Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022

Start your Cyber Security Career with CCST+ Course - Learn Metasploit, Linux, Ethical Hacking and other awesome topics.

4.20 (45 reviews)
Udemy
platform
English
language
Network & Security
category
14,034
students
9 hours
content
Jan 2022
last update
$129.99
regular price

What you will learn

Cybersecurity Training

Networking

Linux File Management

Linux Fundamentals

Linux Networking

Linux Software Control

Cybersecurity Fundamentals

Windows Firewall

Networking Training

CCST+ Training

Metasploit

Exploit Development and Testing

and other awesome topics --->

Description

Ethical hacking is the identification and exploitation of security vulnerabilities for the purpose of improving an organisation’s cyber security. Ethical hacking helps organisations improve their security status by uncovering exposures that are beneath the surface and providing support to address them.

An ethical hacker, also commonly referred to as a white hat hacker, is a cyber security professional entrusted to perform ethical hacking assessments. Certified ethical hackers possess a comprehensive understanding of the tactics and techniques that malicious ‘black hat’ attackers use and leverage this knowledge to ensure that ethical hacking assessments accurately reflect real-life adversarial approaches.

The term ethical hacking is used to describe a broad range of assessment types. From penetration tests performed over a matter of days, to red team operations conducted over weeks and months, ethical hacking engagements vary significantly in scope, duration and price.

Although ethical hacking is sometimes used interchangeably with penetration testing, there are some important differences.

Ethical hackers may get involved in tactics beyond penetration testing. For example, they might choose to test defenses against social engineering techniques by encouraging employees to reveal sensitive business data or log-in credentials.

On the other hand, penetration testing is focused solely on assessing one or a few network vulnerabilities that organizations may have.

Screenshots

Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Screenshot_01Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Screenshot_02Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Screenshot_03Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Screenshot_04

Content

Cybersecurity - Beginning

What is Cyber Security
Firewalls
Windows Firewall
DMZ
VPN

Linux - File System

Linux - Filesystem Part 1
Linux - Filesystem Part 2
Linux - Logging and Remaining Stealthy
Linux Creating our own Web Server

Linux - Working with Archive files

Linux - Working With Archive Files 1
Linux - Working With Archive Files 2

Linux - Working With Files and Permissions

Linux Working With Files - Part 1
Linux Working With Files - Part 2

Linux - Working with Processes

Working with Processes - Part 1
Linux Filtering Processes
Working With Processes - Part 2
Working with Processes - Part 3

Linux - Working With USER Enviroment Variables

User Enviroment Variable Introduction
Changing Enviroment Variables
Editing and Creating New Variables

Linux - Networking

Fundamentals of Linux Introduction
Dealing With Files
Linux Network Manipulation - Part 1
Linux Mac Adress Spoofing
Changing DNS in Linux
Manipulating Hosts File

Linux - Software Control

Linux APT Part 1
Linux APT Part 2

Networking

TCP-IP - Part 1
TCP-IP - Part 2
TCP-IP - Part 3
TCP-IP - Part 4
TCP-IP - Part 5

Networking - Capturing Network Traffic

Passive Capture and Wireshark
Active and Passive Capture

Information Gathering

Introduction to Information Gathering
DNS Info Gathering
Maltego - Part 1
Reconnaissance and Footprinting

Mastering Metasploit

Installing Metasploitable
Installing Metasploit
Metasploit Basics - Part 1
Metasploit Basics - Part 2
Metasploit Basics - Part 3
Running NMAP in Metasploit and Port Scanning
Exploiting SMB Ports
Metasploit Passive Information Gathering - Part 1
Metasploit - Finding Subdomains
Metasploit - TCP Port Scanning
Metasploit - TCP SYN Port Scanning
Metasploit - Passive Information Gathering - Part 2
Metasploit - Version Detection

Reviews

Allan
March 8, 2022
The English is pathetic and I'm struggling to read the subtitles but even then it's still hard to get what he's saying

Charts

Price

Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Price chart

Rating

Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Ratings chart

Enrollment distribution

Cyber Security and Ethical Hacking Masterclass | CSEH+ 2022 - Distribution chart

Coupons

DateDiscountStatus
1/13/2022100% OFF
expired
1/23/2022100% OFF
expired
2/5/2022100% OFF
expired
2/21/2022100% OFF
expired
3/6/2022100% OFF
expired
3/13/2022100% OFF
expired
3/28/2022100% OFF
expired
4/7/2022100% OFF
expired
4/14/2022100% OFF
expired
4/24/2022100% OFF
expired
5/11/2022100% OFF
expired

Related Topics

4488594
udemy ID
1/11/2022
course created date
1/13/2022
course indexed date
Angelcrc Seven
course submited by