نوآوري ديگر از گروه نرم افزاري پارسيان سافت
در راستاي اهداف گروه پارسيان سافت براي كاهش قيمتها و دسترسي كاربران به جديد ترين و كامل ترين مجموعه هاي آموزشي C|EH براي اولين بار اقدام به ارايه بسته ها ي كاملترين بسته هاي آموزشي( Career Academy و CBT Nuggets ) كه در نوع خود منحصر به فرد بوده و اكنون با قيمتي فوق العاده مناسب و غير قابل رقابت ارايه ميدهد
مشخصات هر كدام از بسته ها ي آموزشي :
C|EH Career Academy 2005 (7CD)
C|EH CBT Nuggets ( 1 CD )
C|EH Lab File Version 4.1 (2CD)
C|EH Lab File Video Version 4.1 ( 2 CD)
C|EH Specialist Solutions ( 9 CD ) NEW
KNOPPIX V5.0.1 ( 1 CD)
SLAX KillBill (1CD
5با خريد اين مجموعه شما عدد سی دی Hacking Revealed که قيمت ان 15 تومان ميباشد رو مجانی دريافت کنيد.
همينطور اين مجموعه تا آخر ماه شامل 20% تخفيف نيز ميباشد.
مدرك C|EH يا مدرك تخصصي هكرهاي قانونمند چيست ؟
آزمون و مدرك بين المللي CEH مخفف Certified Ethical Hacker متعلق به EC-Council يا International Council of Electronic Commerce Consultants مي باشد .اين سازمان كه در نيويورك آمريكا قرار دارد شامل گستره وسيعي از اعضا در سراسر دنيا مي باشد. تاسيس اين سازمان با استناد به اين واقعيت صورت گرفته است كه دنياي فن آوري اطلاعات به سوي تجارت الكترونيك در حال حركت مي باشد و لذا مدارك و دوره هاي EC-Council نيز بر اساس تركيب تجارت و آموزش تكنيكال و ايجاد بستر مناسب جهت دستيابي به يك كسب و كار موفق بنا نهاده شده است.اين مدارك بر اساس ابعاد انكار ناپذير e-business از جمله open standards, scalability, availability و security ايجاد گرديده و اين سازمان نماينده شركتهاي بزرگي از جملهMicrosoft ، IBM ، Xerox، SONY، Motorola ، Quantum ، Cisco و Verizon مي باشد. در حقيقت EC-Council در دنياي صنعت صداي جهاني متخصصين تجارت الكترونيك بوده و در اين راستا گام بر مي دارد.
يكي از معروفترين و كاربردي ترين مدارك اين سازمان مدرك CEH يا مدرك تخصصي هكرهاي قانونمند مي باشد.اين مدرك بر روي تكنيكها و تكنولوژيهاي هك از ديدگاه دفاعي تكيه مي نمايد.تكنيكهاي Hacking شامل راهها و روشهايي مي باشد كه طي آن برنامه ها به نحوي طراحي مي گردند كه كارهايي فراتر از آنچه از آنها انتظار مي رود را در جهت سياستها و پروسه هاي امنيتي ، انجام دهند.
اين دوره افراد را با Check List هاي امنيتي آشنا نموده و توانايي بررسي سيستم امنيتي موجود ،ابزار شناسايي نقاط ضعف سيستم و بالاتر از همه كليه متودولوژيهاي تعيين وضعيت امنيت يك سازمان توسط تستهاي نفوذ را به افراد اعطا مي نمايد.انجام Hack در آمريكا و اكثر كشورهاي جهان جرم محسوب مي گردد اما انجام تستهاي هك كه توسط متخصصين و هكرهاي قانونمند وطبق درخواست سازمانها صورت مي گيرد كاملا قانوني بوده و جهت تشخيص نقاط ضعف سيستمها انجام مي گيرد.
براي دريافت كاتالوگ ها و آشنايي با كامل ترين آرشيو موضوعي با دفتر ما تماس بگيريد
شماره فكس66736126
تلفن تماس در تهران 09122762520 مهندس عبّاسي
تلفن تماس در شهرستانها09153175136مهندس اژدري
توجه توجه :
براي مشتريان تهراني و شهرستاني عزيز، هزينه پيك و پست مجاني ميباشد
---------------------------------------
تمامی سر فصل های زير، به صورت تصويری به همراه برنامه مربوطه ( که در CEH Lab Files 4.1 وجود دارد ) آموزش داده شده .
View Complete Course Index ( Career Academy ):
Chapter 1
Introduction to Ethical Hacking
Can Hacking be Ethical
What does a Malicious Hacker Do?
Classification of Hackers
What do Ethical Hackers Do?
Modes of Ethical Hacking
Chapter 2
Footprinting
Revisiting Reconnaissance
Demo - Sam Spade & VisualRoute
Demo - Using Google
Network Range, Traceroute & Tools
Demo - Email Tracking
Information Gathering Methodology
Chapter 3
Scanning
War Dialers
TCP Three Way Handshake
Demo - SuperScan
Port Scanning Techniques
Port Scanning Tools
Scanning Tools
Demo - Cheops & nMap
Chapter 4
Enumeration
Net Bios Null Sessions
Demo - Creating a Null User Session
Countermeasure to Null Sessions
Hacking Tools
Demo - Using SolarWinds
How to Identify Accounts
More Hacking Tools
Demo - Cain Enable
Chapter 5
System Hacking
Password Guessing
Hacking Tool - KerbCrack
Demo - LoftCrack
Privilege Escalation
Password Cracking
Demo - Metasploit Project
SMBRelay
Man-In-The-Middle Scenario
More Hacking Tools
Countermeasures to Installing a Rootkit
Demo - Using an Alternate Data Stream
Demo - BlindSide
Chapter 6
Trojans & Backdoors
Backdoors
Demo - EliteWrap
Tools
BOSniffer and FireKiller
Chapter 7
Sniffers 25m 44s
Introduction to Sniffers
Demo - Ethereal
Passive & Active Sniffing Programs
Demo - Using SMAC
Sniffing HTTPS and SSH
Demo - Sniffing with Kaine Enable
Chapter 8
Denial of Service
Denial of Service Attacks
IDS Companies & Firewalls
Demo - Ping of Death DOS
Chapter 9
Social Engineering What is Social Engineering?
Adding Extra Security into your Corporation
Chapter 10
Session Hijacking
Understanding Session Hijacking
Demo - T-Sight
Protect against Session Hijacking
Chapter 11
Hacking Web Servers
Hacking Tools & Countermeasures
Demo - Simple Internet Client Attack
Unicode Attacks & IIS Log Files
Directory Traversal Tools
Demo - N-Stealth Security Scanner
Hacking Web Servers Review
Chapter 12
Web Application Vulnerabilities
Understanding Web Application Security
Demo - BlackWidow and BurpSpider
Hidden Fields
Demo - Man-In-The-Middle Attack
XXS Web Application
Demo - Performing Reconnaissance
Chapter 13
Web Based Password Cracking
Password Guessing
Demo - SnadBoy's Revelation
Chapter 14
SQL Injection
Shutting Down SQL Server
Demo - SQL Injection
SQL Dictionary
Chapter 15
Hacking Wireless Networks
Network Hacking Tools
Demo - "The Broken" Wireless Hacking & Cracking
Chapter 16
IDS, Firewalls & Honey Pots
Application Protocol Verification
Demo - Engage Packet Builder
TCP Replay
Bypassing Firewalls
Demo - KFSensor
IDS, Firewall and Honey Pots Review
Chapter 17
Linux Hacking
Compiling Programs in Linux
Demo - Nmap Front End
Linux Hacking Tools
Linux Hacking Review
Chapter 18
Buffer Overflows
Different Types of Buffer Overflows
Demo - RPC Exploit
Preventing Buffer Overflows
Chapter 19
Cryptography
Different Types of Cryptography
RC5 & Rainbow Tables
Demo - How to Create Rainbow Tables
Chapter 20
Virus and Worms
Terminologies
How is a worm different from virus?
Access Methods & Modes of Infections
Life Cycle of a Virus
Writing a Simple Virus Program
Prevention is Better Than a Cure
Anti-Virus Software
Chapter 21
Physical Security
Understanding Physical Security
What is the need of Physical Security?
Company Surroundings & Premises
Reception
Wireless Access Points
Security of Other Equipment
Wiretapping, Remote Access & Spying
Chapter 22
Penetration Testing
Penetration Testing Methodology
Open Source vs Proprietary Methodologies
Starting Point and Ending Points of Testing
Selecting the Right Tools
Penetration Testing Tools
Gathering Network Information
Different Types of Threats
More Tools
Demo - Nessus Security Analyzer
Reports and Logs
Ethical Hacker Course Closure
Learnkey : Hacking Revealed ( FREE ) Information About this CD :
Learnkey : Hacking Revealed
5 CD - 15 Hours of Interactive Training
Official Page for this Product :
http://www.learnkey.com/elearning/Pr...ngRevealed.asp View Complete Course Index: Session 1
Section A: Introduction
CD Tour
Certifications
Security Intro
Resource Types
Risk
Section B: Hacking Fundamentals
Exploiting Weaknesses
Exploit Process
Threat/Vulnerability Types
White-Hat vs. Black-Hat
Persistent vs. Casual
Motivations
Section C: Methodologies
Overview
Reconnaissance
Scanning
NMap Scan
Enumeration
Penetration
System Elevation
Network Elevation
Section D: Methodologies (cont.)
