Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Security
Udemy – Mastering Ethical Hacking 2024-4
0 students
Last updated
Jan 2025
Enrol now
Overview
Course content
Instructors
About the course
Show more...
Course content
Sections:
32
•
Activities:
0
•
Resources:
162
Expand all
Section 1
1. Welcome to the Course
1 Welcome to the Course
2 Course Tools
Section 2
2. Creating a Virtual Lab
1 Creating a Virtual Lab
2 VMware Player
3 VirtualBox
4 Parrot OS
5 OWASP BWA
6 VM Snapshots
Section 3
3. MODULE 1 - INTRODUCTION Information Security and Ethical Hacking
1 Information Security and Ethical Hacking
Section 4
4. MODULE 1 - LESSON 1 Introduction to Ethical Hacking
1 Introduction to Ethical Hacking
2 Information Security
3 Cyber Kill Chain
4 Five Phases of Hacking
5 Ethical Hacking Explained
6 Documentation Considerations
Section 5
5. MODULE 2 - INTRODUCTION Reconnaissance Techniques
1 Reconnaissance Techniques
Section 6
6. MODULE 2 - LESSON 1 Footprinting and Reconnaissance
10 Documentation Tools
11 Preventing Footprinting
1 Footprinting and Reconnaissance
2 Footprinting Explained
3 Leveraging the Internet
4 Domain and Subdomain Footprinting
5 Leveraging Social Networking
6 Email Footprinting
7 Whois and DNS Footprinting
8 Network Footprinting
9 Social Engineering
Section 7
7. MODULE 2 -LESSON 2 Scanning Networks
1 Scanning Networks
2 Network Scanning Tools
3 Host Discovery
4 Port Discovery
5 Operating System Discovery
6 Evading Security Appliances
7 Creating Network Maps
Section 8
8. MODULE 2 - LESSON 3 Enumeration
1 Enumeration
2 Common Enumeration Tactics
3 NetBIOS Enumeration
4 SNMP Enumeration
5 LDAP Enumeration
6 Enumerating Linux
7 Enumerating FTP and TFTP
Section 9
9. MODULE 3 - INTRODUCTION Hacking Phases and Attack Techniques
1 Hacking Phases and Attack Techniques
Section 10
10. MODULE 3 - LESSON 1 Vulnerability Analysis
1 Vulnerability Analysis
2 Vulnerability Management Lifecycle
3 Vulnerability Information
4 Vulnerability Assessment Tools
5 Creating Reports
Section 11
11. MODULE 3 - LESSON 2 Hacking Methodology
1 Hacking Methodology
2 Gaining Access
3 Password Cracking
4 Vulnerability Exploitation
5 Privilege Escalation
6 Maintaining Access
7 Executing Applications
8 Hiding Files
9 Clearing Logs
Section 12
12. MODULE 3 - LESSON 3 Malware Threats
1 Malware Threats
2 Components of Malware
3 Advanced Persistent Threats
4 Trojans
5 Viruses and Worms
6 File less Malware
7 Malware Analysis
8 Malware Countermeasures
9 Anti Malware Software
Section 13
13. MODULE 4 - INTRODUCTION Network and Perimeter Hacking
1 Network and Perimeter Hacking
Section 14
14. MODULE 4 - LESSON 1 Sniffing Techniques
1 Sniffing Techniques
2 Types of Sniffing
3 MAC Attacks
4 DHCP Attacks
5 ARP Poisoning
6 MAC Spoofing
7 DNS Poisoning
8 Mitigating Sniffing Attacks
Section 15
15. MODULE 4 - LESSON 2 Social Engineering
1 Social Engineering
2 Understanding the Phases of Social Engineering
3 Considering Examples of Social Engineering
4 Leveraging Common Internet Sites
5 Stealing Someones Identity
6 Protecting Users from Social Engineering
Section 16
16. MODULE 4 - LESSON 3 Denial-of-Service
1 Denial of Service
2 DoS vs DDoS
3 DoS and DDoS Attack Techniques
