Video Tutorials :

[Udemy] The Absolute Beginners Guide to Cyber Security Part 2

      Author: sddd   |   11 January 2020   |   comments: 0

https://i111.fastpic.ru/big/2020/0111/60/18dd5e519e22db1227495456cbcad960.jpg

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 48000 Hz
Language: English | Size: 763 MB | Duration: 2 hours
What you'll learn
You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.
Requirements
You should have completed two previous courses in order to continue learning. Course 1: Absolute Beginners Guide to Cybersecurity and Hacking Course 2: Absolute Beginners Guide to Cyber Security Part 1
Description
You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.
Section 1: Components of Hacking:
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing tracks
Section 2: Ethical hacking Mindmap
Ethical hacking
Places of ethical hacking
Mind map
Section 3: DoS and DDoS
Denial of services
Symptoms of dos attack
Slow performance
Increase in spam emails
Unavailability of a resource
Loss of access to a website
Denial of access to any internet services
Distributed denial of services (DDoS)
DoS/DDoS attack techniques
Land and flood attacks
Service request floods
Section 4: SYN flooding attach using hping3
Section 5: Counter Measures
Counter-measures
DoS/DDoS countermeasure strategies
Detech and neutralize handlers
Monitoring the activities running on a system of network
Deflect attacks by load balancing
Mitigate attacks disabling unnecessary services
Intrusion detection systems
Wavelet analysis
Section 6: Metasploit test
Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make
systems more secure. Metasploit is available for all popular operating systems.
Vulnerability
Exploit
Payload
Meterpreter
Who this course is for:
Students and Professionals interested in a career in Cyber Security and Ethical Hacking
This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.
Download link :
(If you need these, buy and download immediately before they are delete)
Links are Interchangeable - Single Extraction - Premium is support resumable




Home        |        Register        |        Rules        |        Statistics        |        Sitemap        |        RSS        |        Contact Us
DISCLAIMER
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator of this site (downduck.eu) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

Copyright © 2019 DownDuck. All rights reserved.