FileMood

Download [FreeUdemy.Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners

FreeUdemy Me Kali Linux Ethical Hacking and Pen Testing for Beginners

Name

[FreeUdemy.Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners

 DOWNLOAD Copy Link

Total Size

1.3 GB

Total Files

44

Hash

A89EF6B3DF1BB9EFF52BBE1380CDEE01797F7C60

/01 Introduction to Ethical Hacking and Security Industry Terminology/

001 Course Intro.mp4

24.2 MB

002 OSI Model and CIA.mp4

74.0 MB

003 Spoofing and Hijacking.mp4

40.6 MB

004 Cross Site Scripting Cross Site Request Forgery.mp4

45.1 MB

005 SQL Injection.mp4

18.0 MB

006 Wireless Network Security.mp4

32.2 MB

007 Common Malware.mp4

44.1 MB

/02 Kali 101/

008 About Kali and use cases.mp4

6.3 MB

009 Installing and configuring Kali on a VMware Virtual Machine.mp4

10.9 MB

010 Configuring the network adapter.mp4

9.0 MB

011 Booting Kali for the first time.mp4

7.9 MB

012 Basic commands with Kali and VMware.mp4

8.5 MB

013 Basic Kali Configuration.mp4

4.4 MB

014 Configuring your network.mp4

4.4 MB

015 Requesting and Configuring IP Addresses.mp4

8.3 MB

016 Managing services in Kali.mp4

6.2 MB

017 Managing Apache in Kali.mp4

12.7 MB

018 Managing SSH in Kali.mp4

4.7 MB

019 Managing MySQL in Kali.mp4

12.6 MB

020 Vulnerability Analysis Tools Overview.mp4

8.6 MB

021 Tools Overview.mp4

4.6 MB

022 Information Gathering Tools Overview.mp4

4.0 MB

023 Maltego.mp4

5.7 MB

024 Web Applications Tools Overview.mp4

6.8 MB

025 Burp Suite.mp4

5.3 MB

026 Password Attacks Tools Overview.mp4

3.1 MB

027 Ophcrack.mp4

4.7 MB

028 Armitage.mp4

6.4 MB

029 Cracking Wi-Fi Passwords on a WEP Network.mp4

190.8 MB

030 Top 10 Security Tools Overview.mp4

8.9 MB

/03 Penetration Testing Methodologies/

031 Penetration Testing.mp4

58.4 MB

032 Pen-Testing Techniques.mp4

79.6 MB

033 Scope of Pen-Testing.mp4

74.2 MB

034 Types of Pen-Testing and its Strategies Part 1.mp4

69.7 MB

035 Types of Pen-Testing and its Strategies Part 2.mp4

49.5 MB

036 Types of Pen-Testing and its Strategies Part 3.mp4

71.9 MB

037 Types of Pen-Testing and its Strategies Part 4.mp4

83.1 MB

/04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/

038 Injecting MySQL Logs.mp4

33.2 MB

039 Threat Actor Attribution.mp4

25.3 MB

040 Understanding Heap Overflow Protection.mp4

22.2 MB

041 Source Code Fuzzing Lab Crash Analysis using American Fuzzy Lop.mp4

49.9 MB

042 Intercepting Process Injection on Suspended Threads.mp4

52.4 MB

043 Bonus Lecture Get access to all our cybersecurity courses with a deep discount.html

0.5 KB

/

FreeUdemy.Me.html

0.1 KB

 

Total files 44


Copyright © 2024 FileMood.com