Comparte si te a gustado:

The Complete Cyber Security Course : Part 2 - Hacking

Publicado en 13 Feb 2021

Udemy UK


Lo que aprenderás


  • You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.

  • Requisitos


  • You should have completed two previous courses in order to continue learning. Course 1: Absolute Beginners Guide to Cybersecurity and Hacking Course 2: Absolute Beginners Guide to Cyber Security Part 1

  • Descripción


    You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.




    Section 1: Components of Hacking:


    Reconnaissance


    Scanning


    Gaining access


    Maintaining access


    Clearing tracks




    Section 2: Ethical hacking Mindmap


    Ethical hacking


    Places of ethical hacking


    Mind map




    Section 3: DoS and DDoS


    Denial of services


    Symptoms of dos attack


    Slow performance


    Increase in spam emails


    Unavailability of a resource


    Loss of access to a website


    Denial of access to any internet services


    Distributed denial of services (DDoS)


    DoS/DDoS attack techniques


    Land and flood attacks


    Service request floods




    Section 4: SYN flooding attach using hping3




    Section 5: Counter Measures


    Counter-measures


    DoS/DDoS countermeasure strategies


    Detech and neutralize handlers


    Monitoring the activities running on a system of network


    Deflect attacks by load balancing


    Mitigate attacks disabling unnecessary services


    Intrusion detection systems


    Wavelet analysis




    Section 6: Metasploit test


    Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make


    systems more secure. Metasploit is available for all popular operating systems.


    Vulnerability


    Exploit


    Payload


    Meterpreter


    ¿Para quién es este curso?


  • Students and Professionals interested in a career in Cyber Security and Ethical Hacking

  • This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

  • Debes tener en cuenta que los cupones duran maximo 4 dias o hasta agotar 1000 inscripciones,pero puede vencer en cualquier momento. Obten el curso con cupon haciendo clic en el siguiente boton:

    (Cupón válido para las primeras 1000 inscripciones): DF36F66931747C528C4E
    Udemy UK
    Tags:
    • #Cyber Security

    Articulos Relacionados

    content

    Sistema de asistencias en C# y SQLserver desde 0

    Proyecto funcional y terminado

    Ir al Curso
    content

    Python para no matemáticos: De 0 hasta reconocimiento facial

    Reconocimiento facial

    Ir al Curso
    content

    Xamarin básico: Una introducción al SDK de Microsoft

    Una guía en el desarrollo de aplicaciones con esta poderosa herramienta

    Ir al Curso
    Suscríbete a nuestro boletín
    Reciba los últimos Cupones y promociones (Solicitar Cupón)