Download link
File List
-
01. Introduction/01_01-Welcome.mp4 18.16 MB
01. Introduction/01_03-Hacking ethically.mp4 2.47 MB
01. Introduction/01_02-What you should know.mp4 1.07 MB
02. Trojan Overview/02_04-Recognize a Trojan attack.mp4 14.01 MB
02. Trojan Overview/02_02-Infecting a system with a Trojan.mp4 10.07 MB
02. Trojan Overview/02_01-Understanding Trojan behavior.mp4 7.63 MB
02. Trojan Overview/02_03-Wrap and conceal.mp4 6.77 MB
03. Getting into a System/03_05-Using ICMP.mp4 12.01 MB
03. Getting into a System/03_02-SSDP amplification attack.mp4 9.94 MB
03. Getting into a System/03_01-Blended threats.mp4 9.76 MB
03. Getting into a System/03_03-Trojan evolution.mp4 7.6 MB
03. Getting into a System/03_04-Disguising FTP, HTTP, and PING.mp4 4.76 MB
04. Rootkits/04_04-Detect, remove, and avoid rootkits.mp4 8.45 MB
04. Rootkits/04_03-Using rootkits.mp4 8.27 MB
04. Rootkits/04_01-Dissecting rootkits.mp4 6.03 MB
04. Rootkits/04_02-User mode and kernel mode.mp4 5.3 MB
05. Trojan Forensics/05_01-Detecting Trojans.mp4 24.69 MB
05. Trojan Forensics/05_02-Knowing active processes.mp4 17.52 MB
05. Trojan Forensics/05_04-Defend against Trojans.mp4 7.23 MB
05. Trojan Forensics/05_03-Identify and remove Trojans.mp4 5.21 MB
06. Conclusion/06_01-Next steps.mp4 2.82 MB
Download Info
-
Tips
“Lynda - Ethical Hacking - Trojans and Backdoors” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.