Close

Results 1 to 4 of 4
  1. #1
    Advanced Poster nzxtnemesis's Avatar
    Join Date
    Jan 2010
    Posts
    252
    Post Thanks / Like
    Rep Power
    0

    VTC - Ethical Hacking & Penetration Testing Training

    VTC - Ethical Hacking & Penetration Testing Training


    Title: Ethical Hacking & Penetration Testing
    Author: Brad Causey & Bobby Rogers
    SKU: 33718
    ISBN: 1-933736-46-1
    Release Date: 2006-10-06
    Price: Single User: US$ 99.95
    Duration: 7 hrs / 82 lessons
    Work Files: No
    Captions: No
    Compatibility: Vista/XP/2000, OS X, Linux
    QuickTime 7
    Format: iso
    Details:
    Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker?s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.

    Title Description

    Introduction
    Course Overview (04:54)

    Ethical Hacking & Penetration Testing
    What is Ethical Hacking? (04:58)
    Types of Ethical Hacking (05:31)
    Responsibilities of the Ethical Hacker (03:12)
    Customer Expectations (04:04)
    Skills of the Hacker (04:16)
    Relevant Laws (04:54)
    Preparation (04:46)
    Types of Attacks (02:12)

    Methodology Overview
    Your Goals (02:34)
    Reconnaissance [passive, active] (05:11)
    Scanning (03:42)
    Service Enumeration (03:05)
    Vulnerability Assessment (03:35)
    Vulnerability Exploitation (02:52)
    Penetration & Access (03:24)
    Privilege Escalation & Owning the Box (02:40)
    Evading Defenses & Erasing Tracks (04:01)
    Maintaining & Expanding Access (03:22)

    Reconnaissance (Footprinting)
    Passive Reconnaissance (05:03)
    Using WHOIS & Other Tools (03:03)
    Active Reconnaissance (04:10)
    Active Reconnaissance Tools & Methods (04:55)
    Putting It All Together (03:09)
    Reconnaissance Demo (07:04)

    Scanning
    Scanning For Hosts (02:20)
    TCP Connection Basics (04:14)
    TCP Scan Types (07:18)
    UDP & ICMP Scanning (03:44)
    Scanning Demonstration using NMAP (05:19)

    Port & Service Enumeration
    Identifying Ports & Services (03:06)
    OS Fingerprinting (02:57)
    Popular Scanners (01:54)
    Demonstration (05:15)

    Data Enumeration
    Data Enumeration (05:12)
    SNMP Enumeration (07:14)
    DNS Zone Transfers (06:36)
    Windows Null Sessions (05:03)
    NetBIOS Enumeration (06:44)
    Active Directory Extraction (03:02)

    Vulnerability Assessment
    Vulnerabilities & Exploits (06:07)
    OS Vulnerabilities (05:59)
    Web Server Vulnerabilities (06:54)
    Database Vulnerabilities (05:25)
    TCP Stack Vulnerabilities (04:13)
    Application Vulnerabilities (03:05)
    Vulnerability Assesment (07:21)

    Penetration/Access/Compromise Pt.1
    Penetrating the System Pt.1 (05:28)
    Penetrating the System Pt.2 (03:11)
    Bypassing Access Controls (06:34)
    Password Cracking Pt.1 (04:58)
    Password Cracking Pt.2 (03:52)
    Social Engineering (06:28)

    Penetration/Access/Compromise Pt.2
    Session Hijacking Pt.1 (05:46)
    Session Hijacking Pt.2 (04:01)
    Privilege Escalation (04:45)
    Maintaining & Expanding Access (07:01)
    System Compromise (04:40)

    Evading Defenses & Erasing Tracks
    Where Your Actions Recorded Pt.1 (02:04)
    Where Your Actions Recorded Pt.2 (06:50)
    Deleting Log Files & Other Evidence Pt.1 (03:16)
    Deleting Log Files & Other Evidence Pt.2 (04:26)
    Rootkits (05:21)
    Steganography (06:58)
    Evading IDS & Firewalls (04:29)

    Introduction to Hacking Techniques Pt.1
    Encryption (06:07)
    Sniffers (04:15)
    Wireless hacking (06:29)
    SQL Injection (04:18)

    Introduction to Hacking Techniques Pt.2
    Buffer Overflows (05:19)
    Rootkits (03:52)
    Spoofing (04:33)
    Denial of Service Attacks (03:59)
    Web Hacking (07:00)

    Popular Tools
    nmap Pt.1 (06:38)
    nmap Pt.2 (02:14)
    SuperScan (04:30)
    Nessus (06:27)

    Penetration Test Demo
    Penetration Test Demo Pt.1 (01:41)
    Penetration Test Demo Pt.2 (00:59)
    Penetration Test Demo Pt.3 (01:05)

    Credits
    About the Authors (01:37)

    Code:
    http://rapidshare.com/files/140476934/v.T.c.3thic4l.H4ck1n9.n.P3n3tr4t1on.t3st1ng-virTuAlZin.part1.rar
    http://rapidshare.com/files/14048678...lZin.part2.rar

  2. #2
    New User vishnu16's Avatar
    Join Date
    Apr 2018
    Posts
    1
    Post Thanks / Like
    Rep Power
    0
    Thank you for sharing this post

  3. #3
    Junior Poster buzuki's Avatar
    Join Date
    Aug 2016
    Location
    UK
    Posts
    82
    Post Thanks / Like
    Rep Power
    0
    Thank you for sharing this post

  4. #4
    New User
    Join Date
    May 2016
    Location
    Doesnt Matterlnd
    Posts
    6
    Post Thanks / Like
    Rep Power
    0
    Thank you for sharing this post

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •