Search This Blog

Monday, July 8, 2019

Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs



Duration : 10 Hours

DOWNLOAD Size : 6.42 GB 

2 DVDs



01 - Security Penetration Testing  Introduction

02 - 1.0 Learning objectives

03 - 1.1 Introducing Ethical Hacking and Pen Testing

04 - 1.2 Getting Started with Ethical Hacking and Pen Testing

05 - 1.3 Understanding the Legal Aspects of Penetration Testing

06 - 1.4 Exploring Penetration Testing Methodologies

07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications

08 - 1.6 Building Your Own Lab

09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits

10 - 1.8 Understanding the Current Threat Landscape

11 - 2.0 Learning objectives

12 - 2.1 Installing Kali

13 - 2.2 Examining Kali Modules and Architecture

14 - 2.3 Managing Kali Services

15 - 3.0 Learning objectives

16 - 3.1 Understanding Passive Reconnaissance

17 - 3.2 Exploring Passive Reconnaissance Methodologies

18 - 3.3 Surveying Essential Tools for Passive Reconnaissance

19 - 4.0 Learning objectives

20 - 4.1 Understanding Active Reconnaissance

21 - 4.2 Exploring Active Reconnaissance Methodologies

22 - 4.3 Surveying Essential Tools for Active Reconnaissance

23 - 5.0 Learning objectives

24 - 5.1 Understanding Web Applications

25 - 5.2 Understanding Web Architectures

26 - 5.3 Uncovering Web Vulnerabilities

27 - 5.4 Exploring Methodologies for Testing Web Applications

28 - 5.5 Understanding the Exploitation of Web Applications

29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking

30 - 6.0 Learning objectives

31 - 6.1 Understanding Authentication and Authorization Mechanisms

32 - 6.2 Understanding Authentication and Authorization Attacks

33 - 6.3 Exploring Password Storage Mechanisms

34 - 6.4 Attacking Password Storage

35 - 6.5 Exploring Password Cracking

36 - 7.0 Learning objectives

37 - 7.1 Reviewing Database Fundamentals

38 - 7.2 Attacking a Database

39 - 7.3 Surveying Defenses to Mitigate Database Hacking

40 - Security Penetration Testing  Summary

No comments:

Post a Comment