Parece que su navegador tiene desactivado JavaScript.

Usted debe tener habilitado JavaScript en su navegador para utilizar la funcionalidad de este sitio web. Haga clic aquí para obtener instrucciones sobre cómo habilitar JavaScript en su navegador.

Certified Ethical Hacker Video Training Course

This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more.

Recommended skills:

  • Familiarity with Windows of all versions back to Windows XP and Windows Server 2003
  • Familiarity with Linux is not necessary but recommended (a video early in the course provides basic Kali Linux training that is sufficient for the learner to complete the course)

Recommended equipment:

  • Whatever equipment is being used to view the videos (except a smartphone or tablet) is sufficient to create a basic lab environment in which the learner can mirror demonstrations in the videos. This would also require installation of any virtualization software such as Parallels, VMware, Hyper-V, or VirtualBox.
  • High-speed internet is recommended to download Kali Linux and some of the additional tools.

Related job functions:

  • Network Administrator
  • Systems Administrator
  • Systems Engineer
  • Help Desk

Most IT professionals are far too busy with daily tasks and projects to commit themselves to a serious study of security. Problem is, hackers are quite serious about your security and how to exploit it. If a security breach occurs at a company, it can cost millions of dollars, the loss of a priceless reputation, private customer information, and the very jobs of the IT professionals who often get blamed for weak security practices. One of the best ways to ensure good security is to know what hackers do to circumvent it. Security concepts and facts alone do not protect your systems. However, knowledge and experience in exactly how hackers exploit weaknesses will help you to potentially avoid embarrassing security breaches in the future.

  • Idioma Inglés
  • Duración 14:29:45

Temario:

  1. Course Introduction
  2. Introduction to Ethical Hacking
  3. Terms and Types of Hackers
  4. Virtualization
  5. Linux
  6. Reconnaissance: Overview
  7. Reconnaissance: Powerful Resources
  8. Footprinting and Countermeasures
  9. Social Engineering
  10. Scanning Overview
  11. Scanning Demos
  12. Enumeration
  13. Cracking Windows Passwords
  14. Password Principles and Cracking Linux Passwords
  15. System Hacking: ADS and Steganography
  16. System Hacking: Keyloggers and Metasploit
  17. Malware
  18. Hack-O-Rama: Armitage, RAT and Netcat
  19. Hack-O-Rama: Rootkits and Trojans
  20. Sniffing Overview
  21. Sniffing Demos
  22. Denial of Service
  23. Hijacking
  24. Hacking Web Sites and Web Apps: Overview
  25. Hacking Web Sites and Web Apps: Demos
  26. Cryptography
  27. IDS
  28. Snort and Honeypots
  29. Wireless Overview
  30. Wireless Demos

    0 artículos

Monedas