Регистрация ·  Логин: Пароль: Запомнить   · Забыли пароль?




Ответить на тему
Автор Сообщение

Модератор
Аватара пользователя

С нами: 11 лет 1 месяц
Сообщения: 87029
Откуда: Красноярск
СССР

Сообщение 18 янв 2016, 14:11 

[Цитировать]

Learn The Basics of Ethical Hacking and Penetration Testing


Год выпуска: 2015
Производитель: Udemy
Сайт производителя: Page Course
Автор: Mohamed Ramadan
Продолжительность: 18 hours
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Стать Эксперт Мастер компьютерной безопасности, научившись использовать этического взлома, чтобы раскрыть потенциал Уязвимости в информационных системах.
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing

Section 2 Real World Information Intelligence Techniques

Section 3 Scanning and vulnerability Assessment

Section 4 Network Attacking Techniques

Section 5 Windows and Linux Attacking Techniques

Section 6 Windows and Linux Post-Exploitation Techniques

Section 7 Web Exploitation Techniques

Section 8 Windows Exploit Development

Section 9 The end but it is not the end
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1152x360, 16:9, 25.000 fps, ~ 80.4 Kbps
Аудио: AAC, 48.0 KHz, ~ 58.0 Kbps, 2 channels
Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems.

This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.
In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.
Get started with this course today to be on your way towards finding real-world computer security solutions.
Gather Information Intelligence
Find Security Vulnerabilities
Develop Exploits
Scan and Produce Vulnerability Assessments
Learn Network Attacking Techniques
Ethical Hacking for Computer Security
Ethical hackers are computer security experts who focus on penetration testing and weaknesses in an organization’s information systems.

Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions.

Contents and Overview
With 55 lectures and over 17 hours of content this course is perfect for beginning to understand ethical hacking and penetration testing from scratch.
Students will be shown how to gather information intelligence, find web application and system security vulnerabilities, how to scan using Nmap and bypass IDS protected targets, how to hack clients using modern web browsers and how to collect important information once a system has been hacked into.

This course is ideal for web developers, IT security professionals, network engineers, Windows and Linux administrators, security engineers, database administrators and webmasters as well as anyone interested in learning basic ethical hacking techniques.

Upon completion, students will be able to apply ethical hacking practices to identify potential weaknesses, and understand the moves hackers would make to attempt to exploit a system. Students will also have the knowledge to recommend security measures that will make systems more impenetrable to hackers.
Download
Для скачивания .torrent файлов необходима регистрация
Сайт не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм

Страница 1 из 1

Ответить на тему

   Похожие торренты   Торрент