Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Linkedin Learning Ethical Hacking-Vulnerability Analysis
#1
[Image: 537660251_large-use_rgb_blue_128px_learning_rgb.png]
297.81 MB | 00:05:46 | mp4 | 1360X768 | 16:9
Genre:eLearning |Language:English

Files Included :
1 Managing risk.mp4 (4.13 MB)
2 Discovering resources.mp4 (2.01 MB)
3 Hacking ethically- Disclaimer.mp4 (2.4 MB)
1 Risks threats and vulnerabilities.mp4 (11.35 MB)
2 Recognizing common vulnerabilities.mp4 (15.84 MB)
3 Classifying vulnerabilities.mp4 (12.5 MB)
4 Assessing vulnerabilities.mp4 (14.12 MB)
5 Vulnerability management life cycle.mp4 (14.48 MB)
6 Modeling threats.mp4 (12.82 MB)
7 Challenge- Threat modeling exercise.mp4 (7.08 MB)
8 Solution- Threat modeling exercise.mp4 (6.32 MB)
1 Common Vulnerability Scoring System.mp4 (17.18 MB)
2 Common vulnerabilities and exposures.mp4 (13.27 MB)
3 Outsourcing vulnerability analysis.mp4 (6.55 MB)
4 Bug bounty white hat hacking.mp4 (8.74 MB)
5 Challenge- The Temporal metric group.mp4 (4.76 MB)
6 Solution- The Temporal metric group.mp4 (10.07 MB)
1 Installing Kali Linux.mp4 (10.85 MB)
2 Assessment tools.mp4 (20.99 MB)
3 Nikto demo.mp4 (7.31 MB)
4 Securing mobile devices.mp4 (16.16 MB)
5 Fuzz testing.mp4 (16.15 MB)
1 LAN vulnerability scanners.mp4 (15.68 MB)
2 Scanning the LAN.mp4 (7.48 MB)
3 Selecting a vulnerability assessment tool.mp4 (8.83 MB)
4 Updates and patches.mp4 (7.56 MB)
5 Firewalls and HIDS.mp4 (9.28 MB)
6 Vulnerability assessment reports.mp4 (9.32 MB)
1 Next steps.mp4 (4.4 MB)]
Screenshot
[Image: O5iszLO4_o.jpg]


[To see links please register or login]

[To see links please register or login]

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now