Ethical Hacking: Malware Threats [Pluralsight]
English | Size: 422.97 MB (443,513,470 Bytes)
Category: CBTs
The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid – an operating system? I’m about 99.999% sure you’ve already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We’ll talk about the various malware types, including viruses, Trojans, and worms. Now, we won’t leave you in despair, we’ll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
Contents:
ethical-hacking-malware-threats.zip
01 – The Hard Truth Behind Malware\01 – The Hard Truth Behind Malware.mp4
01 – The Hard Truth Behind Malware\02 – What Is Malware.mp4
01 – The Hard Truth Behind Malware\03 – The Numbers Behind Malware.mp4
01 – The Hard Truth Behind Malware\04 – How Does Malware Get In.mp4
01 – The Hard Truth Behind Malware\05 – Summary.mp4
02 – What’s a Trojan\01 – What’s a Trojan.mp4
02 – What’s a Trojan\02 – Trojans up Close.mp4
02 – What’s a Trojan\03 – What’s the Goal.mp4
02 – What’s a Trojan\04 – How Trojans Communicate and Hide.mp4
02 – What’s a Trojan\05 – Clues You Have a Trojan.mp4
02 – What’s a Trojan\06 – Summary.mp4
03 – Trojan Infections\01 – Trojan Infections.mp4
03 – Trojan Infections\02 – How to Infect the Target.mp4
03 – Trojan Infections\03 – DEMO – Creating a Trojan.mp4
03 – Trojan Infections\04 – Different Ways to Enter.mp4
03 – Trojan Infections\05 – Evading Anti-virus.mp4
03 – Trojan Infections\06 – Summary.mp4
04 – Types of Trojans\01 – Types of Trojans.mp4
04 – Types of Trojans\02 – SuperDale’s Top 10.mp4
04 – Types of Trojans\03 – DEMO – Beast.mp4
04 – Types of Trojans\04 – Summary.mp4
05 – Virus and Worms\01 – Virus and Worms.mp4
05 – Virus and Worms\02 – What’s the Difference.mp4
05 – Virus and Worms\03 – Types of Viruses & Worms.mp4
05 – Virus and Worms\04 – Lifecycle.mp4
05 – Virus and Worms\05 – Signs and the Why.mp4
05 – Virus and Worms\06 – Deployment.mp4
05 – Virus and Worms\07 – Real. Fake. Does It Matter.mp4
05 – Virus and Worms\08 – Summary.mp4
06 – Detecting Malware\01 – Detecting Malware.mp4
06 – Detecting Malware\02 – Creating a Virus Worm.mp4
06 – Detecting Malware\03 – Investigation of Malware.mp4
06 – Detecting Malware\04 – Tools in Our Utility-belt.mp4
06 – Detecting Malware\05 – Summary.mp4
07 – Counter Measures\01 – Countermeasures.mp4
07 – Counter Measures\02 – Virus Discovery Methods.mp4
07 – Counter Measures\03 – The Master List of Countermeasures.mp4
07 – Counter Measures\04 – Summary.mp4
DOWNLOAD:
http://rapidgator.net/file/619671b1f75c163daeba5e3872aad0de/Ethical_Hacking_-_Malware_Threats.part1.rar.html
http://rapidgator.net/file/e9bfd4814bcbed4dbda4e496532735af/Ethical_Hacking_-_Malware_Threats.part2.rar.html
http://rapidgator.net/file/da7e7101bd5aa3b3444c0375bccafa98/Ethical_Hacking_-_Malware_Threats.part3.rar.html
http://rapidgator.net/file/d85911075dc231f3119cc893b7c9bc2c/Ethical_Hacking_-_Malware_Threats.part4.rar.html
http://www.nitroflare.com/view/ABF2C4D38AB240D/Ethical_Hacking_-_Malware_Threats.part1.rar
http://www.nitroflare.com/view/2E935910BBE0842/Ethical_Hacking_-_Malware_Threats.part2.rar
http://www.nitroflare.com/view/B1F2D2892AD0D84/Ethical_Hacking_-_Malware_Threats.part3.rar
http://www.nitroflare.com/view/969E1155BD49DCF/Ethical_Hacking_-_Malware_Threats.part4.rar
If any links die or problem unrar, send request to http://goo.gl/aUHSZc
Leave a Reply