Certified Ethical Hacker (CEH) v.12 By ITPROTV

 



What is the Certified Ethical Hacker (CEH) Certification Exam?

The Certified Ethical Hacker (CEH) certification exam supports and verifies the knowledge of auditors, security officers, site admins, security professionals, as well as anyone who wants to ensure a network is safe against cybercriminals.


Official Website Link https://www.itpro.tv/courses/security-skills/certified-ethical-hacker-v12/


Intro to Ethical Hacking

    1. Course Overview 
    2. Basic Cybersecurity Concepts
    3.  The Attacker Motives and Objectives 
    4.  Attack Categories
    5.  Information Warfare
    6.  Cyber Kill Chain
    7.  Tactics Techniques And Procedures
    8.  Common Adversarial Behaviors
    9.  Threat Hunting Concepts
    10. Risk And Risk Management 
    11. Cyber Threat Intelligence
    12.  Threat Modeling 
    13. Incident Management Handling And Response 
    14. ML And AI
    15. Standards And Regulations
    16. CEH Hacking Methodology 
    17. MITRE ATT&CK Framework 
    18. Diamond Model Of Intrusion Analysis

    RECON TECHNIQUES - FOOTPRINTING AND RECON

    1. Footprinting Concepts
    2. Google Dorks
    3. Shodan And Censys
    4. Sub-Domain Enumeration
    5. Social Networking Recon
    6. Job Board Recon
    7. Deep-Dark Web Recon
    8. Email Tracking
    9. WHOIS And DNS Recon
    10. Social Engineering Recon
    11. Other Footprinting Tools
    12. Footprinting And Recon Countermeasures

    RECON TECHNIQUES - SCANNING

    1. Network Scanning Types
    2. Network Scanning Tools
    3. Host Discovery
    4. Port And Service Scanning
    5. TCP Connect Scan
    6. Stealth Scan
    7. Inverse TCP XMAS And Maimon Scans
    8. ACK Scan
    9. IDLE IPID Scan
    10. UDP Scan
    11. SCTP INIT And COOKIE ECHO Scans
    12. Scan Optimizations
    13. Target OS Identification Techniques
    14. IDS And Firewall Evasion

    RECON TECHNIQUES - ENUMERATION

    1. NetBIOS And SMB Enumeration
    2. SNMP Enumeration
    3. LDAP Enumeration
    4. NTP Enumeration
    5. NFS Enumeration
    6. SMTP Enumeration

    SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - VULNERABILITY ANALYSIS

    1. Vulnerability Assessment Concepts And Resources
    2. Vulnerability Management Life-Cycle
    3. Vulnerability Classification
    4. Vulnerability Assessment Types
    5. Vulnerability Assessment Models And Tools
    6. Vulnerability Assessment Reports

    SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - SYSTEM HACKING

    1. CEH Hacking Methodology And Goals
    2. Windows Authentication
    3. Password Attacks - Basic Concepts
    4. Password Extraction And Cracking
    5. Password Attacks Cracking Enhancement Techniques
    6. Buffer Overflows
    7. Privilege Escalation
    8. Maintaining Access
    9. Steganography
    10. Covering Tracks
    11. AD Enumeration
    12. Mimikatz
    13. Pivoting

    SYSTEM HACKING PHASES AND ATTACK TECHNIQUES - MALWARE THREATS

    1. Malware Concepts And Components
    2. APT
    3. Trojans
    4. Viruses And Worms
    5. Fileless Malware
    6. Malware Analysis
    7. Malware Countermeasures

    NETWORK AND PERIMETER HACKING - SNIFFING

    1. Network Sniffing Basics
    2. DHCP Sniffing Attacks
    3. ARP Poisoning
    4. DNS Poisoning
    5. Sniffing Defenses

    NETWORK AND PERIMETER HACKING - SOCIAL ENGINEERING

    1. Social Engineering Concepts And Attacks
    2. Insider Threats
    3. Identity Theft

    NETWORK AND PERIMETER HACKING - DENIAL OF SERVICE

    1. DoS And DDoS Attacks
    2. Volumetric Attacks
    3. Protocol Attacks
    4. Application Layer Attacks
    5. Botnets
    6. DoS And DDoS Countermeasures

