Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.57 GB | Duration: 6h 1m
practice different types of cyber security attacks
What you'll learn
students will learn different kinds of cyber security attacks in practical way.
Description
cyber security attacks: a hand on approach
students will learn wide range of cyber security attacks by doing them ( hand on approach).
EXAMPLES OF ATTACKS THAT YOU WILL LEARN:
Malware attacks
Ping of Death Attack
ARP Poisoning Attack
MAC FLOODING ATTACK
SYN flooding attack DOS
ONLINE PASSWORD ATTACKS
Offline Password Attacks
REVERSE TCP ATTACK
Social Engineering attacks
cross-Site Scripting attacks
File inclusion attacks
SQL injection attacks
Command execution attacks
DNS Spoofing Attack
Smurf Attack DDOS
Random Source Attack
Ping of Death Attack
ARP Poisoning Attack
MAC FLOODING ATTACK
SYN flooding attack DOS
ONLINE PASSWORD ATTACKS
Offline Password Attacks
REVERSE TCP ATTACK
Social Engineering attacks
cross-Site Scripting
File inclusion
SQL injection
Command execution
DNS Spoofing Attack
Smurf Attack DDOS
Random Source Attack
YOU DONT NEED ANY KNOWLEDGE FOR THSI COURSE
you will learn all networking basics that you need for this course.
you will learn all system commands that you need for this course ( both windows commands and Linux commands).
you will learn how to download and install virtual platform like VMware and VirtualBox.
you will learn how download and setup windows 10 virtual machine.
you will lean how to download and setup Ubuntu Linux virtual machine.
you will learn how to download and setup kali Linux virtual machine.
you will learn how to download and setup Metasploitable2 virtual machine to practice different kinds of web application attacks.
we are going to build the lab that needed for this course. the only thing you need for this course is your computer with internet connection.
Screenshots
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction