4.97
(68 تقييمات)
eJPTv2 Prep
تصنيفات: اختبار اختراق الانظمة والشبكات
عن الدورة
تم تحديث كل اللابات الخاصة بالدورة بتاريخ يناير 2025
ماذا سوف تتعلم؟
- Penetration Testing Basics
- Vulnerability Assessment
- Network Attacks
- Web Attacks
محتوى الدورة
مكتمل [جزء اختياري] – Prerequisites
هذا الجزء اختياري من خارج الدورة فى حالة لم تكن علي دراية بأساسيات الشبكات و الويب واختبار الإختراق من قبل.
-
01.1- Introduction – Part 1
42:20 -
01.2- Introduction – Part 2
18:36 -
02.1- Networking – Part 1
57:54 -
02.2- Networking – Part 2
55:00 -
02.3- Networking – Part 3
01:10:05 -
02.4- Networking – Part 4
53:52 -
02.5- Networking – Part 5
01:05:19 -
02.6- Networking – Part 6
50:39 -
03.1- Web Applications – Part 1
01:04:50 -
03.2- Web Applications – Part 2
01:02:30 -
03.3- Web Applications – Part 3
47:29 -
04- Penetration Testing
01:30:54
مكتمل [جزء اختياري] – لابات مجانية للدورة
هذا الجزء اختياري من خارج الدورة لشرح كيفية تطبيق لابات مجانية للدورة بديلة لـ لابات الدورة المدفوعة
-
Section 1- Free Labs
00:00 -
Section 2- Free Labs
05:00 -
Section 3- Free Labs
12:00 -
Section 4- Free Labs
12:00
مكتمل – Section 1: Assessment Methodologies
-
1.1.1- Information Gathering – Part 1
39:15 -
1.1.2- Information Gathering – Part 2
01:14:02 -
1.1.3- Information Gathering – Part 3
01:07:28 -
1.1.4- Information Gathering – Part 4
01:11:24 -
1.2.1- Footprinting and Scanning – Part 1
03:55 -
1.2.2- Footprinting and Scanning – Part 2
55:46 -
1.2.3- Footprinting and Scanning – Part 3
01:01:41 -
1.2.4- Footprinting and Scanning – Part 4
01:13:49 -
1.2.5- Footprinting and Scanning – Part 5 (Windows Recon- Nmap Host Discovery Lab)
18:43 -
1.2.6- Footprinting and Scanning – Part 6 (Scan the Server 1 Lab)
12:19 -
1.2.7- Footprinting and Scanning – Part 7 (Windows Recon – SMB Nmap Scripts Lab)
46:07 -
1.3.1- Enumeration – Part 1
05:01 -
1.3.2- Enumeration – Part 2
01:27:45 -
1.3.3- Enumeration – Part 3 (Windows Recon- Nmap Host Discovery Lab)
18:43 -
1.4.1- [BONUS] Metasploit and Meterpreter
01:02:39 -
1.4.2- Importing Nmap Scan Results Into MSF Lab
16:50 -
1.4.3- Network Service Scanning Lab
40:45 -
1.4.4- FTP Enumeration Lab
11:23 -
1.4.5- Samba Recon Basics Lab
16:08 -
1.4.6- Apache Enumeration Lab
44:24 -
1.4.7- MySQL Enumeration Lab
18:00 -
1.4.8- SSH Login Lab
12:05 -
1.4.9- Postfix Recon – Basics Lab
25:00 -
1.5.1- Vulnerability Assessment – Part 1
03:19 -
1.5.2- Vulnerability Assessment – Part 2
34:33 -
1.5.3- Windows – IIS Server DAVTest Lab
23:54 -
1.5.4- Shellshock Lab
22:48 -
1.5.5- Web App Vulnerability Scanning With WMAP Lab
14:46
مكتمل – Section 2: Host & Networking Auditing
-
2.1- Auditing Fundamentals
29:16
مكتمل – Section 3: Host & Network Penetration Testing
-
3.1.1- System-Host Based Attacks – Part 1
24:52 -
3.1.2- System-Host Based Attacks – Part 2 (Windows – IIS Server DAVTest Lab)
23:54 -
3.1.3- System-Host Based Attacks – Part 3 (Windows – IIS Server WebDav Metasploit Lab)
