zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
magnet:?xt=urn:btih:f9a76b3330f136f3d27ceaf9507ff46d71cd13dd&dn=[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
磁力链接详情
Hash值:
f9a76b3330f136f3d27ceaf9507ff46d71cd13dd
点击数:
216
文件大小:
4.73 GB
文件数量:
209
创建日期:
2021-4-20 03:59
最后访问:
2024-12-26 20:53
访问标签:
FreeAllCourse
Com
Udemy
-
Hacking
in
Practice
Certified
Ethical
Hacking
MEGA
Course
文件列表详情
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4 213.49 MB
02 Application Security/005 Introduction to Application Security.mp4 21.26 MB
02 Application Security/006 Attacks on applications.mp4 25.5 MB
02 Application Security/007 SQL Injection.mp4 17.96 MB
02 Application Security/008 EXERCISE Analyze the application.mp4 28.74 MB
02 Application Security/009 Blind SQL Injection.mp4 22.47 MB
02 Application Security/010 Automated SQL Injection.mp4 29.48 MB
02 Application Security/011 Cross-site scripting - XSS.mp4 29.1 MB
02 Application Security/013 Program security assessment.mp4 12.15 MB
02 Application Security/014 Unsafe applications.mp4 24.95 MB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4 20.46 MB
03 Introduction to Cyber Threats/017 IT Prehistory.mp4 25.8 MB
03 Introduction to Cyber Threats/018 Lets look a few years back.mp4 23.63 MB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4 21.26 MB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4 27.92 MB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4 29.18 MB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4 25.77 MB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4 6 MB
05 IT Security Trends/026 Trends in IT Security.mp4 18.7 MB
05 IT Security Trends/027 The birth of technology society.mp4 18.58 MB
05 IT Security Trends/028 EXERCISE How much info can you gather.mp4 13.78 MB
05 IT Security Trends/029 Fake identity.mp4 21.76 MB
05 IT Security Trends/030 Online privacy.mp4 32.04 MB
05 IT Security Trends/031 Analyzing sniffing software.mp4 19.5 MB
05 IT Security Trends/032 Cyber War.mp4 45.4 MB
06 Data Security/034 Objective 1 - Data security - Introduction.mp4 38.83 MB
06 Data Security/035 Integrity of data.mp4 32.11 MB
06 Data Security/037 Confidentiality of data.mp4 31.65 MB
06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4 23.49 MB
07 Computer Network Security/039 Network security - introduction.mp4 22.04 MB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4 28.95 MB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4 22.75 MB
07 Computer Network Security/042 Threats MAC spoofing.mp4 27.46 MB
07 Computer Network Security/043 Threats ARP Poisoning.mp4 31.29 MB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4 35.27 MB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4 31.7 MB
07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4 34.99 MB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4 28.63 MB
07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4 16.81 MB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 12.84 MB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 26.08 MB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4 16.38 MB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4 37.43 MB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4 16.92 MB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4 18.99 MB
07 Computer Network Security/057 Backtrack Attack Demonstration.mp4 15.59 MB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4 14.2 MB
07 Computer Network Security/059 Modifying Transmitted Packets.mp4 26.76 MB
07 Computer Network Security/060 Unencrypted protocols.mp4 13.64 MB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4 10.93 MB
08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4 29.12 MB
08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4 17.45 MB
08 Designing Secure Computer Networks/066 IPv6 address notation.mp4 27.31 MB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4 30.28 MB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4 43.74 MB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4 21.71 MB
08 Designing Secure Computer Networks/070 Network Address translation.mp4 52.64 MB
08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4 48.43 MB
09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4 6.18 MB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4 41.07 MB
09 Network administration/075 Intrusion detection systems.mp4 38.23 MB
09 Network administration/076 Why are firewalls and NDIS not enough.mp4 28.19 MB
09 Network administration/077 Wireshark - Introduction to network analysis.mp4 30.65 MB
