Giáo trình Certified Ethical Hacker CEH v8 (Tools)

Thảo luận trong 'CD Dạy học' bắt đầu bởi ghost0bk, 24 Tháng sáu 2014.

  1. ghost0bk

    ghost0bk Moderator Staff Member

    This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

    CEHV8 comes with some remarkable updates, not just to the content, but to the content delivery systems and tools, making it an invaluable tool for organizations ranging from Fortune 500 companies to the world’s governments, preparing the next generation of cyber warriors to protect their networks like never before. Students can expect a strong focus on advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real time case studies. 100% of the concepts presented in the CEH V8 course are reinforced by hands-on exercises in EC-Councils newest cyber range. In addition CEHV8, is now an ANSI 17024 accredited professional certification.



    [​IMG]
    Giáo trình Certified Ethical Hacker CEH v8 (Tools)
    Real Life Scenario
    The CEH class deals with real life scenario and real threats by real life experts in the field. Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests. The class is weaved around real-time information security incident and cases to inculcate a capability of making knowledgeable decisions while defending your organizations’ information resources.

    Global Recognition
    Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/penetration tester. The CEH program provides you an industry standard information security curriculum and is accompanied by a highly sought-after CEH certification that helps establish your career as an information security expert.

    Hacking Underground
    Play with real life tools that are used by the hacking underground. The courseware is over 3200 pages, covering 20 modules with over 20 GB of real life underground hacking tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!

    Hands on labs
    Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space. The CEH lab environment simulates a real time information infrastructure and facilitates an objective and modular learning. The result oriented, descriptive and analytical labs are designed by industry experts to reinforce the learning and demonstrate your proficiency in handling real time information security threats.

    Reference Material
    Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment, EC-Council has always sought to provide reference material that continues to be valuable long after the course has concluded. The CEH references to valuable resources including whitepapers, tools and videos are updated continuously and delivered across multiple channels to facilitate a comprehensive learning.

    This product consists of:
    * 6 Tools DVDs



    Nota: En esta entrega solo se incluye los 6 DVDs con herramientas, mas adelante se añadira los videos, libros y manuales de laboratorio.

    Note: In this release only includes 6 DVDs with tools, will be added later videos, books and laboratory manuals.
    ::::::::::::::::::::::::::::>>>>>>>>
    [​IMG]
    Bao gồm:

    CEHv8 Lab Prerequisites
    CEHv8 Module 02 Footprinting and Reconnaissance
    CEHv8 Module 03 Scanning Networks
    CEHv8 Module 04 Enumeration
    CEHv8 Module 05 System Hacking
    CEHv8 Module 06 Trojans and Backdoors
    CEHv8 Module 07 Viruses and Worms
    CEHv8 Module 08 Sniffing
    CEHv8 Module 09 Social Engineering
    CEHv8 Module 10 Denial-of-Service
    CEHv8 Module 11 Session Hijacking
    CEHv8 Module 12 Hacking Webservers
    CEHv8 Module 13 Hacking Web Applications
    CEHv8 Module 14 SQL Injection
    CEHv8 Module 15 Hacking Wireless Networks
    CEHv8 Module 16 Hacking Mobile Platforms
    CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots
    CEHv8 Module 18 Buffer Overflow
    CEHv8 Module 19 Cryptography
    CEHv8 Module 20 Penetration Testing
    BackTrack 5 R3
    [​IMG]
    4Share.Vn Link
  2. ghost0bk

    ghost0bk Moderator Staff Member

  3. s0977141243

    s0977141243 New Member

    cái này có tiếng Việt không bạn

Chia sẻ trang này