Posted by : n0thing
Selasa, 06 Januari 2015
Halo smarter kali ini saya akan membagikan video tutorial bagus buat para pembaca semua, video tutorial course online mengenai Certified APT Defender oleh udemy langsung aja liat di bawah ini. :)
Deskripsi
This course is about all the latest cyber security threats. This courses is useful from corporate users to college students who want to understand apt attack, analyse and learn how to defend.
This course
- Distributed Denial of Service Attacks & Defence
- Advanced, Persistent Threats Analysis, Attack and Defence
- Exploitkits - Cyber Criminals Toolkit
- ShellShock - Latest Vulnerability to Hit Servers across world
- Android exploitation - Analysis with two Android Exploitation
APT is the current threat to most corporate, its is important people learn the attack, analyse and how to defend themselves.
Category:
IT & Software
WHAT'S IN THE COURSE?
- Over 15 lectures and 1.5 hours of content!
- you will be able to understand APT attacks, exploitpacks, ddos and learn how to defend against such attacks
- APT attack Analysis, Defence
- DDOS attack and defence
- Android Exploitation Attacks
- Ethical Hacking
- Cyber Criminals
COURSE REQUIREMENTS:
- Students have to learn some basic courses in Cyber Security like Certified White Hat Hacker Level 1 Basic
WHO SHOULD ATTEND?
- Corporate users - IT manager, CISO
- College students interested in security
- Network, system administrators
Materi pada Video Advanced Persistent Threat Defender :
Section 1 - Advanced Persistent Threat(Attack, Analysis & Defence)
- Lecture 1: Advanced Persistence Threat Presentation09:27
- Lecture 2: APT - Analysis of the Doc Exploit04:51
- Lecture 3: APT - Analysis of downloader05:55
- Lecture 4: APT - Analysis of Spyware/RAT06:35
Section 2 - Distributed Denial of Service Attack
- Lecture 5: DDos Theory09:30
- Lecture 6: DDos Demo04:34
Section 3 - ExploitPacks - Cyber Criminals Kits
- Lecture 7: ExploitKits Presentations08:11
- Lecture 8: ExploitPack Demo03:09
Section 4 - Point of Sale(POS) Attack, Analysis & Defence
- Lecture 9: POS Theory04:22
- Lecture 10: POS Demo02:36
Section 5 - ShellShock Vulnerability(bash) on Servers
- Lecture 11: SHELLSHOCK - Vulnerbility in Bash - Presentation05:39
- Lecture 12: ShellShock Exploitation10:42
Section 6 - Android Exploitation Exploitation
- Lecture 13: Android Exploitation Presentations05:19
- Lecture 14: Android Browser Exploitation Demo03:35
- Lecture 15: Android PDF Exploitation Demo03:17
Download Here
Posting Komentar