Video description
In this Ethical Hacking - White Hat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks.
Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial.
By the time you have completed this video tutorial for White Hat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.
Publisher resources
Table of contents
- Introduction
- Getting The Background - Footprinting And Reconnaissance
- Networking Fundamentals
- Cryptography
- Scanning And Enumeration
- Penetration
- Malware - Trojans, Backdoors, Viruses And Worms
- Denial Of Service Attacks
- Web Application Hacking
- Wireless Networking
- Detection Evasion
- Programming Attacks
- About The Author
Product information
- Title: White Hat Hacking and Penetration Testing
- Author(s):
- Release date: October 2012
- Publisher(s): Infinite Skills
- ISBN: 9781771370349
You might also like
video
Advanced White Hat Hacking and Penetration Testing
In this Advanced White Hat Hacking And Penetration Testing training course, expert author Ric Messier takes …
video
Ethical Hacking - Orchestrating Attacks
Focus on the key attacks you can use to detect flaws in websites and networks. You …
video
WiFi Hacking: Wireless Penetration Testing for Beginners
This course includes an overview of the various types of wireless (802.11) networks, available encryption security …
book
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
The best-selling first edition of became the bible of Internet security by showing a generation of …