CEHv13 Prep
تصنيفات: EC-Council, اختبار اختراق الانظمة والشبكات
عن الدورة
دورة CEH v13 – EC-Council
دورة CEH v13 من EC-Council هي واحدة من أشهر وأقوى الشهادات العالمية في مجال الاختراق الأخلاقي والأمن السيبراني.
تهدف الدورة إلى تعليمك أحدث التقنيات والأدوات التي يستخدمها المخترقون مع التركيز على كيفية اكتشاف الثغرات وتأمين الأنظمة بطريقة عملية ومنهجية، مما يجعلك في الصفوف الأمامية لحماية بيانات وممتلكات المؤسسات.
ماذا سوف تتعلم؟
- التعرف على أنواع الهجمات السيبرانية وأساليبها.
- جمع المعلومات والاستطلاع (Footprinting & Reconnaissance).
- الفحص والبحث عن الثغرات (Scanning Networks).
- استغلال الثغرات وتقنيات الوصول غير المصرح به.
- الهندسة الاجتماعية والتصيد الاحتيالي.
- استغلال أنظمة التشغيل والخوادم (System Hacking & Privilege Escalation).
- هجمات على تطبيقات الويب وقواعد البيانات (Web App & DB Attacks).
- هجمات الشبكات والوايرلس — تحليل الترافيك، DoS، اختطاف الجلسات، واختراق الواي-فاي.
- تجاوز أنظمة الحماية والأمن المتقدم — إخفاء، IDS/Firewall/Honeypot، أمن السحابة وIoT، والتشفير.
- البرمجيات الخبيثة والتحليل (Malware, Fileless & AI-based Malware).
محتوى الدورة
Material – مكتمل
Material of CEHv13 Course
جروب الطلاب علي الواتساب
جروب خاص بكل النقاشات التي تتعلق بدوره ال CEHv13
لينك الجروب علي واتساب
Module 01 – Introduction to Ethical Hacking – مكتمل
01.1 – Introduction to Ethical Hacking – Part 1
20:0001.2 – Introduction to Ethical Hacking – Part 2
32:0001.3 – Introduction to Ethical Hacking – Part 3
33:0001.4 – Introduction to Ethical Hacking – Part 4
15:0001.5 – Introduction to Ethical Hacking – Part 5
33:0001.6 – Introduction to Ethical Hacking – Part 6
32:0001.7 – Introduction to Ethical Hacking – Part 7
44:0001.8 – Introduction to Ethical Hacking – Part 8
24:0001.9 – Introduction to Ethical Hacking – Part 9
21:0001.10 – Introduction to Ethical Hacking – Part 10
25:0001.11 – Lab Overview – Part 11
15:0001.12 – Introduction to Ethical Hacking – Part 12
27:0001.13 – Introduction to Ethical Hacking – Part 13
17:00
Module 02 – Footprinting and Reconnaissance – مكتمل
02.1 – Footprinting and Reconnaissance – Part 1
25:0002.3 – Footprinting and Reconnaissance – Part 3
16:0002.3 – Footprinting and Reconnaissance – Part 3
26:0002.4 – Footprinting and Reconnaissance – Part 4
39:0002.5 – Footprinting and Reconnaissance – Part 5
35:0002.6 – Footprinting and Reconnaissance – Part 6
26:0002.7 – Footprinting and Reconnaissance – Part 7
45:0002.8 – Gather DNS Information using nslookup Command Line Unity and Online Tool – Lab – Part 8
10:0002.9 – Footprinting and Reconnaissance – Part 9
13:0002.10 – Gather Information about a target By Tracking Email Using eMail Tracking Pro – Lab – Part 10
11:0002.11 – How to use Recon-ng – Lab – Part 11
18:0002.12 – Performing Whois Lookup using Domain Tools – Lab – Part 12
21:00
Module 03 – Scanning Networks – مكتمل
03.1 – Scanning Networks – Part 1
17:0003.2 – Scanning Networks – Part 2
25:0003.3 – Scanning Networks – Part 3
29:0003.4 – Scanning Networks – Part 4
27:0003.5 – Scanning Networks – Part 5
25:0003.6 – Scanning Networks – Part 6
42:0003.7 – Scanning Networks – Part 7
32:0003.8 – How to use Nmap To Detect Live hosts in network – Lab – Part 8
16:0003.9 – How to use Znmap To Detect Live hosts in network – Lab – Part 9
11:0003.10 – How to use Nmap NSE To Detect OS – Lab – Part 10
08:0003.11 – Scan beyond IDSFirewall using various Evasion Techniques – Lab – Part 11
16:0003.12 – Scan a Target Network using Metasploit – Lab – Part 12
16:00
Module 04 – Enumeration – مكتمل
04.1 – Enumeration – Part 1
30:0004.2 – Enumeration – Part 2
41:0004.3 – Enumeration – Part 3
19:0004.4 – Enumeration – Part 4
30:0004.5 – Enumeration – Part 5
21:0004.6 – Enumeration – Part 6
17:0004.7 – Enumeration – Part 7
24:0004.8 – Enumeration – Part 8
23:0004.9 – Enumeration – Part 9
14:0004.10 – Enumeration – Part 10
26:0004.11 – Perform NetBIOS Enumeration – Lab – Part 11
09:0004.12 – Perform SNMP Enumeration – Lab – Part 12
09:0004.13 – Perform SNMP Enumeration – Lab – Part 13
10:0004.14 – Perform NFS Enumeration – Lab – Part 14
14:0004.15 – Perform DNS Enumeration – Lab – Part 15
08:0004.16 – Perform SMTP Enumeration – Lab – Part 16
16:00
Module 05 – Vulnerability Analysis – مكتمل
05.1 – Vulnerability Analysis – Part 1
32:0005.2 – Vulnerability Analysis – Part 2
38:0005.3 – Vulnerability Analysis – Part 3
30:0005.4 – Vulnerability Analysis – Part 4
16:0005.5 – Vulnerability Analysis – Part 5
15:0005.6 – Vulnerability Analysis – Part 6
17:0005.7 – Vulnerability Analysis – Part 7
18:0005.8 – Vulnerability Analysis – Part 8
23:0005.9 – Perform vulnerability research with vulnerability scoring systems and databases – Lab – Part 9
08:0005.10 – Perform vulnerability assessment using various vulnerability assessment tools – Lab – Part 10
15:00
Module 06 – System Hacking – مكتمل
06.1 – System Hacking – Part 1
29:0006.2 – System Hacking – Part 2
21:0006.3 – System Hacking – Part 3
20:0006.4 – System Hacking – Part 4
24:0006.5 – System Hacking – Part 5
22:0006.6 – System Hacking – Part 6
18:0006.7 – Perform active online attack to crack the system’s password using Responder – Lab – Part 7
12:0006.8 – Gain access to a remote system using Reverse Shell Generator – Lab – Part 8
12:0006.9 – System Hacking – Part 9
26:0006.10 – System Hacking – Part 10
17:0006.11 – System Hacking – Part 11
35:0006.12 – System Hacking – Part 12
35:0006.13 – System Hacking – Part 13
31:0006.14 – System Hacking – Part 14
36:0006.15 – System Hacking – Part 15
27:0006.16 – Escalate privileges by bypassing UAC and exploiting Sticky Keys – Lab – Part 16
22:0006.17 – Use Spyrix to monitor user activities and maintain persistence on the target system – Lab – Part 17
10:0006.18 – Maintain persistence on the target system by modifying registry run keys – Lab – Part 18
16:0006.19 – Cover Over Tracking – Lab – Part 19
13:0006.20 – Enumeration On AD Environment – Lab – Part 20
10:0006.21 – Perform AS-Reproasting Attack – Lab – Part 21
10:0006.22 – Perform Password Sprying Attack – Lab – Part 22
10:0006.23- Post exploitation With PowerView – Lab – Part 23
15:0006.24 – How to Attack MSSQL Service – Lab – Part 24
15:0006.25 – Prev Esc – Lab – Part 25
15:0006.26 – Perform Kereroasting Attack – Lab – Part 26
10:00
Module 07 – Malware Threats – مكتمل
07.1 – Malware Threats – Part 1
25:0007.2 – Malware Threats – Part 2
24:0007.3 – Malware Threats – Part 3
33:0007.4 – Malware Threats – Part 4
22:0007.5 – Malware Threats – Part 5
24:0007.6 – Malware Threats – Part 6
23:0007.7 – Create a virus using the JPS Virus Maker Tool and infect the target system – Lab – Part 7
11:0007.8 – Gain control over a victim machine using the njRAT RAT Trojan – Lab – Part 8
12:0007.9 – Malware Threats – Part 9
26:0007.10 – Malware Threats – Part 10
23:0007.11 – Malware Threats – Part 11
11:0007.12 – Malware Threats – Part 12
17:0007.13 – Malware Threats – Part 13
22:0007.14 – Malware Threats – Part 14
19:0007.15 – Malware Threats – Part 15
17:0007.16 – Malware Threats – Part 16
23:0007.17 – Malware Threats – Part 17
33:0007.18 – Malware Threats – Part 18
