Lynda - Ethical Hacking - Trojans and Backdoors

Lynda - Ethical Hacking - Trojans and Backdoors

File Size: 194.33 MB

Creat Time: 2016-12-12 01:45:22

Last Active: 2024-11-26 20:27:13

Active Degree: 307

Magnet Link: Magnet LinkMagnet Link

Statement: This site does not provide download links, only text displays, and does not contain any infringement.

File List:

  1. 05. Trojan Forensics/05_01-Detecting Trojans.mp4 25.28 MB
  2. 01. Introduction/01_01-Welcome.mp4 18.59 MB
  3. 05. Trojan Forensics/05_02-Knowing active processes.mp4 17.94 MB
  4. 02. Trojan Overview/02_04-Recognize a Trojan attack.mp4 14.35 MB
  5. 03. Getting into a System/03_05-Using ICMP.mp4 12.30 MB
  6. 02. Trojan Overview/02_02-Infecting a system with a Trojan.mp4 10.31 MB
  7. 03. Getting into a System/03_02-SSDP amplification attack.mp4 10.18 MB
  8. 03. Getting into a System/03_01-Blended threats.mp4 9.99 MB
  9. 04. Rootkits/04_04-Detect, remove, and avoid rootkits.mp4 8.65 MB
  10. 04. Rootkits/04_03-Using rootkits.mp4 8.47 MB
  11. 02. Trojan Overview/02_01-Understanding Trojan behavior.mp4 7.81 MB
  12. 03. Getting into a System/03_03-Trojan evolution.mp4 7.78 MB
  13. 05. Trojan Forensics/05_04-Defend against Trojans.mp4 7.40 MB
  14. 02. Trojan Overview/02_03-Wrap and conceal.mp4 6.93 MB
  15. 04. Rootkits/04_01-Dissecting rootkits.mp4 6.18 MB
  16. 04. Rootkits/04_02-User mode and kernel mode.mp4 5.42 MB
  17. 05. Trojan Forensics/05_03-Identify and remove Trojans.mp4 5.34 MB
  18. 03. Getting into a System/03_04-Disguising FTP, HTTP, and PING.mp4 4.87 MB
  19. 06. Conclusion/06_01-Next steps.mp4 2.89 MB
  20. 01. Introduction/01_03-Hacking ethically.mp4 2.53 MB
  21. 01. Introduction/01_02-What you should know.mp4 1.09 MB