https://img87.pixhost.to/images/599/359020115_tuto.jpg
3.07 GB | 00:24:33 | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
001  Certified Ethical Hacker (CEH) Introduction  (12.6 MB)
002  Certified Ethical Hacker (CEH) Introduction  (12.6 MB)
001  Learning objectives  (4.84 MB)
002  1 1 Introducing Information Security and Cybersecurity  (19.26 MB)
003  1 2 Understanding the Cyber Kill Chain and Hacking Concepts  (30.23 MB)
004  1 3 Surveying Ethical Hacking Methodologies  (33.82 MB)
005  1 4 Undertanding Information Security Controls  (15.98 MB)
006  1 5 Understanding Security Laws and Standards  (18.83 MB)
007  1 6 Planning and Scoping a Penetration Testing Assessment  (19.67 MB)
008  1 7 Building Your Own Hacking Lab with WebSploit Labs  (34.57 MB)
001  Learning objectives  (2.99 MB)
002  10 1 Introducing DoSDDoS Concepts and Attack Techniques  (26.23 MB)
003  10 2 Defining what are Botnets  (10.75 MB)
004  10 3 Exploring DDoS Case Studies  (8.74 MB)
005  10 4 Surveying DoSDDoS Attack Tools  (11.24 MB)
006  10 5 Understanding DoSDDoS Countermeasures and Protection Tools  (31.23 MB)
001  Learning objectives  (2.95 MB)
002  11 1 Introducing Session Hijacking Concepts  (20.69 MB)
003  11 2 Performing Application Level Session Hijacking  (18.97 MB)
004  11 3 Understanding Network Level Session Hijacking  (17.58 MB)
005  11 4 Surveying Session Hijacking Tools  (8.82 MB)
006  11 5 Understanding Session Hijacking Countermeasures  (12.5 MB)
001  Learning objectives  (7.01 MB)
002  12 1 Introducing IDS, IPS, Firewall, and Honeypot Concepts  (50.51 MB)
003  12 2 Exploring IDS, IPS, Firewall, and Honeypot Solutions  (37.18 MB)
004  12 3 Evading IDS and Firewalls  (29.79 MB)
005  12 4 Surveying IDSFirewall Evading Tools  (18.63 MB)
006  12 5 Detecting Honeypots and Sandboxes  (21.61 MB)
007  12 6 Understanding IDSFirewall Evasion Countermeasures  (20.82 MB)
001  Learning objectives  (3 MB)
002  13 1 Introducing Web Server Concepts  (26.19 MB)
003  13 2 Exploring Web Server Attacks  (25.15 MB)
004  13 3 Surveying Web Server Attack Methodologies  (51.15 MB)
005  13 4 Understanding Web Server Countermeasures  (31.15 MB)
006  13 5 Understanding Patch Management  (43.39 MB)
001  Learning objectives  (9.71 MB)
002  14 1 Understanding Web App Concepts and Identifying Web App Threats  (7.38 MB)
003  14 2 Exploring the OWASP Top 10 for Web Applications  (38.36 MB)
004  14 3 Applying Web App Hacking Methodologies and Footprinting Web Infrastructure  (24.97 MB)
005  14 4 Analyzing Web Applications and Bypassing Client-Side Controls  (25.82 MB)
006  14 5 Attacking Authentication Mechanisms  (5.59 MB)
007  14 6 Attacking Session Management Mechanisms  (16.64 MB)
008  14 7 Exploiting Authorization Schemes and Access Controls Flaws  (47.04 MB)
009  14 8 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities  (67.4 MB)
010  14 9 Understanding Server-side Request Forgery (SSRF) Vulnerabilities  (43.01 MB)
011  14 10 Exploiting Buffer Overflows and Creating Payloads  (92.58 MB)
012  14 11 Attacking Application Logic Flaws and Shared Environments  (21.65 MB)
013  14 12 Attacking Database Connectivity and Web App Clients  (12.52 MB)
014  14 13 Attacking Web Services, Exploiting Web APIs, Webhooks, and Web Shells  (47.19 MB)
015  14 14 Ensuring Web App Security  (8.86 MB)
001  Learning objectives  (3.98 MB)
002  15 1 Introducing SQL Injection Concepts  (102.57 MB)
003  15 2 Understanding the Types of SQL Injection  (35.57 MB)
004  15 3 Exploring the SQL Injection Methodologies  (44.99 MB)
005  15 4 Exploring SQL Injection Tools  (65.94 MB)
006  15 5 Exploring SQL Injection Evasion Techniques  (19.82 MB)
007  15 6 Understanding SQL Injection Countermeasures  (21.89 MB)
001  Learning objectives  (9.68 MB)
002  2 1 Understanding Information Gathering and Vulnerability Identification  (14.23 MB)
003  2 2 Introducing Open Source Intelligence (OSINT) Techniques  (63.94 MB)
004  2 3 Exploring Footprinting Methodologies  (19.75 MB)
005  2 4 Utilizing Search Engines for Footprinting  (23.24 MB)
006  2 5 Footprinting Web Services  (17.81 MB)
007  2 6 Exploiting Social Networking Sites for Footprinting  (6.21 MB)
008  2 7 Surveying Password Dumps, File Metadata, and Public Source-code Repositories  (48.11 MB)
