2015
Udemy
10:15:52
English
Get Certified Hacking Training now and gain voucher to Online Examination Center for free. New 2.0 version available!
Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
While this course includes step-by-step instructions for advanced hacking techniques, it is designed to help you prevent an attack. We do not recommend using these tactics to infiltrate networks or IT systems that are not your own.
├── 2. IT_Security_Trends
│ ├── 03. Introduction_to_Current_Cyber_Threats.mp4
│ ├── 04. IT_Prehistory.mp4
│ ├── 05. Let_s_look_a_few_years_back.mp4
│ ├── 06. Cyber_crimes. an_evolution_not_revolution.mp4
│ ├── 08. Popular_myths_about_IT_security. origins.mp4
│ ├── 09. Myths_1. you_ll_never_be_hacked.mp4
│ ├── 10. Myths_2. you_don_t_need_any_protection_software_oraz_hardware.mp4
│ ├── 11. Myths_3. IT_security_is_always_a_priority.mp4
│ ├── 13. Trends_in_IT_Security.mp4
│ ├── 14. The_birth_of_technology_society.mp4
│ ├── 15. EXERCISE. How_much_info_can_you_gathered.mp4
│ ├── 16. Fake_identity.mp4
│ ├── 17. Online_privacy.mp4
│ ├── 18. Analyzing_sniffing_software.mp4
│ ├── 19. Cyber_War.mp4
│ ├── 21. Objective_1. Data_security. Introduction.mp4
│ ├── 22. Confidentiality_of_data.mp4
│ ├── 23. EXERCISE. Finding_confidental_data_with_search_engines.mp4
│ └── 24. Integrity_of_data.mp4
├── 3. Computer_Network_Security
│ ├── 30. Network_security. introduction.mp4
│ ├── 31. OSI_MODEL_1. Physical_layer.mp4
│ ├── 32. OSI_MODEL_2. Data_link_layer.mp4
│ ├── 33. Threats. MAC_spoofing.mp4
│ ├── 34. Threats. ARP_Poisoning.mp4
│ ├── 35. EXERCISE. Data_Link_Layer_Attack.mp4
│ ├── 36. OSI_MODEL_3. Network_layer.mp4
│ ├── 37. TCP_Tunnelling_over_ICMP.mp4
│ ├── 39. OSI_MODEL_4. Transport_Layer.mp4
│ ├── 40. Threats. Enumerating_Remote_Computers.mp4
│ ├── 41. EXERCISE. Transport_Layer_Attack.mp4
│ ├── 42. METASPLOIT. Attack_demonstration_part_1.mp4
│ ├── 43. METASPLOIT. Attack_demonstration_part_2.mp4
│ ├── 44. OSI_MODEL_5. Session_Layer.mp4
│ ├── 46. OSI_MODEL_6. Presentation_Layer.mp4
│ ├── 47. OSI_MODEL_7. Application_Layer.mp4
│ ├── 48. EXERCISE. Application_Layer_Attacks.mp4
│ ├── 49. Backtrack. Attack_Demonstration.mp4
│ ├── 50. Man-in-the-Middle_and_Denial_of_Service_Attacks.mp4
│ ├── 51. Modifying_Transmitted_Packets.mp4
│ └── 52. Unencrypted_protocols.mp4
├── 5. Network_administration
│ ├── 72. Introduction_to_Monitoring_Transmitted_Data.mp4
│ ├── 73. Monitoring_Transmitted_Data. Basic_informations.mp4
│ ├── 74. Intrusion_detection_systems.mp4
│ ├── 75. Why_are_firewalls_and_NDIS_not_enough.mp4
│ ├── 76. Wireshark. Introduction_to_network_analysis.mp4
│ ├── 77. How_to_use_Wireshark.mp4
│ ├── 78. Analyzing_Captured_data.mp4
│ ├── 79. How_to_analyze_telnet_protocol.mp4
│ ├── 80. Intrusion_detection.mp4
│ └── 81. Scanning_computers.mp4
├── 6. Wireless_Networks_Security
│ ├── 85. Wireless_Networks.mp4
│ ├── 86. WIFI_security_solutions. introduction.mp4
│ ├── 87. WIFI. working_principles.mp4
│ ├── 88. Other_wireless_technologies.mp4
│ ├── 89. Threats_and_risks.mp4
│ ├── 90. Ineffective_solutions.mp4
│ ├── 91. Authentication_methods.mp4
│ ├── 92. 802.11_WEP.mp4
│ ├── 93. 802.11I_WPA.mp4
│ ├── 95. Threats_of_WIFI_networks.mp4
│ ├── 96. Client_Attacks. Launching_a_rogue_access_point.mp4
│ ├── 97. Client_Attacks. Evil_twin.mp4
│ ├── 98. Client_Attacks. Denial_of_service.mp4
│ └── 99. EXERCISE. WPA_attack.mp4
├── 7. Operating_Systems_Security
│ ├── 104. Operating_systems_security. introduction.mp4
│ ├── 105. Security_boundaries.mp4
│ ├── 106. Three_core.mp4
│ ├── 107. EXERCISE. OS_boundaries.mp4
│ ├── 108. Process_isolation.mp4
│ ├── 109. Kernel_Mode_Code_Signing.mp4
│ ├── 110. Java_Virtual_Machine_and_code_access_security.mp4
│ ├── 112. Malware.mp4
│ ├── 113. EXERCISE. Vulnerability_attacks.mp4
│ ├── 114. EXERCISE. Identifying_suspicious_processes.mp4
│ ├── 115. Demonstration. Process_Explorer.mp4
│ ├── 116. EXERCISE. Removing_malware.mp4
│ ├── 117. Rootkits.mp4
│ ├── 118. EXERCISE. Detecting_rootkits.mp4
│ └── 119. EXERCISE. Security_evaluation.mp4
├── 8. Access_Control
│ ├── 124. Authentication_and_authorisation. Introduction.mp4
│ ├── 125. Authentication_users.mp4
│ ├── 126. How_secure_is_your_password.mp4
│ ├── 127. Authentication_protocols_and_services.mp4
│ ├── 128. LM_Hash.mp4
│ ├── 129. Cashed_Credentials.mp4
│ ├── 130. KERBEROS.mp4
│ ├── 132. Identity_Theft.mp4
│ ├── 133. EXERCISE. Offline_attacks.mp4
│ └── 134. Using_online_cracking_services.mp4
└── 9. Windows_Security
├── 139. Windows_Security. what_you_ll_learn.mp4
├── 140. User_Account_Control.mp4
├── 141. UAC_configuration.mp4
├── 142. Additional_Security_Features. ASLR_and_DEP.mp4
├── 143. PatchGuard.mp4
├── 145. Encryption. key_protection.mp4
├── 146. Drive_encryption.mp4
├── 147. BitLocker.mp4
├── 148. BitLocker_To_Go_Reader.mp4
├── 149. File_and_folder_encryption. EFS.mp4
└── 150. EXERCISE. EFS.mp4
https://www.udemy.com/it-security-beginner-certified-hacking-training/
Download File Size:2.66 GB