replyreload += ',' + 731372;【课程内容】
Overview
00.Introduction
01.Ethical Hacking Overview
02.Information Security Controls
03.Supporting Ethical Hacking
04.Conclusion
Introduction to Web Design and Development
00.Introduction
01.Exploring Web Design
02.The Field of Web Design
03.Getting Started
04.Exploring Tools
05.Learning Web Design
06.Conclusion
Learning Cryptography and Network Security
00.Introduction
01.Network Security
02.Symmetric Encryption
03.Asymmetric Encryption and Digital Signatures
04.Hash Algorithms, Message Digest, and Authentication
05.Secure Socket Layer (SSL)
06.Email Security
07.Internet Protocol Security
08.Conclusion
Troubleshooting Your Network with Wireshark
00.Introduction
01.Traffic Capture and Analysis
02.Review of the Open Systems Interconnection (OSI) Model
03.Deep Packet Analysis of Common Protocols
04.Normal and Abnormal Behavior
05.Common Attack Signatures
06.Security Tools
07.Conclusion
Learning Python
00.Introduction
01.Preparing the Development Environment
02.Python Basics
03.Working with Dates and Times
04.Working with Files
05.Working with Web Data
06.Conclusion
Learning Bash Scripting
00.Introduction
01.Working with the Command Line
02.Building Bash Scripts
03.Control Structures
04.Interacting with the User
05.Conclusion
Learning Kali Linux
00.Introduction
01.Setting Up the Virtual Lab
02.Introducing Kali
03.Information Gathering (Understanding the Target)
04.Vulnerability Analysis
05.Passwords and Hashes
06.Exploiting Targets
07.Conclusion
Footprinting and Reconnaissance
00.Introduction
01.Footprinting and Reconnaisance - Low Tech
02.Footprinting and Reconnaissance Tools
03.Conclusion
Denial of Service
00.Introduction
01.What is a Denail of Service
02.Infrastructure Denial of Service
03.Wireless Denial of Service
04.Appliacation Denial of Service
05.SIP Service Attacks
06.Ransomware
07.Mitigation Techniques
08.Conclusion
System Hacking
00.Introduction
01.System Hacking Overview
02.Gaining Access
03.Privilege Escalation
04.Spyware
05.Keyloggers
06.Hiding in Plain Sight
07.Cover Your Tracks
08.Conclusion
Scanning Networks
00.Introduction
01.Scanning Overview and Methodology
02.Identifying Live System Using Protocols
03.Blueprint the Network
04.Vulnerability Scanning
05.Scanning Tools
06.Evading Detection
07.Concealing and Spoofing
08.Tunneling
09.Conclusion
Enumeration
00.Introduction
01.Basics of Enumeration
02.Local Host Enumeration
03.Remote Hosts
04.Enumerating the Internet
05.Other Enumeration Tools
06.Conclusion
Social Engineering
00.Introduction
01.Social Engineering Overview
02.Social Engineering Mechanisms
03.Misuse of Trust
04.Penetration Testing with Social Engineering
05.Conclusion
Sniffers
00.Introduction
01.Sniffing Overview
02.MAC attacks
03.DHCP
04.ARP
05.DNS
06.Sniffing Tools and Techniques
07.Conclusion
Session Hijacking
00.Introduction
01.Network Session Hijacking
02.Web Session Hijacking
03.Additional Tools
04.Service Hijacking
05.Hijacking in the Physical World
06.Conclusion
Viruses and Worms
00.Introduction
01.Malware Overview
02.Viruses Types
03.Creating a Virus
04.Analysis and Countermeasures
05.Conclusion
Wireless Networks
00.Introduction
01.Wi-Fi Networks
02.Rogue Access Points
03.Bluetooth
04.Additional Tools
05.Internet of Things
06.Conclusion
Trojans and Backdoors
00.Introduction
01.Trojan Overview
02.Getting into a System
03.Rootkits
04.Trojan Forensics
05.Conclusion
Website and Web Application Testing
00.Introduction
01.Introduction to Web
02.Getting Ready to Test
03.Running Basic Web Application Tests
04.Advanced Web Application Tests
05.Practicing Your Skills
06.Conclusion
Perimeter Defenses
00.Introduction
01.Firewalls
02.Hardware Firewalls
03.Network Simulation Using GNS3
04.Special-Purpose Perimeter Devices
05.Conclusion
Penetration Testing
00.Introduction
01.Organizational Penetration Testing
02.Types of Penetration Testing
03.Pen Testing Techniques
04.Pen Testing Blueprint
05.Outsourcing Penetration Testing
06.Conclusion
【下载地址】
游客,如果您要查看本帖隐藏内容请回复
相关资源