Coursera - Introduction to Ethical Hacking Specialization

dkmdkm

U P L O A D E R
f9673f5a3bebeeeca408866141c49f6e.jpg

Free Download Coursera - Introduction to Ethical Hacking Specialization
Released 11/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + subtitle | Duration: 83 Lessons ( 15h 33m ) | Size: 3.83 GB
Unlock Your Path to Ethical Hacking Mastery. Master ethical hacking methodologies and tools to enhance cybersecurity effectiveness.

What you'll learn
Apply ethical hacking methodologies and frameworks, including the Penetration Testing Execution Standard (PTES).
Identify and exploit vulnerabilities in mobile devices, networks, and web applications through hands-on labs.
Understand cryptography and Public Key Infrastructure (PKI) to enhance security measures and counter cryptographic attacks.
Create detailed penetration testing reports and executive summaries to effectively communicate findings to stakeholders.
Skills you'll gain
Web Application Security
Security Report Writing
Post-Exploitation Techniques
Ethical Hacking Methodologies
Social Engineering Techniques
Cryptography and Public Key Infrastructure (PKI)
Penetration Testing Methodologies
Network Vulnerability Assessment
MITRE ATT&CK Framework
This Specialization is designed for post-graduate students aiming to develop ethical hacking skills. Through three comprehensive courses, you will explore methodologies, penetration testing techniques, and the MITRE ATT&CK framework, preparing you to effectively assess and enhance cybersecurity measures. By the end, you will be equipped to conduct thorough security evaluations and understand hacker behaviors, empowering you to make a significant impact in the cybersecurity industry.
Applied Learning Project
This specialization provides a deep dive into ethical hacking principles and practices. Through self-reflective readings, learners will critically engage with core concepts such as penetration testing, vulnerability assessment, and adversary behaviors. This approach encourages students to connect hacking theories to personal and ethical perspectives while exploring the Offensive Cyber Kill Chain, Tactics, Techniques, and Procedures (TTPs), and Indicators of Compromise (IOCs). The specialization also covers cryptography, network and web exploitation, mobile device security, and social engineering, reinforcing practical cybersecurity knowledge while fostering introspection and a deeper ethical understanding of real-world threats.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!



Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
541637676_oip.jpg

3.82 GB | 00:23:24 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
01 mobile-devices.mp4 (53.42 MB)
02 mobile-device-threat.mp4 (35.14 MB)
01 smartphone-pentest-framework-spf.mp4 (55.39 MB)
02 using-the-spf.mp4 (54.71 MB)
01 scanning-the-host-discovery.mp4 (30.88 MB)
02 os-identification.mp4 (22.75 MB)
01 port-scanning-part-1.mp4 (77.5 MB)
02 port-scanning-part-2.mp4 (79.53 MB)
03 vulnerability-scanning.mp4 (24.82 MB)
04 nessus-example.mp4 (29.65 MB)
01 introduction-to-exploitation.mp4 (10.32 MB)
02 sniffing-passwords.mp4 (28.33 MB)
03 password-hashing.mp4 (38.61 MB)
04 online-password-cracking.mp4 (12.81 MB)
05 offline-password-cracking.mp4 (40.63 MB)
01 vulnerability-exploitation.mp4 (46.83 MB)
02 polymorphic-metamorphic-code.mp4 (18.43 MB)
03 metasploit-examples.mp4 (25.05 MB)
04 meterpreter-demo-and-armitage.mp4 (11.47 MB)
01 web-exploitation.mp4 (61.42 MB)
02 sql-injection.mp4 (47.52 MB)
03 its-about-content.mp4 (69.86 MB)
01 database-mapping.mp4 (42.39 MB)
02 blind-sql.mp4 (34.03 MB)
01 wi-fi-exploitation.mp4 (44.9 MB)
02 wi-fi-connection-setup-and-authentication.mp4 (64.87 MB)
03 packet-structure-and-protocol.mp4 (31.18 MB)
04 beacons-and-probes.mp4 (28.35 MB)
05 wlan-vulnerabilities.mp4 (70.1 MB)
01 wep-hacking.mp4 (51.42 MB)
02 don-t-use-wep-what-about-wpa.mp4 (89 MB)
03 dictionary-attack-on-wpa-2.mp4 (15.66 MB)
01 rootkit.mp4 (43.76 MB)
02 kernel-space-vs-user-space.mp4 (27.97 MB)
03 system-calls.mp4 (16.84 MB)
01 tweaking-the-kernel.mp4 (33.03 MB)
02 lkms.mp4 (33.97 MB)
03 hooking-with-lkms.mp4 (29.45 MB)
04 a-real-rootkit.mp4 (23.9 MB)
01 os-security.mp4 (30.86 MB)
02 trust-and-os.mp4 (34.31 MB)
03 os-design.mp4 (41.33 MB)
01 access-control.mp4 (50.24 MB)
02 os-vulnerability.mp4 (49.9 MB)
03 setuid.mp4 (33.14 MB)
01 introduction.mp4 (52.03 MB)
02 x86-architecture.mp4 (36.08 MB)
03 memory-organization.mp4 (19.73 MB)
04 stack-behavior.mp4 (34.12 MB)
05 seg-fault.mp4 (9.93 MB)
01 modifying-execution.mp4 (37.02 MB)
02 understanding-shell-code.mp4 (24.99 MB)
03 shell-code-addressing.mp4 (30.85 MB)
04 creating-shell-code.mp4 (16.47 MB)
05 null-character.mp4 (18.3 MB)
01 race-conditions-fundamentals.mp4 (49.41 MB)
01 post-exploitation.mp4 (31.53 MB)
02 data-hiding.mp4 (31.89 MB)
03 hiding-your-presence-log-control.mp4 (25.47 MB)
01 island-hopping-pivoting.mp4 (71.88 MB)
02 persistence.mp4 (74.54 MB)
01 specialization-introduction-video-introduction-to-ethical-hacking.mp4 (42.33 MB)
01 hackers-a-broad-discussion.mp4 (42.63 MB)
02 generation-of-hackers.mp4 (186.24 MB)
03 psychology-of-hackers.mp4 (56.46 MB)
04 understanding-hackers.mp4 (85.55 MB)
01 pen-testing-a-broad-discussion.mp4 (64.36 MB)
02 why-pen-testing.mp4 (36.15 MB)
03 tools-and-testing.mp4 (55.18 MB)
01 penetration-testing.mp4 (53 MB)
02 ethical-hacking-methodologies.mp4 (40.61 MB)
01 the-penetration-testing-report-executive-summary.mp4 (82.98 MB)
02 the-penetration-testing-technical-report.mp4 (57.16 MB)
03 our-penetration-testing-scenario.mp4 (20.65 MB)
01 Secret-key-encryption.mp4 (45.86 MB)
02 public-key-cryptography.mp4 (40.3 MB)
01 public-key-infrastructure.mp4 (108.6 MB)
01 information-gathering.mp4 (70.14 MB)
02 social-engineering.mp4 (113.82 MB)
01 se-toolkit.mp4 (60.62 MB)
02 domain-name-service-reconnaissance.mp4 (66.49 MB)
03 dns-cache-poison.mp4 (12.24 MB)
04 more-ig-tools.mp4 (65.99 MB)
]
Screenshot
EFV25Rz7_o.jpg

gzgyNr36_o.jpg

V2hGEJ5E_o.jpg

YEYAx8HN_o.jpg

TBGmTgBC_o.jpg

WWYFelEr_o.jpg

fnD4j0ff_o.jpg

sqZtJM13_o.jpg

JUXASl0c_o.jpg

I1U0IuMH_o.jpg

cd0kDJWq_o.jpg

bcOV6Fkj_o.jpg

0yWdPxde_o.jpg

geuOWuBF_o.jpg

LsnuFEE2_o.jpg

wWYGJmgK_o.jpg

kp0W5i8n_o.jpg

MOLsZj5t_o.jpg

HBiMPMMI_o.jpg

cc5Dwx7k_o.jpg

LAXlUNqi_o.jpg

RLaSrJ2O_o.jpg

rVyBqm3Z_o.jpg

nubR7W6m_o.jpg

uPhacO3e_o.jpg

ysgZwLcK_o.jpg

lxoAbZtM_o.jpg

0VYMI5xf_o.jpg



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten