Udemy - Ethical Hacking Training - Think Like a Hacker

seeders: 31
leechers: 8
Added on September 2, 2015 by sever29in Other > Tutorials
Torrent verified.



Udemy - Ethical Hacking Training - Think Like a Hacker (Size: 428.56 MB)
 Lecture 1 Introduction.mp43.03 MB
 Lecture 2 Overview of the CEH Certification Program.mp41.16 MB
 Lecture 3 What Certifications Brings You.mp41.05 MB
 Lecture 4 Should I Watch This Series0503.mp43.57 MB
 Lecture 5 What's Expected of You.mp46.67 MB
 Lecture 6 Review the CCA.mp41.44 MB
 Lecture 7 Overview How to Build a Lab to Hack Safely.mp48.81 MB
 Lecture 8 The Host Machine.mp48.12 MB
 Lecture 9 Summary.mp4934.92 KB
 Lecture 10 Introduction.mp41.02 MB
 Lecture 11 Virtual Machine Server 2012R2 Part 1.mp415.17 MB
 Lecture 12 Virtual Machine Server 2012R2 Part 2.mp411.33 MB
 Lecture 13 Virtual Machine Server 2008R2.mp417.11 MB
 Lecture 14 Summary.mp4464.81 KB
 Lecture 15 Introduction.mp41016 KB
 Lecture 16 Virtual Machine Windows 8.1.mp432.14 MB
 Lecture 17 Virtual Machine Windows 7.mp423.72 MB
 Lecture 18 Virtual Machine Kali.mp419.81 MB
 Lecture 19 Virtual Machine Housekeeping.mp420.78 MB
 Lecture 20 Summary.mp4959.15 KB
 Lecture 21 Information Security Overview.mp41.11 MB
 Lecture 22 Hacking vs. Ethical Hacking.mp43.51 MB
 Lecture 23 Fundamentals of Information Security.mp43.34 MB
 Lecture 24 Speak like a Hacker.mp45.9 MB
 Lecture 25 The Technology Triangle.mp42.97 MB
 Lecture 26 Summary.mp41.28 MB
 Lecture 27 Overview of Threats and Attack Vectors.mp41.58 MB
 Lecture 28 Threats Hosts.mp45.93 MB
 Lecture 29 Threats Natural & Physical.mp45.81 MB
 Lecture 30 Threats Applications.mp44.49 MB
 Lecture 31 Threats Human.mp45.34 MB
 Lecture 32 Threats Networks.mp42.29 MB
 Lecture 33 Threats Where Do They Come From.mp42.84 MB
 Lecture 34 Attack Vectors.mp47.58 MB
 Lecture 35 IPv6 Issues.mp46.05 MB
 Lecture 36 Summary of Threats and Attack Vectors.mp41.09 MB
 Lecture 37 Overview of Hacking Concepts.mp41.33 MB
 Lecture 38 Hacking Defined.mp41.2 MB
 Lecture 39 History of Hacking In the Beginning.mp45.56 MB
 Lecture 40 History of Hacking Currently.mp45.1 MB
 Lecture 41 Ethical Hacking Defined.mp46.45 MB
 Lecture 42 What Skills Should an Ethical Hacker Have.mp44.1 MB
 Lecture 43 Type of Pen Tests.mp41.79 MB
 Lecture 44 Why a Hacker Hacks.mp44.94 MB
 Lecture 45 Types of Hackers.mp44.57 MB
 Lecture 46 How Does Hacking Influence Companies.mp415.92 MB
 Lecture 47 Summary of Hacking Concepts.mp41.97 MB
 Lecture 48 Overview Hacking Phases.mp43.16 MB
 Lecture 49 The Phases.mp4906.53 KB
 Lecture 50 Phase 1 Reconnaissance.mp410.4 MB
 Lecture 51 Phase 2 Scanning.mp44.27 MB
 Lecture 52 Phase 3 Gaining Access.mp42.18 MB
 Lecture 53 Phase 4 Maintain Access.mp44.43 MB
 Lecture 54 Phase 5 Clearing Tracks.mp42.51 MB
 Lecture 55 Summary of Hacking Phases.mp41.94 MB
 Lecture 56 Overview of Attack Types.mp41.06 MB
 Lecture 57 Application Attacks.mp47.13 MB
 Lecture 58 Misconfiguration Attacks.mp44.09 MB
 Lecture 59 Shrink-wrap Code Attacks.mp412.81 MB
 Lecture 60 OS Attacks.mp42.7 MB
 Lecture 61 Entry Points for an Attack.mp47.53 MB
 Lecture 62 Summary of Attack Types.mp42.5 MB
 Lecture 63 Overview of Information Security Controls.mp41.24 MB
 Lecture 64 Necessity of Ethical Hacking.mp43.94 MB
 Lecture 65 What Skills You Must Have.mp43.04 MB
 Lecture 66 Multi-layered Defense.mp43.48 MB
 Lecture 67 Incident Management.mp43.79 MB
 Lecture 68 IM Process.mp43.7 MB
 Lecture 69 Security Policies.mp43.15 MB
 Lecture 70 Taxonomy of Security Policies.mp44.73 MB
 Lecture 71 Vulnerability Research.mp413.15 MB
 Lecture 72 Penetration Testing.mp45.22 MB
 Lecture 73 Summary of Information Security Controls.mp43.82 MB
 Lecture 74 How to Prepare for the CEH Exam.mp41.16 MB
 Lecture 75 About the Exam.mp41.25 MB
 Lecture 76 How to Prepare.mp42.29 MB
 Lecture 77 The SuperDale Method.mp45.27 MB
 Lecture 78 Study.mp46.24 MB
 Lecture 79 When in Doubt...mp42.42 MB
 Lecture 80 Summary.mp4776.64 KB


Description

Udemy - Ethical Hacking Training - Think Like a Hacker





Become a Cyber Security Expert Today , Get the Knowledge and skills you need


This course is for beginners who want to learn about hacking. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors, and more.

What are the requirements?
As this course is for beginners, so no prior knowledge about hacking is needed.

What am I going to get from this course?
Over 80 lectures and 6.5 hours of content!
Students will learn to understand the motivation of an attacker. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors



What is the target audience?

This course will significantly benefit security officers, network administrators, firewall administrators, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.


Udemy Site

Sharing Widget


Download torrent
428.56 MB
seeders:31
leechers:8
Udemy - Ethical Hacking Training - Think Like a Hacker