Сообщение

[Pluralsight.com / Dale Meredith] Ethical Hacking: Malware Threats [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:23

Ethical Hacking: Malware Threats

Год выпуска: 11/2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com/courses/ethical-hacking-malware-threats
Автор: Dale Meredith
Продолжительность: 3:32
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
The Hard Truth Behind Malware
26m 22s
The Hard Truth Behind Malware 4m 43s
What Is Malware? 4m 0s
The Numbers Behind Malware 5m 1s
How Does Malware Get In? 11m 17s
Summary 1m 19s

What's a Trojan?
25m 47s
What's a Trojan? 1m 36s
Trojans up Close 4m 10s
What's the Goal? 6m 31s
How Trojans Communicate and Hide 6m 33s
Clues You Have a Trojan 5m 12s
Summary 1m 43s

Trojan Infections
29m 4s
Trojan Infections 1m 42s
How to Infect the Target 6m 34s
DEMO: Creating a Trojan 10m 9s
Different Ways to Enter 4m 49s
Evading Anti-virus 4m 10s
Summary 1m 38s

Types of Trojans
26m 22s
Types of Trojans 2m 31s
SuperDale's Top 10 14m 51s
DEMO: Beast 7m 38s
Summary 1m 20s

Virus and Worms
44m 39s
Virus and Worms 1m 51s
What's the Difference? 7m 13s
Types of Viruses & Worms 14m 0s
Lifecycle 4m 57s
Signs and the Why 3m 35s
Deployment 6m 47s
Real? Fake? Does It Matter? 4m 6s
Summary 2m 7s

Detecting Malware
34m 2s
Detecting Malware 1m 8s
Creating a Virus/Worm 13m 55s
Investigation of Malware 9m 46s
Tools in Our Utility-belt 7m 14s
Summary 1m 56s

Countermeasures
25m 50s
Countermeasures 2m 43s
Virus Discovery Methods 5m 40s
The Master List of Countermeasures 14m 29s
Summary 2m 57s
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 15fps, 215kbps
Аудио: AAC, 44.1kHz, 72kbps, stereo

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:23
Размер: 422.97 МБ
Размер: 443 513 470 байт
Сидеров: 127
Личеров: 0
Скачали: 0
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 11 месяцев 9 дней 17 часов 54 минуты 34 секунды назад
Последний личер: 1 год 4 месяца 15 дней 14 минут 28 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 20.11 КБ / Просмотров 2 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность