lundi 6 septembre 2010

Ethical Hacking Penetration Testing and Countermeasures Training

Ethical Hacking Penetration Testing and Countermeasures Training Part 1 + 2 | 2,2GB
Genre: Video Training

Career Academy Hacking Penetration Testing and Countermeasures Training with new younger guy (O.K. guy) but not balding one. These training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems.

You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection,Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Module 01 – Ethical Hacking and Penetration Testing
Module 02 – Footprinting and Reconnaissance
Module 03 – TCP/IP Basics and Scanning
Module 04 – Enumeration and Verification
Module 05 – Hacking & Defending Wireless/Modems

Part TWO: Career Academy Hacking Penetration Testing and Countermeasures Training with new younger guy (O.K. guy) but not balding one.
These training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection,
Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows
and Virus Creation.
 
Disk 6 thru 11
Module 06 – Hacking & Defending Web Servers
Module 07 – Hacking & Defending Web Applications
Module 08 – Sniffers and Session Hijacking
Module 09 – Hacking & Defending Windows Systems
Module 10 – Hacking & Defending Unix Systems
Module 11 – Rootkits, Backdoors, Trojans & Tunnels
 
download  

Aucun commentaire:

Enregistrer un commentaire

Related Posts with Thumbnails