Learn The Basics Of Ethical Hacking And Penetration Testing

Torrent Details

Learn The Basics of Ethical Hacking and Penetration TestingLearn The Basics of Ethical Hacking and Penetration Testing

NAME
Learn The Basics of Ethical Hacking and Penetration Testing.torrent
CATEGORY
eBooks
INFOHASH
4db02a142b316906ebb4da9e24d8e48854994e69
SIZE
3.2 GB in 65 files
ADDED
Uploaded on 07-05-2015 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Learn The Basics of Ethical Hacking and Penetration





You don’t have to be perfect to be a hacker. Or theperson in the room. Or a type-A personality.

Course Description

Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems.

This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.
In this course, students interested in learning ethical hacking techniques and penetrationand who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.
Get started with this course today to be on your way towards finding real-world computer security solutions.
Gather Information Intelligence
Find Security Vulnerabilities
Develop Exploits
Scan and Produce Vulnerability Assessments
Learn Network Attacking Techniques
Ethical Hacking for Computer Security
Ethical hackers are computer security experts who focus on penetrationand weaknesses in an organization’s information systems.

Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/01. About the course.MP46.9 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/02. Hacking vs Ethical Hacking.MP47.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/03. Who is a Hacker.MP44.3 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/04. Types of Hackers.MP414.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/05. Hacktivism.MP45.2 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/06. Computer Crimes.MP410.2 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/07. Important Terms 1.MP410.5 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/08. Important Terms 2.MP412.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/09. Why Penetration Testing.MP45.3 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/10. Penetration Testing Types.MP47.4 MB
Section 2 Real World Information Intelligence Techniques/11.Introduction to Information Intelligence Techniques.mp45.4 MB
Section 2 Real World Information Intelligence Techniques/12. organizing information during a penetration test.MP411.3 MB
Section 2 Real World Information Intelligence Techniques/13. how to locally copying company websites.MP418 MB
Section 2 Real World Information Intelligence Techniques/14. newsgroups and list-servers.MP417.8 MB
Section 2 Real World Information Intelligence Techniques/15. online job listing.MP410.7 MB
Section 2 Real World Information Intelligence Techniques/16. the power of social media websites.MP415 MB
Section 2 Real World Information Intelligence Techniques/17. harvesting a company emails.MP430.3 MB
Section 2 Real World Information Intelligence Techniques/18. how to generate a targeted wordlist for password cracking.MP415.3 MB
Section 2 Real World Information Intelligence Techniques/19. information intelligence with Maltego.MP414.4 MB
Section 2 Real World Information Intelligence Techniques/20. Google Search Techniques for penetration testers.MP463.7 MB
Section 2 Real World Information Intelligence Techniques/21. other search engines for penetration testers.MP49.7 MB
Section 2 Real World Information Intelligence Techniques/22. Enumerating Internal Network From Outside.MP417.7 MB
Section 2 Real World Information Intelligence Techniques/23. gather information using WhatWeb, HttpRecon and SSL SCAN.MP436.4 MB
Section 2 Real World Information Intelligence Techniques/24. Whois Lookups, finding other Web Sites Hosted on a Web Server.MP415.2 MB
Section 2 Real World Information Intelligence Techniques/25. IP Address Geolocation.MP412.3 MB
Section 2 Real World Information Intelligence Techniques/26. finding subdomains, extracting exif data and finding hidden web dirs.MP431.9 MB
Section 2 Real World Information Intelligence Techniques/27. ShodanHQ for fun and profit.MP420 MB
Section 2 Real World Information Intelligence Techniques/28. Web Application Firewall Detection, HTTP and DNS load balancer detection.MP454.1 MB
Section 2 Real World Information Intelligence Techniques/29. DNS Enumerating for penetration testers.MP463.1 MB
Section 2 Real World Information Intelligence Techniques/30. Mail Server Enumeration for penetration testers.MP420 MB
Section 2 Real World Information Intelligence Techniques/31. Intel Gathering Methodology for penetration testers.MP44.7 MB
Section 2 Real World Information Intelligence Techniques/31_1. References.txt574 B
Section 3 Scanning and vulnerability Assessment/32. packet Crafting and Manipulating with Scapy.MP437.4 MB
Section 3 Scanning and vulnerability Assessment/33. port scanning with scapy.MP416.1 MB
Section 3 Scanning and vulnerability Assessment/34. Network Enumeration and Mapping Techniques.MP417.3 MB
Section 3 Scanning and vulnerability Assessment/34_1. References.txt263 B
Section 3 Scanning and vulnerability Assessment/35. Network scanning techniques.MP4115.6 MB
Section 3 Scanning and vulnerability Assessment/35_1. References.txt464 B
Section 3 Scanning and vulnerability Assessment/36. Vulnerability Identification and Assessment techniques.MP492.3 MB
Section 3 Scanning and vulnerability Assessment/36_1. References.txt375 B
Section 3 Scanning and vulnerability Assessment/37. Practical Evasion and avoidance Techniques.MP454.7 MB
Section 3 Scanning and vulnerability Assessment/37_1. References.txt283 B
Section 4 Network Attacking Techniques/38. Password cracking, MITM, Sniffing SSL and RDP Attacks.MP4140.3 MB
Section 4 Network Attacking Techniques/38_1. References.txt694 B
Section 5 Windows and Linux Attacking Techniques/39. Windows Security Overview for Penetration Testers.MP484.3 MB
Section 5 Windows and Linux Attacking Techniques/39_1. References.txt328 B
Section 5 Windows and Linux Attacking Techniques/40. Linux Security Overview for Penetration Testers.MP452.2 MB
Section 5 Windows and Linux Attacking Techniques/41. Attacking and Hacking Windows.MP4232.8 MB
Section 5 Windows and Linux Attacking Techniques/42. Attacking and Hacking Linux.MP468 MB
Section 6 Windows and Linux Post-Exploitation Techniques/43. Windows post exploitation techniques.MP4185.7 MB
Section 6 Windows and Linux Post-Exploitation Techniques/44. Linux post exploitation techniques.MP4159.4 MB
Section 6 Windows and Linux Post-Exploitation Techniques/45. Data mining techniques.MP45.7 MB
Section 7 Web Exploitation Techniques/46. Web Application Primer.MP466.8 MB
Section 7 Web Exploitation Techniques/46_1. module-7-web-exploitation-techniques.pdf473 KB
Section 7 Web Exploitation Techniques/47. Web Application Scanning and Mapping.MP480.3 MB
Section 7 Web Exploitation Techniques/48. Exploiting SQL Injection to Full System Access (MYSQL).MP4237.5 MB
Section 7 Web Exploitation Techniques/48_1. module-8-windows-exploit-development.pdf329 KB
Section 7 Web Exploitation Techniques/49. Exploiting SQL Injection to Full System Access (MSSQL).MP473.7 MB
Section 7 Web Exploitation Techniques/50. Exploiting Blind SQL Injection to Full System Access (MYSQL).MP453.3 MB
Section 7 Web Exploitation Techniques/51. Exploiting Blind SQL Injection to Full System Access (MSSQL).MP4141.1 MB
Section 7 Web Exploitation Techniques/52. Exploiting RFI, Local File include, File Uploads and RCE.MP4116.8 MB
Section 7 Web Exploitation Techniques/53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access.MP4155.6 MB
Section 8 Windows Exploit Development/54. Using Immunity Debugger and Metasploit to develop a windows exploit.MP4458 MB
Section 8 Windows Exploit Development/54_1. References.txt359 B
Section 9 The end but it is not the end/55. The End.MP411.3 MB

Alternative Torrents for 'Learn Basics of Ethical Hacking and Penetration Testing'.

There are no alternative torrents found.