Pilfer
Expansion
Housekeeping
Common Tools
Other Tools
Section E: Network Scanning Phases 1 & 2
Overview
Network Topology
Network as a Target
Discovery
Scanning the Network
Scanning Tools
Section F: Network Scanning Phases 3 & 4
Enumerating
Packet Analyzers
CDP
CDP Demo
Weak Passwords
Common Conventions
Session 2
Section A: Management/Physical Threats
Device Management
Design Errors
SolarWinds
Physical Security
Physical Tools
Section B: Routers
Router Components
Routers & Domains
Dynamic Routing
Tools
Attacks
RIP
Section C: Bridges & Switches
Concepts
Root Bridges
Vulnerabilities/Attacks
ARP Poisoning
Section D: Firewalls
Firewall Concepts
Vulnerabilities
Design Vulnerabilities
Firewall Setup
Firewall Traversal
Section E: Wireless
Wireless Concepts
WEP
Management Console
Wireless Security
Wireless Modes
Wireless Vulnerabilities
Attacks
Warchalking/WarDriving
Section F: W2K Hacking Phases 1 & 2
Overview
Discovery/Reconnaissance
Scanning
Section G: Enumerating Servers
Overview
Database Servers
Mail/IM Servers
Network/Web Servers
Syslog/IAS Servers
Session 3
Section A: Enumeration Strategies & Tools
Tool Concepts
Terminal Services
General Banner Grabbing
Assorted Tools
Anonymous Connections
Browser/Client
Net Commands
LDAP Query Tools
Section B: Using Enumeration Tools
NetCat
Cain & Abel
Null Session
DumpSec
Section C: Penetrating Windows 2000/NT
Identification
Weaknesses
Default Configuration
Default Accounts
Account Management
Inherent OS Weaknesses
NetBIOS API
Tools
Section D: Penetration Tools & Strategies
LSA
Sniffer
Password Cracker
Notepad Execution
Section E: Elevation on Windows 2000/NT
Overview
SAM Dump
Tools/Vulnerabilities
L0phtCrack
SAM File
Registry
Section F: Pilfering
Permissions
Use Data
Targets
More Targets
Section G: File Permission Auditing
Folder Permissions
Registry Permissions
File Delete Child
File Delete Child Process
Session 4
Section A: Expansion
Scanning/Enumeration
Authentication
Relays & Proxies
Service Accounts
User Rights
Account Policies
Local Policies
Section B: Housekeeping
Cleaning Up
Reentry
File Header
Tools
Strategies
Section C: Event Log Management
Log Utilities
Set Up Audits
Audit Object Access
Section D: Terminal Server
Vulnerabilities
Detection Tools
Monitoring Tools
Attack Applications
Pipeupadmin
Section E: IIS
Evaluation
Weaknesses
Input Validation
Permissions
Application Analysis
Tools
Section F: Exploiting IIS
File Traversal
View Results
Section G: Securing IIS
Directory Structure
IDS
Internet Service Manager
DLLs
ISAPI Filters
Directory Browsing
Authentication
Lockdown
Session 5
Section A: Securing Windows 2000/NT
Analyze
Best Practices
Communication
User Education
Penetration Analysis
Backups
Tools
Restriction
Section B: Baseline Security Analysis
Security Analyzer
Security Report
Score & Templates
Options
Reports
Section C: UNIX Hacking Phases 1-3
Versions
Usage
Discovery/Reconnaissance
Scanning
Enumeration
Section D: UNIX Hacking Phases 4-7
Concepts
Brute Force Attack
Dir. Serv./Remoting
Pilfer Points
Expansion
Housekeeping
UNIX Resources
Section E: Security Policies
Adapt to Security
Security Plan
Risk Assessmen
Cost
Personnel/Culture
Section F: Prevention Strategies
Passive/Proactive Plan
Testing & Documentation
Fall Back Plan
When it Happens!
Discovery
Reaction
موضوعات مشابه: