Lynda - Ethical Hacking - Trojans and Backdoors
- 收录时间:2018-02-24 17:31:32
- 文件大小:190MB
- 下载次数:188
- 最近下载:2021-01-19 13:55:35
- 磁力链接:
-
文件列表
- 05. Trojan Forensics/05_01-Detecting Trojans.mp4 25MB
- 01. Introduction/01_01-Welcome.mp4 18MB
- 05. Trojan Forensics/05_02-Knowing active processes.mp4 18MB
- 02. Trojan Overview/02_04-Recognize a Trojan attack.mp4 14MB
- 03. Getting into a System/03_05-Using ICMP.mp4 12MB
- 02. Trojan Overview/02_02-Infecting a system with a Trojan.mp4 10MB
- 03. Getting into a System/03_02-SSDP amplification attack.mp4 10MB
- 03. Getting into a System/03_01-Blended threats.mp4 10MB
- 04. Rootkits/04_04-Detect, remove, and avoid rootkits.mp4 8MB
- 04. Rootkits/04_03-Using rootkits.mp4 8MB
- 02. Trojan Overview/02_01-Understanding Trojan behavior.mp4 8MB
- 03. Getting into a System/03_03-Trojan evolution.mp4 8MB
- 05. Trojan Forensics/05_04-Defend against Trojans.mp4 7MB
- 02. Trojan Overview/02_03-Wrap and conceal.mp4 7MB
- 04. Rootkits/04_01-Dissecting rootkits.mp4 6MB
- 04. Rootkits/04_02-User mode and kernel mode.mp4 5MB
- 05. Trojan Forensics/05_03-Identify and remove Trojans.mp4 5MB
- 03. Getting into a System/03_04-Disguising FTP, HTTP, and PING.mp4 5MB
- 06. Conclusion/06_01-Next steps.mp4 3MB
- 01. Introduction/01_03-Hacking ethically.mp4 2MB
- 01. Introduction/01_02-What you should know.mp4 1MB