本站已收录 番号和无损神作磁力链接/BT种子 

VTC - Ethical Hacking & Penetration

种子简介

种子名称: VTC - Ethical Hacking & Penetration
文件类型: 视频
文件数目: 82个文件
文件大小: 192.07 MB
收录时间: 2017-3-10 01:39
已经下载: 3
资源热度: 88
最近下载: 2024-9-5 05:54

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:644a66459295d6adefb1254caa3afb512c283405&dn=VTC - Ethical Hacking & Penetration 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

VTC - Ethical Hacking & Penetration.torrent
  • 01.Introduction/01.Course Overview.mov2.01MB
  • 02.Ethical Hacking & Penetration Testing/01.What is Ethical Hacking.mov2.14MB
  • 02.Ethical Hacking & Penetration Testing/02.Types of Ethical Hacking.mov2.16MB
  • 02.Ethical Hacking & Penetration Testing/03.Responsibilities of the Ethical Hacker .mov1.27MB
  • 02.Ethical Hacking & Penetration Testing/04.Customer Expectations.mov1.69MB
  • 02.Ethical Hacking & Penetration Testing/05.Skills of the Hacker.mov1.79MB
  • 02.Ethical Hacking & Penetration Testing/06.Relevant Laws.mov1.73MB
  • 02.Ethical Hacking & Penetration Testing/07.Preparation.mov1.89MB
  • 02.Ethical Hacking & Penetration Testing/08.Types of Attacks.mov828.89KB
  • 03.Methodology Overview/01.Your Goals.mov1.14MB
  • 03.Methodology Overview/02.Formal Methodologies.mov1.83MB
  • 03.Methodology Overview/03.Reconnaissance.mov1.44MB
  • 03.Methodology Overview/04.Scanning.mov1.18MB
  • 03.Methodology Overview/05.Service Enumeration.mov1.5MB
  • 03.Methodology Overview/06.Vulnerability Assessment.mov1.13MB
  • 03.Methodology Overview/07.Vulnerability Exploitation.mov1.35MB
  • 03.Methodology Overview/08.Privilege Escalation & Owning the Box.mov1.11MB
  • 03.Methodology Overview/09.Evading Defenses & Erasing Tracks.mov1.63MB
  • 03.Methodology Overview/10.Maintaining & Expanding Access.mov1.36MB
  • 04.Reconnaissance (Footprinting)/01.Passive Reconnaissance.mov2.19MB
  • 04.Reconnaissance (Footprinting)/02.Using WHOIS & Other Tools.mov1.29MB
  • 04.Reconnaissance (Footprinting)/03.Active Reconnaissance.mov1.69MB
  • 04.Reconnaissance (Footprinting)/04.Active Reconnaissance Tools & Methods.mov1.89MB
  • 04.Reconnaissance (Footprinting)/05.Putting It All Together.mov1.39MB
  • 04.Reconnaissance (Footprinting)/06.Reconnaissance Demo.mov8.83MB
  • 05.Scanning/01.Scanning For Hosts.mov1.09MB
  • 05.Scanning/02.TCP Connection Basics.mov1.87MB
  • 05.Scanning/03.TCP Scan Types.mov3.05MB
  • 05.Scanning/04.UDP & ICMP Scanning.mov1.53MB
  • 05.Scanning/05.Scanning Demonstration using NMAP.mov5.74MB
  • 06.Port & Service Enumeration/01.Identifying Ports & Services.mov1.35MB
  • 06.Port & Service Enumeration/02.OS Fingerprinting.mov1.18MB
  • 06.Port & Service Enumeration/03.Popular Scanners.mov844.15KB
  • 06.Port & Service Enumeration/04.Demonstration.mov5.86MB
  • 07.Data Enumeration/01.Data Enumeration.mov2.09MB
  • 07.Data Enumeration/02.SNMP Enumeration.mov6.4MB
  • 07.Data Enumeration/03.DNS Zone Transfers.mov3.29MB
  • 07.Data Enumeration/04.Windows Null Sessions.mov3.32MB
  • 07.Data Enumeration/05.NetBIOS Enumeration.mov4.39MB
  • 07.Data Enumeration/06.Active Directory Extraction.mov1.23MB
  • 08.Vulnerability Assessment/01.OS Vulnerabilities.mov2.43MB
  • 08.Vulnerability Assessment/02.Vulnerabilities & Exploits.mov2.66MB
  • 08.Vulnerability Assessment/03.Web Server Vulnerabilities.mov2.91MB
  • 08.Vulnerability Assessment/04.Database Vulnerabilities.mov2.26MB
  • 08.Vulnerability Assessment/05.TCP Stack Vulnerabilities.mov1.69MB
  • 08.Vulnerability Assessment/06.Application Vulnerabilities.mov1.28MB
  • 08.Vulnerability Assessment/07.Vulnerability Assesment.mov5.15MB
  • 09.Penetration Access Compromise Pt.1/01.Penetrating the System Pt.1.mov2.2MB
  • 09.Penetration Access Compromise Pt.1/02.Penetrating the System Pt.2.mov1.25MB
  • 09.Penetration Access Compromise Pt.1/03.Bypassing Access Controls.mov2.67MB
  • 09.Penetration Access Compromise Pt.1/04.Password Cracking Pt.1.mov1.94MB
  • 09.Penetration Access Compromise Pt.1/05.Password Cracking Pt.2.mov3.46MB
  • 09.Penetration Access Compromise Pt.1/06.Social Engineering.mov2.73MB
  • 10.Penetration Access Compromise Pt.2/01.Session Hijacking Pt.1.mov2.49MB
  • 10.Penetration Access Compromise Pt.2/02.Session Hijacking Pt.2.mov6.81MB
  • 10.Penetration Access Compromise Pt.2/03.Privilege Escalation.mov2.09MB
  • 10.Penetration Access Compromise Pt.2/04.Maintaining & Expanding Access.mov3.09MB
  • 10.Penetration Access Compromise Pt.2/05.System Compromise.mov1.88MB
  • 11.Evading Defenses & Erasing Tracks/01.Where Your Actions Recorded Pt.1.mov828.71KB
  • 11.Evading Defenses & Erasing Tracks/02.Where Your Actions Recorded Pt.2.mov2.63MB
  • 11.Evading Defenses & Erasing Tracks/03.Deleting Log Files & Other Evidence Pt.1.mov1.36MB
  • 11.Evading Defenses & Erasing Tracks/04.Deleting Log Files & Other Evidence Pt.2.mov2.02MB
  • 11.Evading Defenses & Erasing Tracks/05.Rootkits.mov2.36MB
  • 11.Evading Defenses & Erasing Tracks/06.Steganography.mov4.6MB
  • 11.Evading Defenses & Erasing Tracks/07.Evading IDS & Firewalls.mov1.94MB
  • 12.Introduction to Hacking Techniques Pt.1/01.Encryption.mov2.3MB
  • 12.Introduction to Hacking Techniques Pt.1/02.Sniffers.mov1.81MB
  • 12.Introduction to Hacking Techniques Pt.1/03.Wireless hacking.mov2.94MB
  • 12.Introduction to Hacking Techniques Pt.1/04.SQL Injection.mov1.88MB
  • 13.Introduction to Hacking Techniques Pt.2/01.Buffer Overflows.mov2.3MB
  • 13.Introduction to Hacking Techniques Pt.2/02.Rootkits.mov1.6MB
  • 13.Introduction to Hacking Techniques Pt.2/03.Spoofing.mov1.89MB
  • 13.Introduction to Hacking Techniques Pt.2/04.Denial of Service Attacks.mov1.73MB
  • 13.Introduction to Hacking Techniques Pt.2/05.Web Hacking.mov2.83MB
  • 14.Popular Tools/01.nmap Pt.1.mov3.68MB
  • 14.Popular Tools/02.nmap Pt.2.mov1.42MB
  • 14.Popular Tools/03.SuperScan.mov6.33MB
  • 14.Popular Tools/04.Nessus.mov4.51MB
  • 15.Penetration Test Demo/01.Penetration Test Demo Pt.1.mov854.99KB
  • 15.Penetration Test Demo/02.Penetration Test Demo Pt.2.mov474.89KB
  • 15.Penetration Test Demo/03.Penetration Test Demo Pt.3.mov509.85KB
  • 16.Credits/01.About the Authors.mov674.17KB