ITpro - CEH
English | mp4 | H264 1280x720 | AAC 2 ch | 28 hrs 39 min | 13.6 GB
Properly securing servers and networks is a significant challenge due to the ever changing attack methods used by hackers. The most successful security technicians have a thorough understanding of the tools and techniques used by the hackers themselves. This practical knowledge of attack methods allows a defender to assemble more flexible protections for their systems. The Certified Ethical Hacker certification is designed to bridge the gap between theoretical and practical knowledge. This is the first step to becoming a Penetration Tester and increasing your ability to secure a network.
Contents
01 CEH Overview (8m).mp4
02 Getting Started With CEH (105m).mp4
03 System Fundamentals (44s).mp4
04 Cryptography (52m).mp4
05 Cryptography Part 2 (55m).mp4
06 Footprinting (107m).mp4
07 Footprinting Part 2 (63m).mp4
08 Footprinting Part 3 (112m).mp4
09 Scanning (78m).mp4
10 Scanning Part 2 (80m).mp4
11 Enumeration (87m).mp4
12 Gaining Access (98m).mp4
13 Gaining Access Part 2 (95m).mp4
14 Viruses, Trojans, and Malware (103m).mp4
15 Sniffers (68m).mp4
16 Social Engineering (78m).mp4
17 Denial Of Service (87m).mp4
18 Session Hijacking (73m).mp4
19 Web Servers and Applications (73m).mp4
20 SQL Injection (45m).mp4
21 Wireless Networks (110m).mp4
22 Wireless Networks Part 2 (64m).mp4
23 Evading IDSs, Firewalls, and Honeypots (58m).mp4
24 Next Steps (6m).mp4
发布日期: 2015-08-21