589689.xyz

Ethical_Hacking_-_Overview

  • 收录时间:2018-06-17 08:46:29
  • 文件大小:132MB
  • 下载次数:24
  • 最近下载:2020-08-21 17:47:07
  • 磁力链接:

文件列表

  1. 4_3._Supporting_Ethical_Hacking/16_Hacking_concepts.mp4 13MB
  2. 4_3._Supporting_Ethical_Hacking/13_Common_vulnerabilities.mp4 12MB
  3. 4_3._Supporting_Ethical_Hacking/14_Protecting_data.mp4 11MB
  4. 3_2._Information_Security_Controls/11_Creating_security_policies.mp4 11MB
  5. 3_2._Information_Security_Controls/09_Managing_incidents.mp4 10MB
  6. 2_1._Ethical_Hacking_Overview/04_Information_security.mp4 9MB
  7. 3_2._Information_Security_Controls/10_Exploring_security_policies.mp4 9MB
  8. 3_2._Information_Security_Controls/08_Defense_in_depth.mp4 8MB
  9. 3_2._Information_Security_Controls/07_Ethical_hacking_principles.mp4 8MB
  10. 2_1._Ethical_Hacking_Overview/06_Compare_attack_types.mp4 8MB
  11. 4_3._Supporting_Ethical_Hacking/12_Understand_vulnerabilities.mp4 7MB
  12. 2_1._Ethical_Hacking_Overview/05_Threats_and_attack_vectors.mp4 7MB
  13. 4_3._Supporting_Ethical_Hacking/17_Hacking_phases.mp4 7MB
  14. 4_3._Supporting_Ethical_Hacking/15_Penetration_testing_methodology.mp4 6MB
  15. 1_Introduction/01_Welcome.mp4 4MB
  16. 1_Introduction/03_Hacking_ethically.mp4 2MB
  17. 5_Conclusion/18_Next_steps.mp4 1MB
  18. 1_Introduction/02_What_you_should_know.mp4 679KB