Sam Bowne CNIT-123 Ethical Hacking And Network Defense DVD
Trang 1 trong tổng số 1 trang
Sam Bowne CNIT-123 Ethical Hacking And Network Defense DVD
Sam Bowne CNIT-123 Ethical Hacking And Network Defense DVD | 1.5 GB
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security.
Upon successful completion of this course, the student will be able to:
1. Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers.
2. Define the types of malicious software found in modern networks.
3. Explain the threats and countermeasures for physical security and social engineering.
4. Perform footprinting to learn about a company and its network.
5. Perform port scans to locate potential entry points to servers and networks.
6. Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
7. Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
8. Learn how to identify Microsoft Windows vulnerabilities and to harden systems.
9. Learn how to identify Linux vulnerabilities and to protect servers.
10. Describe how to take control of Web Servers, and how to protect them.
11. Locate and hack into wireless networks, and protect them.
12. Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks.
13. Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Rapidshare
Netload
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security.
Upon successful completion of this course, the student will be able to:
1. Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers.
2. Define the types of malicious software found in modern networks.
3. Explain the threats and countermeasures for physical security and social engineering.
4. Perform footprinting to learn about a company and its network.
5. Perform port scans to locate potential entry points to servers and networks.
6. Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
7. Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
8. Learn how to identify Microsoft Windows vulnerabilities and to harden systems.
9. Learn how to identify Linux vulnerabilities and to protect servers.
10. Describe how to take control of Web Servers, and how to protect them.
11. Locate and hack into wireless networks, and protect them.
12. Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks.
13. Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Rapidshare
- Code:
http://rapidshare.com/files/312707472/S.Bowne.CNIT.part01.rar.html
http://rapidshare.com/files/312707273/S.Bowne.CNIT.part02.rar.html
http://rapidshare.com/files/312706967/S.Bowne.CNIT.part03.rar.html
http://rapidshare.com/files/312707321/S.Bowne.CNIT.part04.rar.html
http://rapidshare.com/files/312707255/S.Bowne.CNIT.part05.rar.html
http://rapidshare.com/files/312707749/S.Bowne.CNIT.part06.rar.html
http://rapidshare.com/files/312707117/S.Bowne.CNIT.part07.rar.html
http://rapidshare.com/files/312707320/S.Bowne.CNIT.part08.rar.html
http://rapidshare.com/files/312707218/S.Bowne.CNIT.part09.rar.html
http://rapidshare.com/files/312707532/S.Bowne.CNIT.part10.rar.html
http://rapidshare.com/files/312707474/S.Bowne.CNIT.part11.rar.html
http://rapidshare.com/files/312707343/S.Bowne.CNIT.part12.rar.html
http://rapidshare.com/files/312707121/S.Bowne.CNIT.part13.rar.html
http://rapidshare.com/files/312707603/S.Bowne.CNIT.part14.rar.html
http://rapidshare.com/files/312707500/S.Bowne.CNIT.part15.rar.html
Netload
- Code:
http://www.netload.in/dateiiaQpxIq8oo/S.Bowne.CNIT.part01.rar.html.htm
http://www.netload.in/datei3ij6JzVdNo/S.Bowne.CNIT.part02.rar.html.htm
http://www.netload.in/dateiAcFiRJHzzW/S.Bowne.CNIT.part03.rar.html.htm
http://www.netload.in/datei6GAuPQCRzN/S.Bowne.CNIT.part04.rar.html.htm
http://www.netload.in/dateicmFtTbJlbz/S.Bowne.CNIT.part05.rar.html.htm
http://www.netload.in/dateiFqwFzyJK9u/S.Bowne.CNIT.part06.rar.html.htm
http://www.netload.in/dateibGRe0ncr0v/S.Bowne.CNIT.part07.rar.html.htm
http://www.netload.in/dateiFjadVVkVys/S.Bowne.CNIT.part08.rar.html.htm
http://www.netload.in/dateiX4ugU4CesS/S.Bowne.CNIT.part09.rar.html.htm
http://www.netload.in/dateiDvCoKKVtDa/S.Bowne.CNIT.part10.rar.html.htm
http://www.netload.in/dateinJnPsdQgva/S.Bowne.CNIT.part11.rar.html.htm
http://www.netload.in/dateiz0sx6rVwfb/S.Bowne.CNIT.part12.rar.html.htm
http://www.netload.in/dateidhPVjqr0SD/S.Bowne.CNIT.part13.rar.html.htm
http://www.netload.in/dateiYhoNCn1Ast/S.Bowne.CNIT.part14.rar.html.htm
http://www.netload.in/dateioQDfQIVJOs/S.Bowne.CNIT.part15.rar.html.htm
Similar topics
» SANS: Sec 60 - Network Penetration Testing and Ethical Hacki
» [MS] SkillSoft.Course.CompTIA.Network.Plus.2009.Network.Secu
» [MS] SkillSoft.Course.CompTIA.Network.Plus.2009.Network.Prot
» [MS] SkillSoft.Course.CompTIA.Network.Plus.2009.Network.Secu
» [MS] SkillSoft.Course.CompTIA.Network.Plus.2009.Network.Prot
Trang 1 trong tổng số 1 trang
Permissions in this forum:
Bạn không có quyền trả lời bài viết
Mon 05 Oct 2015, 7:51 pm by giaychuotkhoet
» Hộp đựng đa năng trong phòng tắm và các đồ dụng tiện llợi khác
Wed 22 Jul 2015, 1:23 am by aloonline1987
» gel bôi trơn ấm áp warm lovin
Tue 19 May 2015, 4:24 pm by shopnguoilon_sg
» màng film tránh thai vcf dành cho chị em
Tue 19 May 2015, 4:19 pm by shopnguoilon_sg
» màng film tránh thai vcf dành cho chị em
Tue 19 May 2015, 4:17 pm by shopnguoilon_sg
» stud 100 khẳng định đẳng cấp phái mạnh
Fri 15 May 2015, 11:25 am by shopnguoilon_sg
» Lover aider máy mát xa dành cho nữ
Fri 15 May 2015, 11:23 am by shopnguoilon_sg
» cung cấp máy ép dĩa chất lượng
Fri 17 Apr 2015, 2:15 pm by huyenrio
» Máy in hình lên ly
Wed 25 Mar 2015, 2:44 pm by huyenrio
» Máy in hình lên áo
Wed 25 Mar 2015, 2:43 pm by huyenrio
» trang trí cây thông noel ở vinh,cho thuê cây thông noel ở vinh,chuyển quà noel ở vinh
Fri 28 Nov 2014, 8:44 am by sunflowerhn83
» Máy in hạn sử dụng DMJ-B chính hãng, giá sốc
Thu 02 Oct 2014, 9:40 am by phamlinhnd1010
» Dạy cắm hoa chuyên nghiệp,dạy cắm hoa nghệ thuật,dạy cắt tỉa của quả ở T.p Vinh Nghệ An
Tue 30 Sep 2014, 10:10 am by haiha131276
» công ty Yên Phát chuyên phân phối, lắp đặt camera chính hãng giá rẻ nhất miền Bắc.
Fri 26 Sep 2014, 10:57 am by phamlinhnd1010
» HOT! Chung cư mini Xuân Đỉnh ở ngay giá chỉ từ 690 triệu 1 căn
Fri 26 Sep 2014, 10:44 am by xuantruong23