Título: IT Security Beginner 2.0: Certified Hacking Training
Redes y seguridad de TI no es una broma. En cuestión de segundos, los hackers pueden acceder a redes cerradas y ver archivos, cuentas, e incluso robar identidades. Este curso está diseñado para introducir estos conceptos y las tácticas del mundo real que los hackers utilizan, de manera que pueda protegerse y proteger a su red.
Aunque este curso incluye instrucciones paso a paso para las técnicas de hacking avanzadas, está diseñado para ayudar a prevenir un ataque. No se recomienda el uso de estas tácticas para infiltrarse en las redes o sistemas informáticos que no son el suyo propio.
Conviértete en un Hacker Certificado cubriendo los siguientes temas:
Seguridad y hacking
Principiante a Avanzado de TI Seguridad
Microsoft Windows Amenazas y Debilidades WiFi
Amenazas actuales black-Hat y Tendencias
Diseño de Redes más Aseguradas
Datos cifrados, Identificar Spoofing, y de autorización de Windows
Contenido:
Section 2: IT Security Trends
3
Introduction to Current Cyber Threats
04:46
4
IT Prehistory
04:41
5
Let’s look a few years back
04:42
6
Cyber crimes - an evolution not revolution
04:25
7
Current Cyber Threats - notes for the examination
18 pages
8
Popular myths about IT security - origins
05:33
9
Myths #1 - you’ll never be hacked
05:55
10
Myths #2 - you don’t need any protection software oraz hardware
05:11
11
Myths #3 - IT security is always a priority
01:13
12
Popular Myths About Computer System Security - notes for the examination
9 pages
13
Trends in IT Security
03:44
14
The birth of technology society
03:16
15
EXERCISE: How much info can you gathered?
03:59
16
Fake identity
05:03
17
Online privacy
06:14
18
Analyzing sniffing software
03:33
19
Cyber War
08:23
20
Changing IT Security Trends - notes for the examination
32 pages
21
Objective #1 - Data security - Introduction
06:58
22
Confidentiality of data
05:33
23
EXERCISE: Finding confidental data with search engines
06:05
24
Integrity of data
07:04
25
Data security - notes for the examination
22 pages
Section 3: Computer Network Security
26
Network security - introduction
05:44
27
OSI MODEL #1 - Physical layer
05:45
28
OSI MODEL #2 - Data link layer
04:46
29
Threats: MAC spoofing
05:54
30
Threats: ARP Poisoning
06:38
31
EXERCISE: Data Link Layer Attack
07:32
32
OSI MODEL #3 - Network layer
06:58
33
TCP Tunnelling over ICMP
07:39
34
Network Protocols - notes for the examination
26 pages
35
OSI MODEL #4 - Transport Layer
06:04
36
Threats: Enumerating Remote Computers
03:40
37
EXERCISE: Transport Layer Attack
05:27
38
METASPLOIT: Attack demonstration part 1
03:48
39
METASPLOIT: Attack demonstration part 2
05:13
40
OSI MODEL #5 - Session Layer
03:33
41
Transport Protocols - notes for the examination
10 pages
42
OSI MODEL #6 - Presentation Layer
06:52
43
OSI MODEL #7 - Application Layer
03:48
44
EXERCISE: Application Layer Attacks
06:03
45
Backtrack: Attack Demonstration
03:34
46
Man-in-the-Middle and Denial of Service Attacks
02:49
47
Modifying Transmitted Packets
04:45
48
Unencrypted protocols
02:58
49
Application Protocols - notes for the examination
21 pages
Section 4: Designing Secure Computer Networks
50
Subnetting - notes for the examination
20 pages
51
Protocols and Services - notes for the examination
20 pages
Section 5: Network administration
52
Introduction to Monitoring Transmitted Data
01:06
53
Monitoring Transmitted Data - Basic informations
08:03
54
Intrusion detection systems
07:43
55
Why are firewalls and NDIS not enough?
05:41
56
Wireshark - Introduction to network analysis
Preview
06:29
57
How to use Wireshark?
Preview
08:27
58
Analyzing Captured data
Preview
05:43
59
How to analyze telnet protocol?
08:09
60
Intrusion detection
07:48
61
Scanning computers
07:47
62
Monitoring transmitted data - notes for the examination
28 pages
Section 6: Wireless Networks Security
63
Wireless Networks
01:16
64
WIFI security solutions - introduction
05:44
65
WIFI - working principles
05:48
66
Other wireless technologies
02:56
67
Threats and risks
04:38
68
Ineffective solutions
04:11
69
Authentication methods
08:31
70
802.11 WEP
07:06
71
802.11I WPA
06:24
72
Standards and Security Solutions - notes for the examination
29 pages
73
Threats of WIFI networks
05:58
74
Client Attacks: Launching a rogue access point
07:03
75
Client Attacks: Evil twin
04:51
76
Client Attacks: Denial of service
09:17
77
EXERCISE: WPA attack
03:24
78
Wi-Fi Security Threats - notes for the examination
19 pages
Section 7: Operating Systems Security
79
Operating systems security - introduction
09:10
80
Security boundaries
04:44
81
Three core
07:15
82
EXERCISE: OS boundaries
07:54
83
Process isolation
06:30
84
Kernel Mode Code Signing
06:24
85
Java Virtual Machine and code access security
04:17
86
OS Security Boundaries - notes for the examination
28 pages
87
Malware
12:09
88
EXERCISE: Vulnerability attacks
10:26
89
EXERCISE: Identifying suspicious processes
06:54
90
Demonstration: Process Explorer
09:13
91
EXERCISE: Removing malware
08:38
92
Rootkits
06:14
93
EXERCISE: Detecting rootkits
11:07
94
EXERCISE: Security evaluation
06:00
95
Malware - notes for the examination
18 pages
Section 8: Access Control
96
Authentication and authorisation - Introduction
01:57
97
Authentication users
06:56
98
How secure is your password?
05:03
99
Authentication protocols and services
08:25
100
LM Hash
07:02
Section 9: Prepare yourself for the examination
101
Answer sample questions which you can find during the examination
5 questions
Aunque este curso incluye instrucciones paso a paso para las técnicas de hacking avanzadas, está diseñado para ayudar a prevenir un ataque. No se recomienda el uso de estas tácticas para infiltrarse en las redes o sistemas informáticos que no son el suyo propio.
Conviértete en un Hacker Certificado cubriendo los siguientes temas:
Seguridad y hacking
Principiante a Avanzado de TI Seguridad
Microsoft Windows Amenazas y Debilidades WiFi
Amenazas actuales black-Hat y Tendencias
Diseño de Redes más Aseguradas
Datos cifrados, Identificar Spoofing, y de autorización de Windows
Contenido:
Section 2: IT Security Trends
3
Introduction to Current Cyber Threats
04:46
4
IT Prehistory
04:41
5
Let’s look a few years back
04:42
6
Cyber crimes - an evolution not revolution
04:25
7
Current Cyber Threats - notes for the examination
18 pages
8
Popular myths about IT security - origins
05:33
9
Myths #1 - you’ll never be hacked
05:55
10
Myths #2 - you don’t need any protection software oraz hardware
05:11
11
Myths #3 - IT security is always a priority
01:13
12
Popular Myths About Computer System Security - notes for the examination
9 pages
13
Trends in IT Security
03:44
14
The birth of technology society
03:16
15
EXERCISE: How much info can you gathered?
