SECURITY PENETRATION TESTING Art of Hacking Part 2 - Video Training Tutorial DVD

£3.95 Buy It Now Sold, FREE Shipping, 14-Day Returns, eBay Money Back Guarantee

Seller: daber56 (1,989) 97.9%, Location: Slough, Berkshire, Ships to: Worldwide, Item: 223205005908 SECURITY PENETRATION TESTING Part 2 The Art of Hacking Series Professional Video Training on DVD You can use this DVD only on PC and MAC (not working on standalone DVD player). Includes free VLC Media Player to play video lessons on computer (version for Windows and Mac-OS). Dispatch withing 24h (Mon-Sat) - FREE 1st class UK Royal Mail Please don't hesitate to contact us regarding any of our listing, postage discount, item inquiry etc. THIS DVD comes with 14 days Money Back Guarantee. You have to send the item back within 14 days of delivery in original unused excellent condition. Please note: Postage is Non-Refundable & Buyer will bear the return postage. CONTENTS 08 Hacking Networking Devices Learning objectives Understanding the Reasons for and the Steps to Hacking a Network Reviewing Networking Technology Fundamentals OSI and DoD Internet Models Reviewing Networking Technology Fundamentals Forwarding Device Architecture and Communication Building an Internetwork Topology Using VIRL Hacking Switches Reviewing Ethernet Fundamentals Hacking Switches Demo Hacking Switches ARP Vulnerabilities and ARP Cache Poisoning Reviewing Router Fundamentals Examining ICMP, First Hop Redundancy and Routing Protocol Attacks Hacking the Management Plane Understanding Firewall Fundamentals and Levels of Inspection Performing Firewall Reconnaissance and Tunneling Surveying Essential Tools for Hacking Network Devices Packet Capture Surveying Essential Tools for Hacking Network Devices Switch and Router Hacking Tools Surveying Essential Tools for Hacking Network Devices ARP Spoofing Tools Surveying Essential Tools for Hacking Network Devices MiTM Tools Surveying Essential Tools for Hacking Network Devices Linux Tools Using Network Device Hacking Tools to Perform a MiTM Attack 09 Fundamentals of Wireless Hacking Learning objectives Reviewing Wireless Technology Fundamentals Surveying Wireless Hacking Tools Wireless Adapters Surveying Wireless Hacking Tools Software Hacking WEP, WPA, and Other Protocols Understanding Hacking Wireless Clients 10 Buffer Overflows Learning objectives Understanding Buffer Overflows Exploiting Buffer Overflows Overcoming Defenses for Buffer Overflow Vulnerabilities Understanding Fuzzing Creating a Fuzzing Strategy Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers Surveying Tools to Find and Exploit Buffer Overflows 11 Powershell Attacks Learning objectives Understanding Powershell Pwning Windows Using PowerShell Empire Components, Setup, and Basic Exploits Pwning Windows Using PowerShell Empire Modules and Advanced Exploits Gathering Network Information Using PowerShell 12 Evasion and Post Exploitation Techniques Learning objectives Understanding Security Evasion Techniques Exploring Post Exploitation Techniques Covering Your Tracks 13 Social Engineering Learning objectives Understanding Social Engineering Exploring the Social Engineering Toolkit (SET) Exploring Maltego Surveying Social Engineering Case Studies 14 Maintaining Persistence, Pivoting, and Data Exfiltration Learning objectives Understanding Persistence Gaining Network Access Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and LLMNR Poisoning Maintaining Persistence Understanding Pivoting and Lateral Movement Defending Against the Advanced Persistent Threat 15 Writing Penetration Testing Reports Learning objectives Understanding Pen Test Reports and How They Are Used Planning and Organizing Your Report Understanding the Pen Test Report Format Exploring Risk Ratings Distributing Pen Test Reports NOTICE: This listing complies with all eBay rules and regulations. The item does NOT infringe upon any trademark, copyright, or any other rights, nor does it infringe upon any eBay listing or spam policies. The contents of this DVD are distributed freely and globally under the terms of the GNU Public License, the GNU Lesser General Public Licence (LGPL), or the Mozilla Public Licence. We have a full and legal right to redistribute this product. This is NOT a digital download – the item will be sent to the buyer on solid form DVD media. Condition: New

deenshow.us Insights deenshow.us Exclusive
  •  Popularity - 49 views, 0.6 views per day, 79 days on eBay. High amount of views. 1 sold, 4 available.
  •  Price -
  •  Seller - 1,989+ items sold. 2.1% negative feedback. Good seller with good positive feedback and good amount of ratings.
Similar Items
SitemapDownload | Full Version9 | Wir töten Stella (2017)