Coursera Certified Ethical Hacking v12 Specialization
1.58 GB | 00:23:26 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
01 introduction-to-cloud-computing (8.26 MB)
02 types-of-cloud-computing-services (6.61 MB)
03 responsibilities-in-on-premises (10.12 MB)
04 responsibilities-in-cloud (7.97 MB)
05 cloud-deployment-models (6.69 MB)
06 understanding-virtualization (6.36 MB)
07 cloud-security-control-layers (11.5 MB)
08 benefits-of-virtualization-in-the-cloud (4.88 MB)
09 cloud-computing-threats (9.85 MB)
10 cloud-computing-attacks (7.74 MB)
11 cloud-computing-security-tools (4.22 MB)
01 hacking-mobile-platforms (4.3 MB)
02 vulnerable-areas-for-mobiles (7.13 MB)
03 mobile-platform-vulnerabilities-and-risks (16.21 MB)
04 demo-hacking-mobile-phone (40.46 MB)
05 android-os (6.63 MB)
06 architecture-of-android-os (9.14 MB)
07 android-rooting-tools (7.8 MB)
08 android-pen-testing (5.1 MB)
09 counter-measures-for-mobile-security (14.24 MB)
01 what-is-cryptography (5.12 MB)
02 types-of-cryptography (16.35 MB)
03 demo-cryptographic-techniques (22.09 MB)
04 rsa-algorithm (8.92 MB)
05 steganography-and-its-types (9.45 MB)
06 how-steganography-works (8.77 MB)
07 use-of-algorithms-and-transformation (4.64 MB)
08 demo-perform-stegnography-using-open-stego (21.06 MB)
09 demo-perform-stegnography-using-snow-tool (17.46 MB)
01 denial-of-service-dos-attack (4.8 MB)
02 distributed-denial-of-service-ddos-attack (5.06 MB)
03 symptoms-of-dos-and-ddos-attacks (3 MB)
04 how-ddos-attacks-work (2.6 MB)
05 demo-perform-a-dos-attack-on-a-virtual-machine (27.97 MB)
06 categories-of-dos-and-ddos-attack-vectors (5.97 MB)
07 techniques-of-dos-and-ddos-attacks (12 MB)
08 what-is-botnet (5.52 MB)
09 techniques-to-protect-against-botnets (4.65 MB)
10 dos-and-ddos-protection-tools (3.87 MB)
01 sql-injection (4.79 MB)
02 scope-of-sql-injections (7.93 MB)
03 how-sql-query-works (10.46 MB)
04 types-of-sql-injection (6.46 MB)
05 demo-sql-injections (31.35 MB)
06 extract-information-through-error-messages (5.05 MB)
07 sql-injection-tools (8.85 MB)
08 how-to-defend-from-an-sql-injection-attack (12.36 MB)
09 demo-sql-injection-using-havij-tool (27.49 MB)
03 certificate-introduction-and-exam-details (17.01 MB)
04 course-introduction (8.65 MB)
05 course-outline (9.75 MB)
01 what-is-hacking (12.76 MB)
02 types-of-hackers (12.32 MB)
03 hacking-legal-or-illegal (7.59 MB)
01 introduction-to-cyber-security (9.22 MB)
02 stages-of-hacking (15.09 MB)
03 terminology-in-cyber-security-and-hacking (11.68 MB)
04 security-elements-in-cyber-security (9.41 MB)
05 penetration-testing (7.71 MB)
01 footprinting-or-reconnaissance (4.09 MB)
02 demo-gathering-information-from-various-online-resources (59.45 MB)
03 types-of-footprinting (8.16 MB)
04 website-footprinting (11.1 MB)
05 footprinting-methodology (9.43 MB)
06 e-mail-footprinting-methodology (10.87 MB)
07 finding-a-companys-public-and-restricted-data (12.59 MB)
08 footprinting-through-job-sites (6.33 MB)
09 archive-org-and-google-dorks (3.92 MB)
10 footprinting-pen-test-process (12.88 MB)
01 introduction-to-network-scanning (8.1 MB)
02 identify-targets-from-system-os (6.61 MB)
03 objectives-of-network-scanning (4.91 MB)
04 check-for-live-system (5.58 MB)
05 network-scanning-tool (3.22 MB)
06 demo-networking-scanning-with-advanced-ip-scanner-tool (13.59 MB)
07 vulnerability-scanning (6.38 MB)
08 what-is-enumeration (12.14 MB)
09 vulnerability-assessment (9.42 MB)
10 scanning-pen-testing (8.3 MB)
11 countermeasures-for-port-scanning (4.4 MB)
12 demo-port-scanning-using-nmap-tool (27.57 MB)
01 social-engineering (3.74 MB)
02 types-of-social-engineering (5 MB)
03 human-based-social-engineering (8 MB)
04 phishing (10.07 MB)
05 computer-based-social-engineering (4.86 MB)
06 mobile-based-social-engineering (13.95 MB)
08 phases-of-social-engineering-attacks (4.94 MB)
09 insider-threats (5.44 MB)
10 common-social-engineering-targets-and-defense-strategies (6.76 MB)
11 risk-of-social-engineering (4.23 MB)
12 demo-manual-phishing-attacks (31.86 MB)
13 tools-to-detect-phishing (4.24 MB)
14 how-to-detect-phishing-e-mails (5.15 MB)
15 how-to-defend-against-phishing-attacks (3.71 MB)
16 demo-phishing-attacks-using-kali-linux-automation-tools (24.17 MB)
01 web-penetration-testing (3.61 MB)
02 web-server-layers (13.78 MB)
03 web-application-attacks (6.78 MB)
04 why-do-web-servers-get-hacked (7.99 MB)
05 web-servers-architecture (7.8 MB)
06 web-application (6.91 MB)
07 web-application-architecture (11.34 MB)
08 demo-bypass-authentication (33.62 MB)
02 problem-statement (24.22 MB)
03 task-1 (11.81 MB)
04 task-2 (21.94 MB)
05 task-3 (13.53 MB)
06 task-4 (26.51 MB)
07 task-5 (18.14 MB)
08 task-6 (7.73 MB)
09 task-7 (21.77 MB)
10 task-8 (5.6 MB)
11 task-9 (10.04 MB)
12 task-10 (7.09 MB)
01 introduction-to-system-hacking (5.16 MB)
02 system-hacking-methodology (11.39 MB)
03 types-of-password-attacks (15.44 MB)
04 tools-for-password-attack (3.11 MB)
05 microsoft-authentication (7.84 MB)
06 password-salting (5.23 MB)
07 demo-how-attackers-crack-passwords-with-virtual-machines (44.3 MB)
01 malware-threats (6.38 MB)
02 ways-of-malware-propagation (8.65 MB)
03 what-is-a-virus (4.35 MB)
04 types-of-virus (7.28 MB)
05 how-does-a-computer-get-infected (4.91 MB)
06 how-to-defend-against-a-virus-attack (7.91 MB)
07 what-is-rootkit (5.95 MB)
08 what-is-a-worm (4.66 MB)
09 difference-between-worm-and-virus (4.64 MB)
10 trojan-and-trojan-horse (4.75 MB)
11 types-of-trojan (6.78 MB)
12 how-to-infect-systems-using-trojan (5.82 MB)
13 how-to-identify-trojan-infections (8.18 MB)
14 how-to-protect-from-trojans (3.92 MB)
15 malware-pen-testing (4.19 MB)
16 introduction-to-network-sniffing (6.98 MB)
17 working-of-network-sniffing (4.08 MB)
18 types-of-sniffing (5.88 MB)
19 vulnerable-protocols-in-sniffing (4.89 MB)
20 arp-poisoning (6.88 MB)
01 firewall-evading-ids-and-honeypots (6.25 MB)
02 types-of-firewalls (13.48 MB)
03 uses-of-firewall (10.35 MB)
04 what-is-an-ids-intrusion-detection-system (14.49 MB)
05 general-indications-of-system-intrusions (3.9 MB)
06 types-of-ids (5.8 MB)
07 intrusion-detection-tool-snort (5.23 MB)
08 what-is-honeypot (2.75 MB)
09 types-of-honeypots (6.78 MB)
10 detecting-honeypots (5.69 MB)
01 iot-hacking (3.69 MB)
02 how-does-iot-work (5.47 MB)
03 architecture-of-iot (5.4 MB)
04 iot-technologies-and-protocols (8.09 MB)
05 iot-communication-models (9.4 MB)
06 understanding-iot-attacks (10.66 MB)
07 iot-attack (9.77 MB)
08 iot-hacking-methodology (11.42 MB)
02 types-of-cloud-computing-services (6.61 MB)
03 responsibilities-in-on-premises (10.12 MB)
04 responsibilities-in-cloud (7.97 MB)
05 cloud-deployment-models (6.69 MB)
06 understanding-virtualization (6.36 MB)
07 cloud-security-control-layers (11.5 MB)
08 benefits-of-virtualization-in-the-cloud (4.88 MB)
09 cloud-computing-threats (9.85 MB)
10 cloud-computing-attacks (7.74 MB)
11 cloud-computing-security-tools (4.22 MB)
01 hacking-mobile-platforms (4.3 MB)
02 vulnerable-areas-for-mobiles (7.13 MB)
03 mobile-platform-vulnerabilities-and-risks (16.21 MB)
04 demo-hacking-mobile-phone (40.46 MB)
05 android-os (6.63 MB)
06 architecture-of-android-os (9.14 MB)
07 android-rooting-tools (7.8 MB)
08 android-pen-testing (5.1 MB)
09 counter-measures-for-mobile-security (14.24 MB)
01 what-is-cryptography (5.12 MB)
02 types-of-cryptography (16.35 MB)
03 demo-cryptographic-techniques (22.09 MB)
04 rsa-algorithm (8.92 MB)
05 steganography-and-its-types (9.45 MB)
06 how-steganography-works (8.77 MB)
07 use-of-algorithms-and-transformation (4.64 MB)
08 demo-perform-stegnography-using-open-stego (21.06 MB)
09 demo-perform-stegnography-using-snow-tool (17.46 MB)
01 denial-of-service-dos-attack (4.8 MB)
02 distributed-denial-of-service-ddos-attack (5.06 MB)
03 symptoms-of-dos-and-ddos-attacks (3 MB)
04 how-ddos-attacks-work (2.6 MB)
05 demo-perform-a-dos-attack-on-a-virtual-machine (27.97 MB)
06 categories-of-dos-and-ddos-attack-vectors (5.97 MB)
07 techniques-of-dos-and-ddos-attacks (12 MB)
08 what-is-botnet (5.52 MB)
09 techniques-to-protect-against-botnets (4.65 MB)
10 dos-and-ddos-protection-tools (3.87 MB)
01 sql-injection (4.79 MB)
02 scope-of-sql-injections (7.93 MB)
03 how-sql-query-works (10.46 MB)
04 types-of-sql-injection (6.46 MB)
05 demo-sql-injections (31.35 MB)
06 extract-information-through-error-messages (5.05 MB)
07 sql-injection-tools (8.85 MB)
08 how-to-defend-from-an-sql-injection-attack (12.36 MB)
09 demo-sql-injection-using-havij-tool (27.49 MB)
03 certificate-introduction-and-exam-details (17.01 MB)
04 course-introduction (8.65 MB)
05 course-outline (9.75 MB)
01 what-is-hacking (12.76 MB)
02 types-of-hackers (12.32 MB)
03 hacking-legal-or-illegal (7.59 MB)
01 introduction-to-cyber-security (9.22 MB)
02 stages-of-hacking (15.09 MB)
03 terminology-in-cyber-security-and-hacking (11.68 MB)
04 security-elements-in-cyber-security (9.41 MB)
05 penetration-testing (7.71 MB)
01 footprinting-or-reconnaissance (4.09 MB)
02 demo-gathering-information-from-various-online-resources (59.45 MB)
03 types-of-footprinting (8.16 MB)
04 website-footprinting (11.1 MB)
05 footprinting-methodology (9.43 MB)
06 e-mail-footprinting-methodology (10.87 MB)
07 finding-a-companys-public-and-restricted-data (12.59 MB)
08 footprinting-through-job-sites (6.33 MB)
09 archive-org-and-google-dorks (3.92 MB)
10 footprinting-pen-test-process (12.88 MB)
01 introduction-to-network-scanning (8.1 MB)
02 identify-targets-from-system-os (6.61 MB)
03 objectives-of-network-scanning (4.91 MB)
04 check-for-live-system (5.58 MB)
05 network-scanning-tool (3.22 MB)
06 demo-networking-scanning-with-advanced-ip-scanner-tool (13.59 MB)
