Регистрация ·  Логин: Пароль: Запомнить   · Забыли пароль?




Ответить на тему
Автор Сообщение

Модератор
Аватара пользователя

С нами: 11 лет 4 месяца
Сообщения: 87029
Откуда: Красноярск
СССР

Сообщение 18 янв 2016, 13:55 

[Цитировать]

VTC Ethical Hacking & Penetration Testing Tutorials

Производитель: VTC
Год выпуска: 2006
Язык: английскийОписание: Introduction
Course Overview
Ethical Hacking & Penetration Testing
What is Ethical Hacking?
Types of Ethical Hacking
Responsibilities of the Ethical Hacker
Customer Expectations
Skills of the Hacker
Relevant Laws
Preparation
Types of Attacks
Methodology Overview
Your Goals
Reconnaissance [passive, active]
Scanning
Service Enumeration
Vulnerability Assessment
Vulnerability Exploitation
Penetration & Access
Privilege Escalation & Owning the Box
Evading Defenses & Erasing Tracks
Maintaining & Expanding Access
Reconnaissance Footprinting
Passive Reconnaissance
Using WHOIS & Other Tools
Active Reconnaissance
Active Reconnaissance Tools & Methods
Putting It All Together
Reconnaissance Demo
Scanning
Scanning For Hosts
TCP Connection Basics
TCP Scan Types
UDP & ICMP Scanning
Scanning Demonstration using NMAP
Port & Service Enumeration
Identifying Ports & Services
OS Fingerprinting
Popular Scanners
Demonstration
Data Enumeration
Data Enumeration
SNMP Enumeration
DNS Zone Transfers
Windows Null Sessions
NetBIOS Enumeration
Active Directory Extraction
Vulnerability Assessment
Vulnerabilities & Exploits
OS Vulnerabilities
Web Server Vulnerabilities
Database Vulnerabilities
TCP Stack Vulnerabilities
Application Vulnerabilities
Vulnerability Assesment
Penetration/Access/Compromise Pt.
Penetrating the System Pt.
Penetrating the System Pt.
Bypassing Access Controls
Password Cracking Pt.
Password Cracking Pt.
Social Engineering
Penetration/Access/Compromise Pt.
Session Hijacking Pt.
Session Hijacking Pt.
Privilege Escalation
Maintaining & Expanding Access
System Compromise
Evading Defenses & Erasing Tracks
Where Your Actions Recorded Pt.
Where Your Actions Recorded Pt.
Deleting Log Files & Other Evidence Pt.
Deleting Log Files & Other Evidence Pt.
Rootkits
Steganography
Evading IDS & Firewalls
Introduction to Hacking Techniques Pt.
Encryption
Sniffers
Wireless hacking
SQL Injection
Introduction to Hacking Techniques Pt.
Buffer Overflows
Rootkits
Spoofing
Denial of Service Attacks
Web Hacking
Popular Tools
nmap Pt.
nmap Pt.
SuperScan
Nessus
Penetration Test Demo
Penetration Test Demo Pt.
Penetration Test Demo Pt.
Penetration Test Demo Pt.
Credits
About the Authors

Видео кодек: QuickTime
Видео: QuickTime
Аудио: 400 kbps, 800x600
Download
Для скачивания .torrent файлов необходима регистрация
Сайт не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм

Страница 1 из 1

Ответить на тему

   Похожие торренты   Торрент