17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Learn The Basics Of Ethical Hacking And Penetration Testing
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn The Basics of Ethical Hacking and Penetration
You donâ™t have to be perfect to be a hacker. Or theperson in the room. Or a type-A personality.
Course Description
Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems.
This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.
In this course, students interested in learning ethical hacking techniques and penetrationand who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.
Get started with this course today to be on your way towards finding real-world computer security solutions.
Gather Information Intelligence
Find Security Vulnerabilities
Develop Exploits
Scan and Produce Vulnerability Assessments
Learn Network Attacking Techniques
Ethical Hacking for Computer Security
Ethical hackers are computer security experts who focus on penetrationand weaknesses in an organizationâ™s information systems.
Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/01. About the course.MP4
6.9 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/02. Hacking vs Ethical Hacking.MP4
7.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/03. Who is a Hacker.MP4
4.3 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/04. Types of Hackers.MP4
14.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/05. Hacktivism.MP4
5.2 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/06. Computer Crimes.MP4
10.2 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/07. Important Terms 1.MP4
10.5 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/08. Important Terms 2.MP4
12.4 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/09. Why Penetration Testing.MP4
5.3 MB
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing/10. Penetration Testing Types.MP4
7.4 MB
Section 2 Real World Information Intelligence Techniques/11.Introduction to Information Intelligence Techniques.mp4
5.4 MB
Section 2 Real World Information Intelligence Techniques/12. organizing information during a penetration test.MP4
11.3 MB
Section 2 Real World Information Intelligence Techniques/13. how to locally copying company websites.MP4
18 MB
Section 2 Real World Information Intelligence Techniques/14. newsgroups and list-servers.MP4
17.8 MB
Section 2 Real World Information Intelligence Techniques/15. online job listing.MP4
10.7 MB
Section 2 Real World Information Intelligence Techniques/16. the power of social media websites.MP4
15 MB
Section 2 Real World Information Intelligence Techniques/17. harvesting a company emails.MP4
30.3 MB
Section 2 Real World Information Intelligence Techniques/18. how to generate a targeted wordlist for password cracking.MP4
15.3 MB
Section 2 Real World Information Intelligence Techniques/19. information intelligence with Maltego.MP4
14.4 MB
Section 2 Real World Information Intelligence Techniques/20. Google Search Techniques for penetration testers.MP4
63.7 MB
Section 2 Real World Information Intelligence Techniques/21. other search engines for penetration testers.MP4
9.7 MB
Section 2 Real World Information Intelligence Techniques/22. Enumerating Internal Network From Outside.MP4
17.7 MB
Section 2 Real World Information Intelligence Techniques/23. gather information using WhatWeb, HttpRecon and SSL SCAN.MP4
36.4 MB
Section 2 Real World Information Intelligence Techniques/24. Whois Lookups, finding other Web Sites Hosted on a Web Server.MP4
15.2 MB
Section 2 Real World Information Intelligence Techniques/25. IP Address Geolocation.MP4
12.3 MB
Section 2 Real World Information Intelligence Techniques/26. finding subdomains, extracting exif data and finding hidden web dirs.MP4
31.9 MB
Section 2 Real World Information Intelligence Techniques/27. ShodanHQ for fun and profit.MP4
20 MB
Section 2 Real World Information Intelligence Techniques/28. Web Application Firewall Detection, HTTP and DNS load balancer detection.MP4
54.1 MB
Section 2 Real World Information Intelligence Techniques/29. DNS Enumerating for penetration testers.MP4
63.1 MB
Section 2 Real World Information Intelligence Techniques/30. Mail Server Enumeration for penetration testers.MP4
20 MB
Section 2 Real World Information Intelligence Techniques/31. Intel Gathering Methodology for penetration testers.MP4
4.7 MB
Section 2 Real World Information Intelligence Techniques/31_1. References.txt
574 B
Section 3 Scanning and vulnerability Assessment/32. packet Crafting and Manipulating with Scapy.MP4
37.4 MB
Section 3 Scanning and vulnerability Assessment/33. port scanning with scapy.MP4
16.1 MB
Section 3 Scanning and vulnerability Assessment/34. Network Enumeration and Mapping Techniques.MP4
17.3 MB
Section 3 Scanning and vulnerability Assessment/34_1. References.txt
263 B
Section 3 Scanning and vulnerability Assessment/35. Network scanning techniques.MP4
115.6 MB
Section 3 Scanning and vulnerability Assessment/35_1. References.txt
464 B
Section 3 Scanning and vulnerability Assessment/36. Vulnerability Identification and Assessment techniques.MP4
92.3 MB
Section 3 Scanning and vulnerability Assessment/36_1. References.txt
375 B
Section 3 Scanning and vulnerability Assessment/37. Practical Evasion and avoidance Techniques.MP4
54.7 MB
Section 3 Scanning and vulnerability Assessment/37_1. References.txt