24:16 -
3.1.4- System-Host Based Attacks – Part 4
16:33 -
3.1.5- System-Host Based Attacks – Part 5 (Windows – SMB Server PSexec Lab)
18:13 -
3.1.6- System-Host Based Attacks – Part 6
09:02 -
3.1.7- System-Host Based Attacks – Part 7 (Windows – Insecure RDP Service Lab)
19:05 -
3.1.8- System-Host Based Attacks – Part 8
03:53 -
3.1.9- System-Host Based Attacks – Part 9 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.1.10- System-Host Based Attacks – Part 10
12:44 -
3.1.11- System-Host Based Attacks – Part 11
11:17 -
3.1.12- System-Host Based Attacks – Part 12 (UAC Bypass – UACMe Lab)
37:03 -
3.1.13- System-Host Based Attacks – Part 13
12:41 -
3.1.14- System-Host Based Attacks – Part 14 (Privilege Escalation – Impersonate Lab)
13:45 -
3.1.15- System-Host Based Attacks – Part 15
30:52 -
3.1.16- System-Host Based Attacks – Part 16 (Unattended Installation Lab)
22:16 -
3.1.17- System-Host Based Attacks – Part 17 (Windows – Meterpreter – Kiwi Extension Lab)
15:33 -
3.1.18.1- System-Host Based Attacks – Part 18
14:30 -
3.1.18.2- [BONUS] Introducing Linux – Part 1
36:37 -
3.1.18.3- [BONUS] Introducing Linux – Part 2
54:27 -
3.1.19- System-Host Based Attacks – Part 19 (Shellshock Lab)
22:48 -
3.1.20- System-Host Based Attacks – Part 20
09:56 -
3.1.21- System-Host Based Attacks – Part 21 (ProFTP Recon – Basics Lab)
17:57 -
3.1.22- System-Host Based Attacks – Part 22 (SSH Login Lab)
12:05 -
3.1.23- System-Host Based Attacks – Part 23 (Samba Recon – Dictionary Attack Lab)
19:43 -
3.1.24- System-Host Based Attacks – Part 24
14:53 -
3.1.25- System-Host Based Attacks – Part 25 (Cron Jobs Gone Wild II Lab)
31:23 -
3.1.26- System-Host Based Attacks – Part 26 (Exploiting Setuid Programs Lab)
10:45 -
3.1.27- System-Host Based Attacks – Part 27 (Password Cracker – Linux Lab)
14:07 -
3.2.1- [New] Network-Based Attacks – Part 1
40:30 -
3.2.2- [New] Network-Based Attacks – Part 2 (NetBIOS Hacking Lab)
01:03:30 -
3.2.3- [New] Network-Based Attacks – Part 3
25:30 -
3.2.4- [New] Network-Based Attacks – Part 4 (SNMP Analysis Lab)
21:30 -
3.2.5- [New] Network-Based Attacks – Part 5 (DNS and SMB Relay Attack Lab)
28:30 -
3.2.1- [OLD] Network-Based Attacks Part 1
04:30 -
3.2.2- [OLD] Network-Based Attacks Part 2
50:39 -
3.2.3- [OLD] Network-Based Attacks Part 3
22:06 -
3.3.1- The Metasploit Framework – Part 1
33:57 -
3.3.2- The Metasploit Framework – Part 2
36:31 -
3.3.3- The Metasploit Framework – Part 3
08:14 -
3.3.4- The Metasploit Framework – Part 4 (Windows Recon – Nmap Host Discovery Lab)
18:43 -
3.3.5- The Metasploit Framework – Part 5 (Importing Nmap Scan Results Into MSF Lab)
16:50 -
3.3.6- The Metasploit Framework – Part 6 (Network Service Scanning Lab)
40:45 -
3.3.7- The Metasploit Framework – Part 7
14:19 -
3.3.8- The Metasploit Framework – Part 8 (FTP Enumeration Lab)
11:23 -
3.3.9- The Metasploit Framework – Part 9 (Samba Recon – Basics Lab)
16:08 -
3.3.10- The Metasploit Framework – Part 10 (Apache Enumeration Lab)
44:24 -
3.3.11- The Metasploit Framework – Part 11 (MySQL Enumeration Lab)
18:00 -
3.3.12- The Metasploit Framework – Part 12 (SSH Login Lab)
12:05 -
3.3.13- The Metasploit Framework – Part 13 (Postfix Recon – Basics Lab)
25:00 -
3.3.14- The Metasploit Framework – Part 14
09:22 -
3.3.15- The Metasploit Framework – Part 15 (Web App Vulnerability Scanning With WMAP Lab)
14:46 -
3.3.16.1- The Metasploit Framework – Part 16
18:28 -
3.3.16.2- [BONUS] Generating Payloads With Msfvenom
30:33 -
3.3.16.3- [BONUS] Encoding Payloads With Msfvenom
15:32 -
3.3.16.4- [BONUS] Injecting Payloads Into Windows Portable Executables
11:03 -
3.3.16.5- [BONUS] Automating Metasploit With Resource Scripts
16:26 -
3.3.17- The Metasploit Framework – Part 17 (Windows – HTTP File Server Lab)
19:00 -
3.3.18- The Metasploit Framework – Part 18
08:46 -
3.3.19- The Metasploit Framework – Part 19 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.3.20- The Metasploit Framework – Part 20 (Windows – Java Web Server Lab)
09:10 -
3.3.21- The Metasploit Framework – Part 21
10:09 -
3.3.22- The Metasploit Framework – Part 22 (Vulnerable FTP Server Lab)
07:22 -
3.3.23- The Metasploit Framework – Part 23 (Vulnerable File Sharing Service Lab)
05:11 -
3.3.24- The Metasploit Framework – Part 24 (Vulnerable SSH server Lab)
04:42 -
3.3.25- The Metasploit Framework – Part 25 (Vulnerable SMTP Server Lab)
06:56 -
3.3.26- The Metasploit Framework – Part 26
08:42 -
3.3.27- The Metasploit Framework – Part 27 (Meterpreter Basics Lab)
37:26 -
3.3.28- The Metasploit Framework – Part 28 (Upgrading Command Shells To Meterpreter Shells Lab)
08:52 -
3.3.29- The Metasploit Framework – Part 29
05:17 -
3.3.30- The Metasploit Framework – Part 30 (Windows Post Exploitation Modules Lab)
24:34 -
3.3.31- The Metasploit Framework – Part 31 (UAC Bypass – Memory Injection Lab)
20:45 -
3.3.32- The Metasploit Framework – Part 32
14:28 -
3.3.33- The Metasploit Framework – Part 33 (Privilege Escalation – Impersonate Lab)
13:45 -
3.3.34- The Metasploit Framework – Part 34 (Windows Meterpreter – Kiwi Extension Lab)
15:33 -
3.3.35- The Metasploit Framework – Part 35 (Exploiting SMB With PsExec Lab)
14:52 -
3.3.36- The Metasploit Framework – Part 36
14:03 -
3.3.37- The Metasploit Framework – Part 37 (Maintaining Access – Persistence Service Lab)
19:06 -
3.3.38- The Metasploit Framework – Part 38 (Windows – Enabling Remote Desktop Lab)
11:48 -
3.3.39- The Metasploit Framework – Part 39 (Windows – File and Keylogging Lab)
12:53 -
3.3.40- The Metasploit Framework – Part 40 (Clearing Windows Event Logs Lab)
06:45 -
3.3.41- The Metasploit Framework – Part 41 (Pivoting Lab)
19:40 -
3.3.42- The Metasploit Framework – Part 42
05:29 -
3.3.43- The Metasploit Framework – Part 43 (Post Exploitation Lab I Lab)
25:57 -
3.3.44- The Metasploit Framework – Part 44 (Privilege Escalation – Rootkit Scanner Lab)
13:10 -
3.3.45- The Metasploit Framework – Part 45 (Post Exploitation Lab II Lab)
09:27 -
3.3.46- The Metasploit Framework – Part 46 (Establishing Persistence On Linux Lab)
16:25 -
3.3.47- The Metasploit Framework – Part 47 (Port Scanning and Enumeration With Armitage Lab)
07:13 -
3.3.48- The Metasploit Framework – Part 48 (Exploitation and Post Exploitation With Armitage Lab)
12:02 -
3.4.1- Exploitation – Part 1
17:52 -
3.4.2- Exploitation – Part 2 (SSH Recon – Basic Lab)
21:52 -
3.4.3- Exploitation – Part 3 (Shellshock Lab)
22:48 -
3.4.4- Exploitation – Part 4 (Windows – HTTP File Server Lab)
19:00 -
3.4.5- Exploitation – Part 5
27:34 -
3.4.6- Exploitation – Part 6 (Netcat Fundamentals Lab)
26:44 -
3.4.7- Exploitation – Part 7 (Bind Shells Lab)
10:55 -
3.4.8- Exploitation – Part 8 (Windows – File and Keylogging Lab)
12:53 -
3.4.9- Exploitation – Part 9
19:49 -
3.4.10- Exploitation – Part 10 (Windows – Workflow Platform Lab)
11:00 -
3.4.11- Exploitation – Part 11
07:14 -
3.4.12- Exploitation – Part 12 (Port Scanning and Enumeration – Windows Lab)
18:01 -
3.4.13- Exploitation – Part 13 (Targeting Microsoft IIS FTP Lab)
12:58 -
3.4.14- Exploitation – Part 14 (Targeting OpenSSH Lab)
07:33 -
3.4.15- Exploitation – Part 15 (Targeting SMB Lab)
14:31 -
3.4.16- Exploitation – Part 16 (Targeting MySQL Database Server Lab)
14:30 -
3.4.17- Exploitation – Part 17 (Port Scanning and Enumeration – Linux Lab)
11:46 -
3.4.18- Exploitation – Part 18 (Targeting vsFTPd Lab)
10:10 -
3.4.19- Exploitation – Part 19 (Targeting PHP Lab)
07:21 -
3.4.20- Exploitation – Part 20 (Targeting SAMBA Lab)
05:02 -
3.4.21- Exploitation – Part 21
16:34 -
3.5.1- Post-Exploitation – Part 1
14:51 -
3.5.2- Post-Exploitation – Part 2 (Enumerating Windows System Information Lab)
16:34 -
3.5.3- Post-Exploitation – Part 3 (Enumerating Windows Users and Groups Lab)
13:59 -
3.5.4- Post-Exploitation – Part 4 (Enumerating Windows Network Information Lab)
09:02 -
3.5.5- Post-Exploitation – Part 5 (Enumerating Windows Processes and Services Lab)
15:21 -
3.5.6- Post-Exploitation – Part 6 (Automating Windows Local Enumeration)
20:31 -
3.5.7- Post-Exploitation – Part 7
04:58 -
3.5.8- Post-Exploitation – Part 8 (Enumerating Linux System Information Lab)
13:10 -
3.5.9- Post-Exploitation – Part 9 (Enumerating Linux Users and Groups Lab)
07:48 -
3.5.10- Post-Exploitation – Part 10 (Enumerating Linux Network Information Lab)
09:54 -
3.5.11- Post-Exploitation – Part 11 (Enumerating Linux Processes and Cron Jobs Lab)
08:44 -
3.5.12- Post-Exploitation – Part 12 (Automating Linux Local Enumeration Lab)
16:04 -
3.5.13- Post-Exploitation – Part 13
05:17 -
3.5.14- Post-Exploitation – Part 14 (Setting Up A Web Server With Python Lab)
07:38 -
3.5.15- Post-Exploitation – Part 15 (Transferring Files To Windows Targets Lab)
16:04 -
3.5.16- Post-Exploitation – Part 16 (Transferring Files To Linux Targets Lab)
07:51 -
3.5.17- Post-Exploitation – Part 17
04:48 -
3.5.18- Post-Exploitation – Part 18 (Upgrading Non-Interactive Shells Lab)
05:03 -
3.5.19- Post-Exploitation – Part 19 (Windows – PrivescCheck Lab)
14:00 -
3.5.20- Post-Exploitation – Part 20 (Permissions Matter! Lab)
14:58 -
3.5.21- Post-Exploitation – Part 21 (Editing Gone Wrong Lab)
09:20 -
3.5.22- Post-Exploitation – Part 22
08:04 -
3.5.23- Post-Exploitation – Part 23 (Maintaining Access – Persistence Service Lab)
19:06 -
3.5.24- Post-Exploitation – Part 24 (Maintaining Access – RDP Lab)
12:39 -
3.5.25- Post-Exploitation – Part 25 (Maintaining Access I Lab)
11:29 -
3.5.26- Post-Exploitation – Part 26 (T1168 – Local Job Scheduling Lab)
09:06 -
3.5.27- Post-Exploitation – Part 27
15:46 -
3.5.28- Post-Exploitation – Part 28 (Windows – NTLM Hash Cracking Lab)
11:04 -
3.5.29- Post-Exploitation – Part 29 (Password Cracker – Linux Lab)
14:07 -
3.5.30- Post-Exploitation – Part 30
06:50 -
3.5.31- Post-Exploitation – Part 31 (Pivoting Lab)
19:40 -
3.5.32- Post-Exploitation – Part 32 (Clearing Your Tracks On Windows Lab)
04:48 -
3.5.33- Post-Exploitation – Part 33 (Clearing Your Tracks On Linux Lab)
04:24 -
3.6.1- Social Engineering – Part 1
33:36 -
3.6.2- Social Engineering – Part 2 (Let’s Go Phishing Lab)
27:19
مكتمل – Section 4: Web Application Penetration Testing
-
04.1.1- Introduction to the Web and HTTP Protocol – Part 1
06:16 -
04.1.2- Introduction to the Web and HTTP Protocol – Part 2
01:04:28 -
04.1.3- Introduction to the Web and HTTP Protocol – Part 3
01:08:29 -
04.1.5- Introduction to the Web and HTTP Protocol – Part 5 (HTTP Method Enumeration Lab)
01:02:06 -
04.1.8- Introduction to the Web and HTTP Protocol – Part 8
01:36:25 -
04.1.9- Introduction to the Web and HTTP Protocol – Part 9
01:04:31 -
04.1.12- Introduction to the Web and HTTP Protocol – Part 12 (Passive Crawling with Burp Suite Lab)
09:10
eJPTv2 Exam Review
-
مراجعة لـ اختبار شهادة eJPTv2
24:00
Full Course Slides
-
Course Slides
احصل على شهادة اتمام الدورة بعد الإنتهاء
أضف هذه الشهادة إلى سيرتك الذاتية لإثبات مهاراتك وزيادة فرصك في الحصول علي وظيفة.

تقييمات ومراجعات الطلاب
5.0
الإجمالي 68 تقييمات
5
التقييمات: 66
4
التقييمات: 2
3
التقييمات: 0
2
التقييمات: 0
1
التقييمات: 0
ممتاز
It was a great Meant experiment
كالعادة مبدع الاسطوري المهندس أحمد سلطان
يعطيك العافية شرح جميل وقوي وباذن الله باخذ الشهادة الاسبوع هذا الله يسهل
ممتازه جدا
افضل دكتور بيشرح دكتور أحمد سلطان كدا كدا
السلام عليكم و رحمة الله وبركاته
الدورة رائعة و استفدت منها الكثير و لله الحمد اختبرت و نجحت في الاختبار.
الدورة رائعة و استفدت منها الكثير و لله الحمد اختبرت و نجحت في الاختبار.
بفضل الله ثم بفضل شروحات الدكتور أحمد سلطان, اجتزت الإختبار و حصلت على الشهادة
جميلة واستفدت منها كثير