    NETWORK AND PERIMETER HACKING - SESSION HIJACKING

    1. Session Hijacking Concepts
    2. Network Level Session Hijacking
    3. Application Level Session Hijacking
    4. Session Hijacking Countermeasures

    NETWORK AND PERIMETER HACKING - EVADING FIREWALLS, IDS, AND HONEYPOTS

    1. IDS And IPS
    2. Firewalls
    3. Honeypots

    WEB APPLICATION HACKING - HACKING WEB SERVERS

    1. Web Server Basics
    2. Web Server Attacks
    3. Web Server Hacking Methodology

    WEB APPLICATION HACKING - HACKING WEB APPLICATIONS

    1. Web App Basics
    2. OWASP Top 10 Web Application Attacks 2021
    3. Web App Hacking Methodology
    4. Unvalidated Redirects And Forwards
    5. XSS And CSRF
    6. Input Filtering Evasion
    7. IDOR
    8. LFI RFI
    9. APIs And Webhooks

    WEB APPLICATION HACKING - SQL INJECTION

    1. SQLi Concepts
    2. Error-Based SQLi Attacks
    3. Blind-Based SQLi Attacks
    4. SQLi To System Access
    5. SQLMap

    WIRELESS NETWORK HACKING - HACKING WIRELESS NETWORKS

    1. Wireless Basics
    2. Wireless Threats
    3. Wireless Hacking Tools
    4. Wireless Hacking
    5. Wireless Hacking Countermeasures

    MOBILE PLATFORM, IOT, AND OT HACKING - HACKING MOBILE PLATFORMS

    1. Mobile Hacking Basics
    2. Android Security
    3. IOS Security
    4. Mobile Device Management

    MOBILE PLATFORM, IOT, AND OT HACKING - IOT AND OT HACKING

    1. Basics of Iot
    2. IoT Threats And Vulnerabilities
    3. IoT Attacks Tools And Countermeasures
    4. Basics of OT
    5. Attacks Tools And Countermeasures of OT

    CLOUD COMPUTING - CLOUD COMPUTING

    1. Basics of Cloud Computing 
    2. Basics of Container 
    3. Hacking Cloud Services
    4. Cloud Security Controls

    CRYPTOGRAPHY - CRYPTOGRAPHY

    1. Basics of Cryptography 
    2. Algorithms And Implementations of Crypto 
    3. Tools of Cryptography
    4. Public Key Infrastructure
    5. Cryptanalysis
    6. Crypto-Attack Countermeasures








    Getting Info...

    25 comments

    1. If possible please upload all the ITproTV course like CompTIA Security+ , CCNA Network+ etc
      1. yea sure
    2. the decrypt key in is not working . In the link you put in telegram
      1. use 2 link ( backuplink )
    3. can you upload the Transcript please?
      1. Ok sir
    4. The ITProTv link on Mega is down, I couldn't complete the download
      You guys should please do something about it
      1. yes some time in update
    5. The mega link got copyright strike
    6. This link is not working. Please resend 😭
    7. the link is not working :(
    8. mega link is already down any backup?
    9. backup link also is down please re upload to another hosting site ^^
    10. the link is down, maybe due to copystrike.. PLEASE upload the ITPRO.TV ceh v12 course again and give the new link... i really need this course, i have been watching this for the past days... so please
      1. yes some time in update
    11. I've Downloaded All Zip Files From Telegram and When I Extract It Is Throwing Me The Error.
      1. download all file and then extract
    12. Please upload Video CC translator or Transcript
    13. I have downloaded first 11 sections, anyone with latter part should exchange with me
    14. How do I extract the file downloaded from the telegram
      1. How do I extract the file downloaded from the telegram
      2. First download all file and then extract first file using 7zip
    15. Please reupload the Cehv12 itprotv its so helpful thank you so much for what your doing for us🥹 pls reply admin
      1. all links are working check again
    16. What is decryption key in mega link


    Cookie Consent
    We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
    Oops!
    It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
    AdBlock Detected!
    We have detected that you are using adblocking plugin in your browser.
    The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
    Site is Blocked
    Sorry! This site is not available in your country.