Ethical Hacking: Denial of Service
MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch | Duration: 1h 33m
Genre: eLearning | Language: English + Sub | Size: 242 MB
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Ethical Hacker exam. In this course, learn about the history of the major DoS attacks and the types of techniques hackers use to cripple wired and wireless networks, applications, and services on the infrastructure. Instructor Malcolm Shore covers the basic methods hackers use to flood networks and damage services, the rising threat of ransomware like Cryptolocker, mitigation techniques for detecting and defeating DoS attacks, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Topics include: What is denial of service? TCP SYN, Smurf, and UDP flooding Deauthenticating a wireless host Flooding HTTP Using BlackEnergy Flooding a SIP server Detecting P2P attacks with PeerShark Defeating DoS attacks HOMEPAGE https://www.lynda.com/course-tutorials/Ethical-Hacking-2019-Denial-Service/5028660-2.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.