Udemy - Most Complete Real-World Ethical Hacking

seeders: 10
leechers: 6
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

[ DevCourseWeb.com ] Udemy - Most Complete Real-World Ethical Hacking
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - MITRE Frameworks
    • 1 - Introduction English.vtt (2.6 KB)
    • 1 - Introduction.mp4 (11.8 MB)
    • 2 - Terms English.vtt (8.1 KB)
    • 2 - Terms.mp4 (47.8 MB)
    • 3 - MITRE ATT&CK Framework English.vtt (14.8 KB)
    • 3 - MITRE ATT&CK Framework.mp4 (121.8 MB)
    • 4 - DeTT&CT English.vtt (10.3 KB)
    • 4 - DeTT&CT.mp4 (73.6 MB)
    • 5 - Atomic Purple Team English.vtt (2.5 KB)
    • 5 - Atomic Purple Team.mp4 (13.4 MB)
    • 6 - Threat Hunting Tahiti English.vtt (6.2 KB)
    • 6 - Threat Hunting Tahiti.mp4 (30.7 MB)
    • 7 - Other MITRE Frameworks English.vtt (2.9 KB)
    • 7 - Other MITRE Frameworks.mp4 (14.1 MB)
    2 - OpenSource INTelligence OSINT
    • 10 - Dark Web English.vtt (2.6 KB)
    • 10 - Dark Web.mp4 (17.2 MB)
    • 11 - Search Engine Clustering English.vtt (2.6 KB)
    • 11 - Search Engine Clustering.mp4 (33.0 MB)
    • 12 - Whois English.vtt (4.0 KB)
    • 12 - Whois.mp4 (45.0 MB)
    • 13 - Reverse Whois English.vtt (1.9 KB)
    • 13 - Reverse Whois.mp4 (25.5 MB)
    • 14 - Spiderfoot English.vtt (3.2 KB)
    • 14 - Spiderfoot.mp4 (42.7 MB)
    • 15 - DNS English.vtt (6.2 KB)
    • 15 - DNS.mp4 (44.0 MB)
    • 16 - Wireless English.vtt (5.4 KB)
    • 16 - Wireless.mp4 (47.1 MB)
    • 17 - Email Recon English.vtt (6.8 KB)
    • 17 - Email Reconng.mp4 (60.9 MB)
    • 18 - People English.vtt (2.8 KB)
    • 18 - People.mp4 (30.5 MB)
    • 19 - Image English.vtt (5.1 KB)
    • 19 - Image.mp4 (44.4 MB)
    • 20 - OCR English.vtt (2.1 KB)
    • 20 - OCR.mp4 (17.9 MB)
    • 21 - Sock Puppet English.vtt (7.1 KB)
    • 21 - Sock Puppet.mp4 (42.3 MB)
    • 22 - Twitter English.vtt (5.2 KB)
    • 22 - Twitter.mp4 (51.9 MB)
    • 23 - Facebook English.vtt (2.4 KB)
    • 23 - Facebook.mp4 (23.0 MB)
    • 24 - Maltego English.vtt (5.8 KB)
    • 24 - Maltego.mp4 (44.8 MB)
    • 25 - Website Analysis using Maltego English.vtt (4.3 KB)
    • 25 - Website Analysis using Maltego.mp4 (58.6 MB)
    • 26 - Footprint Machine Levels in Maltego English.vtt (2.8 KB)
    • 26 - Footprint Machine Levels in Maltego.mp4 (46.7 MB)
    • 27 - Documentation English.vtt (2.7 KB)
    • 27 - Documentation.mp4 (10.6 MB)
    • 8 - OSINT Introduction English.vtt (6.3 KB)
    • 8 - OSINT Introduction.mp4 (28.9 MB)
    • 9 - Search Engines English.vtt (11.3 KB)
    • 9 - Search Engines.mp4 (90.9 MB)
    3 - Network Penetration Testing
    • 28 - Layer 2 Attacks Definitions CDP Attack Lab English.vtt (8.9 KB)
    • 28 - Layer 2 Attacks Definitions CDP Attack Lab.mp4 (49.1 MB)
    • 29 - CAM Table Overflow Attack English.vtt (1.0 KB)
    • 29 - CAM Table Overflow Attack.mp4 (10.0 MB)
    • 30 - ARP Spoofing Attack English.vtt (3.0 KB)
    • 30 - ARP Spoofing Attack.mp4 (19.0 MB)
    • 31 - Switch Spoofing Attack English.vtt (1.4 KB)
    • 31 - Switch Spoofing Attack.mp4 (12.2 MB)
    • 32 - Double Tagging Attack English.vtt (2.7 KB)
    • 32 - Double Tagging Attack.mp4 (26.6 MB)
    • 33 - STP Attack English.vtt (1.8 KB)
    • 33 - STP Attack.mp4 (20.4 MB)
    • 34 - Cisco Password Decryption Attacks English.vtt (2.9 KB)
    • 34 - Cisco Password Decryption Attacks.mp4 (31.3 MB)
    • 35 - Layer 3 Attacks Definitions DHCP Starvation Attack English.vtt (11.3 KB)
    • 35 - Layer 3 Attacks Definitions DHCP Starvation Attack.mp4 (56.8 MB)
    • 36 - HSRP Attack English.vtt (1.8 KB)
    • 36 - HSRP Attack.mp4 (19.6 MB)
    • 37 - Log Spoofing Attack English.vtt (3.6 KB)
    • 37 - Log Spoofing Attack.mp4 (32.8 MB)
    • 38 - Log DDoS Attack English.vtt (1.9 KB)
    • 38 - Log DDoS Attack.mp4 (40.5 MB)
    • 39 - DNS Attacks Definitions DNS Spoofing Attack English.vtt (3.4 KB)
    • 39 - DNS Attacks Definitions DNS Spoofing Attack.mp4 (16.1 MB)
    • 40 - DNS Amplification Attack English.vtt (1.2 KB)
    • 40 - DNS Amplification Attack.mp4 (11.8 MB)
    • 41 - Firewall English.vtt (6.8 KB)
    • 41 - Firewall.mp4 (33.4 MB)
    4 - Client Penetration Testing
    • 42 - Client English.vtt (3.4 KB)
    • 42 - ClientSide Exploitation Privilege Escalation.mp4 (40.6 MB)
    • 43 - Remote Target Sniffing English.vtt (1.6 KB)
    • 43 - Remote Target Sniffing.mp4 (18.7 MB)
    • 44 - Host English.vtt (1.3 KB)
    • 44 - HostBased DNS Poisoning.mp4 (15.1 MB)
    • Bonus Resources.txt (0.4 KB)

