Coursera Certified Ethical Hacking v12 Specialization - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Coursera Certified Ethical Hacking v12 Specialization (/Thread-Coursera-Certified-Ethical-Hacking-v12-Specialization--611938) |
Coursera Certified Ethical Hacking v12 Specialization - AD-TEAM - 10-13-2024 1.58 GB | 00:23:26 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
01 introduction-to-cloud-computing (8.26 MB) 02 types-of-cloud-computing-services (6.61 MB) 03 responsibilities-in-on-premises (10.12 MB) 04 responsibilities-in-cloud (7.97 MB) 05 cloud-deployment-models (6.69 MB) 06 understanding-virtualization (6.36 MB) 07 cloud-security-control-layers (11.5 MB) 08 benefits-of-virtualization-in-the-cloud (4.88 MB) 09 cloud-computing-threats (9.85 MB) 10 cloud-computing-attacks (7.74 MB) 11 cloud-computing-security-tools (4.22 MB) 01 hacking-mobile-platforms (4.3 MB) 02 vulnerable-areas-for-mobiles (7.13 MB) 03 mobile-platform-vulnerabilities-and-risks (16.21 MB) 04 demo-hacking-mobile-phone (40.46 MB) 05 android-os (6.63 MB) 06 architecture-of-android-os (9.14 MB) 07 android-rooting-tools (7.8 MB) 08 android-pen-testing (5.1 MB) 09 counter-measures-for-mobile-security (14.24 MB) 01 what-is-cryptography (5.12 MB) 02 types-of-cryptography (16.35 MB) 03 demo-cryptographic-techniques (22.09 MB) 04 rsa-algorithm (8.92 MB) 05 steganography-and-its-types (9.45 MB) 06 how-steganography-works (8.77 MB) 07 use-of-algorithms-and-transformation (4.64 MB) 08 demo-perform-stegnography-using-open-stego (21.06 MB) 09 demo-perform-stegnography-using-snow-tool (17.46 MB) 01 denial-of-service-dos-attack (4.8 MB) 02 distributed-denial-of-service-ddos-attack (5.06 MB) 03 symptoms-of-dos-and-ddos-attacks (3 MB) 04 how-ddos-attacks-work (2.6 MB) 05 demo-perform-a-dos-attack-on-a-virtual-machine (27.97 MB) 06 categories-of-dos-and-ddos-attack-vectors (5.97 MB) 07 techniques-of-dos-and-ddos-attacks (12 MB) 08 what-is-botnet (5.52 MB) 09 techniques-to-protect-against-botnets (4.65 MB) 10 dos-and-ddos-protection-tools (3.87 MB) 01 sql-injection (4.79 MB) 02 scope-of-sql-injections (7.93 MB) 03 how-sql-query-works (10.46 MB) 04 types-of-sql-injection (6.46 MB) 05 demo-sql-injections (31.35 MB) 06 extract-information-through-error-messages (5.05 MB) 07 sql-injection-tools (8.85 MB) 08 how-to-defend-from-an-sql-injection-attack (12.36 MB) 09 demo-sql-injection-using-havij-tool (27.49 MB) 03 certificate-introduction-and-exam-details (17.01 MB) 04 course-introduction (8.65 MB) 05 course-outline (9.75 MB) 01 what-is-hacking (12.76 MB) 02 types-of-hackers (12.32 MB) 03 hacking-legal-or-illegal (7.59 MB) 01 introduction-to-cyber-security (9.22 MB) 02 stages-of-hacking (15.09 MB) 03 terminology-in-cyber-security-and-hacking (11.68 MB) 04 security-elements-in-cyber-security (9.41 MB) 05 penetration-testing (7.71 MB) 01 footprinting-or-reconnaissance (4.09 MB) 02 demo-gathering-information-from-various-online-resources (59.45 MB) 03 types-of-footprinting (8.16 MB) 04 website-footprinting (11.1 MB) 05 footprinting-methodology (9.43 MB) 06 e-mail-footprinting-methodology (10.87 MB) 07 finding-a-companys-public-and-restricted-data (12.59 MB) 08 footprinting-through-job-sites (6.33 MB) 09 archive-org-and-google-dorks (3.92 MB) 10 footprinting-pen-test-process (12.88 MB) 01 introduction-to-network-scanning (8.1 MB) 02 identify-targets-from-system-os (6.61 MB) 03 objectives-of-network-scanning (4.91 MB) 04 check-for-live-system (5.58 MB) 05 network-scanning-tool (3.22 MB) 06 demo-networking-scanning-with-advanced-ip-scanner-tool (13.59 MB) 07 vulnerability-scanning (6.38 MB) 08 what-is-enumeration (12.14 MB) 09 vulnerability-assessment (9.42 MB) 10 scanning-pen-testing (8.3 MB) 11 countermeasures-for-port-scanning (4.4 MB) 12 demo-port-scanning-using-nmap-tool (27.57 MB) 01 social-engineering (3.74 MB) 02 types-of-social-engineering (5 MB) 03 human-based-social-engineering (8 MB) 04 phishing (10.07 MB) 05 computer-based-social-engineering (4.86 MB) 06 mobile-based-social-engineering (13.95 MB) 08 phases-of-social-engineering-attacks (4.94 MB) 09 insider-threats (5.44 MB) 10 common-social-engineering-targets-and-defense-strategies (6.76 MB) 11 risk-of-social-engineering (4.23 MB) 12 demo-manual-phishing-attacks (31.86 MB) 13 tools-to-detect-phishing (4.24 MB) 14 how-to-detect-phishing-e-mails (5.15 MB) 15 how-to-defend-against-phishing-attacks (3.71 MB) 16 demo-phishing-attacks-using-kali-linux-automation-tools (24.17 MB) 01 web-penetration-testing (3.61 MB) 02 web-server-layers (13.78 MB) 03 web-application-attacks (6.78 MB) 04 why-do-web-servers-get-hacked (7.99 MB) 05 web-servers-architecture (7.8 MB) 06 web-application (6.91 MB) 07 web-application-architecture (11.34 MB) 08 demo-bypass-authentication (33.62 MB) 02 problem-statement (24.22 MB) 03 task-1 (11.81 MB) 04 task-2 (21.94 MB) 05 task-3 (13.53 MB) 06 task-4 (26.51 MB) 07 task-5 (18.14 MB) 08 task-6 (7.73 MB) 09 task-7 (21.77 MB) 10 task-8 (5.6 MB) 11 task-9 (10.04 MB) 12 task-10 (7.09 MB) 01 introduction-to-system-hacking (5.16 MB) 02 system-hacking-methodology (11.39 MB) 03 types-of-password-attacks (15.44 MB) 04 tools-for-password-attack (3.11 MB) 05 microsoft-authentication (7.84 MB) 06 password-salting (5.23 MB) 07 demo-how-attackers-crack-passwords-with-virtual-machines (44.3 MB) 01 malware-threats (6.38 MB) 02 ways-of-malware-propagation (8.65 MB) 03 what-is-a-virus (4.35 MB) 04 types-of-virus (7.28 MB) 05 how-does-a-computer-get-infected (4.91 MB) 06 how-to-defend-against-a-virus-attack (7.91 MB) 07 what-is-rootkit (5.95 MB) 08 what-is-a-worm (4.66 MB) 09 difference-between-worm-and-virus (4.64 MB) 10 trojan-and-trojan-horse (4.75 MB) 11 types-of-trojan (6.78 MB) 12 how-to-infect-systems-using-trojan (5.82 MB) 13 how-to-identify-trojan-infections (8.18 MB) 14 how-to-protect-from-trojans (3.92 MB) 15 malware-pen-testing (4.19 MB) 16 introduction-to-network-sniffing (6.98 MB) 17 working-of-network-sniffing (4.08 MB) 18 types-of-sniffing (5.88 MB) 19 vulnerable-protocols-in-sniffing (4.89 MB) 20 arp-poisoning (6.88 MB) 01 firewall-evading-ids-and-honeypots (6.25 MB) 02 types-of-firewalls (13.48 MB) 03 uses-of-firewall (10.35 MB) 04 what-is-an-ids-intrusion-detection-system (14.49 MB) 05 general-indications-of-system-intrusions (3.9 MB) 06 types-of-ids (5.8 MB) 07 intrusion-detection-tool-snort (5.23 MB) 08 what-is-honeypot (2.75 MB) 09 types-of-honeypots (6.78 MB) 10 detecting-honeypots (5.69 MB) 01 iot-hacking (3.69 MB) 02 how-does-iot-work (5.47 MB) 03 architecture-of-iot (5.4 MB) 04 iot-technologies-and-protocols (8.09 MB) 05 iot-communication-models (9.4 MB) 06 understanding-iot-attacks (10.66 MB) 07 iot-attack (9.77 MB) 08 iot-hacking-methodology (11.42 MB)
Screenshot
|