Created by Brian Scotto, Paul Hill | Video: h264, 1280x720 | Audio: AAC 48KHz 2ch | Duration: 05:59 H/M | Lec: 413 | 3.42 GB | Language: English | Sub: English [Auto-generated]
Build Ethical Hacking and Penetration Testing skills so you can secure your networks and stop malicious attacks
What you'll learn Network and Company Reconnaissance System Scanning and enumeration System Ethical Hacking Techniques and Countermeasures Web Server Ethical Hacking Techniques and Countermeasures Web Application Ethical Hacking Techniques and Countermeasures Malware Causes and Cures Packet Sniffing Techniques and Countermeasures Denial of Service Techniques and Countermeasures Social Engineering Techniques and Countermeasures Session Hijacking Techniques and Countermeasures SQL Injection Techniques and Countermeasures Mobile Ethical Hacking Techniques and Countermeasures Evasion Techniques and Countermeasures Cryptography Uses and Limitations Penetration Testing Overview Security with Cloud Computing
Requirements General computer knowledge A desire to learn ethical hacking techniques Some experience with Windows and Linux is helpful
Description This course features over 400 lectures to help you build the skills you need to stop malicious attackers from taking over your network.
This course was designed to help system administrators and computer users acquire the understanding of the tools, methods, and thought processes of malicious users who may be trying to attack their networks. The best way to defend your network is know and practice a good offense. This course is designed to give you those skills as quickly as possible.
This course covers a lot of topics:
Scanning and enumeration
Web server hacking
Web application hacking
Denial of Service
Get out your black hat and get ready to learn!
Who this course is for? Computer users and System administrators interested in learning how ethical hacking works Homepage