CEH v9 Instructor Slides by xsukax

  • CategoryOther
  • TypeE-Books
  • LanguageEnglish
  • Total size186 MB
  • Uploaded Byxsukax
  • Downloads1496
  • Last checkedJun. 14th '18
  • Date uploadedJun. 20th '17
  • Seeders 17
  • Leechers2

Infohash : 72DFE11DCF3DA0282CE61FD11383D51AC3232A23

Certified Ethical Hacking Certification

CEH-Cert-Mokcup-02-1A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The purpose of the CEH credential is to:

Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
Inform the public that credentialed individuals meet or exceed the minimum standards.
Reinforce ethical hacking as a unique and self-regulating profession.
About the Exam

Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Files:

CEH v9 Instructor Slides by xsukax
  • CEHv9 Module 00 Unlocked - xsukax.pdf (3.0 MB)
  • CEHv9 Module 09 Denial-of-Service - xsukax.pdf (5.1 MB)
  • CEHv9 Module 04 Enumeration - xsukax.pdf (5.2 MB)
  • CEHv9 Module 10 Session Hijacking - xsukax.pdf (5.9 MB)
  • CEHv9 Module 18 Cryptography - xsukax.pdf (6.6 MB)
  • CEHv9 Module 08 Social Engineering - xsukax.pdf (7.3 MB)
  • CEHv9 Module 17 Cloud Computing - xsukax.pdf (7.3 MB)
  • CEHv9 Module 01 Introduction to Ethical Hacking - xsukax.pdf (8.8 MB)
  • CEHv9 Module 03 Scanning Networks - xsukax.pdf (9.1 MB)
  • CEHv9 Module 02 Footprinting and Reconnaissance - xsukax.pdf (9.1 MB)
  • CEHv9 Module 11 Hacking Webservers - xsukax.pdf (9.3 MB)
  • CEHv9 Module 07 Sniffing - xsukax.pdf (9.4 MB)
  • CEHv9 Module 13 SQL Injection - xsukax.pdf (11.1 MB)
  • CEHv9 Module 16 Evading IDS, Firewalls, and Honeypots - xsukax.pdf (11.5 MB)
  • CEHv9 Module 15 Hacking Mobile Platforms - xsukax.pdf (12.2 MB)
  • CEHv9 Module 05 System Hacking - xsukax.pdf (14.9 MB)
  • CEHv9 Module 14 Hacking Wireless Networks - xsukax.pdf (16.0 MB)
  • CEHv9 Module 06 Malware Threats - xsukax.pdf (17.0 MB)
  • CEHv9 Module 12 Hacking Web Applications - xsukax.pdf (17.2 MB)

Code:

  • udp://tracker.openbittorrent.com:80/announce
  • udp://tracker.opentrackr.org:1337/announce