23:0007.19 – Malware Threats – Part 19
32:0007.20 – Analyze an ELF executable file using Detect It Easy (DIE) – Lab – Part 20
07:0007.21 – Perform malware disassembly using IDA and OllyDbg – Lab – Part 21
14:0007.22 – Perform static malware analysis using Hybrid Analysis – Lab – Part 22
08:0007.23 – Malware Threats – Part 23
43:0007.24 – Perform dynamic malware analysis using TCPView and Process Monitor – Lab – Part 24
18:00
Remote Access Trojans – مكتمل
RAT
Module 08 – Sniffing – مكتمل
08.1 – Sniffing – Part 1
25:0008.2 – Sniffing – Part 2
23:0008.3 – Sniffing – Part 3
24:0008.4 – Perform MAC Flooding using macof – Lab – Part 4
10:0008.5 – Sniffing – Part 5
19:0008.6 – Sniffing – Part 6
27:0008.7 – Perform a DHCP Starvation Attack using Yersinia – Lab – Part 7
06:0008.8 – Sniffing – Part 8
30:0008.9 – Sniffing – Part 9
38:0008.10 – Perform Password Sniffing using Wireshark – Lab – Part 10
22:00
Module 09 – Social Engineering – مكتمل
09.1 – Social Engineering – Part 1
14:0009.2 – Social Engineering – Part 2
26:0009.3 – Social Engineering – Part 3
17:0009.4 – Social Engineering – Part 4
25:0009.5 – Social Engineering – Part 5
31:0009.6 – Social Engineering – Part 6
16:0009.7 – Sniff Credentials using the Social-Engineer Toolkit (SET) – Lab – Part 7
15:0009.8 – Detect Phishing using Netcraft – Lab – Part 8
09:00
Module 10 – Denial-of-Service (DoS – DDoS) – مكتمل
10.1 – Denial-of-Service (DoS – DDoS) – Part 1
26:0010.2 – Denial-of-Service (DoS – DDoS) – Part 2
24:0010.3 – Denial-of-Service (DoS – DDoS) – Part 3
30:0010.4 – Denial-of-Service (DoS – DDoS) – Part 4
29:0010.6 – Detect and Protect Against DDoS Attacks using Anti-DDoS Guardian – Lab – Part 6
12:0010.7 – Perform a DDoS Attack using Botnet – Lab – Part 7
24:0010.8 – Perform DoS and DDoS Attacks using Various Techniques – Lab – Part 8
10:00
Module 11 – Session Hijacking – مكتمل
11.1 – Session Hijacking – Part 1
23:0011.2 – Session Hijacking – Part 2
23:0011.3 – Session Hijacking – Part 3
26:0011.4 – Session Hijacking – Part 4
31:0011.5 – Session Hijacking – Part 5
19:0011.6 – Session Hijacking – Part 6
13:0011.7 – Hijack a Session using Caido – Lab – Part 7
23:0011.8 – Intercept HTTP Traffic using Hetty – Lab – Part 8
13:0011.9 – Detect Session Hijacking using Wireshark – Lab – Part 9
10:00
Module 12 – Evading IDS, Firewalls, and Honeypots – مكتمل
12.1 – Evading IDS, Firewalls, and Honeypots – Part 1
23:0012.2 – Evading IDS, Firewalls, and Honeypots – Part 2
26:0012.3 – Evading IDS, Firewalls, and Honeypots – Part 3
20:0012.4 – Evading IDS, Firewalls, and Honeypots – Part 4
25:0012.5 – Evading IDS, Firewalls, and Honeypots – Part 5
28:0012.6 – Evading IDS, Firewalls, and Honeypots – Part 6
24:0012.7 – Evading IDS, Firewalls, and Honeypots – Part 7
27:0012.8 – Deploy Cowrie Honeypot to Detect Malicious Network Traffic – Lab – Part 8
23:0012.9 – Evade Firewall through Windows BITSAdmin – Lab – Part 9
00:00
Module 13 – Hacking Web Servers – مكتمل
13.1 – Hacking Web Servers – Part 1
24:0013.2 – Hacking Web Servers – Part 2
29:0013.3 – Hacking Web Servers – Part 3
15:0013.4 – Hacking Web Servers – Part 4
15:0013.5 – Hacking Web Servers – Part 5
23:0013.6 – Footprint a web server using Netcat and Telnet – Lab – Part 6
08:0013.7 – Enumeration Web Server Information Using Nmap Script Engine (NSE) – Lab – Part 7
11:0013.8 – Cracking FTP Password using Dictionary Attack with Hydra – Lab – Part 8
13:0013.9 – exploiting the Log4j vulnerability to gain remote access to the web server – Lab – Part 9
