Udemy - Most Complete Real-World Ethical Hacking

Torrent Details

Udemy - Most Complete Real-World Ethical HackingUdemy - Most Complete Real-World Ethical Hacking

NAME
Udemy - Most Complete Real-World Ethical Hacking.torrent
CATEGORY
Other
INFOHASH
3af4b62881feec0212c576ebcdeac120f5157d34
SIZE
1.5 GB in 89 files
ADDED
Uploaded on 05-07-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Most Complete Real-World Ethical Hacking



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







Published 7/2022

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz

Language: English | Size: 1.54 GB | Duration: 4h 11m



Learn and review many modern courses just in one course as fast as possible



What you'll learn

45 Real World Ethical Hacking Videos

Start from ground up to the Sky

Latest & Newest Methods in Real World Ethical Hacking

Learn Latest Tools for Real World Ethical Hacking

Understand What Happened in Ethical Hacking Process

Modern Case Studies and Current Events

MITRE ATT&CK Framework

DeTT&CT Framework

Atomic Purple Team

Threat Hunting (Tahiti)

MITRE D3FEND Framework

MITRE RE&CT

MITRE Engage Framework

MITRE ENGENUITY Framework

MITRE Cyber Analytics Repository (CAR) Framework

Search Engines for OSINT

Whois

Reverse Whois

Dark Web OSINT

Search Engine Clustering

DNS OSINT

Wireless OSINT

Email OSINT

Recon-ng For OSINT

People OSINT

Spiderfoot for OSINT

Image OSINT

OCR for OSINT

Sock Puppet

Social Networks OSINT

Maltego

Maltego Website Analysis

Maltego Footprint Machines

Documentation

CDP Recon

ARP Spoofing Attack

CAM Table OverFlow Attack

Switch Spoofing Attack

Double Tagging Attack

STP Attack

Cisco Password Attacks (Type 5 & Type 7)

DHCP Starvation Attack

HSRP Attack

Syslog Spoofing Attack

Syslog DDoS Attack

DNS Spoofing Attack

DNS Amplification Attack

Discover Live Hosts in Restricted Networks

Learn Metasploit Framework

Server-Side Exploitation Attack

Client-Side Exploitation Attack

Bypass User Access Control

Remote Sniffing Attack

Host-Based DNS Poisoning Attack

Requirements

Basic Networking Knowledge

Description

Welcome to this comprehensive Ethical Hacking course...!This course assumes you have prior Networking knowledge. This course is practical but it won't neglect the theory. You'll learn everything Practically by exploiting everything such as Network Infrastructure Devices (Switch & Router) and Client (Windows 10) and you will never waste your time theoretical lecturesThis course is divided into 4 main sections1- MITRE FrameworksIn this Section, you will Learn MITRE Frameworks Such as :MITRE ATT&CK Framework and how it really works and how to use MITRE ATT&CK Navigator.You will learn DETT&CT Framework for Blue Teams and Investigators and how to use ityou will learn Threat Hunting Methodology (TaHiTI) for Threat Hunting, and how it works and introduction to MaGMa Use Case (UCS) Framework.and I will introduce MITRE Cyber Analytics Repository (CAR) Framework, MITRE D3FEND Framework, MITRE ENGENUITY Framework, MITRE Engage Framework, and MITRE RE&CT Framework.2- Open-source intelligence (OSINT)This Section is ideal for Ethical Hackers, Investigators and ResearchersYou will learn Search Engines, Dark Web For OSINTYou will learn Search Engine ClusteringYou will Learn Whois and Reverse WhoisYou will learn Spiderfoot for Website Analysis.You will learn DNS Records and DNS Analysis ToolsYou will learn Wireless OSINTYou will learn Email OSINT with Tools such as Recon-ng and WebsitesYou will learn People OSINTYou will learn Image OSINT Techniques such as Reverse Image SearchYou will learn OCR Technology for Image OSINTYou will learn Sock Puppet for Social NetworksYou will learn Social Networks OSINT such as Twitter and FacebookYou will learn Maltego and how it works.You will learn Maltego BasicsYou will learn Website analysis with MaltegoYou will learn Footprint Machine Levels with maltegoYou will learn documentation and see document template3- Network Penetration Testingin This section, You will learn Layer 2 Attacks such as :CDP/LLDP Recon and CDP FloodingCAM Table Overflow AttackARP Spoofing AttackVlan Hopping Attack (Switch Spoofing)Vlan Hopping Attack (Double Tagging)Spanning-Tree Protocol (STP) AttackYou will learn Layer 3 Attacks such as :Cisco Password Decryption Attacks (Type 5 & Type 7)DHCP Starvation AttackFHRP Protocol Attacks (HSRP Attack)You will learn Monitoring Attacks such as :Log Spoofing AttackLog DDoS Attackyou will learn DNS Attacks such as :DNS Spoofing AttackDNS Amplification AttackFirewall Pentesting Steps4- Client Penetration TestingYou will learn Metasploit Framework ComponentsYou will learn Server-Side Exploitation using MetasploitYou will learn Client-Side Exploitation using MetasploitYou will learn Privilege Escalation using Bypass User Access Control (UAC)You will learn Post-Exploitation Attacks such as Remote SniffingYou will learn Post-Exploitation Attacks such as Host-Based DNS PoisoningAll the techniques in this comprehensive course are highly practical and at the end of this course, expected you to become an expert in Ethical HackingNotes :This course is created for educational purposes only. all the attacks are launched in my own lab. This course is a product of Hamed Mehdi and no other organization is associated with it or a certification exam but you will receive a Course Completion Certification from Udemy



Overview



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1 - MITRE Frameworks/1 - Introduction English.vtt2.6 KB
~Get Your Files Here !/1 - MITRE Frameworks/1 - Introduction.mp411.8 MB
~Get Your Files Here !/1 - MITRE Frameworks/2 - Terms English.vtt8.1 KB
~Get Your Files Here !/1 - MITRE Frameworks/2 - Terms.mp447.8 MB
~Get Your Files Here !/1 - MITRE Frameworks/3 - MITRE ATT&CK Framework English.vtt14.8 KB
~Get Your Files Here !/1 - MITRE Frameworks/3 - MITRE ATT&CK Framework.mp4121.8 MB
~Get Your Files Here !/1 - MITRE Frameworks/4 - DeTT&CT English.vtt10.3 KB
~Get Your Files Here !/1 - MITRE Frameworks/4 - DeTT&CT.mp473.6 MB
~Get Your Files Here !/1 - MITRE Frameworks/5 - Atomic Purple Team English.vtt2.5 KB
~Get Your Files Here !/1 - MITRE Frameworks/5 - Atomic Purple Team.mp413.4 MB
~Get Your Files Here !/1 - MITRE Frameworks/6 - Threat Hunting Tahiti English.vtt6.2 KB
~Get Your Files Here !/1 - MITRE Frameworks/6 - Threat Hunting Tahiti.mp430.7 MB
~Get Your Files Here !/1 - MITRE Frameworks/7 - Other MITRE Frameworks English.vtt2.9 KB
~Get Your Files Here !/1 - MITRE Frameworks/7 - Other MITRE Frameworks.mp414.1 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/10 - Dark Web English.vtt2.6 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/10 - Dark Web.mp417.2 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/11 - Search Engine Clustering English.vtt2.6 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/11 - Search Engine Clustering.mp433 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/12 - Whois English.vtt4 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/12 - Whois.mp445 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/13 - Reverse Whois English.vtt1.9 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/13 - Reverse Whois.mp425.5 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/14 - Spiderfoot English.vtt3.2 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/14 - Spiderfoot.mp442.7 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/15 - DNS English.vtt6.2 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/15 - DNS.mp444 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/16 - Wireless English.vtt5.4 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/16 - Wireless.mp447.1 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/17 - Email Recon English.vtt6.8 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/17 - Email Reconng.mp460.9 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/18 - People English.vtt2.8 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/18 - People.mp430.5 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/19 - Image English.vtt5.1 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/19 - Image.mp444.4 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/20 - OCR English.vtt2.1 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/20 - OCR.mp417.9 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/21 - Sock Puppet English.vtt7.1 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/21 - Sock Puppet.mp442.3 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/22 - Twitter English.vtt5.2 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/22 - Twitter.mp451.9 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/23 - Facebook English.vtt2.4 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/23 - Facebook.mp423 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/24 - Maltego English.vtt5.8 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/24 - Maltego.mp444.8 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/25 - Website Analysis using Maltego English.vtt4.3 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/25 - Website Analysis using Maltego.mp458.6 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/26 - Footprint Machine Levels in Maltego English.vtt2.8 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/26 - Footprint Machine Levels in Maltego.mp446.7 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/27 - Documentation English.vtt2.7 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/27 - Documentation.mp410.6 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/8 - OSINT Introduction English.vtt6.3 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/8 - OSINT Introduction.mp428.9 MB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/9 - Search Engines English.vtt11.3 KB
~Get Your Files Here !/2 - OpenSource INTelligence OSINT/9 - Search Engines.mp490.9 MB
~Get Your Files Here !/3 - Network Penetration Testing/28 - Layer 2 Attacks Definitions CDP Attack Lab English.vtt8.9 KB
~Get Your Files Here !/3 - Network Penetration Testing/28 - Layer 2 Attacks Definitions CDP Attack Lab.mp449.1 MB
~Get Your Files Here !/3 - Network Penetration Testing/29 - CAM Table Overflow Attack English.vtt1000 B
~Get Your Files Here !/3 - Network Penetration Testing/29 - CAM Table Overflow Attack.mp410 MB
~Get Your Files Here !/3 - Network Penetration Testing/30 - ARP Spoofing Attack English.vtt3 KB
~Get Your Files Here !/3 - Network Penetration Testing/30 - ARP Spoofing Attack.mp419 MB
~Get Your Files Here !/3 - Network Penetration Testing/31 - Switch Spoofing Attack English.vtt1.4 KB
~Get Your Files Here !/3 - Network Penetration Testing/31 - Switch Spoofing Attack.mp412.2 MB
~Get Your Files Here !/3 - Network Penetration Testing/32 - Double Tagging Attack English.vtt2.7 KB
~Get Your Files Here !/3 - Network Penetration Testing/32 - Double Tagging Attack.mp426.6 MB
~Get Your Files Here !/3 - Network Penetration Testing/33 - STP Attack English.vtt1.8 KB
~Get Your Files Here !/3 - Network Penetration Testing/33 - STP Attack.mp420.4 MB
~Get Your Files Here !/3 - Network Penetration Testing/34 - Cisco Password Decryption Attacks English.vtt2.9 KB
~Get Your Files Here !/3 - Network Penetration Testing/34 - Cisco Password Decryption Attacks.mp431.3 MB
~Get Your Files Here !/3 - Network Penetration Testing/35 - Layer 3 Attacks Definitions DHCP Starvation Attack English.vtt11.3 KB
~Get Your Files Here !/3 - Network Penetration Testing/35 - Layer 3 Attacks Definitions DHCP Starvation Attack.mp456.8 MB
~Get Your Files Here !/3 - Network Penetration Testing/36 - HSRP Attack English.vtt1.8 KB
~Get Your Files Here !/3 - Network Penetration Testing/36 - HSRP Attack.mp419.6 MB
~Get Your Files Here !/3 - Network Penetration Testing/37 - Log Spoofing Attack English.vtt3.6 KB
~Get Your Files Here !/3 - Network Penetration Testing/37 - Log Spoofing Attack.mp432.8 MB
~Get Your Files Here !/3 - Network Penetration Testing/38 - Log DDoS Attack English.vtt1.9 KB
~Get Your Files Here !/3 - Network Penetration Testing/38 - Log DDoS Attack.mp440.5 MB
~Get Your Files Here !/3 - Network Penetration Testing/39 - DNS Attacks Definitions DNS Spoofing Attack English.vtt3.4 KB
~Get Your Files Here !/3 - Network Penetration Testing/39 - DNS Attacks Definitions DNS Spoofing Attack.mp416.1 MB
~Get Your Files Here !/3 - Network Penetration Testing/40 - DNS Amplification Attack English.vtt1.2 KB
~Get Your Files Here !/3 - Network Penetration Testing/40 - DNS Amplification Attack.mp411.8 MB
~Get Your Files Here !/3 - Network Penetration Testing/41 - Firewall English.vtt6.8 KB
~Get Your Files Here !/3 - Network Penetration Testing/41 - Firewall.mp433.4 MB
~Get Your Files Here !/4 - Client Penetration Testing/42 - Client English.vtt3.4 KB
~Get Your Files Here !/4 - Client Penetration Testing/42 - ClientSide Exploitation Privilege Escalation.mp440.6 MB
~Get Your Files Here !/4 - Client Penetration Testing/43 - Remote Target Sniffing English.vtt1.6 KB
~Get Your Files Here !/4 - Client Penetration Testing/43 - Remote Target Sniffing.mp418.7 MB
~Get Your Files Here !/4 - Client Penetration Testing/44 - Host English.vtt1.3 KB
~Get Your Files Here !/4 - Client Penetration Testing/44 - HostBased DNS Poisoning.mp415.1 MB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy Most Complete RealWorld Ethical Hacking'.

There are no alternative torrents found.