Últimos Posts:
http://gfsistemas.net/mailing/oki7.png

IT Security Beginner 2.0: Certified Hacking Training


Título: IT Security Beginner 2.0: Certified Hacking Training 

Redes y seguridad de TI no es una broma. En cuestión de segundos, los hackers pueden acceder a redes cerradas y ver archivos, cuentas, e incluso robar identidades. Este curso está diseñado para introducir estos conceptos y las tácticas del mundo real que los hackers utilizan, de manera que pueda protegerse y proteger a su red.

Aunque este curso incluye instrucciones paso a paso para las técnicas de hacking avanzadas, está diseñado para ayudar a prevenir un ataque. No se recomienda el uso de estas tácticas para infiltrarse en las redes o sistemas informáticos que no son el suyo propio.

Conviértete en un Hacker Certificado cubriendo los siguientes temas:

Seguridad y hacking
Principiante a Avanzado de TI Seguridad
Microsoft Windows Amenazas y Debilidades WiFi
Amenazas actuales black-Hat y Tendencias
Diseño de Redes más Aseguradas
Datos cifrados, Identificar Spoofing, y de autorización de Windows

Contenido:

Section 2: IT Security Trends
3      
Introduction to Current Cyber Threats
04:46
4      
IT Prehistory
04:41
5      
Let’s look a few years back
04:42
6      
Cyber crimes - an evolution not revolution
04:25
7      
Current Cyber Threats - notes for the examination
18 pages
8      
Popular myths about IT security - origins
05:33
9      
Myths #1 - you’ll never be hacked
05:55
10      
Myths #2 - you don’t need any protection software oraz hardware
05:11
11      
Myths #3 - IT security is always a priority
01:13
12      
Popular Myths About Computer System Security - notes for the examination
9 pages
13      
Trends in IT Security
03:44
14      
The birth of technology society
03:16
15      
EXERCISE: How much info can you gathered?
03:59
16      
Fake identity
05:03
17      
Online privacy
06:14
18      
Analyzing sniffing software
03:33
19      
Cyber War
08:23
20      
Changing IT Security Trends - notes for the examination
32 pages
21      
Objective #1 - Data security - Introduction
06:58
22      
Confidentiality of data
05:33
23      
EXERCISE: Finding confidental data with search engines
06:05
24      
Integrity of data
07:04
25      
Data security - notes for the examination
22 pages
Section 3: Computer Network Security
26      
Network security - introduction
05:44
27      
OSI MODEL #1 - Physical layer
05:45
28      
OSI MODEL #2 - Data link layer
04:46
29      
Threats: MAC spoofing
05:54
30      
Threats: ARP Poisoning
06:38
31      
EXERCISE: Data Link Layer Attack
07:32
32      
OSI MODEL #3 - Network layer
06:58
33      
TCP Tunnelling over ICMP
07:39
34      
Network Protocols - notes for the examination
26 pages
35      
OSI MODEL #4 - Transport Layer
06:04
36      
Threats: Enumerating Remote Computers
03:40
37      
EXERCISE: Transport Layer Attack
05:27
38      
METASPLOIT: Attack demonstration part 1
03:48
39      
METASPLOIT: Attack demonstration part 2
05:13
40      
OSI MODEL #5 - Session Layer
03:33
41      
Transport Protocols - notes for the examination
10 pages
42      
OSI MODEL #6 - Presentation Layer
06:52
43      
OSI MODEL #7 - Application Layer
03:48
44      
EXERCISE: Application Layer Attacks
06:03
45      
Backtrack: Attack Demonstration
03:34
46      
Man-in-the-Middle and Denial of Service Attacks
02:49
47      
Modifying Transmitted Packets
04:45
48      
Unencrypted protocols
02:58
49      
Application Protocols - notes for the examination
21 pages
Section 4: Designing Secure Computer Networks
50      
Subnetting - notes for the examination
20 pages
51      
Protocols and Services - notes for the examination
20 pages
Section 5: Network administration
52      
Introduction to Monitoring Transmitted Data
01:06
53      
Monitoring Transmitted Data - Basic informations
08:03
54      
Intrusion detection systems
07:43
55      
Why are firewalls and NDIS not enough?
05:41
56      
Wireshark - Introduction to network analysis
Preview
06:29
57      
How to use Wireshark?
Preview
08:27
58      
Analyzing Captured data
Preview
05:43
59      
How to analyze telnet protocol?
08:09
60      
Intrusion detection
07:48
61      
Scanning computers
07:47
62      
Monitoring transmitted data - notes for the examination
28 pages
Section 6: Wireless Networks Security
63      
Wireless Networks
01:16
64      
WIFI security solutions - introduction
05:44
65      
WIFI - working principles
05:48
66      
Other wireless technologies
02:56
67      
Threats and risks
04:38
68      
Ineffective solutions
04:11
69      
Authentication methods
08:31
70      
802.11 WEP
07:06
71      
802.11I WPA
06:24
72      
Standards and Security Solutions - notes for the examination
29 pages
73      
Threats of WIFI networks
05:58
74      
Client Attacks: Launching a rogue access point
07:03
75      
Client Attacks: Evil twin
04:51
76      
Client Attacks: Denial of service
09:17
77      
EXERCISE: WPA attack
03:24
78      
Wi-Fi Security Threats - notes for the examination
19 pages
Section 7: Operating Systems Security
79      
Operating systems security - introduction
09:10
80      
Security boundaries
04:44
81      
Three core
07:15
82      
EXERCISE: OS boundaries
07:54
83      
Process isolation
06:30
84      
Kernel Mode Code Signing
06:24
85      
Java Virtual Machine and code access security
04:17
86      
OS Security Boundaries - notes for the examination
28 pages
87      
Malware
12:09
88      
EXERCISE: Vulnerability attacks
10:26
89      
EXERCISE: Identifying suspicious processes
06:54
90      
Demonstration: Process Explorer
09:13
91      
EXERCISE: Removing malware
08:38
92      
Rootkits
06:14
93      
EXERCISE: Detecting rootkits
11:07
94      
EXERCISE: Security evaluation
06:00
95      
Malware - notes for the examination
18 pages
Section 8: Access Control
96      
Authentication and authorisation - Introduction
01:57
97      
Authentication users
06:56
98      
How secure is your password?
05:03
99      
Authentication protocols and services
08:25
100      
LM Hash
07:02
Section 9: Prepare yourself for the examination
101      
Answer sample questions which you can find during the examination
5 questions

Share this article :

+ comentarios + 2 comentarios

Anónimo
17 de febrero de 2016, 12:10

Cual es la contraseña para descomprimirlo?

21 de noviembre de 2017, 10:49

Submit your website or blog now for indexing in Google and 300+ search engines!

Over 200,000 sites submitted!

SUBMIT NOW via I NEED HITS!!!

Publicar un comentario
 
Soporte : GFSistemas Corp. | Email Marketing | Pedidos o Sugerencias
Copyright © 2013. Informática al Día GFSistemas - Todos los Derechos Reservados By GFSistemas
Template Created by GFSistemas Published by GFSistemas
Proudly powered by Blogger