* Cantinho Satkeys

Refresh History
  • bruno mirandela: boa noite todos boa semana
    10 de Fevereiro de 2026, 21:42
  • FELISCUNHA: cereal killa  Boa noite amigo , eu percebi , aquele abraço  101041
    10 de Fevereiro de 2026, 20:48
  • cereal killa: boas feliscunha  49E09B4F, t5r76 so dava mais jeito  p0i8l p0i8l
    10 de Fevereiro de 2026, 19:04
  • FELISCUNHA: cereal killa   Já mudaste de clube ???   535reqef34
    10 de Fevereiro de 2026, 11:41
  • FELISCUNHA: Bom dia pessoal  49E09B4F
    10 de Fevereiro de 2026, 11:39
  • cereal killa: try65hytr raio da chuva nao acaba  3w45r  9Scp0 9Scp0
    09 de Fevereiro de 2026, 20:18
  • worrierblack: 4tj97u<z
    09 de Fevereiro de 2026, 03:09
  • worrierblack: hello
    09 de Fevereiro de 2026, 03:09
  • worrierblack: hello
    09 de Fevereiro de 2026, 03:09
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    08 de Fevereiro de 2026, 11:39
  • j.s.: tenham um bom fim de semana,   49E09B4F 49E09B4F
    07 de Fevereiro de 2026, 14:31
  • j.s.: dgtgtr a todos  49E09B4F
    07 de Fevereiro de 2026, 14:30
  • FELISCUNHA: ghyt74  pessoall 49E09B4F
    06 de Fevereiro de 2026, 12:00
  • JPratas: try65hytr A Todos  4tj97u<z  2dgh8i k7y8j0 classic
    06 de Fevereiro de 2026, 05:17
  • joca34: ola amigos alguem tem este cd Ti Maria da Peida -  Mãe negra
    05 de Fevereiro de 2026, 16:09
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    03 de Fevereiro de 2026, 11:46
  • Robi80g: CIAO A TUTTI
    03 de Fevereiro de 2026, 10:53
  • Robi80g: THE SWAP FILM WALT DISNEY
    03 de Fevereiro de 2026, 10:50
  • Robi80g: SWAP
    03 de Fevereiro de 2026, 10:50
  • j.s.: dgtgtr a todos  49E09B4F
    02 de Fevereiro de 2026, 16:50

Autor Tópico: The Absolute Tools Guide to Cyber Security and Hacking (Updated 32020)  (Lida 264 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 129146
  • Karma: +0/-0

The Absolute Tools Guide to Cyber Security and Hacking (Updated 3/2020)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 7.53 GB
Genre: eLearning Video | Duration: 18 lectures (16 hour, 43 mins) | Language: English

Master the Essential Hand-on Tools Used in Cyber Security and Hacking

What you'll learn

    You will go through a demo on SYN flooding attach using hping3 command
    You will go through a demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for many attackers and defenders.
    You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
    You will get clarity on web application security and that it is a branch of information security that deals specifically with security of websites, web applications and web services.
    You will get an introduction to Splunk's user interface and will be conversant with the UI post this session. We cover Navigating splunk web: splunk home, splunk bar, splunk web,getting date into splunk, how to specify data inputs, where splunk stores data, getting tutorial data into splunk, using splunk search, search actions and modes, search results tools, events, what are fields, extracted fields, find and select fields,run more targeted searches, use the search language and learn with search assistant.
    You will learn what SIEM and Log Management mean for businesses and how to use them more effectively to mitigate risk for your company.
    Assignment: You need to read two books and share the summary for completion of this course and to get the certificate
    Public and Private IP, Classes of IP: an end to end demo using a network simulation tool
    We cover Navigating splunk web: splunk home, splunk bar, splunk web and getting date into splunk
    You will learn how to specify data inputs, where splunk stores data and getting tutorial data into splunk
    You will start using splunk search, search actions and modes, search results tools, events, what are fields, extracted fields, find and select fields,run more targeted searches, use the search language and learn with search assistant.
    Start using Splunk's basic transforming commands and create reports, dashboards and alerts.
    You will start using Splunk Enterprise Security
    You can setup Splunk on your system, save and share reports and start creating alerts
    You will understand what vulnerabilities are and will learn how to mitigate them

Requirements

    You should have gone through two of our courses as a prerequisite, this will help you build you knowledge base properly. Course 1: The Absolute Beginners Guide on Cyber Security and Hacking, Course 2: A Guide to Security Information and Event Management -SIEM

Description

In this course on "The Absolute Tools Guide to Cyber Security and Hacking" you will learn most of the common tools used in IT Companies. We aim to keep adding more tools to make this course as comprehensive as possible.

Section1:

You will go through a live demo on SYN flooding attach using hping3 command

Section2:

You will go through a live demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for many attackers and defenders.

Section3:

You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.

Section4:

You will get clarity on web application security and that it is a branch of information security that deals specifically with security of websites, web applications and web services.

Section 5:

You will learn what SIEM and Log Management mean for businesses and how to use them more effectively to mitigate risk for your company.

Section 6:

Introduction to Splunk's user interface

Section 7:

Assignment: You need to complete reading two books. One is on Network Security and the other is on SIEM

Who this course is for:

    Those who are interested in a career in cyber security and ethical hacking
   

Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction