CG数据库 >> ITpro – CEH

ITpro – CEH的图片1

ITpro - CEH

English | mp4 | H264 1280x720 | AAC 2 ch | 28 hrs 39 min | 13.6 GB

Properly securing servers and networks is a significant challenge due to the ever changing attack methods used by hackers. The most successful security technicians have a thorough understanding of the tools and techniques used by the hackers themselves. This practical knowledge of attack methods allows a defender to assemble more flexible protections for their systems. The Certified Ethical Hacker certification is designed to bridge the gap between theoretical and practical knowledge. This is the first step to becoming a Penetration Tester and increasing your ability to secure a network.

Contents

01 CEH Overview (8m).mp4

02 Getting Started With CEH (105m).mp4

03 System Fundamentals (44s).mp4

04 Cryptography (52m).mp4

05 Cryptography Part 2 (55m).mp4

06 Footprinting (107m).mp4

07 Footprinting Part 2 (63m).mp4

08 Footprinting Part 3 (112m).mp4

09 Scanning (78m).mp4

10 Scanning Part 2 (80m).mp4

11 Enumeration (87m).mp4

12 Gaining Access (98m).mp4

13 Gaining Access Part 2 (95m).mp4

14 Viruses, Trojans, and Malware (103m).mp4

15 Sniffers (68m).mp4

16 Social Engineering (78m).mp4

17 Denial Of Service (87m).mp4

18 Session Hijacking (73m).mp4

19 Web Servers and Applications (73m).mp4

20 SQL Injection (45m).mp4

21 Wireless Networks (110m).mp4

22 Wireless Networks Part 2 (64m).mp4

23 Evading IDSs, Firewalls, and Honeypots (58m).mp4

24 Next Steps (6m).mp4

ITpro – CEH的图片2

ITpro – CEH的图片3

发布日期: 2015-08-21