IT & SoftwareNetwork & Security

Certified Ethical Hacker|CEHv12(Arabic)#UNOFFICIAL#

الدوره الشامله لتصبح هكر اخلاقي معتمد (CEHv12)

Description

We welcome you to this comprehensive ethical hacking course! We assume you have no prior knowledge of programming or hacking, and by the end of the course you will be able to hack systems like a black hat hacker and secure them like security experts!

This course is very practical but will not neglect the theoretical part; We’ll start with the basics of ethical hacking, break down the different areas of penetration testing and install the required software (on Windows, Linux, and Mac OS X), then we’ll dive in and start hacking right away. You will learn everything by eg, by analyzing and exploiting different systems like networks, servers, clients, websites…..etc. We will not have any boring theory lectures.

The course is divided into several sections, each section covers a testing/hacking area, and in each of these sections you will first learn how the target system works, the vulnerabilities in that system, and how to practically exploit these vulnerabilities to hack that system.

By the end of the course you will have a solid grounding in most areas of hacking and you will also learn how to detect, prevent and secure systems and secure yourself from the attacks discussed.

The course is divided into five main sections:

1. Network Hacking – This section will teach you the basics of a network, how it works, and how devices communicate with each other. You will also learn a number of powerful techniques that allow you to gather comprehensive information about connected devices, and see anything they do on the Internet (such as login information, passwords, etc.). traffic, urls visited, images, videos…etc), redirect requests, malicious code insertion into loaded pages and much more! All of these attacks work against both wired and wireless networks.

2. Gaining Access – In this section you will learn two main methods of gaining full control or hacking into computer systems:

A – Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without user intervention. You will learn how to gather useful information about a target computer system such as its operating system, open ports, and installed services, and then use this information to discover and exploit vulnerabilities to take full control of the target. Finally you will learn how to automatically scan servers for vulnerabilities and generate different types of reports using your discoveries.

b – Client Side Attacks: If the target system does not contain any vulnerabilities, the only way to hack them is through interaction from the users, in this subsection you will learn how to get the target user to open a backdoor on their system without them realizing it. You will also learn how to create Trojans by disguising ordinary files (such as an image or pdf file) and sending fake emails that appear as if they were sent from the target’s friend, boss, or any email account they are likely to interact with in order to run your Trojan. .

3. Hacking Android Devices – In this section, you will learn how to hack Android devices and take full control of them

4. Post Exploit – In this section you will learn how to interact with systems that have been compromised so far. You will learn how to access the file system (read/write/mount/execute), maintain your access, and spy on the target such as taking screenshots.

5. Website Hacking – In this section you will learn how websites work, how to collect information about the target website (such as website owner, server location, technologies used…etc) and how to detect and exploit critical vulnerabilities to hack websites by:

– download file.

Code execution.

– Include the local file.

– Include a remote file.

– SQL injection.

Cross-Site Scripting (XSS)

At the end of each section you will learn how to detect, prevent and secure systems and secure yourself from the attacks discussed.

All the techniques in this course are practical and work against real systems, you will understand the complete mechanism of each technique first, then you will learn how to use it to hack the target system. By the end of the course, you will be able to modify these techniques for more powerful attacks, and adapt them to suit different situations and different scenarios.

Who this course is for:

  • Beginner for cyber security

Enroll Now

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button