
- 12. A11 - Namespaces in CPP
- 13. A12 - Scoping Variables and Static Keyword
- 14. Conditional Statements
43. Types and Conditional Statements in C++
- 1. A1 - Types in CPP - Binary, Octal and Hex
- 2. A2 - Floating Point types in CPP - Float, Double, Long Double
- 3. A3 - Char types in CPP
- 4. A4 - Enum Types
- 5. A4 - Boolean Types and Comparison Operators
- 6. A5 - Void Type and Void Function
- 7. A6 - 1 Operators 101
- 8. A7 - Default Values in CPP
- 9. A1 - Switch Statement with ENUM
- 10. A2 - Conditional Statements in CPP
- 11. A3 - For Loop
- 12. A4 - Continue Keyword
- 13. A5 - Do-While Loop
- 14. A6 - Goto
44. Classes and Pointers in C++
- 1. A1 - POD Data Classes
- 2. A2 - Unions in CPP
- 3. A3 - Methods in Struct
- 4. A4 - Access Controls in CPP
- 5. A5 - Classes and Initializing Class Member
- 6. A6 - Constructors
- 7. A7 - Destructors in CPP
- 8. A8 - Initializers in CPP
- 9. 11 - Pointers in CPP
- 10. A1 - C++ Beginning to Pointers
- 11. A2 - Dereference Operator in CPP
- 12. A3 - Pointers and Arrays
- 13. B2 - nullptr
- 14. B3 - Pointer arithmetic in CPP
- 15. C1 - Arrays out of bounds and Deallocating Pointers=
- 16. C2 - Consts and Casts with Pointers
- 17. C3 - Allocating Memory
- 18. C4 - Allocating memory as arrays
- 19. C5 - Lifetime of Memory
45. STL, References, Pointers in C++
- 1. A1 - STL, Vectors and Arrays
- 2. A1 - References
- 3. A2 - Example Project With References
- 4. A3 - Code Example with AUTO, TUPLE and FOR LOOP
- 5. A4 - Range Based for Loop
- 6. A1 - Pointers in Practice
- 7. A2 - Pointers in Practice - Part 2
- 8. A3 - Pointers in Practice - Part 3
- 9. A4- Pointers in Practice - Part 4
46. Functions in C++
47. Data Structures in C++
- 1. A1 - Introduction to Basic CPP Programming
- 2. A2 - Creating Random Card Generator Using Enum and rand
- 3. A3 - Developing main Function and using static_cast
- 4. A1 - Introduction to ADT
- 5. A2 - Creating ADT Class and using Constructors
- 6. A3 - Virtual Methods and Overriding from Class
- 7. A4 - Controlling Copy Operations with ADT
- 8. A1 - Starting with Templates
- 9. A2 - Class Templates in CPP
- 10. A1 - Introduction to STL
- 11. A2 - Algorithm Analysis
- 12. A3 - Scenario Analysis
- 13. A4 - Developing Main
- 14. A5 - Factorial Method
- 15. A1 - Understanding Arrays
- 16. A2 - Manipulating Arrays
- 17. A3 - Starting with Array Pointers
- 18. A4 - Pointer Increment vs Array Indexing
- 19. A1 - Creating List ADT
- 20. A2 - Developing Get and Insert Methods
- 21. A3 - Developing Search and Remove Methods
- 22. A4 - Testing ADT List
- 23. A1 - Node and Chaining Example
- 24. A2 - Creating and Chaining nodes with Different data types
- 25. A1 - Creating Custom Linked List
- 26. A2 - Get Method
- 27. A3 - Developing InsertHead, InsertTail and Insert Methods
- 28. A4 - Developing Search Operation
- 29. A4 - Removing Items
48. SQL Training for Ethical Hacking - Introduction
49. SQL for Ethical Hacking Creating our first Database and Table
50. SQL for Ethical Hacking Datatypes in SQL
51. Ethical Hacking for SQL Dates and Times in SQL
52. Learning Python for Ethical Hacking - Variables and Strings in Python
53. Learning Python for Ethical Hacking - Numbers in Python
54. Learning Python for Ethical Hacking - Lists in Python
55. Python for Ethical Hacking - Looping in Python
56. If, Else, Else If
57. Creating Hacking Tools with Python from Zero - Network
58. Mastering Metasploit
- 1. Installing Metasploit
- 2. Metasploit Basics - Part 1
- 3. Metasploit Basics - Part 2
- 4. Metasploit Basics - Part 3
- 5. Running NMAP in Metasploit and Port Scanning
- 6. Metasploit Passive Information Gathering - Part 1
- 7. Metasploit - Finding Subdomains
- 8. Metasploit - TCP Port Scanning
- 9. Metasploit - TCP SYN Port Scanning
- 10. Metasploit - Passive Information Gathering - Part 2
- 11. Metasploit - Version Detection
- 12. DONE
59. Mastering Volatility Framework for Ethical Hacking and Digital Forensics
- 1. Introduction to Volatility Framework
- 2. Downloading and Installing Volatility
- 3. Downloading and Unrar Sample Images for Volatility
- 4. Volatility Plugins - Part 1
- 5. Volatility Plugins Part 2 - Network Analysis
- 6. Network Analysis
- 7. DLL Analysis
- 8. Volatility Registry Analysis
- 9. Password Extraction and Timeliner Plugin
- 10. Volatility Plugins Part 3
- 11. Analysis of the Malware Using Volatility
- 12. DLL and Memory Dump using Volatility
- 13. EXE Dump and Last lecture of section