Lynda - Ethical Hacking - Trojans and Backdoors
File List
- 05. Trojan Forensics/05_01-Detecting Trojans.mp4 24.7 MB
- 01. Introduction/01_01-Welcome.mp4 18.2 MB
- 05. Trojan Forensics/05_02-Knowing active processes.mp4 17.5 MB
- 02. Trojan Overview/02_04-Recognize a Trojan attack.mp4 14.0 MB
- 03. Getting into a System/03_05-Using ICMP.mp4 12.0 MB
- 02. Trojan Overview/02_02-Infecting a system with a Trojan.mp4 10.1 MB
- 03. Getting into a System/03_02-SSDP amplification attack.mp4 9.9 MB
- 03. Getting into a System/03_01-Blended threats.mp4 9.8 MB
- 04. Rootkits/04_04-Detect, remove, and avoid rootkits.mp4 8.4 MB
- 04. Rootkits/04_03-Using rootkits.mp4 8.3 MB
- 02. Trojan Overview/02_01-Understanding Trojan behavior.mp4 7.6 MB
- 03. Getting into a System/03_03-Trojan evolution.mp4 7.6 MB
- 05. Trojan Forensics/05_04-Defend against Trojans.mp4 7.2 MB
- 02. Trojan Overview/02_03-Wrap and conceal.mp4 6.8 MB
- 04. Rootkits/04_01-Dissecting rootkits.mp4 6.0 MB
- 04. Rootkits/04_02-User mode and kernel mode.mp4 5.3 MB
- 05. Trojan Forensics/05_03-Identify and remove Trojans.mp4 5.2 MB
- 03. Getting into a System/03_04-Disguising FTP, HTTP, and PING.mp4 4.8 MB
- 06. Conclusion/06_01-Next steps.mp4 2.8 MB
- 01. Introduction/01_03-Hacking ethically.mp4 2.5 MB
- 01. Introduction/01_02-What you should know.mp4 1.1 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.