Ethical_Hacking_-_Penetration_Testing

mp4   Hot:267   Size:177.09 MB   Created:2017-08-28 00:27:27   Update:2017-10-23 17:12:32  

File List

  • 0_Introduction/01_Welcome.mp4 13.34 MB
    0_Introduction/02_What_you_should_know.mp4 1.06 MB
    0_Introduction/03_Hacking_ethically.mp4 2.47 MB
    1_1._Organizational_Penetration_Testing/04_Auditing_security_mechanisms.mp4 7.74 MB
    1_1._Organizational_Penetration_Testing/05_Locating_security_vulnerabilities.mp4 5.62 MB
    1_1._Organizational_Penetration_Testing/06_Understanding_penetration_testing.mp4 5.82 MB
    1_1._Organizational_Penetration_Testing/07_Identifying_the_attack_vectors.mp4 4.89 MB
    2_2._Types_of_Penetration_Testing/08_Black_gray_and_white-box_testing.mp4 6.67 MB
    2_2._Types_of_Penetration_Testing/09_Checking_from_the_outside_in.mp4 5.34 MB
    2_2._Types_of_Penetration_Testing/10_Looking_inside_the_organization.mp4 6.66 MB
    2_2._Types_of_Penetration_Testing/11_Testing_using_other_methods.mp4 4.58 MB
    3_3._Pen_Testing_Techniques/12_Following_a_structured_plan.mp4 5.59 MB
    3_3._Pen_Testing_Techniques/13_Planning_the_pen_test.mp4 16.08 MB
    3_3._Pen_Testing_Techniques/14_Attacking_the_system.mp4 5.18 MB
    3_3._Pen_Testing_Techniques/15_Delivering_the_results.mp4 14.25 MB
    4_4._Pen_Testing_Blueprint/16_Checking_physical_security.mp4 5.62 MB
    4_4._Pen_Testing_Blueprint/17_Wireless_penetration_testing.mp4 8.86 MB
    4_4._Pen_Testing_Blueprint/18_Breach_the_website_and_the_database.mp4 10.04 MB
    4_4._Pen_Testing_Blueprint/19_Leaking_data_via_email_or_VoIP.mp4 8.14 MB
    4_4._Pen_Testing_Blueprint/20_Social_engineering.mp4 6.36 MB
    5_5._Outsourcing_Penetration_Testing/21_Defining_the_project_scope.mp4 6.08 MB
    5_5._Outsourcing_Penetration_Testing/22_Outsourcing_penetration_testing.mp4 4.78 MB
    5_5._Outsourcing_Penetration_Testing/23_Hiring_consultants.mp4 7.39 MB
    5_5._Outsourcing_Penetration_Testing/24_Agreeing_on_terms.mp4 11.51 MB
    6_Conclusion/25_Next_steps.mp4 3.02 MB

Download Info

  • Tips

    “Ethical_Hacking_-_Penetration_Testing” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.