اعضاء منتدانا الحبيب اقدم لكم اليوم دورة
Ethical Hacker & Penetration testing From SANS
الدورة عبارة عن عروض تقديمية مع شروحات صوتية
الدورة نظرية وليست تطبيقية
نستطيع أن نقول أنها مفاهيم وتأسيس
Index
-01.Introduction
--01.Course Overview.mov
-02.Ethical Hacking & Penetration Testing
--01.What is Ethical Hacking.mov
--02.Types of Ethical Hacking.mov
--03.Responsibilities of the Ethical Hacker .mov
--04.Customer Expectations.mov
--05.Skills of the Hacker.mov
--06.Relevant Laws.mov
--07.Preparation.mov
--08.Types of Attacks.mov
-03.Methodology Overview
--01.Your Goals.mov
--02.Formal Methodologies.mov
--03.Reconnaissance.mov
--04.Scanning.mov
--05.Service Enumeration.mov
--06.Vulnerability Assessment.mov
--07.Vulnerability Exploitation.mov
--08.Privilege Escalation & Owning the Box.mov
--09.Evading Defenses & Erasing Tracks.mov
--10.Maintaining & Expanding Access.mov
-04.Reconnaissance (Footprinting)
--01.Passive Reconnaissance.mov
--02.Using WHOIS & Other Tools.mov
--03.Active Reconnaissance.mov
--04.Active Reconnaissance Tools & Methods.mov
--05.Putting It All Together.mov
--06.Reconnaissance Demo.mov
-05.Scanning
--01.Scanning For Hosts.mov
--02.TCP Connection Basics.mov
--03.TCP Scan Types.mov
--04.UDP & ICMP Scanning.mov
--05.Scanning Demonstration using NMAP.mov
-06.Port & Service Enumeration
--01.Identifying Ports & Services.mov
--02.OS Fingerprinting.mov
--03.Popular Scanners.mov
--04.Demonstration.mov
-07.Data Enumeration
--01.Data Enumeration.mov
--02.SNMP Enumeration.mov
--03.DNS Zone Transfers.mov
--04.Windows Null Sessions.mov
--05.NetBIOS Enumeration.mov
--06.Active Directory Extraction.mov
-08.Vulnerability Assessment
--01.OS Vulnerabilities.mov
--02.Vulnerabilities & Exploits.mov
--03.*** Server Vulnerabilities.mov
--04.Database Vulnerabilities.mov
--05.TCP Stack Vulnerabilities.mov
--06.Application Vulnerabilities.mov
--07.Vulnerability Assesment.mov
-09.Penetration Access Compromise Pt.1
--01.Penetrating the System Pt.1.mov
--02.Penetrating the System Pt.2.mov
--03.Bypassing Access Controls.mov
--04.Password Cracking Pt.1.mov
--05.Password Cracking Pt.2.mov
--06.Social Engineering.mov
-10.Penetration Access Compromise Pt.2
--01.Session Hijacking Pt.1.mov
--02.Session Hijacking Pt.2.mov
--03.Privilege Escalation.mov
--04.Maintaining & Expanding Access.mov
--05.System Compromise.mov
-11.Evading Defenses & Erasing Tracks
--01.Where Your Actions Recorded Pt.1.mov
--02.Where Your Actions Recorded Pt.2.mov
--03.Deleting Log Files & Other Evidence Pt.1.mov
--04.Deleting Log Files & Other Evidence Pt.2.mov
--05.Rootkits.mov
--06.Steganography.mov
--07.Evading IDS & Firewalls.mov
-12.Introduction to Hacking Techniques Pt.1
--01.Encryption.mov
--02.Sniffers.mov
--03.Wireless hacking.mov
--04.SQL Injection.mov
-13.Introduction to Hacking Techniques Pt.2
--01.Buffer Overflows.mov
--02.Rootkits.mov
--03.Spoofing.mov
--04.Denial of Service Attacks.mov
--05.*** Hacking.mov
-14.Popular Tools
--01.nmap Pt.1.mov
--02.nmap Pt.2.mov
--03.SuperScan.mov
--04.Nessus.mov
-15.Penetration Test Demo
--01.Penetration Test Demo Pt.1.mov
--02.Penetration Test Demo Pt.2.mov
--03.Penetration Test Demo Pt.3.mov
-16.Credits
--01.About the Authors.mov
------------------------------------------------------------
Ethical hacking & penetration testing From SANS
------------------------------------------------------------
#########
Uploaded by
Captain Jack
arabhardware.net
##############
لا تنسونا من صالح الدعاء بارك الله فيكم يا احبه
المفضلات