وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Master Penetration Testing and Ethical Hacking: From A to Z

سرفصل های دوره

Become a Cybersecurity Expert: Master Penetration Testing & Ethical Hacking - A Comprehensive A-to-Z Course - 2023 NEW!


01 - Understanding Metasploit Modules
  • 001 The mysterious working principle of Metasploit Framework

  • 02 - Getting Started with Real Metasploit
  • 001 Using and Understanding Important Console Commands in Metasploit
  • 002 Variables in Metasploit Framework

  • 03 - Understanding Internet Networks
  • 001 The main goal and importance of Network Security
  • 002 3 Main Ways to Make your Network Stronger
  • 003 A Chain is no stronger than its weakest link
  • 004 What is Network Maps in Cyber Security
  • 005 What is network protocol and what it does
  • 006 Layers of TCPIP Model
  • 007 How emails sent and received over internet
  • 008 PDU Explained
  • 009 Basic Use of Switch and Data Transmission
  • 010 2 Networks Talking with Router in Middle
  • 011 Main Guidelines for Network Security
  • 012 Analysis to Consider and Action Priority
  • 013 Threat Modeling

  • 04 - Understanding Linux Commands and Terminal
  • 001 Understanding Linux Commands and Pipes
  • 002 What is a Command
  • 003 Pipeline example #1
  • 004 Weird LS Command
  • 005 Different Linux Commands using with Pipe
  • 006 Understanding key concepts
  • 007 Finding Helpful manuals
  • 008 Linux Directories
  • 009 Linux Directories - Part 2

  • 05 - Exploring Linux Shell and System Components
  • 001 The bridge between You and Shell
  • 002 LS Command
  • 003 RD vs APD
  • 004 Filtering LS
  • 005 CP Command
  • 006 Tab Auto-completion
  • 007 SYM AND HRD Link Files
  • 008 Manipulating Files
  • 009 Introduction to Shell and Expansion
  • 010 Arithmetic Expressions with Shell
  • 011 Automating Folder Creation with Shell
  • 012 Quoting in Shell

  • 06 - Permissions and Processes in Linux
  • 001 Introduction to Permissions in Linux
  • 002 Differences between UID, GID and Shadow
  • 003 File and Dir Permissions
  • 004 A4.txt
  • 004 Examples with File Permissions
  • 005 After this video youll understand all LINUX Permissions
  • 006 Chmod

  • 07 - Process Management in Linux
  • 001 Fundamentals of Processes in System
  • 002 The Magic with PS Aux Command
  • 003 The Magic with TOP Command
  • 004 Foreground and Background Processes
  • 005 From Background to Foreground
  • 006 The Tutorial with Linux Process Signals
  • 007 Introduction to Packet Management Systems
  • 008 Why we need package management tools
  • 009 Package Management in Linux - Final

  • 08 - Networking in Linux
  • 001 Trcrt command
  • 002 Networking with Linux

  • 09 - Starting with Network Security and Networks Penetration Testing
  • 001 What is Wireshark and What youll learn in this section
  • 002 Introduction to Interface and Important Shortcuts
  • 003 The Importance of Promiscous Mode
  • 004 Displaying the Captured Data and Plugins
  • 005 Learning Key Concepts and Tools
  • 006 IDS, ACL and Firewalls
  • 007 Starting to Capture Traffic with Wireshark and Live Filters
  • 008 Understanding Signal Types
  • 009 Beginning to use Wireshark Display Filters
  • 010 Learning TCP States

  • 10 - Vulnerability Assessment and Information Gathering with Metasploit
  • 001 Information Gathering on TCP and UDP Protocols using Metasploit
  • 002 Two Methods to Hack Into FTP Servers
  • 003 Information Gathering and Finding Exploits of SMB
  • 004 Finding Vulnerabilities in PHP and Apache
  • 005 SSH User Enumeration
  • 006 Brute Forcing SSH and Information Gathering

  • 11 - Penetration Testing on Industrial Control System (ICS PENTEST)
  • 001 Creating Pentest Lab for Industrial Control Systems
  • 002 Pentesting Industrial Control Systems
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 28171
    حجم: 5604 مگابایت
    مدت زمان: 579 دقیقه
    تاریخ انتشار: ۱۹ دی ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید