Ethical Hacking - Malware Threats By Dale-Meredith
dans Cybersecurity
Créé par
Academy
A propos de ce cours
##What you will learn
You will learn the following domains of ethical hacking
Information Security and Ethical Hacking Overview
Reconnaissance Techniques
System Hacking Phases and Attack Techniques
Network and Perimeter Hacking
Web Application Hacking
Wireless Network Hacking
Mobile Platform, IoT, and OT Hacking
Cloud Computing
Cryptography
Experience
No ethical hacking experience is required for this series, but it is recommended that you possess a strong understanding of TCP/IP and operating systems and have at least one year of experience working with networking technologies.
Commentaires (0)
1. Course Overview
1 Parties
1. Course Overview
5.10 MB
2. Explaining Malware Threats
8 Parties
1. The Hard Truth Behind Malware
6.66 MB
2. What Is Malware
8.94 MB
3. Malware Components
5.38 MB
4. How Malware Gets in a System
10.55 MB
5. Deployment Techniques
16.36 MB
6. Demo - Task Manager
22.70 MB
7. The Numbers Behind Malware
12.84 MB
8. Learning Check
3.37 MB
3. Discussing Advanced Persistent Threats (APT)
4 Parties
1. Whats an APT
14.24 MB
2. APT Characteristics
6.82 MB
3. Lifecycle of an APT
7.41 MB
4. Learning Check
2.21 MB
4. Explaining Trojans
6 Parties
1. Explaining Trojans
11.60 MB
2. Whats the Goal
9.26 MB
3. How Trojans Communicate and Hide
6.45 MB
4. Demo - What Ports Are Listening
8.82 MB
5. Indicators You Have a Trojan
11.82 MB
6. Learning Check
1.17 MB
5. Diving Deeper into Trojans
6 Parties
1. How to Infect the Target
10.50 MB
2. Demo - Using SET to Create a Trojan
16.57 MB
3. Transmitting a Trojan Package
6.70 MB
4. Evading Anti-virus
2.31 MB
5. Demo - Create a Trojan with MSFVENOM
5.84 MB
6. Learning Check
2.24 MB
6. Describing the Types of Trojans
6 Parties
1. Types of Trojans
13.02 MB
2. Continuing Dales Top 10
13.71 MB
3. More Trojans
16.31 MB
4. Mobile and IoT Trojans
9.72 MB
5. Demo - Creating a Trojan with TheFatRAT
11.16 MB
6. Learning Checks
1.80 MB
7. Explaining Worms and Viruses
8 Parties
1. Explaining Worms and Virus
18.39 MB
2. Types of Viruses and Worms
16.88 MB
3. Demo - File Extension Hack
3.34 MB
4. Lifecycle
7.67 MB
5. The Signs and Why
8.28 MB
6. Deployment
7.26 MB
7. Real Fake Does It Matter
4.97 MB
8. Learning Checks
3.64 MB
8. Reviewing Fileless Malware
6 Parties
1. What Is Fileless Malware
5.74 MB
2. Fileless Techniques
3.21 MB
3. Taxonomy
5.84 MB
4. How Does Fileless Malware Work
6.54 MB
5. Launching Fileless Malware
9.50 MB
6. Learning Checks
1.92 MB
09. Detecting Malware
10 Parties
01. Detecting Malware
14.05 MB
02. Types of Malware Analysis
11.40 MB
03. Investigation Continues
5.12 MB
04. Demo - Autoruns and VirusTotal
19.10 MB
05. Investigation Still Continues
4.76 MB
06. Tools
1.41 MB
07. Demo - TCPView and DriverView
37.55 MB
08. The Creation Process
2.61 MB
09. Demo - JPS Virus Maker and IWMT
9.82 MB
10. Learning Checks
1.97 MB
10. Deploying Countermeasure for Malware
3 Parties
1. Countermeasures
11.96 MB
2. Master List
10.01 MB
3. Learning Checks
9.75 MB
11. Domain Summary
1 Parties
1. Domain Summary
3.95 MB
0
0 Avis