Book
Penetration Tester to SecOps Engineer
Video Course
EC Council
- CEH v11: App Layer Attacks, Botnets & DoS Countermeasures
- CEH v11: Buffer Overflows, Privilege Escalation & System Access
- CEH v11: CEH Hacking Methodology & Windows Authentication
- CEH v11: Fileless Malware, Malware Analysis & Countermeasures
- CEH v11: Hijacking Concepts & Countermeasures
- CEH v11: NetBIOS, SMB, SNMP & LDAP Enumeration
- CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion
- CEH v11: Sniffing & Poisoning
- CEH v11: Social Engineering, Insider Threats & Identity Theft
- CEH v11: Vulnerability Assessment, Management & Classification
- CEHv10: Security Controls
- CEHv11: Cryptography, Algorithms, Implementations & Tools
- CEHv11: Intrusion Prevention and Detection, Firewalls & Honeypots
- CEHv11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures
- CEHv11: Mobile Hacking, OS Security & Device Management
- CEHv11: Web Application Attacks & Vulnerabilities
- CEHv11: Web Application Hacking and Login Attacks
- Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
- Certified Ethical Hacker - CEHv10: Covert Data Gathering
- Certified Ethical Hacker - CEHv10: Cryptography Attacks
- Certified Ethical Hacker - CEHv10: Cryptography Concepts
- Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
- Certified Ethical Hacker - CEHv10: Malware Distribution
- Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
- Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
EC-Council
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- CEH v11: DoS, DDoS, Volumetric & Protocol Attacks
- CEH v11: Incident Management, ML, AI & Regulations
- CEH v11: Malware, Threats, Trojans, & Viruses
- CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
- CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning
- CEH v11: Nmap TCP Scans
- CEH v11: NTP, NFS, SMTP & FTP Enumeration
- CEH v11: Passwords Attacks, Extraction & Cracking
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Steganography & Avoiding Detection
- CEH v11: Vulnerability Assessment Types, Models, Tools & Reports
- CEHv10: Denial of Service
- CEHv10: Ethical Hacking Overview and Threats
- CEHv10: Hidden Files and Covering Tracks
- CEHv10: Host Discovery and Scanning with Nmap
- CEHv10: Network Sniffing
- CEHv10: ProxyChains and Enumeration
- CEHv10: Vulnerability Analysis Concepts and Tools
- CEHv11: Cloud Computing, Containers, Hacking & Security Controls
- CEHv11: CSRF, IDOR, LFI & RFI Attacks
- CEHv11: Operational Technology Concepts, Attack Tools & Countermeasures
- CEHv11: PKI, Cryptanalysis & Attack Countermeasures
- CEHv11: SQL Injection & SQLMap
- CEHv11: SQL Injection Concepts & Attacks
- CEHv11: Web Server Hacking, Attacks & Attack Methodologies
- CEHv11: Wireless Concepts, Threats & Hacking Tools
- CEHv11: Wireless Hacking & Countermeasures
- CEHv11: XSS, Web Shells, APIs & Webhooks
- Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
- Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
- Certified Ethical Hacker - CEHv10: IoT Attacks
- Certified Ethical Hacker - CEHv10: Practical Web App Hacking
- Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
- TestPrep 312-50 Certified Ethical Hacker (CEH)
Internet and Network Technologies Solution Area
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
- CEH v11: Hacking Phases & Concepts
- CEH v11: Nmap IP Scans
- CEHv10: Common Web App Threats
- CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
- CEHv10: Footprinting
- CEHv10: Hacking Web Servers
- CEHv10: IoT Hacking and Countermeasures
- CEHv10: Password Attacks
- CEHv10: Password Attacks Part 2
- CEHv10: Pentesting, Laws, and Standards
- Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
- Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
- Certified Ethical Hacker - CEHv10: Common Web App Threats
- Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
- Certified Ethical Hacker - CEHv10: Cryptography Attacks
- Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
- Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
- Certified Ethical Hacker - CEHv10: Denial of Service
- Certified Ethical Hacker - CEHv10: Ethical Hacking Overview and Threats
- Certified Ethical Hacker - CEHv10: Footprinting
- Certified Ethical Hacker - CEHv10: Hacking Concepts
- Certified Ethical Hacker - CEHv10: Hacking Web Servers
- Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks
- Certified Ethical Hacker - CEHv10: IoT Attacks
- Certified Ethical Hacker - CEHv10: IoT Concepts
- Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures
- Certified Ethical Hacker - CEHv10: Malware Threats
- Certified Ethical Hacker - CEHv10: Password Attacks
- Certified Ethical Hacker - CEHv10: Password Attacks Part 2
- Certified Ethical Hacker - CEHv10: Privilege Escalation
- Certified Ethical Hacker - CEHv10: Security Controls Part 2
- Certified Ethical Hacker - CEHv10: Session Hijacking
- Certified Ethical Hacker - CEHv10: SQL Injection
- Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
Security
- CEH v11: Footprinting and Social Engineering Recon & Countermeasures
- CEH v11: Recon Tools & Tactics
- CEHv10: Hacking Concepts
- CEHv10: Security Controls Part 2
- CEHv10: SQL Injection
- CEHv10: Wireless Hacking Concepts
- Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
- Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
- Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
- Certified Ethical Hacker - CEHv10: Covert Data Gathering
- Certified Ethical Hacker - CEHv10: Cryptography Concepts
- Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
- Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
- Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
- Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
- Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
- Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap
- Certified Ethical Hacker - CEHv10: IoT Concepts
- Certified Ethical Hacker - CEHv10: Malware Distribution
- Certified Ethical Hacker - CEHv10: Malware Threats
- Certified Ethical Hacker - CEHv10: Network Sniffing
- Certified Ethical Hacker - CEHv10: Pentesting, Laws, and Standards
- Certified Ethical Hacker - CEHv10: Practical Web App Hacking
- Certified Ethical Hacker - CEHv10: Privilege Escalation
- Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration
- Certified Ethical Hacker - CEHv10: Security Controls
- Certified Ethical Hacker - CEHv10: Session Hijacking
- Certified Ethical Hacker - CEHv10: Social Engineering
- Certified Ethical Hacker - CEHv10: Social Engineering
- Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
- Certified Ethical Hacker - CEHv10: Vulnerability Analysis Concepts and Tools
- Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
- Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts