4.97
(63 تقييمات)
eJPTv2 Prep
تصنيفات: اختبار اختراق الانظمة والشبكات
عن الدورة
تم تحديث كل اللابات الخاصة بالدورة بتاريخ يناير 2025
ماذا سوف تتعلم؟
- Penetration Testing Basics
- Vulnerability Assessment
- Network Attacks
- Web Attacks
محتوى الدورة
مكتمل [جزء اختياري] – Prerequisites
هذا الجزء اختياري من خارج الدورة فى حالة لم تكن علي دراية بأساسيات الشبكات و الويب واختبار الإختراق من قبل.
-
01.1- Introduction – Part 1
42:20 -
01.2- Introduction – Part 2
18:36 -
02.1- Networking – Part 1
57:54 -
02.2- Networking – Part 2
55:00 -
02.3- Networking – Part 3
01:10:05 -
02.4- Networking – Part 4
53:52 -
02.5- Networking – Part 5
01:05:19 -
02.6- Networking – Part 6
50:39 -
03.1- Web Applications – Part 1
01:04:50 -
03.2- Web Applications – Part 2
01:02:30 -
03.3- Web Applications – Part 3
47:29 -
04- Penetration Testing
01:30:54
مكتمل [جزء اختياري] – لابات مجانية للدورة
هذا الجزء اختياري من خارج الدورة لشرح كيفية تطبيق لابات مجانية للدورة بديلة لـ لابات الدورة المدفوعة
-
Section 1- Free Labs
00:00 -
Section 2- Free Labs
05:00 -
Section 3- Free Labs
12:00 -
Section 4- Free Labs
12:00
مكتمل – Section 1: Assessment Methodologies
-
1.1.1- Information Gathering – Part 1
39:15 -
1.1.2- Information Gathering – Part 2
01:14:02 -
1.1.3- Information Gathering – Part 3
01:07:28 -
1.1.4- Information Gathering – Part 4
01:11:24 -
1.2.1- Footprinting and Scanning – Part 1
03:55 -
1.2.2- Footprinting and Scanning – Part 2
55:46 -
1.2.3- Footprinting and Scanning – Part 3
01:01:41 -
1.2.4- Footprinting and Scanning – Part 4
01:13:49 -
1.2.5- Footprinting and Scanning – Part 5 (Windows Recon- Nmap Host Discovery Lab)
18:43 -
1.2.6- Footprinting and Scanning – Part 6 (Scan the Server 1 Lab)
12:19 -
1.2.7- Footprinting and Scanning – Part 7 (Windows Recon – SMB Nmap Scripts Lab)
46:07 -
1.3.1- Enumeration – Part 1
05:01 -
1.3.2- Enumeration – Part 2
01:27:45 -
1.3.3- Enumeration – Part 3 (Windows Recon- Nmap Host Discovery Lab)
18:43 -
1.4.1- [BONUS] Metasploit and Meterpreter
01:02:39 -
1.4.2- Importing Nmap Scan Results Into MSF Lab
16:50 -
1.4.3- Network Service Scanning Lab
40:45 -
1.4.4- FTP Enumeration Lab
11:23 -
1.4.5- Samba Recon Basics Lab
16:08 -
1.4.6- Apache Enumeration Lab
44:24 -
1.4.7- MySQL Enumeration Lab
18:00 -
1.4.8- SSH Login Lab
12:05 -
1.4.9- Postfix Recon – Basics Lab
25:00 -
1.5.1- Vulnerability Assessment – Part 1
03:19 -
1.5.2- Vulnerability Assessment – Part 2
34:33 -
1.5.3- Windows – IIS Server DAVTest Lab
23:54 -
1.5.4- Shellshock Lab
22:48 -
1.5.5- Web App Vulnerability Scanning With WMAP Lab
14:46
مكتمل – Section 2: Host & Networking Auditing
-
2.1- Auditing Fundamentals
29:16
مكتمل – Section 3: Host & Network Penetration Testing
-
3.1.1- System-Host Based Attacks – Part 1
24:52 -
3.1.2- System-Host Based Attacks – Part 2 (Windows – IIS Server DAVTest Lab)
23:54 -
3.1.3- System-Host Based Attacks – Part 3 (Windows – IIS Server WebDav Metasploit Lab)
24:16 -
3.1.4- System-Host Based Attacks – Part 4
16:33 -
3.1.5- System-Host Based Attacks – Part 5 (Windows – SMB Server PSexec Lab)
18:13 -
3.1.6- System-Host Based Attacks – Part 6
09:02 -
3.1.7- System-Host Based Attacks – Part 7 (Windows – Insecure RDP Service Lab)
19:05 -
3.1.8- System-Host Based Attacks – Part 8
03:53 -
3.1.9- System-Host Based Attacks – Part 9 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.1.10- System-Host Based Attacks – Part 10
12:44 -
3.1.11- System-Host Based Attacks – Part 11
11:17 -
3.1.12- System-Host Based Attacks – Part 12 (UAC Bypass – UACMe Lab)
37:03 -
3.1.13- System-Host Based Attacks – Part 13
12:41 -
3.1.14- System-Host Based Attacks – Part 14 (Privilege Escalation – Impersonate Lab)
13:45 -
3.1.15- System-Host Based Attacks – Part 15
30:52 -
3.1.16- System-Host Based Attacks – Part 16 (Unattended Installation Lab)
22:16 -
3.1.17- System-Host Based Attacks – Part 17 (Windows – Meterpreter – Kiwi Extension Lab)
15:33 -
3.1.18.1- System-Host Based Attacks – Part 18
14:30 -
3.1.18.2- [BONUS] Introducing Linux – Part 1
36:37 -
3.1.18.3- [BONUS] Introducing Linux – Part 2
54:27 -
3.1.19- System-Host Based Attacks – Part 19 (Shellshock Lab)
22:48 -
3.1.20- System-Host Based Attacks – Part 20
09:56 -
3.1.21- System-Host Based Attacks – Part 21 (ProFTP Recon – Basics Lab)
17:57 -
3.1.22- System-Host Based Attacks – Part 22 (SSH Login Lab)
12:05 -
3.1.23- System-Host Based Attacks – Part 23 (Samba Recon – Dictionary Attack Lab)
19:43 -
3.1.24- System-Host Based Attacks – Part 24
14:53 -
3.1.25- System-Host Based Attacks – Part 25 (Cron Jobs Gone Wild II Lab)
31:23 -
3.1.26- System-Host Based Attacks – Part 26 (Exploiting Setuid Programs Lab)
10:45 -
3.1.27- System-Host Based Attacks – Part 27 (Password Cracker – Linux Lab)
14:07 -
3.2.1- [New] Network-Based Attacks – Part 1
40:30 -
3.2.2- [New] Network-Based Attacks – Part 2 (NetBIOS Hacking Lab)
01:03:30 -
3.2.3- [New] Network-Based Attacks – Part 3
25:30 -
3.2.4- [New] Network-Based Attacks – Part 4 (SNMP Analysis Lab)
21:30 -
3.2.5- [New] Network-Based Attacks – Part 5 (DNS and SMB Relay Attack Lab)
28:30 -
3.2.1- [OLD] Network-Based Attacks Part 1
04:30 -
3.2.2- [OLD] Network-Based Attacks Part 2
50:39 -
3.2.3- [OLD] Network-Based Attacks Part 3
22:06 -
3.3.1- The Metasploit Framework – Part 1
33:57 -
3.3.2- The Metasploit Framework – Part 2
36:31 -
3.3.3- The Metasploit Framework – Part 3
08:14 -
3.3.4- The Metasploit Framework – Part 4 (Windows Recon – Nmap Host Discovery Lab)
18:43 -
3.3.5- The Metasploit Framework – Part 5 (Importing Nmap Scan Results Into MSF Lab)
16:50 -
3.3.6- The Metasploit Framework – Part 6 (Network Service Scanning Lab)
40:45 -
3.3.7- The Metasploit Framework – Part 7
14:19 -
3.3.8- The Metasploit Framework – Part 8 (FTP Enumeration Lab)
11:23 -
3.3.9- The Metasploit Framework – Part 9 (Samba Recon – Basics Lab)
16:08 -
3.3.10- The Metasploit Framework – Part 10 (Apache Enumeration Lab)
44:24 -
3.3.11- The Metasploit Framework – Part 11 (MySQL Enumeration Lab)
18:00 -
3.3.12- The Metasploit Framework – Part 12 (SSH Login Lab)
12:05 -
3.3.13- The Metasploit Framework – Part 13 (Postfix Recon – Basics Lab)
25:00 -
3.3.14- The Metasploit Framework – Part 14
09:22 -
3.3.15- The Metasploit Framework – Part 15 (Web App Vulnerability Scanning With WMAP Lab)
14:46 -
3.3.16.1- The Metasploit Framework – Part 16
18:28 -
3.3.16.2- [BONUS] Generating Payloads With Msfvenom
30:33 -
3.3.16.3- [BONUS] Encoding Payloads With Msfvenom
15:32 -
3.3.16.4- [BONUS] Injecting Payloads Into Windows Portable Executables
11:03 -
3.3.16.5- [BONUS] Automating Metasploit With Resource Scripts
16:26 -
3.3.17- The Metasploit Framework – Part 17 (Windows – HTTP File Server Lab)
19:00 -
3.3.18- The Metasploit Framework – Part 18
08:46 -
3.3.19- The Metasploit Framework – Part 19 (WinRM – Exploitation with Metasploit Lab)
28:34 -
3.3.20- The Metasploit Framework – Part 20 (Windows – Java Web Server Lab)
09:10 -
3.3.21- The Metasploit Framework – Part 21
10:09 -
3.3.22- The Metasploit Framework – Part 22 (Vulnerable FTP Server Lab)
07:22 -
3.3.23- The Metasploit Framework – Part 23 (Vulnerable File Sharing Service Lab)
05:11 -
3.3.24- The Metasploit Framework – Part 24 (Vulnerable SSH server Lab)
04:42 -
3.3.25- The Metasploit Framework – Part 25 (Vulnerable SMTP Server Lab)
06:56 -
3.3.26- The Metasploit Framework – Part 26
08:42 -
3.3.27- The Metasploit Framework – Part 27 (Meterpreter Basics Lab)
37:26 -
3.3.28- The Metasploit Framework – Part 28 (Upgrading Command Shells To Meterpreter Shells Lab)
08:52 -
3.3.29- The Metasploit Framework – Part 29
05:17 -
3.3.30- The Metasploit Framework – Part 30 (Windows Post Exploitation Modules Lab)
24:34 -
3.3.31- The Metasploit Framework – Part 31 (UAC Bypass – Memory Injection Lab)
20:45 -
3.3.32- The Metasploit Framework – Part 32
14:28 -
3.3.33- The Metasploit Framework – Part 33 (Privilege Escalation – Impersonate Lab)
13:45 -
3.3.34- The Metasploit Framework – Part 34 (Windows Meterpreter – Kiwi Extension Lab)
15:33 -
3.3.35- The Metasploit Framework – Part 35 (Exploiting SMB With PsExec Lab)
14:52 -
3.3.36- The Metasploit Framework – Part 36
14:03 -
3.3.37- The Metasploit Framework – Part 37 (Maintaining Access – Persistence Service Lab)
19:06 -
3.3.38- The Metasploit Framework – Part 38 (Windows – Enabling Remote Desktop Lab)
11:48 -
3.3.39- The Metasploit Framework – Part 39 (Windows – File and Keylogging Lab)
12:53 -
3.3.40- The Metasploit Framework – Part 40 (Clearing Windows Event Logs Lab)
06:45 -
3.3.41- The Metasploit Framework – Part 41 (Pivoting Lab)
19:40 -
3.3.42- The Metasploit Framework – Part 42
05:29 -
3.3.43- The Metasploit Framework – Part 43 (Post Exploitation Lab I Lab)
25:57 -
3.3.44- The Metasploit Framework – Part 44 (Privilege Escalation – Rootkit Scanner Lab)
13:10 -
3.3.45- The Metasploit Framework – Part 45 (Post Exploitation Lab II Lab)
09:27 -
3.3.46- The Metasploit Framework – Part 46 (Establishing Persistence On Linux Lab)
16:25 -
3.3.47- The Metasploit Framework – Part 47 (Port Scanning and Enumeration With Armitage Lab)
07:13 -
3.3.48- The Metasploit Framework – Part 48 (Exploitation and Post Exploitation With Armitage Lab)
12:02 -
3.4.1- Exploitation – Part 1
17:52 -
3.4.2- Exploitation – Part 2 (SSH Recon – Basic Lab)
21:52 -
3.4.3- Exploitation – Part 3 (Shellshock Lab)
22:48 -
3.4.4- Exploitation – Part 4 (Windows – HTTP File Server Lab)
19:00 -
3.4.5- Exploitation – Part 5
27:34 -
3.4.6- Exploitation – Part 6 (Netcat Fundamentals Lab)
26:44 -
3.4.7- Exploitation – Part 7 (Bind Shells Lab)
10:55 -
3.4.8- Exploitation – Part 8 (Windows – File and Keylogging Lab)
12:53 -
3.4.9- Exploitation – Part 9
19:49 -
3.4.10- Exploitation – Part 10 (Windows – Workflow Platform Lab)
11:00 -
3.4.11- Exploitation – Part 11
07:14 -
3.4.12- Exploitation – Part 12 (Port Scanning and Enumeration – Windows Lab)
18:01 -
3.4.13- Exploitation – Part 13 (Targeting Microsoft IIS FTP Lab)
12:58 -
3.4.14- Exploitation – Part 14 (Targeting OpenSSH Lab)
07:33 -
3.4.15- Exploitation – Part 15 (Targeting SMB Lab)
14:31 -
3.4.16- Exploitation – Part 16 (Targeting MySQL Database Server Lab)
14:30 -
3.4.17- Exploitation – Part 17 (Port Scanning and Enumeration – Linux Lab)
11:46 -
3.4.18- Exploitation – Part 18 (Targeting vsFTPd Lab)
10:10 -
3.4.19- Exploitation – Part 19 (Targeting PHP Lab)
07:21 -
3.4.20- Exploitation – Part 20 (Targeting SAMBA Lab)
05:02 -
3.4.21- Exploitation – Part 21
16:34 -
3.5.1- Post-Exploitation – Part 1
14:51 -
3.5.2- Post-Exploitation – Part 2 (Enumerating Windows System Information Lab)
16:34 -
3.5.3- Post-Exploitation – Part 3 (Enumerating Windows Users and Groups Lab)
13:59 -
3.5.4- Post-Exploitation – Part 4 (Enumerating Windows Network Information Lab)
09:02 -
3.5.5- Post-Exploitation – Part 5 (Enumerating Windows Processes and Services Lab)
15:21 -
3.5.6- Post-Exploitation – Part 6 (Automating Windows Local Enumeration)
20:31 -
3.5.7- Post-Exploitation – Part 7
04:58 -
3.5.8- Post-Exploitation – Part 8 (Enumerating Linux System Information Lab)
13:10 -
3.5.9- Post-Exploitation – Part 9 (Enumerating Linux Users and Groups Lab)
07:48 -
3.5.10- Post-Exploitation – Part 10 (Enumerating Linux Network Information Lab)
09:54 -
3.5.11- Post-Exploitation – Part 11 (Enumerating Linux Processes and Cron Jobs Lab)
08:44 -
3.5.12- Post-Exploitation – Part 12 (Automating Linux Local Enumeration Lab)
16:04 -
3.5.13- Post-Exploitation – Part 13
05:17 -
3.5.14- Post-Exploitation – Part 14 (Setting Up A Web Server With Python Lab)
