[Pluralsight.com / Dale Meredith] Ethical Hacking: Malware Threats [2015, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
0 0 422.97 МБ
Аватара пользователя
Сообщения: 22944
Зарегистрирован: 13 янв 2016, 22:10

[Pluralsight.com / Dale Meredith] Ethical Hacking: Malware Threats [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:23

Ethical Hacking: Malware Threats

Год выпуска: 11/2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com/courses/ethical-hacking-malware-threats
Автор: Dale Meredith
Продолжительность: 3:32
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-pa ... al-hacking
The Hard Truth Behind Malware
26m 22s
The Hard Truth Behind Malware 4m 43s
What Is Malware? 4m 0s
The Numbers Behind Malware 5m 1s
How Does Malware Get In? 11m 17s
Summary 1m 19s

What's a Trojan?
25m 47s
What's a Trojan? 1m 36s
Trojans up Close 4m 10s
What's the Goal? 6m 31s
How Trojans Communicate and Hide 6m 33s
Clues You Have a Trojan 5m 12s
Summary 1m 43s

Trojan Infections
29m 4s
Trojan Infections 1m 42s
How to Infect the Target 6m 34s
DEMO: Creating a Trojan 10m 9s
Different Ways to Enter 4m 49s
Evading Anti-virus 4m 10s
Summary 1m 38s

Types of Trojans
26m 22s
Types of Trojans 2m 31s
SuperDale's Top 10 14m 51s
DEMO: Beast 7m 38s
Summary 1m 20s

Virus and Worms
44m 39s
Virus and Worms 1m 51s
What's the Difference? 7m 13s
Types of Viruses & Worms 14m 0s
Lifecycle 4m 57s
Signs and the Why 3m 35s
Deployment 6m 47s
Real? Fake? Does It Matter? 4m 6s
Summary 2m 7s

Detecting Malware
34m 2s
Detecting Malware 1m 8s
Creating a Virus/Worm 13m 55s
Investigation of Malware 9m 46s
Tools in Our Utility-belt 7m 14s
Summary 1m 56s

25m 50s
Countermeasures 2m 43s
Virus Discovery Methods 5m 40s
The Master List of Countermeasures 14m 29s
Summary 2m 57s
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 15fps, 215kbps
Аудио: AAC, 44.1kHz, 72kbps, stereo
У вас нет необходимых прав для просмотра вложений в этом сообщении.