Certified Ethical Hacker-CEH v12
CHAPTER 1
1.1: Introduction to Course
1.2: Introduction to Linux Fundamental
1.3: Linux Distributions or Distro
1.4: Linux Kernel And File System Mangement
1.5: Lab Setup
1.6: Apt,Yum,Git Explained
1.7: The Linux Command Line
1.8: Shell Scripting Basics
1.9: User Management & User Profiles
CHAPTER 2
2.1: Introduction to Cyber Security
2.2: Machines and Cyber Security vs Information Security
2.3: Fundamental of Cyber Security & Hacking Concepts
2.4: Laws and Standards
2.5: Cyber Kill Chain & Security Control
CHAPTER 3
3.1: Footprinting and Reconnaissance
3.2: Footprinting Concepts
3.3: Footprinting through Search Engine & Web Services
3.4: Website Footprinting
3.5: Email Footprinting ,DNS & Network Footprinting
3.6: Footprinting through Social Engineering
1 of 6
Previous Lesson
Next Lesson
1.9: User Management & User Profiles
Certified Ethical Hacker-CEH v12
1.9: User Management & User Profiles
Previous Lesson
Back to Course
Next Lesson
WhatsApp us