Curso Completo de Hacking Ético 2019 (Udemy, 20h, Inglés)

Todos los regalos y muestras gratis, promociones, productos gratis, cupones descuento, sorteos, concursos, ofertas España del 2019

Curso Completo de Hacking Ético 2019 (Udemy, 20h, Inglés)

By

Udemy
El presente curso busca servir como punto de referencia e iniciación al mundo del hacking ético, sin importar los conocimientos previos o perfil del alumno.

Aquí tienes todo el contenido:

Introduction to Ethical Hacking
  • What is an ethical hacker?
  • Terminology crash course pt. 1
  • Terminology crash course pt. 2
  • Terminology crash course pt. 3
  • Confidentiality, integrity, and availability
  • Legal considerations
Reconnaissance - Surveying the Attack Surface
  • Surveying the attack surface
  • Recon types and goals
  • Passive recon pt. 1
  • Passive recon pt. 2
  • Active recon
  • Recon walk-through and tools summary
  • DEMO - Maltego real world example
  • DEMO - FOCA to examine metadata
  • DEMO - Harvester
  • DEMO - Information collection using Recon-ng
Scanning and Enumeration - Getting Down to Business
  • Scanning & enumeration
  • Identifying active hosts pt. 1
  • Identifying active hosts pt. 2
  • Identifying active services
  • OS and services fingerprinting
  • Network mapping
  • Final thoughts
  • DEMO - Nmap syntax pt. 1
  • DEMO - Nmap syntax pt. 2
  • DEMO - Nmap hosts discovery
  • DEMO - Nmap service discovery
  • DEMO - Nmap scripts
  • DEMO - masscan
Network Presence
  • Network insecurity
  • Sniffing and spoofing
  • Sniffing tools
  • Spoofing, crypto, and wifi
  • DEMO - tcpdump
  • DEMO - Wireshark
  • DEMO - Ettercap
  • DEMO - Burp Suite
  • DEMO - Scapy
Attacking
  • Security overview pt. 1: Windows architecture
  • Security overview pt. 2: credentials security
  • Security overview pt. 3: memory corruption & exploitation
  • Windows hacking basics
  • Local access and privilege escalation
  • Dumping hashes and cracking passwords
  • Linux attacking basics pt. 1
  • Linux attacking basics pt. 2
  • References
  • DEMO - Windows msf exploit pt. 1
  • DEMO - Windows msf exploit pt. 2
  • DEMO - Post exploitation activities
  • DEMO - Mimikatz
  • DEMO - Dumping hashes
  • DEMO - Hashcat
  • DEMO - Konboot
  • DEMO - Post exploitation Windows cmd
  • DEMO - Post exploitation Windows powershell
  • DEMO - Online password cracking pt. 1
  • DEMO - Online password cracking pt. 2
  • DEMO - Attacking Linux targets pt. 1
  • DEMO - Attacking Linux targets pt. 2
Web Hacking
  • Introduction to web hacking
  • Web security architecture overview pt. 1
  • Web security architecture overview pt. 2
  • Attacking the web server pt. 1
  • Attacking the webserver pt. 2
  • Attacking the platform pt. 1
  • Attacking the platform pt. 2
  • Attacking the technology pt. 1
  • Attacking the technology pt. 2
  • OWASP top 10 pt. 1
  • OWASP top 10 pt. 2
  • Attacking the business logic pt. 1
  • Attacking the business logic pt. 2
  • Tools and methodology
  • References
  • DEMO - OWASP Mutillidae
  • DEMO - SQL injection
  • DEMO - SQLMAP intro
  • DEMO - SQLMAP practice
  • DEMO - Burpsuite
  • DEMO - Burpsuite XSS Hunter
  • DEMO - mitmproxy
  • DEMO - Skipfish pt.1
  • DEMO - Skipfish pt.2
Social Engineering - Hacking Humans
  • Social engineering basics
  • Social engineering methods
  • Tools and techniques pt. 1
  • Tools and techniques pt. 2
  • Tools and techniques pt. 3
  • Physical security considerations
  • Final thoughts
  • DEMO - Social engineering intro
  • DEMO - Social engineering toolkit prep
  • DEMO - Credential harvesting
  • DEMO - Website cloning
  • DEMO - Automating an attack
  • DEMO - Anti-virus evasion pt. 1
  • DEMO - Anti-virus evasion pt. 2
Tags:
muestras gratis |



MÁS INFORMACIÓN

Muestras gratis y regalos