VTC - Ethical Hacking & Penetration Testing Training
Trang 1 trong tổng số 1 trang
VTC - Ethical Hacking & Penetration Testing Training
VTC - Ethical Hacking & Penetration Testing Training
Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Price: Single User: US$ 99.95
Duration: 7 hrs / 82 lessons
Work Files: No
Captions: No
Compatibility: Vista/XP/2000, OS X, Linux
QuickTime 7
Format: iso
Details:
Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker?s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.
Title Description
Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Price: Single User: US$ 99.95
Duration: 7 hrs / 82 lessons
Work Files: No
Captions: No
Compatibility: Vista/XP/2000, OS X, Linux
QuickTime 7
Format: iso
Details:
Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker?s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.
Title Description
Introduction
Course Overview (04:54)
Ethical Hacking & Penetration Testing
What is Ethical Hacking? (04:58)
Types of Ethical Hacking (05:31)
Responsibilities of the Ethical Hacker (03:12)
Customer Expectations (04:04)
Skills of the Hacker (04:16)
Relevant Laws (04:54)
Preparation (04:46)
Types of Attacks (02:12)
Methodology Overview
Your Goals (02:34)
Reconnaissance [passive, active] (05:11)
Scanning (03:42)
Service Enumeration (03:05)
Vulnerability Assessment (03:35)
Vulnerability Exploitation (02:52)
Penetration & Access (03:24)
Privilege Escalation & Owning the Box (02:40)
Evading Defenses & Erasing Tracks (04:01)
Maintaining & Expanding Access (03:22)
Reconnaissance (Footprinting)
Passive Reconnaissance (05:03)
Using WHOIS & Other Tools (03:03)
Active Reconnaissance (04:10)
Active Reconnaissance Tools & Methods (04:55)
Putting It All Together (03:09)
Reconnaissance Demo (07:04)
Scanning
Scanning For Hosts (02:20)
TCP Connection Basics (04:14)
TCP Scan Types (07:18)
UDP & ICMP Scanning (03:44)
Scanning Demonstration using NMAP (05:19)
Port & Service Enumeration
Identifying Ports & Services (03:06)
OS Fingerprinting (02:57)
Popular Scanners (01:54)
Demonstration (05:15)
Data Enumeration
Data Enumeration (05:12)
SNMP Enumeration (07:14)
DNS Zone Transfers (06:36)
Windows Null Sessions (05:03)
NetBIOS Enumeration (06:44)
Active Directory Extraction (03:02)
Vulnerability Assessment
Vulnerabilities & Exploits (06:07)
OS Vulnerabilities (05:59)
Web Server Vulnerabilities (06:54)
Database Vulnerabilities (05:25)
TCP Stack Vulnerabilities (04:13)
Application Vulnerabilities (03:05)
Vulnerability Assesment (07:21)
Penetration/Access/Compromise Pt.1
Penetrating the System Pt.1 (05:28)
Penetrating the System Pt.2 (03:11)
Bypassing Access Controls (06:34)
Password Cracking Pt.1 (04:58)
Password Cracking Pt.2 (03:52)
Social Engineering (06:28)
Penetration/Access/Compromise Pt.2
Session Hijacking Pt.1 (05:46)
Session Hijacking Pt.2 (04:01)
Privilege Escalation (04:45)
Maintaining & Expanding Access (07:01)
System Compromise (04:40)
Evading Defenses & Erasing Tracks
Where Your Actions Recorded Pt.1 (02:04)
Where Your Actions Recorded Pt.2 (06:50)
Deleting Log Files & Other Evidence Pt.1 (03:16)
Deleting Log Files & Other Evidence Pt.2 (04:26)
Rootkits (05:21)
Steganography (06:58)
Evading IDS & Firewalls (04:29)
Introduction to Hacking Techniques Pt.1
Encryption (06:07)
Sniffers (04:15)
Wireless hacking (06:29)
SQL Injection (04:18)
Introduction to Hacking Techniques Pt.2
Buffer Overflows (05:19)
Rootkits (03:52)
Spoofing (04:33)
Denial of Service Attacks (03:59)
Web Hacking (07:00)
Popular Tools
nmap Pt.1 (06:38)
nmap Pt.2 (02:14)
SuperScan (04:30)
Nessus (06:27)
Penetration Test Demo
Penetration Test Demo Pt.1 (01:41)
Penetration Test Demo Pt.2 (00:59)
Penetration Test Demo Pt.3 (01:05)
Credits
About the Authors (01:37)
- Code:
http://rapidshare.com/files/140476934/v.T.c.3thic4l.H4ck1n9.n.P3n3tr4t1on.t3st1ng-virTuAlZin.part1.rar
http://rapidshare.com/files/140486783/v.T.c.3thic4l.H4ck1n9.n.P3n3tr4t1on.t3st1ng-virTuAlZin.part2.rar
Similar topics
» VTC Ethical Hacking & Penetration Testing Training (new)
» VTC - Ethical Hacking And Penetration Testing Tutorials
» Network Security testing via Penetration Testing 6DVD
» VTC - Ethical Hacking And Penetration Testing Tutorials
» Network Security testing via Penetration Testing 6DVD
Trang 1 trong tổng số 1 trang
Permissions in this forum:
Bạn không có quyền trả lời bài viết
Mon 05 Oct 2015, 7:51 pm by giaychuotkhoet
» Hộp đựng đa năng trong phòng tắm và các đồ dụng tiện llợi khác
Wed 22 Jul 2015, 1:23 am by aloonline1987
» gel bôi trơn ấm áp warm lovin
Tue 19 May 2015, 4:24 pm by shopnguoilon_sg
» màng film tránh thai vcf dành cho chị em
Tue 19 May 2015, 4:19 pm by shopnguoilon_sg
» màng film tránh thai vcf dành cho chị em
Tue 19 May 2015, 4:17 pm by shopnguoilon_sg
» stud 100 khẳng định đẳng cấp phái mạnh
Fri 15 May 2015, 11:25 am by shopnguoilon_sg
» Lover aider máy mát xa dành cho nữ
Fri 15 May 2015, 11:23 am by shopnguoilon_sg
» cung cấp máy ép dĩa chất lượng
Fri 17 Apr 2015, 2:15 pm by huyenrio
» Máy in hình lên ly
Wed 25 Mar 2015, 2:44 pm by huyenrio
» Máy in hình lên áo
Wed 25 Mar 2015, 2:43 pm by huyenrio
» trang trí cây thông noel ở vinh,cho thuê cây thông noel ở vinh,chuyển quà noel ở vinh
Fri 28 Nov 2014, 8:44 am by sunflowerhn83
» Máy in hạn sử dụng DMJ-B chính hãng, giá sốc
Thu 02 Oct 2014, 9:40 am by phamlinhnd1010
» Dạy cắm hoa chuyên nghiệp,dạy cắm hoa nghệ thuật,dạy cắt tỉa của quả ở T.p Vinh Nghệ An
Tue 30 Sep 2014, 10:10 am by haiha131276
» công ty Yên Phát chuyên phân phối, lắp đặt camera chính hãng giá rẻ nhất miền Bắc.
Fri 26 Sep 2014, 10:57 am by phamlinhnd1010
» HOT! Chung cư mini Xuân Đỉnh ở ngay giá chỉ từ 690 triệu 1 căn
Fri 26 Sep 2014, 10:44 am by xuantruong23