Brand Waali Quality, Bazaar Waali Deal!
Impact@Snapdeal
Gift Cards
Help Center
Sell On Snapdeal
Download App
Cart
Sign In

Sorry! ONLINE DELIVERY VIA EMAIL - Expert Training Security Penetration Testing 2018 Video Training 10 Hours Course DOWNLOAD Downloadable Content is sold out.

Compare Products
Clear All
Let's Compare!

ONLINE DELIVERY VIA EMAIL - Expert Training Security Penetration Testing 2018 Video Training 10 Hours Course DOWNLOAD Downloadable Content

This product has been sold out

We will let you know when in stock
notify me

Featured

Highlights

  • Disclaimer:Online Delivery via E-mail. No Physical Dispatch. Non-Cancellable Product
  • Stream:Ethical Hacking
  • Certification:No
  • Language:English
  • Format:Downloadable Content
  • Type:Online Fulfillment
  • Duration:10 Hours
  • For queries and concerns drop an email to learning@snapdeal.com
  • SUPC: SDL230949197

Description

Duration : 10 Hours DOWNLOAD Size : 6.42 GB ( 3 PART DOWNLOAD) 01 - Security Penetration Testing Introduction 02 - 1.0 Learning objectives 03 - 1.1 Introducing Ethical Hacking and Pen Testing 04 - 1.2 Getting Started with Ethical Hacking and Pen Testing 05 - 1.3 Understanding the Legal Aspects of Penetration Testing 06 - 1.4 Exploring Penetration Testing Methodologies 07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications 08 - 1.6 Building Your Own Lab 09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits 10 - 1.8 Understanding the Current Threat Landscape 11 - 2.0 Learning objectives 12 - 2.1 Installing Kali 13 - 2.2 Examining Kali Modules and Architecture 14 - 2.3 Managing Kali Services 15 - 3.0 Learning objectives 16 - 3.1 Understanding Passive Reconnaissance 17 - 3.2 Exploring Passive Reconnaissance Methodologies 18 - 3.3 Surveying Essential Tools for Passive Reconnaissance 19 - 4.0 Learning objectives 20 - 4.1 Understanding Active Reconnaissance 21 - 4.2 Exploring Active Reconnaissance Methodologies 22 - 4.3 Surveying Essential Tools for Active Reconnaissance 23 - 5.0 Learning objectives 24 - 5.1 Understanding Web Applications 25 - 5.2 Understanding Web Architectures 26 - 5.3 Uncovering Web Vulnerabilities 27 - 5.4 Exploring Methodologies for Testing Web Applications 28 - 5.5 Understanding the Exploitation of Web Applications 29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking 30 - 6.0 Learning objectives 31 - 6.1 Understanding Authentication and Authorization Mechanisms 32 - 6.2 Understanding Authentication and Authorization Attacks 33 - 6.3 Exploring Password Storage Mechanisms 34 - 6.4 Attacking Password Storage 35 - 6.5 Exploring Password Cracking 36 - 7.0 Learning objectives 37 - 7.1 Reviewing Database Fundamentals 38 - 7.2 Attacking a Database 39 - 7.3 Surveying Defenses to Mitigate Database Hacking 40 - Security Penetration Testing Summary

Terms & Conditions

The images represent actual product though color of the image and product may slightly differ.