EC‑Council CEH v13 Module 2: Footprinting and Reconnaissance

فهرست مطالب کتاب ECCouncil CEH v13 Module 2: Footprinting and Reconnaissance:

Footprinting Concepts

Footprinting through Search Engines

Footprinting through Internet Research Services

Footprinting through Social Networking Sites

Whois Footprinting

DNS Footprinting

Network and Email Footprinting

Footprinting through Social Engineering

Footprinting Tasks using Advanced Tools and Al

Footprinting Countermeasures

EC‑Council CEH v13 Module 3: Scanning Networks

فهرست مطالب کتاب ECCouncil CEH v13 Module 3: Scanning Networks:

Network Scanning Concepts

Host Discovery

Port and Service Discovery

OS Discovery

Scanning Beyond IDS and Firewall

Network Scanning Countermeasures

EC‑Council CEH v13 Module 5: Vulnerability Analysis

فهرست مطالب کتاب ECCouncil CEH v13 Module 5: Vulnerability Analysis:

Vulnerability Assessment Concepts

Vulnerability Assessment Tools

Vulnerability Assessment Reports

EC‑Council CEH v13 Module 6: System Hacking

فهرست مطالب کتاب EC‑Council CEH v13 Module 6: System Hacking:

Gaining Access

Escalating Privileges

Maintaining Access

Clearing Logs

EC‑Council CEH v13 Module 7: Malware Threats

فهرست مطالب کتاب ECCouncil CEH v13 Module 7: Malware Threats:

Malware and APT Concepts

Fileless Malware Concepts

Al-based Malware Concepts

Malware Analysis

Malware Countermeasures

EC‑Council CEH v13 Module 8: Sniffing

فهرست مطالب کتاب ECCouncil CEH v13 Module 8: Sniffing:

Sniffing Concepts

Sniffing Techniques

Sniffing Tools

Sniffing Countermeasures

EC‑Council CEH v13 Module 9: Social Engineering

فهرست مطالب کتاب ECCouncil CEH v13 Module 9: Social Engineering:

Social Engineering Concepts

Human-based Social Engineering Techniques

Computer-based Social Engineering Techniques

Mobile-based Social Engineering Techniques

Social Engineering Countermeasures

EC‑Council CEH v13: Ethical Hacking and Countermeasures

فهرست مطالب کتاب ECCouncil CEH v13: Ethical Hacking and Countermeasures:

Module 01: Introduction to Ethical Hacking

Information Security Overview

Hacking Concepts and Hacker Classes

Ethical Hacking Concepts

Hacking Methodologies and Frameworks

Information Security Controls

Information Security Laws and Standards

EC‑Council CEH v13: Module 4 Enumeration

فهرست مطالب کتاب ECCouncil CEH v13: Module 4 Enumeration:

Enumeration Concepts

NetBIOS Enumeration

SNMP and LDAP Enumeration

NTP and NFS Enumeration

SMTP and DNS Enumeration

Other Enumeration Techniques

Enumeration Countermeasures

Effective Modern C++ 42 Specific Ways to Improve Your Use of C++11 and C++14

فهرست مطالب کتاب Effective Modern C++:

  1. Deducing Types
  2. auto
  3. Moving to Modern C++
  4. Smart Pointers
  5. Rvalue References, Move Semantics, and Perfect Forwarding
  6. Lambda Expressions
  7. The Concurrency API
  8. Tweaks