009  2 9 Implementing DNS Footprinting  (17.6 MB)
010  2 10 Executing Network Footprinting  (32.43 MB)
011  2 11 Applying Social Engineering for Footprinting  (22.14 MB)
012  2 12 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools  (83.05 MB)
013  2 13 Identifying Cloud vs  Self-hosted Assets  (35.4 MB)
001  Learning objectives  (3.58 MB)
002  3 1 Surveying Network Scanning Concepts  (25.17 MB)
003  3 2 Exploiting Scanning Tools  (102.81 MB)
004  3 3 Understanding Host Discovery  (36.22 MB)
005  3 4 Performing Website and Web Application Reconnaissance  (39.44 MB)
006  3 5 Performing OS Discovery (Banner GrabbingOS Fingerprinting)  (27.32 MB)
007  3 6 Scanning Beyond IDS and Firewall  (51.16 MB)
008  3 7 Creating Network Diagrams  (11.54 MB)
009  3 8 Discovering Cloud Assets  (24.62 MB)
010  3 9 Crafting Packets with Scapy to Perform Reconnaissance  (30 MB)
001  Learning objectives  (2.05 MB)
002  4 1 Introducing Enumeration Techniques  (7.07 MB)
003  4 2 Performing NetBIOS Enumeration  (8.77 MB)
004  4 3 Performing SNMP Enumeration  (19.41 MB)
005  4 4 Performing LDAP Enumeration  (7.86 MB)
006  4 5 Performing NTP and NFS Enumeration  (13.82 MB)
007  4 6 Performing SMTP and DNS Enumeration  (15.62 MB)
008  4 7 Conducting Additional Enumeration Techniques  (30.95 MB)
009  4 8 Surveying Enumeration Countermeasures  (13.49 MB)
001  Learning objectives  (3.07 MB)
002  5 1 Understanding Vulnerability Assessment Concepts  (16.31 MB)
003  5 2 Classifying and Assessing Vulnerability Types  (15.46 MB)
004  5 3 Utilizing Vulnerability Assessment Tools  (13.21 MB)
005  5 4 Generating Vulnerability Assessment Reports  (9.73 MB)
001  Learning objectives  (6.35 MB)
002  6 1 Understanding System Hacking Concepts  (14.53 MB)
003  6 2 Gaining System Access  (6.66 MB)
004  6 3 Cracking Passwords  (22.56 MB)
005  6 4 Exploiting Known and Zero-Day Vulnerabilities  (32.37 MB)
006  6 5 Escalating Privileges  (11.89 MB)
007  6 6 Maintaining Access, Command and Control, and Exfiltration  (36.46 MB)
008  6 7 Executing Applications  (28.54 MB)
009  6 8 Hiding Files  (15.83 MB)
010  6 9 Clearing Logs  (25.85 MB)
011  6 10 Performing On-Path Attacks  (17.61 MB)
012  6 11 Introduction to Lateral Movement and Exfiltration  (13.76 MB)
013  6 12 Understanding Post-Engagement Cleanup  (16.43 MB)
001  Learning objectives  (4 MB)
002  7 1 Understanding Malware Concepts  (22.42 MB)
003  7 2 Comprehending APT Concepts  (15.29 MB)
004  7 3 Grasping Trojan Concepts  (24.61 MB)
005  7 4 Exploring Virus and Worm Concepts  (11.43 MB)
006  7 5 Examining Fileless Malware and Living off the Land Techniques  (24.4 MB)
007  7 6 Analyzing Malware  (25.52 MB)
008  7 7 Implementing Malware Countermeasures  (19.92 MB)
001  Learning objectives  (2.79 MB)
002  8 1 Introducing Sniffing Concepts  (45.38 MB)
003  8 2 Performing MAC Attacks  (15.26 MB)
004  8 3 Conducting DHCP Attacks  (17.23 MB)
005  8 4 Performing ARP Poisoning  (17.29 MB)
006  8 5 Performing Spoofing Attacks  (23.62 MB)
007  8 6 Performing DNS Poisoning  (18.18 MB)
008  8 7 Surveying Sniffing Tools  (6.2 MB)
009  8 8 Exploring Sniffing Countermeasures and Detection Techniques  (14.85 MB)
001  Learning objectives  (3.55 MB)
002  9 1 Introducing Social Engineering Concepts and Techniques  (35.11 MB)
003  9 2 Understanding the Insider Threat  (38.42 MB)
004  9 3 Impersonation on Social Networking Sites  (26.53 MB)
005  9 4 Understanding Identity Theft  (28.2 MB)
006  9 5 Understanding Social Engineering Countermeasures  (24.25 MB)
[align=center]
Screenshot
https://images2.imgbox.com/d0/f5/t7YUnKKN_o.jpg

[/align]

Код:
https://ddownload.com/iefuag6tazna/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part1.rar
https://ddownload.com/0gd12m3mp7ab/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part2.rar
Код:
https://rapidgator.net/file/4bb7d60516cbcc31ffd182d1f93b02dd/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part1.rar
https://rapidgator.net/file/4cb4d82f516ec1550b2d86ca7debeea9/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part2.rar
Код:
https://turbobit.net/2rxnre73n7af/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part1.rar.html
https://turbobit.net/rt7o14pyrl1n/Oreilly.-.Certified.Ethical.Hacker.CEH.4th.Edition.part2.rar.html