4 DoS and DDoS Attack Tools
5 DoS and DDoS Attack Defense
Section 17
17. MODULE 4 - LESSON 4 Session Hijacking
1 Session Hijacking
2 Understanding Session Hijacking
3 Application Level Session Hijacking
4 Network Level Session Hijacking
5 Session Hijacking Tools
6 Session Hijacking Countermeasures
Section 18
18. MODULE 4 - LESSON 5 - Evading Security Measures
1 Evading Security Measures
2 Overview of IDS Sensors Firewalls and Honeypots
3 IDS Sensor and Firewall Evasion
4 Preventing IDS Sensor and Firewall Evasion
5 Detecting Honeypots
Section 19
19. MODULE 5 - INTRODUCTION Web Application Hacking
1 Web Application Hacking
Section 20
20. MODULE 5 - LESSON 1 Hacking Web Servers
1 Hacking Web Servers
2 Web Server Attacks
3 Web Server Attack Methodology
4 Web Server Attack Tools
5 Web Server Attack Countermeasures
6 Patch Management
Section 21
Topic 20
10 Session Management Mechanism
11 Injection Attacks
12 Application Logic Flaws
13 Shared Environments
14 Database Connectivity
15 Web Application Clients
16 Web Services
17 Web Application Security
1 Hacking Web Applications
2 Web Application Threats
3 Web Application Hacking Methods
4 Footprint Web Infrastructure
5 Analyze Web Applications
6 Bypassing Client Side Controls
7 Authentication Mechanisms
8 Authorization Schemes
9 Access Controls
Section 22
21. MODULE 5 - LESSON 2 Hacking Web Applications
1 SQL Injection
2 Types of SQL Injection
3 SQL Injection Methodology
4 SQL Injection Tools
5 SQL Injection Evasion Techniques
6 SQL Injection Countermeasures
Section 23
22. MODULE 5 - LESSON 3 SQL Injection
1 Wireless Network Hacking
Section 24
23. MODULE 6 - INTRODUCTION Wireless Network Hacking
1 Hacking Wireless Networks
2 Wireless Standards
3 Wireless Authentication and Encryption
4 Types of Wireless Antennas
5 Wireless Threats
6 Wireless Hacking Tools and Methodology
7 Bluetooth Hacking
8 Wireless Hacking Countermeasures
Section 25
24. MODULE 6 - LESSON 1 Hacking Wireless Networks
1 Mobile IoT and OT Hacking
Section 26
25. MODULE 7 - INTRODUCTION Mobile, IoT and OT Hacking
1 Mobile Platform Hacking
2 Mobile Attack Vectors
3 Hacking Android OS
4 Hacking iOS
5 Mobile Device Management
6 Mobile Security Guidelines and Tools
Section 27
26. MODULE 7 - LESSON 1 Mobile Platform Hacking
1 IoT Hacking
2 IoT Attacks
3 IoT Hacking Methodology
4 IoT Hacking Tools
5 IoT Hacking Countermeasures
Section 28
27. MODULE 7 - LESSON 2 IoT Hacking
1 OT Hacking
2 OT Attacks
3 OT Hacking Methodology and Tools
4 OT Hacking Countermeasures
Section 29
28. MODULE 7 - LESSON 3 OT Hacking
1 Cloud Computing
Section 30
30. MODULE 8 - LESSON 1 Cloud Computing Security
1 Cryptography
Section 31
31. MODULE 9 - INTRODUCTION Cryptography
1 Foundations of Cryptography
2 Cryptography Basics
3 Cryptography Tools
4 Public Key Infrastructure PKI
5 Email Encryption
6 Disk Encryption
7 Cryptographic Attacks
8 Cryptographic Attack Countermeasures
Section 32
32. MODULE 9 - LESSON 1 Foundations of Cryptography
1 Course Wrap Up
Instructors
Enrolment options
Udemy – Mastering Ethical Hacking 2024-4
Course modified date:
16 Jan 2025
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Resources
Share this course
Scroll to top
×
Close
×
Close