TorBT - Torrents and Magnet Links Search Engine

Lynda - Ethical Hacking - Trojans and Backdoors

File Name
Size
01. Introduction/01_01-Welcome.mp4
18 MB
01. Introduction/01_03-Hacking ethically.mp4
2.5 MB
01. Introduction/01_02-What you should know.mp4
1.1 MB
02. Trojan Overview/02_04-Recognize a Trojan attack.mp4
14 MB
02. Trojan Overview/02_02-Infecting a system with a Trojan.mp4
10 MB
02. Trojan Overview/02_01-Understanding Trojan behavior.mp4
7.6 MB
02. Trojan Overview/02_03-Wrap and conceal.mp4
6.8 MB
03. Getting into a System/03_05-Using ICMP.mp4
12 MB
03. Getting into a System/03_02-SSDP amplification attack.mp4
9.9 MB
03. Getting into a System/03_01-Blended threats.mp4
9.8 MB
03. Getting into a System/03_03-Trojan evolution.mp4
7.6 MB
03. Getting into a System/03_04-Disguising FTP, HTTP, and PING.mp4
4.8 MB
04. Rootkits/04_04-Detect, remove, and avoid rootkits.mp4
8.4 MB
04. Rootkits/04_03-Using rootkits.mp4
8.3 MB
04. Rootkits/04_01-Dissecting rootkits.mp4
6.0 MB
04. Rootkits/04_02-User mode and kernel mode.mp4
5.3 MB
05. Trojan Forensics/05_01-Detecting Trojans.mp4
25 MB
05. Trojan Forensics/05_02-Knowing active processes.mp4
18 MB
05. Trojan Forensics/05_04-Defend against Trojans.mp4
7.2 MB
05. Trojan Forensics/05_03-Identify and remove Trojans.mp4
5.2 MB
06. Conclusion/06_01-Next steps.mp4
2.8 MB