[Udemy] IT Security Beginner 2.0 Certified Hacking Training [2015, ENG]

Страницы:  1
Ответить
 

Whisperkiller

Стаж: 16 лет 9 месяцев

Сообщений: 179


Whisperkiller · 20-Окт-15 08:48 (9 лет 6 месяцев назад, ред. 20-Окт-15 08:49)

IT Security Beginner 2.0 Certified Hacking Training
Год выпуска: 2015
Производитель: Udemy
Сайт производителя: https://www.udemy.com/it-security-beginner-certified-hacking-training/
Продолжительность: 10:15:52
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: Get Certified Hacking Training now and gain voucher to Online Examination Center for free. New 2.0 version available!
Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
While this course includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these tactics to infiltrate networks or IT systems that are not your own.
Содержание
├── 2. IT_Security_Trends
│ ├── 03. Introduction_to_Current_Cyber_Threats.mp4
│ ├── 04. IT_Prehistory.mp4
│ ├── 05. Let_s_look_a_few_years_back.mp4
│ ├── 06. Cyber_crimes. an_evolution_not_revolution.mp4
│ ├── 08. Popular_myths_about_IT_security. origins.mp4
│ ├── 09. Myths_1. you_ll_never_be_hacked.mp4
│ ├── 10. Myths_2. you_don_t_need_any_protection_software_oraz_hardware.mp4
│ ├── 11. Myths_3. IT_security_is_always_a_priority.mp4
│ ├── 13. Trends_in_IT_Security.mp4
│ ├── 14. The_birth_of_technology_society.mp4
│ ├── 15. EXERCISE. How_much_info_can_you_gathered.mp4
│ ├── 16. Fake_identity.mp4
│ ├── 17. Online_privacy.mp4
│ ├── 18. Analyzing_sniffing_software.mp4
│ ├── 19. Cyber_War.mp4
│ ├── 21. Objective_1. Data_security. Introduction.mp4
│ ├── 22. Confidentiality_of_data.mp4
│ ├── 23. EXERCISE. Finding_confidental_data_with_search_engines.mp4
│ └── 24. Integrity_of_data.mp4
├── 3. Computer_Network_Security
│ ├── 30. Network_security. introduction.mp4
│ ├── 31. OSI_MODEL_1. Physical_layer.mp4
│ ├── 32. OSI_MODEL_2. Data_link_layer.mp4
│ ├── 33. Threats. MAC_spoofing.mp4
│ ├── 34. Threats. ARP_Poisoning.mp4
│ ├── 35. EXERCISE. Data_Link_Layer_Attack.mp4
│ ├── 36. OSI_MODEL_3. Network_layer.mp4
│ ├── 37. TCP_Tunnelling_over_ICMP.mp4
│ ├── 39. OSI_MODEL_4. Transport_Layer.mp4
│ ├── 40. Threats. Enumerating_Remote_Computers.mp4
│ ├── 41. EXERCISE. Transport_Layer_Attack.mp4
│ ├── 42. METASPLOIT. Attack_demonstration_part_1.mp4
│ ├── 43. METASPLOIT. Attack_demonstration_part_2.mp4
│ ├── 44. OSI_MODEL_5. Session_Layer.mp4
│ ├── 46. OSI_MODEL_6. Presentation_Layer.mp4
│ ├── 47. OSI_MODEL_7. Application_Layer.mp4
│ ├── 48. EXERCISE. Application_Layer_Attacks.mp4
│ ├── 49. Backtrack. Attack_Demonstration.mp4
│ ├── 50. Man-in-the-Middle_and_Denial_of_Service_Attacks.mp4
│ ├── 51. Modifying_Transmitted_Packets.mp4
│ └── 52. Unencrypted_protocols.mp4
├── 5. Network_administration
│ ├── 72. Introduction_to_Monitoring_Transmitted_Data.mp4
│ ├── 73. Monitoring_Transmitted_Data. Basic_informations.mp4
│ ├── 74. Intrusion_detection_systems.mp4
│ ├── 75. Why_are_firewalls_and_NDIS_not_enough.mp4
│ ├── 76. Wireshark. Introduction_to_network_analysis.mp4
│ ├── 77. How_to_use_Wireshark.mp4
│ ├── 78. Analyzing_Captured_data.mp4
│ ├── 79. How_to_analyze_telnet_protocol.mp4
│ ├── 80. Intrusion_detection.mp4
│ └── 81. Scanning_computers.mp4
├── 6. Wireless_Networks_Security
│ ├── 85. Wireless_Networks.mp4
│ ├── 86. WIFI_security_solutions. introduction.mp4
│ ├── 87. WIFI. working_principles.mp4
│ ├── 88. Other_wireless_technologies.mp4
│ ├── 89. Threats_and_risks.mp4
│ ├── 90. Ineffective_solutions.mp4
│ ├── 91. Authentication_methods.mp4
│ ├── 92. 802.11_WEP.mp4
│ ├── 93. 802.11I_WPA.mp4
│ ├── 95. Threats_of_WIFI_networks.mp4
│ ├── 96. Client_Attacks. Launching_a_rogue_access_point.mp4
│ ├── 97. Client_Attacks. Evil_twin.mp4
│ ├── 98. Client_Attacks. Denial_of_service.mp4
│ └── 99. EXERCISE. WPA_attack.mp4
├── 7. Operating_Systems_Security
│ ├── 104. Operating_systems_security. introduction.mp4
│ ├── 105. Security_boundaries.mp4
│ ├── 106. Three_core.mp4
│ ├── 107. EXERCISE. OS_boundaries.mp4
│ ├── 108. Process_isolation.mp4
│ ├── 109. Kernel_Mode_Code_Signing.mp4
│ ├── 110. Java_Virtual_Machine_and_code_access_security.mp4
│ ├── 112. Malware.mp4
│ ├── 113. EXERCISE. Vulnerability_attacks.mp4
│ ├── 114. EXERCISE. Identifying_suspicious_processes.mp4
│ ├── 115. Demonstration. Process_Explorer.mp4
│ ├── 116. EXERCISE. Removing_malware.mp4
│ ├── 117. Rootkits.mp4
│ ├── 118. EXERCISE. Detecting_rootkits.mp4
│ └── 119. EXERCISE. Security_evaluation.mp4
├── 8. Access_Control
│ ├── 124. Authentication_and_authorisation. Introduction.mp4
│ ├── 125. Authentication_users.mp4
│ ├── 126. How_secure_is_your_password.mp4
│ ├── 127. Authentication_protocols_and_services.mp4
│ ├── 128. LM_Hash.mp4
│ ├── 129. Cashed_Credentials.mp4
│ ├── 130. KERBEROS.mp4
│ ├── 132. Identity_Theft.mp4
│ ├── 133. EXERCISE. Offline_attacks.mp4
│ └── 134. Using_online_cracking_services.mp4
└── 9. Windows_Security
├── 139. Windows_Security. what_you_ll_learn.mp4
├── 140. User_Account_Control.mp4
├── 141. UAC_configuration.mp4
├── 142. Additional_Security_Features. ASLR_and_DEP.mp4
├── 143. PatchGuard.mp4
├── 145. Encryption. key_protection.mp4
├── 146. Drive_encryption.mp4
├── 147. BitLocker.mp4
├── 148. BitLocker_To_Go_Reader.mp4
├── 149. File_and_folder_encryption. EFS.mp4
└── 150. EXERCISE. EFS.mp4
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: 1280x720 (16:9), 25.000 fps, Zencoder Video Encoding System ~545 Kbps avg, 0.024 bit/pixe
Аудио: 48.0 KHz, AAC LC, 2 ch, ~51.3 Kbps Доп. информация: Важно: В данной раздаче отсутствует 1 и 4 модули! Кто найдет тому респект и уважуха!
Download
Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 

boydband

Стаж: 9 лет 7 месяцев

Сообщений: 3


boydband · 24-Окт-15 13:54 (спустя 4 дня)

Thankz for your kindness. good job.
[Профиль]  [ЛС] 

Whisperkiller

Стаж: 16 лет 9 месяцев

Сообщений: 179


Whisperkiller · 25-Окт-15 12:32 (спустя 22 часа)

boydband писал(а):
69055996Thankz for your kindness. good job.
If you know where I and IV chapter, say me.
[Профиль]  [ЛС] 
 
Ответить
Loading...
Error