07 vulnerability-scanning (6.38 MB)
08 what-is-enumeration (12.14 MB)
09 vulnerability-assessment (9.42 MB)
10 scanning-pen-testing (8.3 MB)
11 countermeasures-for-port-scanning (4.4 MB)
12 demo-port-scanning-using-nmap-tool (27.57 MB)
01 social-engineering (3.74 MB)
02 types-of-social-engineering (5 MB)
03 human-based-social-engineering (8 MB)
04 phishing (10.07 MB)
05 computer-based-social-engineering (4.86 MB)
06 mobile-based-social-engineering (13.95 MB)
08 phases-of-social-engineering-attacks (4.94 MB)
09 insider-threats (5.44 MB)
10 common-social-engineering-targets-and-defense-strategies (6.76 MB)
11 risk-of-social-engineering (4.23 MB)
12 demo-manual-phishing-attacks (31.86 MB)
13 tools-to-detect-phishing (4.24 MB)
14 how-to-detect-phishing-e-mails (5.15 MB)
15 how-to-defend-against-phishing-attacks (3.71 MB)
16 demo-phishing-attacks-using-kali-linux-automation-tools (24.17 MB)
01 web-penetration-testing (3.61 MB)
02 web-server-layers (13.78 MB)
03 web-application-attacks (6.78 MB)
04 why-do-web-servers-get-hacked (7.99 MB)
05 web-servers-architecture (7.8 MB)
06 web-application (6.91 MB)
07 web-application-architecture (11.34 MB)
08 demo-bypass-authentication (33.62 MB)
02 problem-statement (24.22 MB)
03 task-1 (11.81 MB)
04 task-2 (21.94 MB)
05 task-3 (13.53 MB)
06 task-4 (26.51 MB)
07 task-5 (18.14 MB)
08 task-6 (7.73 MB)
09 task-7 (21.77 MB)
10 task-8 (5.6 MB)
11 task-9 (10.04 MB)
12 task-10 (7.09 MB)
01 introduction-to-system-hacking (5.16 MB)
02 system-hacking-methodology (11.39 MB)
03 types-of-password-attacks (15.44 MB)
04 tools-for-password-attack (3.11 MB)
05 microsoft-authentication (7.84 MB)
06 password-salting (5.23 MB)
07 demo-how-attackers-crack-passwords-with-virtual-machines (44.3 MB)
01 malware-threats (6.38 MB)
02 ways-of-malware-propagation (8.65 MB)
03 what-is-a-virus (4.35 MB)
04 types-of-virus (7.28 MB)
05 how-does-a-computer-get-infected (4.91 MB)
06 how-to-defend-against-a-virus-attack (7.91 MB)
07 what-is-rootkit (5.95 MB)
08 what-is-a-worm (4.66 MB)
09 difference-between-worm-and-virus (4.64 MB)
10 trojan-and-trojan-horse (4.75 MB)
11 types-of-trojan (6.78 MB)
12 how-to-infect-systems-using-trojan (5.82 MB)
13 how-to-identify-trojan-infections (8.18 MB)
14 how-to-protect-from-trojans (3.92 MB)
15 malware-pen-testing (4.19 MB)
16 introduction-to-network-sniffing (6.98 MB)
17 working-of-network-sniffing (4.08 MB)
18 types-of-sniffing (5.88 MB)
19 vulnerable-protocols-in-sniffing (4.89 MB)
20 arp-poisoning (6.88 MB)
01 firewall-evading-ids-and-honeypots (6.25 MB)
02 types-of-firewalls (13.48 MB)
03 uses-of-firewall (10.35 MB)
04 what-is-an-ids-intrusion-detection-system (14.49 MB)
05 general-indications-of-system-intrusions (3.9 MB)
06 types-of-ids (5.8 MB)
07 intrusion-detection-tool-snort (5.23 MB)
08 what-is-honeypot (2.75 MB)
09 types-of-honeypots (6.78 MB)
10 detecting-honeypots (5.69 MB)
01 iot-hacking (3.69 MB)
02 how-does-iot-work (5.47 MB)
03 architecture-of-iot (5.4 MB)
04 iot-technologies-and-protocols (8.09 MB)
05 iot-communication-models (9.4 MB)
06 understanding-iot-attacks (10.66 MB)
07 iot-attack (9.77 MB)
08 iot-hacking-methodology (11.42 MB)
[center]
Screenshot
[/center]