888888 发表于 2022-10-17 09:33:35

美国某知名教育网站 “成为道德黑客”系列培训视频

【课程内容】

Overview

00.Introduction
01.Ethical Hacking Overview
02.Information Security Controls
03.Supporting Ethical Hacking
04.Conclusion

Introduction to Web Design and Development

00.Introduction
01.Exploring Web Design
02.The Field of Web Design
03.Getting Started
04.Exploring Tools
05.Learning Web Design
06.Conclusion

Learning Cryptography and Network Security

00.Introduction
01.Network Security
02.Symmetric Encryption
03.Asymmetric Encryption and Digital Signatures
04.Hash Algorithms, Message Digest, and Authentication
05.Secure Socket Layer (SSL)
06.Email Security
07.Internet Protocol Security
08.Conclusion

Troubleshooting Your Network with Wireshark

00.Introduction
01.Traffic Capture and Analysis
02.Review of the Open Systems Interconnection (OSI) Model
03.Deep Packet Analysis of Common Protocols
04.Normal and Abnormal Behavior
05.Common Attack Signatures
06.Security Tools
07.Conclusion

Learning Python

00.Introduction
01.Preparing the Development Environment
02.Python Basics
03.Working with Dates and Times
04.Working with Files
05.Working with Web Data
06.Conclusion

Learning Bash Scripting

00.Introduction
01.Working with the Command Line
02.Building Bash Scripts
03.Control Structures
04.Interacting with the User
05.Conclusion

Learning Kali Linux

00.Introduction
01.Setting Up the Virtual Lab
02.Introducing Kali
03.Information Gathering (Understanding the Target)
04.Vulnerability Analysis
05.Passwords and Hashes
06.Exploiting Targets
07.Conclusion

Footprinting and Reconnaissance

00.Introduction
01.Footprinting and Reconnaisance - Low Tech
02.Footprinting and Reconnaissance Tools
03.Conclusion

Denial of Service

00.Introduction
01.What is a Denail of Service
02.Infrastructure Denial of Service
03.Wireless Denial of Service
04.Appliacation Denial of Service
05.SIP Service Attacks
06.Ransomware
07.Mitigation Techniques
08.Conclusion

System Hacking

00.Introduction
01.System Hacking Overview
02.Gaining Access
03.Privilege Escalation
04.Spyware
05.Keyloggers
06.Hiding in Plain Sight
07.Cover Your Tracks
08.Conclusion

Scanning Networks

00.Introduction
01.Scanning Overview and Methodology
02.Identifying Live System Using Protocols
03.Blueprint the Network
04.Vulnerability Scanning
05.Scanning Tools
06.Evading Detection
07.Concealing and Spoofing
08.Tunneling
09.Conclusion

Enumeration

00.Introduction
01.Basics of Enumeration
02.Local Host Enumeration
03.Remote Hosts
04.Enumerating the Internet
05.Other Enumeration Tools
06.Conclusion

Social Engineering

00.Introduction
01.Social Engineering Overview
02.Social Engineering Mechanisms
03.Misuse of Trust
04.Penetration Testing with Social Engineering
05.Conclusion

Sniffers

00.Introduction
01.Sniffing Overview
02.MAC attacks
03.DHCP
04.ARP
05.DNS
06.Sniffing Tools and Techniques
07.Conclusion

Session Hijacking

00.Introduction
01.Network Session Hijacking
02.Web Session Hijacking
03.Additional Tools
04.Service Hijacking
05.Hijacking in the Physical World
06.Conclusion

Viruses and Worms

00.Introduction
01.Malware Overview
02.Viruses Types
03.Creating a Virus
04.Analysis and Countermeasures
05.Conclusion

Wireless Networks

00.Introduction
01.Wi-Fi Networks
02.Rogue Access Points
03.Bluetooth
04.Additional Tools
05.Internet of Things
06.Conclusion

Trojans and Backdoors

00.Introduction
01.Trojan Overview
02.Getting into a System
03.Rootkits
04.Trojan Forensics
05.Conclusion

Website and Web Application Testing

00.Introduction
01.Introduction to Web
02.Getting Ready to Test
03.Running Basic Web Application Tests
04.Advanced Web Application Tests
05.Practicing Your Skills
06.Conclusion

Perimeter Defenses

00.Introduction
01.Firewalls
02.Hardware Firewalls
03.Network Simulation Using GNS3
04.Special-Purpose Perimeter Devices
05.Conclusion

Penetration Testing

00.Introduction
01.Organizational Penetration Testing
02.Types of Penetration Testing
03.Pen Testing Techniques
04.Pen Testing Blueprint
05.Outsourcing Penetration Testing
06.Conclusion








本资源来源于 网络 付费网站付费收集而来, 随时收集更新资源本站专注搜集和分享各种付费网站资源,感谢您的信任


资源下载地址:
**** Hidden Message *****
本站所有资源都来源于网络收集,网友提供或者交换而来!

如果侵犯了您的权益,请及时联系客服,我们即刻删除!
页: [1]
查看完整版本: 美国某知名教育网站 “成为道德黑客”系列培训视频