09 Network administration/078 How to use Wireshark.mp4 43.55 MB
09 Network administration/079 Analyzing Captured data.mp4 31.01 MB
09 Network administration/080 How to analyze telnet protocol.mp4 37.99 MB
09 Network administration/081 Intrusion detection.mp4 46.35 MB
09 Network administration/082 Scanning computers.mp4 35.27 MB
10 Wireless Networks Security/084 Wireless Networks.mp4 6.96 MB
10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4 29.17 MB
10 Wireless Networks Security/086 WIFI - working principles.mp4 29.36 MB
10 Wireless Networks Security/087 Other wireless technologies.mp4 13.16 MB
10 Wireless Networks Security/088 Threats and risks.mp4 18.49 MB
10 Wireless Networks Security/089 Ineffective solutions.mp4 18.98 MB
10 Wireless Networks Security/090 Authentication methods.mp4 37.13 MB
10 Wireless Networks Security/091 802.11 WEP.mp4 31.39 MB
10 Wireless Networks Security/092 802.11I WPA.mp4 31.59 MB
10 Wireless Networks Security/094 Threats of WIFI networks.mp4 30.54 MB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4 33.57 MB
10 Wireless Networks Security/096 Client Attacks Evil twin.mp4 22.76 MB
10 Wireless Networks Security/097 Client Attacks Denial of service.mp4 36.52 MB
10 Wireless Networks Security/098 EXERCISE WPA attack.mp4 8.86 MB
11 Operating Systems Security/100 Operating systems security - introduction.mp4 48.07 MB
11 Operating Systems Security/101 Security boundaries.mp4 21.2 MB
11 Operating Systems Security/102 Three core.mp4 29.75 MB
11 Operating Systems Security/103 EXERCISE OS boundaries.mp4 39.1 MB
11 Operating Systems Security/104 Process isolation.mp4 26.85 MB
11 Operating Systems Security/105 Kernel Mode Code Signing.mp4 25.68 MB
11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4 18.64 MB
11 Operating Systems Security/108 Malware.mp4 44.86 MB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4 47.61 MB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4 29.97 MB
11 Operating Systems Security/111 Demonstration Process Explorer.mp4 38.13 MB
11 Operating Systems Security/112 EXERCISE Removing malware.mp4 45.85 MB
11 Operating Systems Security/113 Rootkits.mp4 28.94 MB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4 58.29 MB
11 Operating Systems Security/115 EXERCISE Security evaluation.mp4 17.82 MB
12 Access Control/117 Authentication and authorisation - Introduction.mp4 9.63 MB
12 Access Control/118 Authentication users.mp4 31.37 MB
12 Access Control/119 How secure is your password.mp4 15.97 MB
12 Access Control/120 Authentication protocols and services.mp4 31.82 MB
12 Access Control/122 LM Hash.mp4 30.7 MB
12 Access Control/123 Cached Credentials.mp4 18.08 MB
12 Access Control/124 KERBEROS.mp4 52.56 MB
12 Access Control/125 Identity Theft.mp4 42.95 MB
12 Access Control/126 EXERCISE Offline attacks.mp4 45.63 MB
12 Access Control/127 Using online cracking services.mp4 37.65 MB
13 Windows Security/129 Windows Security - what youll learn.mp4 7.59 MB
13 Windows Security/130 User Account Control.mp4 32.01 MB
13 Windows Security/131 UAC configuration.mp4 35.1 MB
13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4 40.91 MB
13 Windows Security/133 PatchGuard.mp4 7.86 MB
13 Windows Security/135 Encryption - key protection.mp4 46.34 MB
13 Windows Security/136 Drive encryption.mp4 37.33 MB
13 Windows Security/137 BitLocker.mp4 36.43 MB
13 Windows Security/138 BitLocker To Go Reader.mp4 18.44 MB
13 Windows Security/139 File and folder encryption - EFS.mp4 34.52 MB
13 Windows Security/140 EXERCISE EFS.mp4 15.35 MB
14 Security Policies/142 Security policies introduction.mp4 5.87 MB
14 Security Policies/143 What is security.mp4 10.89 MB
14 Security Policies/144 Information security.mp4 10.26 MB
14 Security Policies/145 Information security - level up.mp4 9.87 MB
14 Security Policies/146 Security issues.mp4 12.84 MB
14 Security Policies/147 Why are security solutions fallible.mp4 15.48 MB
14 Security Policies/148 Security policy issues.mp4 12.6 MB
14 Security Policies/149 Introduction to threat modelling and classification.mp4 13.3 MB
14 Security Policies/150 Threat modelling - STRIDE.mp4 10.58 MB
14 Security Policies/151 STRIDE Spoofing identity.mp4 13.84 MB
14 Security Policies/152 STRIDE Tampering with Data.mp4 12.84 MB
14 Security Policies/153 STRIDE Denial of Service.mp4 10.39 MB
15 Risk Management/154 Introduction to Risk Management.mp4 3.87 MB
15 Risk Management/155 Attack methods.mp4 17.28 MB
15 Risk Management/156 Local attacks.mp4 7.88 MB
15 Risk Management/157 Target scanning and enumeration techniques 1.mp4 15.84 MB
15 Risk Management/158 Target scanning and enumeration techniques 2.mp4 8.4 MB
15 Risk Management/159 Passive scanning.mp4 7.13 MB
15 Risk Management/161 Introduction to risk assessment.mp4 18.15 MB
15 Risk Management/162 DREAD Risk assessment model.mp4 12.64 MB
15 Risk Management/163 DREAD Exploitability.mp4 13.9 MB
15 Risk Management/164 EXERCISE Risk Assessment.mp4 18.11 MB
15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4 11.41 MB
15 Risk Management/167 Manipulation tactics.mp4 22.17 MB
15 Risk Management/168 EXERCISE Social Engineering attacks.mp4 19.02 MB
15 Risk Management/169 SE with KALI BackTrack.mp4 16.16 MB
15 Risk Management/170 Rogue Software.mp4 7.37 MB
15 Risk Management/171 Fraud tools 1.mp4 20.02 MB
15 Risk Management/172 Fraud tools 2.mp4 17.72 MB
16 Defence in Depth/174 Introduction to Defence in Depth.mp4 4.54 MB
16 Defence in Depth/175 How to use Defence in Depth model.mp4 14.67 MB
16 Defence in Depth/176 DiD OS and LAN Layers.mp4 16.13 MB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4 12.92 MB
16 Defence in Depth/178 DiD Demonstration.mp4 6.98 MB
16 Defence in Depth/179 Automated attack targeting a service.mp4 15.14 MB
16 Defence in Depth/180 Automated user-targeting attack.mp4 13.43 MB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4 13.99 MB
16 Defence in Depth/183 Law 2.mp4 7.58 MB
16 Defence in Depth/184 Law 3.mp4 5.86 MB
16 Defence in Depth/185 Law 4.mp4 5.96 MB
16 Defence in Depth/186 Law 5.mp4 8.81 MB
16 Defence in Depth/187 Law 6.mp4 5.82 MB
16 Defence in Depth/188 Law 7.mp4 2.9 MB
16 Defence in Depth/189 Law 8.mp4 4.59 MB
16 Defence in Depth/190 Law 9.mp4 9.23 MB
16 Defence in Depth/191 Law 10.mp4 1.96 MB
16 Defence in Depth/192 Laws for administrators.mp4 13.86 MB
17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4 4.36 MB
17 Disaster Recovery/195 How to reduce losses.mp4 14.85 MB
17 Disaster Recovery/196 Ensuring continous availability.mp4 10.78 MB
17 Disaster Recovery/197 Threat discovery 1.mp4 12.28 MB
17 Disaster Recovery/198 Threat discovery 2.mp4 8.84 MB
17 Disaster Recovery/199 Audit users and keep control accounts.mp4 13.3 MB
17 Disaster Recovery/200 High risk users.mp4 7.92 MB
17 Disaster Recovery/201 Collecting and analysing evidence.mp4 18.29 MB
17 Disaster Recovery/202 Forensics example.mp4 10.61 MB
17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4 20.02 MB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4 3.1 MB
18 Application Security - Configuration and Management/206 Managing applications.mp4 17.21 MB
18 Application Security - Configuration and Management/207 Software updates.mp4 6.22 MB
18 Application Security - Configuration and Management/208 MS Update.mp4 16.24 MB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4 6.27 MB
18 Application Security - Configuration and Management/210 Blocking applications.mp4 17.98 MB
18 Application Security - Configuration and Management/211 Software restrictions policies.mp4 14.49 MB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4 27.19 MB
18 Application Security - Configuration and Management/213 Isolating applications.mp4 16.88 MB
19 Cryptography/215 Introduction to cryptography.mp4 23.58 MB
19 Cryptography/216 History of ciphers.mp4 25.5 MB
19 Cryptography/217 Symmetric and asymmetric ciphers.mp4 15.06 MB
19 Cryptography/218 Symmetric-key algorithms.mp4 13.51 MB
19 Cryptography/219 Block ciphers.mp4 15.35 MB
19 Cryptography/220 Data encryption standard.mp4 16.54 MB
19 Cryptography/221 DES-X.mp4 18.22 MB
19 Cryptography/222 Advanced encryption standards.mp4 12.83 MB
19 Cryptography/223 Block cipher modes.mp4 17.49 MB
19 Cryptography/224 Stream Ciphers - RC4.mp4 8.59 MB
19 Cryptography/225 Asymmetric-key algorithms.mp4 19.08 MB
19 Cryptography/226 RSA.mp4 12.83 MB
19 Cryptography/227 ELGAMAL.mp4 4.9 MB
19 Cryptography/228 HASH functions.mp4 14.43 MB
19 Cryptography/229 Digital signature.mp4 15.45 MB
19 Cryptography/230 Hybrid Schemes.mp4 16.06 MB
20 Public Key Infrastructure/232 Introduction to cryptology.mp4 5.98 MB
20 Public Key Infrastructure/233 Public key infrastructure.mp4 14.8 MB
20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4 12.74 MB
20 Public Key Infrastructure/235 What will PKI allow you.mp4 14.46 MB
20 Public Key Infrastructure/236 EXERCISE Certificates.mp4 20.63 MB
20 Public Key Infrastructure/237 Planning the PKI.mp4 22.55 MB
20 Public Key Infrastructure/238 Certificate life cycle.mp4 16.19 MB
20 Public Key Infrastructure/239 PKI Administration.mp4 19.69 MB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4 179.9 MB
其他位置