CEH v11 Book
CEH v11. Ethical hacking and penetration testing
The course provides detailed materials on the operation of computer systems and networks. Typical vulnerabilities of network protocols, operating systems and applications are considered.
Sequences of various types of attacks on computer systems and networks are described, and recommendations for strengthening the security of computer systems and networks are proposed.
CEH v11 Book
Certified Ethical Hacker (CEH) Version 11. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure: https://python.engineering/ceh-v11-certified-ethical-hacker-study-guide/.
You will gain the knowledge and skills you need to successfully identify and resolve security issues in mixed computer networks. The course focuses on unique hacking techniques and hacking techniques in the context of applying the defensive practices and recommendations outlined by real hackers. The course is approved by the US Department of Defense and is the official bible for security personnel.
Required Preparation: Successful completion of the CNDv2 course: Protection against hacker attacks or equivalent training. As well as the skills of administering Windows and Linux systems.
Recommended training (optional): English for IT professionals (pre-intermediate) or knowledge of technical English.
The aim of the course is to give students the knowledge and skills to form a systematic approach to ensuring computer security, to teach methods of checking the security of various nodes of a computer network and to acquaint students with the tools of attackers, with their advantages and limitations.
This course provides a detailed knowledge of ensuring computer security of modern systems and will be important for security administrators as a reference on various methods and means of hacking computer networks and systems. The course is also useful for security personnel to improve their work efficiency, taking into account the new tricks of attackers, and no doubt this course will be of interest to IT managers to form a realistic assessment of the current situation in the field of computer security. In addition, the course is useful for security professionals as a preparation for obtaining international certification.