Description

Most Complete Real-World Ethical Hacking



https://DevCourseWeb.com

Published 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.54 GB | Duration: 4h 11m

Learn and review many modern courses just in one course as fast as possible

What you'll learn
45 Real World Ethical Hacking Videos
Start from ground up to the Sky
Latest & Newest Methods in Real World Ethical Hacking
Learn Latest Tools for Real World Ethical Hacking
Understand What Happened in Ethical Hacking Process
Modern Case Studies and Current Events
MITRE ATT&CK Framework
DeTT&CT Framework
Atomic Purple Team
Threat Hunting (Tahiti)
MITRE D3FEND Framework
MITRE RE&CT
MITRE Engage Framework
MITRE ENGENUITY Framework
MITRE Cyber Analytics Repository (CAR) Framework
Search Engines for OSINT
Whois
Reverse Whois
Dark Web OSINT
Search Engine Clustering
DNS OSINT
Wireless OSINT
Email OSINT
Recon-ng For OSINT
People OSINT
Spiderfoot for OSINT
Image OSINT
OCR for OSINT
Sock Puppet
Social Networks OSINT
Maltego
Maltego Website Analysis
Maltego Footprint Machines
Documentation
CDP Recon
ARP Spoofing Attack
CAM Table OverFlow Attack
Switch Spoofing Attack
Double Tagging Attack
STP Attack
Cisco Password Attacks (Type 5 & Type 7)
DHCP Starvation Attack
HSRP Attack
Syslog Spoofing Attack
Syslog DDoS Attack
DNS Spoofing Attack
DNS Amplification Attack
Discover Live Hosts in Restricted Networks
Learn Metasploit Framework
Server-Side Exploitation Attack
Client-Side Exploitation Attack
Bypass User Access Control
Remote Sniffing Attack
Host-Based DNS Poisoning Attack
Requirements
Basic Networking Knowledge
Description
Welcome to this comprehensive Ethical Hacking course...!This course assumes you have prior Networking knowledge. This course is practical but it won't neglect the theory. You'll learn everything Practically by exploiting everything such as Network Infrastructure Devices (Switch & Router) and Client (Windows 10) and you will never waste your time theoretical lecturesThis course is divided into 4 main sections1- MITRE FrameworksIn this Section, you will Learn MITRE Frameworks Such as :MITRE ATT&CK Framework and how it really works and how to use MITRE ATT&CK Navigator.You will learn DETT&CT Framework for Blue Teams and Investigators and how to use ityou will learn Threat Hunting Methodology (TaHiTI) for Threat Hunting, and how it works and introduction to MaGMa Use Case (UCS) Framework.and I will introduce MITRE Cyber Analytics Repository (CAR) Framework, MITRE D3FEND Framework, MITRE ENGENUITY Framework, MITRE Engage Framework, and MITRE RE&CT Framework.2- Open-source intelligence (OSINT)This Section is ideal for Ethical Hackers, Investigators and ResearchersYou will learn Search Engines, Dark Web For OSINTYou will learn Search Engine ClusteringYou will Learn Whois and Reverse WhoisYou will learn Spiderfoot for Website Analysis.You will learn DNS Records and DNS Analysis ToolsYou will learn Wireless OSINTYou will learn Email OSINT with Tools such as Recon-ng and WebsitesYou will learn People OSINTYou will learn Image OSINT Techniques such as Reverse Image SearchYou will learn OCR Technology for Image OSINTYou will learn Sock Puppet for Social NetworksYou will learn Social Networks OSINT such as Twitter and FacebookYou will learn Maltego and how it works.You will learn Maltego BasicsYou will learn Website analysis with MaltegoYou will learn Footprint Machine Levels with maltegoYou will learn documentation and see document template3- Network Penetration Testingin This section, You will learn Layer 2 Attacks such as :CDP/LLDP Recon and CDP FloodingCAM Table Overflow AttackARP Spoofing AttackVlan Hopping Attack (Switch Spoofing)Vlan Hopping Attack (Double Tagging)Spanning-Tree Protocol (STP) AttackYou will learn Layer 3 Attacks such as :Cisco Password Decryption Attacks (Type 5 & Type 7)DHCP Starvation AttackFHRP Protocol Attacks (HSRP Attack)You will learn Monitoring Attacks such as :Log Spoofing AttackLog DDoS Attackyou will learn DNS Attacks such as :DNS Spoofing AttackDNS Amplification AttackFirewall Pentesting Steps4- Client Penetration TestingYou will learn Metasploit Framework ComponentsYou will learn Server-Side Exploitation using MetasploitYou will learn Client-Side Exploitation using MetasploitYou will learn Privilege Escalation using Bypass User Access Control (UAC)You will learn Post-Exploitation Attacks such as Remote SniffingYou will learn Post-Exploitation Attacks such as Host-Based DNS PoisoningAll the techniques in this comprehensive course are highly practical and at the end of this course, expected you to become an expert in Ethical HackingNotes :This course is created for educational purposes only. all the attacks are launched in my own lab. This course is a product of Hamed Mehdi and no other organization is associated with it or a certification exam but you will receive a Course Completion Certification from Udemy

Overview



Download torrent
1.5 GB
seeders:10
leechers:6
Udemy - Most Complete Real-World Ethical Hacking


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.5 GB
seeders:10
leechers:6
Udemy - Most Complete Real-World Ethical Hacking


Torrent hash: 3AF4B62881FEEC0212C576EBCDEAC120F5157D34