15:00
Module 14 – Hacking Web Applications – مكتمل
14.1 – Hacking Web Applications – Part 1
21:0014.2 – Hacking Web Applications – Part 2
33:0014.3 – Hacking Web Applications – Part 3
37:0014.4 – Hacking Web Applications – Part 4
36:0014.5 – Hacking Web Applications – Part 5
43:0014.6 – Hacking Web Applications – Part 6
28:0014.7 – Hacking Web Applications – Part 7
10:0014.8 – gather information about the target web application, such as server details, open ports, and services – Lab – Part 8
10:0014.9 – Use OWASP ZAP for web infrastructure footprinting and vulnerability scanning – Lab – Part 9
10:0014.10 – Use Smar Scanner to scan web Application – Lab – Part 10
10:0014.11 – Perform a Brute-force Attack using Burp Suite – Lab – Part 11
10:0014.12 – Perform Remote Code Execution (RCE) Attack – Lab – Part 12 – Part 1
10:00
Module 15 – SQL Injection – مكتمل
15.1 – SQL Injection – Part 1
15:0015.2 – SQL Injection – Part 2
26:0015.3 – SQL Injection – Part 3
33:0015.4 – SQL Injection – Part 4
32:0015.5 – Use sqlmap to perform SQL injection attacks – Lab – Part 5
15:0016.6 – Detect SQL Injection Vulnerabilities using OWASP ZAP – Lab – Part 6
10:00
Module 16 – Hacking Wireless Networks – مكتمل
16.1 – Hacking Wireless Networks – Part 1
30:0016.2 – Hacking Wireless Networks – Part 2
25:0016.3 – Hacking Wireless Networks – Part 3
40:0016.4 – Hacking Wireless Networks – Part 4
19:0016.5 – Hacking Wireless Networks – Part 5
22:0016.6 – Hacking Wireless Networks – Part 6
20:00
Module 17 – Hacking Mobile Platforms – مكتمل
17.1 – Hacking Mobile Platforms – Part 1
30:0017.2 – Hacking Mobile Platforms – Part 2
34:0017.3 – Hacking Mobile Platforms – Part 3
36:0017.4 – Hacking Mobile Platforms – Part 4
16:0017.5 – Hacking Mobile Platforms – Part 5
32:0017.6 – using PhoneSploit-Pro to exploit Android vulnerabilities via ADB – Lab – Part 6
10:00video card 17.7 – using AndroRAT to create a malicious APK for gaining unauthorized access – Lab – Part 7
15:00
Module 18 – IoT and OT Hacking – مكتمل
18.1 – IoT and OT Hacking – Part 1
17:0018.2 – IoT and OT Hacking – Part 2
38:0018.3 – IoT and OT Hacking – Part 3
45:0018.4 – IoT and OT Hacking – Part 4
37:0018.5 – IoT and OT Hacking – Part 5
37:0018.6 – IoT and OT Hacking – Part 6
35:0018.7 – IoT and OT Hacking – Part 7
19:0018.8 – Perform Footprinting using Various Footprinting Techniques – Lab – Part 8
10:0018.9 – Capture and Analyze IoT Device Traffic – Lab – Part 9
15:00
Module 19 – Cloud Computing – مكتمل
19.1 – Cloud Computing – Part 1
28:0019.2 – Cloud Computing – Part 2
26:0019.3 – Cloud Computing – Part 3
20:0019.4 – Cloud Computing – Part 4
38:0019.5 – Cloud Computing – Part 5
37:0019.6 – Cloud Computing – Part 6
37:0019.7 – Perform Reconnaissance on Azure – Lab – Part 7
12:0019.8 – Exploit S3 Buckets – Lab – Part 8 – Part 1
14:00
Module 20 – Cryptography – مكتمل
20.1 – Cryptography – Part 1
23:0020.2 – Cryptography – Part 2
22:0020.3 – Cryptography – Part 3
31:0020.4 – Cryptography – Part 4
29:0020.5 – Cryptography – Part 5
26:0020.6 – demonstrates the use of tools like CyberChef for multi-layer hashing – Lab – Part 6
10:0020.7 – CryptoForge for file and text message encryption – Lab – Part 7
10:0020.8 – Perform Disk Encryption – Lab – Part 8
10:00
CEHv13 – Dump
CEHv13 – Dump
CEHv13 – eXam Review
CEHv13 eXam Review
10:00
احصل على شهادة اتمام الدورة بعد الإنتهاء
أضف هذه الشهادة إلى سيرتك الذاتية لإثبات مهاراتك وزيادة فرصك في الحصول علي وظيفة.

تقييمات ومراجعات الطلاب
لا يوجد تقييم حتى الآن


