LinkedIn - Ethical Hacking Vulnerability Analysis
250.16 MB | 00:05:46 | mp4 | 1280X720 | 16:9
Genre:eLearning |
Language:
English
Files Included :
01 - Managing risk (4.97 MB)
02 - Discovering resources (924.03 KB)
03 - Hacking ethically Disclaimer (2.74 MB)
01 - Risks threats and vulnerabilities (10.9 MB)
02 - Recognizing common vulnerabilities (9.13 MB)
03 - Classifying vulnerabilities (7.7 MB)
04 - Assessing vulnerabilities (9.24 MB)
05 - Vulnerability management life cycle (13.84 MB)
06 - Modeling threats (9.41 MB)
07 - Challenge Threat modeling exercise (4.92 MB)
08 - Solution Threat modeling exercise (4.43 MB)
01 - Common Vulnerability Scoring System (16.49 MB)
02 - Common vulnerabilities and exposures (14.43 MB)
03 - Outsourcing vulnerability analysis (6.57 MB)
04 - Bug bounty white hat hacking (7.41 MB)
05 - Challenge The Temporal metric group (3.31 MB)
06 - Solution The Temporal metric group (7.33 MB)
01 - Installing Kali Linux (8.68 MB)
02 - Assessment tools (17.81 MB)
03 - Nikto demo (7.75 MB)
04 - Securing mobile devices (14.38 MB)
05 - Fuzz testing (12.89 MB)
01 - LAN vulnerability scanners (15.51 MB)
02 - Scanning the LAN (4.11 MB)
03 - Selecting a vulnerability assessment tool (4.99 MB)
04 - Updates and patches (6.64 MB)
05 - Firewalls and HIDS (8.71 MB)
06 - Vulnerability assessment reports (9.36 MB)
01 - Next steps (5.43 MB)
[center]
Screenshot
[/center]
Коментарии
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.