07:38 -
3.5.15- Post-Exploitation – Part 15 (Transferring Files To Windows Targets Lab)
16:04 -
3.5.16- Post-Exploitation – Part 16 (Transferring Files To Linux Targets Lab)
07:51 -
3.5.17- Post-Exploitation – Part 17
04:48 -
3.5.18- Post-Exploitation – Part 18 (Upgrading Non-Interactive Shells Lab)
05:03 -
3.5.19- Post-Exploitation – Part 19 (Windows – PrivescCheck Lab)
14:00 -
3.5.20- Post-Exploitation – Part 20 (Permissions Matter! Lab)
14:58 -
3.5.21- Post-Exploitation – Part 21 (Editing Gone Wrong Lab)
09:20 -
3.5.22- Post-Exploitation – Part 22
08:04 -
3.5.23- Post-Exploitation – Part 23 (Maintaining Access – Persistence Service Lab)
19:06 -
3.5.24- Post-Exploitation – Part 24 (Maintaining Access – RDP Lab)
12:39 -
3.5.25- Post-Exploitation – Part 25 (Maintaining Access I Lab)
11:29 -
3.5.26- Post-Exploitation – Part 26 (T1168 – Local Job Scheduling Lab)
09:06 -
3.5.27- Post-Exploitation – Part 27
15:46 -
3.5.28- Post-Exploitation – Part 28 (Windows – NTLM Hash Cracking Lab)
11:04 -
3.5.29- Post-Exploitation – Part 29 (Password Cracker – Linux Lab)
14:07 -
3.5.30- Post-Exploitation – Part 30
06:50 -
3.5.31- Post-Exploitation – Part 31 (Pivoting Lab)
19:40 -
3.5.32- Post-Exploitation – Part 32 (Clearing Your Tracks On Windows Lab)
04:48 -
3.5.33- Post-Exploitation – Part 33 (Clearing Your Tracks On Linux Lab)
04:24 -
3.6.1- Social Engineering – Part 1
33:36 -
3.6.2- Social Engineering – Part 2 (Let’s Go Phishing Lab)
27:19
مكتمل – Section 4: Web Application Penetration Testing
-
04.1.1- Introduction to the Web and HTTP Protocol – Part 1
06:16 -
04.1.2- Introduction to the Web and HTTP Protocol – Part 2
01:04:28 -
04.1.3- Introduction to the Web and HTTP Protocol – Part 3
01:08:29 -
04.1.5- Introduction to the Web and HTTP Protocol – Part 5 (HTTP Method Enumeration Lab)
01:02:06 -
04.1.8- Introduction to the Web and HTTP Protocol – Part 8
01:36:25 -
04.1.9- Introduction to the Web and HTTP Protocol – Part 9
01:04:31 -
04.1.12- Introduction to the Web and HTTP Protocol – Part 12 (Passive Crawling with Burp Suite Lab)
09:10
eJPTv2 Exam Review
-
مراجعة لـ اختبار شهادة eJPTv2
24:00
Full Course Slides
-
Course Slides
احصل على شهادة اتمام الدورة بعد الإنتهاء
أضف هذه الشهادة إلى سيرتك الذاتية لإثبات مهاراتك وزيادة فرصك في الحصول علي وظيفة.

تقييمات ومراجعات الطلاب
5.0
الإجمالي 63 تقييمات
5
التقييمات: 61
4
التقييمات: 2
3
التقييمات: 0
2
التقييمات: 0
1
التقييمات: 0
افضل دكتور بيشرح دكتور أحمد سلطان كدا كدا
السلام عليكم و رحمة الله وبركاته
الدورة رائعة و استفدت منها الكثير و لله الحمد اختبرت و نجحت في الاختبار.
الدورة رائعة و استفدت منها الكثير و لله الحمد اختبرت و نجحت في الاختبار.
بفضل الله ثم بفضل شروحات الدكتور أحمد سلطان, اجتزت الإختبار و حصلت على الشهادة
جميلة واستفدت منها كثير
دورة جميلة جدا و شرح الاستاذ احمد سلطان مره رهيب
👍🏻👍🏻
ممتازة جدا
رائعة الله يعطيك يا م.احمد
شكرا مهندسنا شرح اكثر من رائع كافي ووافي