Video học bảo mật mạng

Thảo luận trong 'Training Tutorial' bắt đầu bởi ghost0bk, 2 Tháng tư 2016.

  1. ghost0bk

    ghost0bk www.KeyPhanMem.info Staff Member

    [​IMG]

    [​IMG]


    1. Introduction
    0101 What you should expect from the video.mp4
    0102 What is Hacking.mp4
    0103 Why do we hack.mp4
    0104 Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc).mp4
    0105 Being Ethical.mp4
    0106 Legal Issues Around Hacking.mp4
    0107 Methodology.mp4
    0108 Types Of Attacks.mp4
    0109 Skills Necessary And Skills To Be Learned.mp4
    0110 What Is Penetration Testing Scope.mp4

    2. Getting The Backgound - Footprinting And Reconnaissance
    0201 What Is Footprinting.mp4
    0202 History Lessons - Way Back Machine.mp4
    0203 Using Your Resources - Job Listings, People Searches, Social Networks.mp4
    0204 Using Whois Lookups.mp4
    0205 Using DNS To Extract Information.mp4
    0206 Finding Network Ranges.mp4
    0207 Google Hacking.mp4
    0208 Mining For Information Using Google Hacking.mp4
    0209 Google Hacking Database.mp4

    3. Networking Fundamentals
    0301 History Of TCPIP.mp4
    0302 Using Wireshark To Examine Packets.mp4
    0303 OSI And IP Models.mp4
    0304 Addressing.mp4
    0305 UDP.mp4
    0306 TCP.mp4
    0307 Services.mp4
    0308 Using Wireshark For Deep Analysis.mp4
    0309 DHCP.mp4
    0310 Using ARP.mp4

    4. Cryptography
    0401 History Of Cryptography.mp4
    0402 Types Of Cryptography.mp4
    0403 Public Key.mp4
    0404 Certificates.mp4
    0405 Hashing.mp4
    0406 AES, DES, 3DES.mp4
    0407 SSL and TLS.mp4
    0408 SSH.mp4
    0409 Disk Encryption.mp4
    0410 Cryptographic Analysis.mp4

    5. Scanning and Enumeration
    0501 Types Of Scans.mp4
    0502 Using NMAP.mp4
    0503 Other Types Of Scans.mp4
    0504 Using hping And Its Uses.mp4
    0505 War Dialing.mp4
    0506 IDS Evasion.mp4
    0507 Banner Grabbing.mp4
    0508 Vulnerability Scanning.mp4
    0509 Using Nessus.mp4
    0510 Enumeration Techniques.mp4
    0511 SNMP.mp4
    0512 LDAP.mp4
    0513 Using Proxies.mp4
    0514 Tor And Anonymizers.mp4
    0515 Tunneling.mp4

    6. Penetration
    0601 Goals - Copy.mp4
    0601 Goals.mp4
    0602 Password Cracking And Complexity - Copy.mp4
    0602 Password Cracking And Complexity.mp4
    0603 Password Attacks.mp4
    0604 Password Storage Techniques.mp4
    0605 Privilege Escalation.mp4
    0606 Spyware, Rootkits And Key Loggers.mp4
    0607 Metasploit Basics.mp4
    0608 AuditingLogging.mp4
    0609 Metasploit Again.mp4

    7. Viruses - Trojans, Backdoors, Viruses and Worms
    0701 Definitions And History.mp4
    0702 Detection Of Malware.mp4
    0703 Anti-Virus Evasion.mp4
    0704 Deployment Of Malware.mp4
    0705 Virus Types.mp4
    0706 Malware Analysis.mp4
    0707 Windows ADS And Hiding Malware.mp4
    0708 Doing Debugging - OllyDbg.mp4
    0709 Packing And Automated A V Maker Tools.mp4
    0710 More Malware Analysis.mp4

    8. Denial of Service Attacks'
    0801 What Is DoS DDoS.mp4
    0802 DoS Attacks.mp4
    0803 Cyber Crime.mp4
    0804 Botnets.mp4
    0805 Attack Countermeasures - Flooding.mp4

    9. Web Application Hacking
    0901 What Is Web Application Testing.mp4
    0902 Web Application Architecture.mp4
    0903 Web Testing Tools.mp4
    0904 Cross Site Scripting.mp4
    0905 SQL Injection.mp4
    0906 Cross Site Request Forgery.mp4
    0907 Session Hijacking And Attacks And Cookies.mp4
    0908 Password Attacks.mp4
    0909 Encoding.mp4

    10. Wireless Networking
    1001 Wireless Networking.mp4
    1002 Encryption Techniques - WEP, WPA, WPA2.mp4
    1003 Finding Hotspots.mp4
    1004 Breaking WEP Encryption.mp4
    1005 Rogue Access Points And Attacks.mp4
    1006 Wireless Sniffing.mp4
    1007 Protecting Wireless Networks.mp4

    11. Detecting Evasion
    1101 What Is Evasion And Why Do We Use It.mp4
    1102 Steganography.mp4

    12. Programming Attacks
    1201 Stacks And Heaps.mp4
    1202 Buffer Overflows.mp4
    1203 Protecting Against Buffer Overflow Attacks.mp4
    1204 Format String.mp4
    1205 De-Compilation.mp4
    1206 Reverse Engineering.mp4

    13. About the Instructor
    1301 About Me.mp4
    :dl:



    Video.Learning.Whitehat.Hacking.and.Penetration.Testing.rar 1.29 GB
    Link OneDrive
    Link GoogleDrive
     

Chia sẻ trang này