03:59
16
Fake identity
05:03
17
Online privacy
06:14
18
Analyzing sniffing software
03:33
19
Cyber War
08:23
20
Changing IT Security Trends - notes for the examination
32 pages
21
Objective #1 - Data security - Introduction
06:58
22
Confidentiality of data
05:33
23
EXERCISE: Finding confidental data with search engines
06:05
24
Integrity of data
07:04
25
Data security - notes for the examination
22 pages
Section 3: Computer Network Security
26
Network security - introduction
05:44
27
OSI MODEL #1 - Physical layer
05:45
28
OSI MODEL #2 - Data link layer
04:46
29
Threats: MAC spoofing
05:54
30
Threats: ARP Poisoning
06:38
31
EXERCISE: Data Link Layer Attack
07:32
32
OSI MODEL #3 - Network layer
06:58
33
TCP Tunnelling over ICMP
07:39
34
Network Protocols - notes for the examination
26 pages
35
OSI MODEL #4 - Transport Layer
06:04
36
Threats: Enumerating Remote Computers
03:40
37
EXERCISE: Transport Layer Attack
05:27
38
METASPLOIT: Attack demonstration part 1
03:48
39
METASPLOIT: Attack demonstration part 2
05:13
40
OSI MODEL #5 - Session Layer
03:33
41
Transport Protocols - notes for the examination
10 pages
42
OSI MODEL #6 - Presentation Layer
06:52
43
OSI MODEL #7 - Application Layer
03:48
44
EXERCISE: Application Layer Attacks
06:03
45
Backtrack: Attack Demonstration
03:34
46
Man-in-the-Middle and Denial of Service Attacks
02:49
47
Modifying Transmitted Packets
04:45
48
Unencrypted protocols
02:58
49
Application Protocols - notes for the examination
21 pages
Section 4: Designing Secure Computer Networks
50
Subnetting - notes for the examination
20 pages
51
Protocols and Services - notes for the examination
20 pages
Section 5: Network administration
52
Introduction to Monitoring Transmitted Data
01:06
53
Monitoring Transmitted Data - Basic informations
08:03
54
Intrusion detection systems
07:43
55
Why are firewalls and NDIS not enough?
05:41
56
Wireshark - Introduction to network analysis
Preview
06:29
57
How to use Wireshark?
Preview
08:27
58
Analyzing Captured data
Preview
05:43
59
How to analyze telnet protocol?
08:09
60
Intrusion detection
07:48
61
Scanning computers
07:47
62
Monitoring transmitted data - notes for the examination
28 pages
Section 6: Wireless Networks Security
63
Wireless Networks
01:16
64
WIFI security solutions - introduction
05:44
65
WIFI - working principles
05:48
66
Other wireless technologies
02:56
67
Threats and risks
04:38
68
Ineffective solutions
04:11
69
Authentication methods
08:31
70
802.11 WEP
07:06
71
802.11I WPA
06:24
72
Standards and Security Solutions - notes for the examination
29 pages
73
Threats of WIFI networks
05:58
74
Client Attacks: Launching a rogue access point
07:03
75
Client Attacks: Evil twin
04:51
76
Client Attacks: Denial of service
09:17
77
EXERCISE: WPA attack
03:24
78
Wi-Fi Security Threats - notes for the examination
19 pages
Section 7: Operating Systems Security
79
Operating systems security - introduction
09:10
80
Security boundaries
04:44
81
Three core
07:15
82
EXERCISE: OS boundaries
07:54
83
Process isolation
06:30
84
Kernel Mode Code Signing
06:24
85
Java Virtual Machine and code access security
04:17
86
OS Security Boundaries - notes for the examination
28 pages
87
Malware
12:09
88
EXERCISE: Vulnerability attacks
10:26
89
EXERCISE: Identifying suspicious processes
06:54
90
Demonstration: Process Explorer
09:13
91
EXERCISE: Removing malware
08:38
92
Rootkits
06:14
93
EXERCISE: Detecting rootkits
11:07
94
EXERCISE: Security evaluation
06:00
95
Malware - notes for the examination
18 pages
Section 8: Access Control
96
Authentication and authorisation - Introduction
01:57
97
Authentication users
06:56
98
How secure is your password?
05:03
99
Authentication protocols and services
08:25
100
LM Hash
07:02
Section 9: Prepare yourself for the examination
101
Answer sample questions which you can find during the examination
5 questions
+ comentarios + 2 comentarios
Cual es la contraseña para descomprimirlo?
Submit your website or blog now for indexing in Google and 300+ search engines!
Over 200,000 sites submitted!
SUBMIT NOW via I NEED HITS!!!