TA的每日心情 | 开心 2024-9-19 21:14 |
---|
签到天数: 757 天 [LV.10]以坛为家III
管理员
- 积分
- 1312455
|
资源详情
【课程内容】
Overview
00.Introduction
01.EthicalHackingOverview
02.InformationSecurityControls
03.SupportingEthicalHacking
04.Conclusion
IntroductiontoWebDesignandDevelopment
00.Introduction
01.ExploringWebDesign
02.TheFieldofWebDesign
03.GettingStarted
04.ExploringTools
05.LearningWebDesign
06.Conclusion
LearningCryptographyandNetworkSecurity
00.Introduction
01.NetworkSecurity
02.SymmetricEncryption
03.AsymmetricEncryptionandDigitalSignatures
04.HashAlgorithms,MessageDigest,andAuthentication
05.SecureSocketLayer(SSL)
06.EmailSecurity
07.InternetProtocolSecurity
08.Conclusion
TroubleshootingYourNetworkwithWireshark
00.Introduction
01.TrafficCaptureandAnalysis
02.ReviewoftheOpenSystemsInterconnection(OSI)Model
03.DeepPacketAnalysisofCommonProtocols
04.NormalandAbnormalBehA危ior
05.CommonAttackSignatures
06.SecurityTools
07.Conclusion
LearningPython
00.Introduction
01.PreparingtheDevelopmentEnvironment
02.PythonBasics
03.WorkingwithDatesandTimes
04.WorkingwithFiles
05.WorkingwithWebData
06.Conclusion
LearningBashScripting
00.Introduction
01.WorkingwiththeCommandLine
02.BuildingBashScripts
03.ControlStructures
04.InteractingwiththeUser
05.Conclusion
LearningKaliLinux
00.Introduction
01.SettingUptheVirtualLab
02.IntroducingKali
03.InformationGathering(UnderstandingtheTarget)
04.VulnerabilityAnalysis
05.PasswordsandHashes
06.ExploitingTargets
07.Conclusion
FootprintingandReconnaissance
00.Introduction
01.FootprintingandReconnaisance-LowTech
02.FootprintingandReconnaissanceTools
03.Conclusion
DenialofService
00.Introduction
01.WhatisaDenailofService
02.InfrastructureDenialofService
03.WirelessDenialofService
04.AppliacationDenialofService
05.SIPServiceAttacks
06.Ransomware
07.MitigationTechniques
08.Conclusion
SystemHacking
00.Introduction
01.SystemHackingOverview
02.GainingAccess
03.PrivilegeEscalation
04.Spyware
05.Keyloggers
06.HidinginPlainSight
07.CoverYourTracks
08.Conclusion
ScanningNetworks
00.Introduction
01.ScanningOverviewandMethodology
02.IdentifyingLiveSystemUsingProtocols
03.BlueprinttheNetwork
04.VulnerabilityScanning
05.ScanningTools
06.EvadingDetection
07.ConcealingandSpoofing
08.Tunneling
09.Conclusion
Enumeration
00.Introduction
01.BasicsofEnumeration
02.LocalHostEnumeration
03.RemoteHosts
04.EnumeratingtheInternet
05.OtherEnumerationTools
06.Conclusion
SocialEngineering
00.Introduction
01.SocialEngineeringOverview
02.SocialEngineeringMechanisms
03.MisuseofTrust
04.PenetrationTestingwithSocialEngineering
05.Conclusion
Sniffers
00.Introduction
01.SniffingOverview
02.MACattacks
03.DHCP
04.ARP
05.DNS
06.SniffingToolsandTechniques
07.Conclusion
SessionHijacking
00.Introduction
01.NetworkSessionHijacking
02.WebSessionHijacking
03.AdditionalTools
04.ServiceHijacking
05.HijackinginthePhysicalWorld
06.Conclusion
VirusesandWorms
00.Introduction
01.MalwareOverview
02.VirusesTypes
03.CreatingaVirus
04.AnalysisandCountermeasures
05.Conclusion
WirelessNetworks
00.Introduction
01.Wi-FiNetworks
02.RogueAccessPoints
03.Bluetooth
04.AdditionalTools
05.InternetofThings
06.Conclusion
TrojansandBackdoors
00.Introduction
01.TrojanOverview
02.GettingintoaSystem
03.Rootkits
04.TrojanForensics
05.Conclusion
WebsiteandWebApplicationTesting
00.Introduction
01.IntroductiontoWeb
02.GettingReadytoTest
03.RunningBasicWebApplicationTests
04.AdvancedWebApplicationTests
05.PracticingYourSkills
06.Conclusion
PerimeterDefenses
00.Introduction
01.Firewalls
02.HardwareFirewalls
03.NetworkSimulationUsingGNS3
04.Special-PurposePerimeterDevices
05.Conclusion
PenetrationTesting
00.Introduction
01.OrganizationalPenetrationTesting
02.TypesofPenetrationTesting
03.PenTestingTechniques
04.PenTestingBlueprint
05.OutsourcingPenetrationTesting
06.Conclusion
|
|