Duration : 10 Hours
DOWNLOAD Size : 6.42 GB
2 DVDs
01 - Security Penetration Testing Introduction
02 - 1.0 Learning objectives
03 - 1.1 Introducing Ethical Hacking and Pen Testing
04 - 1.2 Getting Started with Ethical Hacking and Pen Testing
05 - 1.3 Understanding the Legal Aspects of Penetration Testing
06 - 1.4 Exploring Penetration Testing Methodologies
07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications
08 - 1.6 Building Your Own Lab
09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits
10 - 1.8 Understanding the Current Threat Landscape
11 - 2.0 Learning objectives
12 - 2.1 Installing Kali
13 - 2.2 Examining Kali Modules and Architecture
14 - 2.3 Managing Kali Services
15 - 3.0 Learning objectives
16 - 3.1 Understanding Passive Reconnaissance
17 - 3.2 Exploring Passive Reconnaissance Methodologies
18 - 3.3 Surveying Essential Tools for Passive Reconnaissance
19 - 4.0 Learning objectives
20 - 4.1 Understanding Active Reconnaissance
21 - 4.2 Exploring Active Reconnaissance Methodologies
22 - 4.3 Surveying Essential Tools for Active Reconnaissance
23 - 5.0 Learning objectives
24 - 5.1 Understanding Web Applications
25 - 5.2 Understanding Web Architectures
26 - 5.3 Uncovering Web Vulnerabilities
27 - 5.4 Exploring Methodologies for Testing Web Applications
28 - 5.5 Understanding the Exploitation of Web Applications
29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking
30 - 6.0 Learning objectives
31 - 6.1 Understanding Authentication and Authorization Mechanisms
32 - 6.2 Understanding Authentication and Authorization Attacks
33 - 6.3 Exploring Password Storage Mechanisms
34 - 6.4 Attacking Password Storage
35 - 6.5 Exploring Password Cracking
36 - 7.0 Learning objectives
37 - 7.1 Reviewing Database Fundamentals
38 - 7.2 Attacking a Database
39 - 7.3 Surveying Defenses to Mitigate Database Hacking
40 - Security Penetration Testing Summary
No comments:
Post a Comment