Cart
Sign In

Sorry! Easy Learning Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs DVD is sold out.

Compare Products
Clear All
Let's Compare!

Easy Learning Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs DVD

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Normal Physical Delivery of Product
  • Stream:Ethical Hacking
  • Certification:No
  • Language:English
  • Format:DVD
  • Type:Physical Shipping
  • Duration:10 Hours
  • For queries and concerns drop an email to learning@snapdeal.com
  • SUPC: SDL478747151

Description

Duration : 10 Hours DOWNLOAD Size : 6.42 GB 2 DVDs 01 - Security Penetration Testing Introduction 02 - 1.0 Learning objectives 03 - 1.1 Introducing Ethical Hacking and Pen Testing 04 - 1.2 Getting Started with Ethical Hacking and Pen Testing 05 - 1.3 Understanding the Legal Aspects of Penetration Testing 06 - 1.4 Exploring Penetration Testing Methodologies 07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications 08 - 1.6 Building Your Own Lab 09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits 10 - 1.8 Understanding the Current Threat Landscape 11 - 2.0 Learning objectives 12 - 2.1 Installing Kali 13 - 2.2 Examining Kali Modules and Architecture 14 - 2.3 Managing Kali Services 15 - 3.0 Learning objectives 16 - 3.1 Understanding Passive Reconnaissance 17 - 3.2 Exploring Passive Reconnaissance Methodologies 18 - 3.3 Surveying Essential Tools for Passive Reconnaissance 19 - 4.0 Learning objectives 20 - 4.1 Understanding Active Reconnaissance 21 - 4.2 Exploring Active Reconnaissance Methodologies 22 - 4.3 Surveying Essential Tools for Active Reconnaissance 23 - 5.0 Learning objectives 24 - 5.1 Understanding Web Applications 25 - 5.2 Understanding Web Architectures 26 - 5.3 Uncovering Web Vulnerabilities 27 - 5.4 Exploring Methodologies for Testing Web Applications 28 - 5.5 Understanding the Exploitation of Web Applications 29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking 30 - 6.0 Learning objectives 31 - 6.1 Understanding Authentication and Authorization Mechanisms 32 - 6.2 Understanding Authentication and Authorization Attacks 33 - 6.3 Exploring Password Storage Mechanisms 34 - 6.4 Attacking Password Storage 35 - 6.5 Exploring Password Cracking 36 - 7.0 Learning objectives 37 - 7.1 Reviewing Database Fundamentals 38 - 7.2 Attacking a Database 39 - 7.3 Surveying Defenses to Mitigate Database Hacking 40 - Security Penetration Testing Summary

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.