Ethical Hacking - Malware Threats (Updated 1 - 2022)

seeders: 12
leechers: 8
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 45
  • Language: English

Files

[ CourseBoat.com ] Ethical Hacking - Malware Threats (Updated 1 - 2022)
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01. Course Overview
    • 01. Course Overview.mp4 (5.1 MB)
    02. Explaining Malware Threats
    • 02. The Hard Truth Behind Malware.mp4 (6.6 MB)
    • 03. What Is Malware.mp4 (9.3 MB)
    • 04. Malware Components.mp4 (5.4 MB)
    • 05. How Malware Gets in a System.mp4 (10.5 MB)
    • 06. Deployment Techniques.mp4 (16.3 MB)
    • 07. Demo-Task Manager.mp4 (22.7 MB)
    • 08. The Numbers Behind Malware.mp4 (12.8 MB)
    • 09. Learning Check.mp4 (3.4 MB)
    03. Discussing Advanced Persistent Threats APT
    • 10. Whats an APT.mp4 (14.2 MB)
    • 11. APT Characteristics.mp4 (6.8 MB)
    • 12. Lifecycle of an APT.mp4 (7.4 MB)
    • 13. Learning Check.mp4 (2.2 MB)
    04. Explaining Trojans
    • 14. Explaining Trojans.mp4 (11.6 MB)
    • 15. Whats the Goal.mp4 (9.2 MB)
    • 16. How Trojans Communicate and Hide.mp4 (6.4 MB)
    • 17. Demo-What Ports Are Listening.mp4 (8.8 MB)
    • 18. Indicators You Have a Trojan.mp4 (11.8 MB)
    • 19. Learning Check.mp4 (1.2 MB)
    05. Diving Deeper into Trojans
    • 20. How to Infect the Target.mp4 (10.5 MB)
    • 21. Demo-Using SET to Create a Trojan.mp4 (16.7 MB)
    • 22. Transmitting a Trojan Package.mp4 (6.7 MB)
    • 23. Evading Anti-virus.mp4 (2.3 MB)
    • 24. Demo-Create a Trojan with MSFVENOM.mp4 (5.8 MB)
    • 25. Learning Check.mp4 (2.2 MB)
    06. Describing the Types of Trojans
    • 26. Types of Trojans.mp4 (13.0 MB)
    • 27. Continuing Dales Top 10.mp4 (13.7 MB)
    • 28. More Trojans.mp4 (16.5 MB)
    • 29. Mobile and IoT Trojans.mp4 (9.7 MB)
    • 30. Demo-Creating a Trojan with TheFatRAT.mp4 (11.1 MB)
    • 31. Learning Checks.mp4 (1.8 MB)
    07. Explaining Worms and Viruses
    • 32. Explaining Worms and Virus.mp4 (18.3 MB)
    • 33. Types of Viruses and Worms.mp4 (15.8 MB)
    • 34. Demo-File Extension Hack .mp4 (19.2 MB)
    • 35. Lifecycle.mp4 (7.6 MB)
    • 36. The Signs and Why.mp4 (8.3 MB)
    • 37. Deployment.mp4 (4.9 MB)
    • 38. Real Fake Does It Matter.mp4 (4.9 MB)
    • 39. Learning Checks.mp4 (3.6 MB)
    08. Reviewing Fileless Malware
    • 40. What Is Fileless Malware.mp4 (5.7 MB)
    • 41. Fileless Techniques.mp4 (3.2 MB)
    • 42. Taxonomy.mp4 (5.8 MB)
    • 43. How Does Fileless Malware Work.mp4 (6.5 MB)
    • 44. Launching Fileless Malware.mp4 (9.5 MB)
    • 45. Learning Checks.mp4 (1.9 MB)
    09. Detecting Malware
    • 46. Detecting Malware.mp4 (14.0 MB)
    • 47. Types of Malware Analysis.mp4 (11.8 MB)
    • 48. Investigation Continues.mp4 (5.1 MB)
    • 49. Demo-Autoruns and VirusTotal.mp4 (19.1 MB)
    • 50. Investigation Still Continues.mp4 (4.7 MB)
    • 51. Tools.mp4 (1.4 MB)
    • 52. Demo-TCPView and DriverView.mp4 (34.2 MB)
    • 53. The Creation Process.mp4 (2.6 MB)
    • 54. Demo-JPS Virus Maker and IWMT.mp4 (9.8 MB)
    • 55. Learning Checks.mp4 (2.0 MB)
    10. Deploying Countermeasure for Malware
    • 56. Countermeasures.mp4 (11.9 MB)
    • 57. Master List.mp4 (10.0 MB)
    • 58. Learning Checks.mp4 (9.7 MB)
    11. Domain Summary
    • 59. Domain Summary.mp4 (3.9 MB)
    • Bonus Resources.txt (0.4 KB)
    • Exercise Files 01
      • demos.docx (73.9 KB)
      02
      • explaining-malware-threats-slides.pdf (5.0 MB)
      03
      • discussing-advanced-persistent-threats-apt-slides.pdf (1.7 MB)
      04
      • explaining-trojans-slides.pdf (3.0 MB)
      05
      • diving-deeper-into-trojans-slides.pdf (533.7 KB)
      06
      • describing-the-types-of-trojans-slides.pdf (6.7 MB)
      07
      • explaining-worms-and-viruses-slides.pdf (8.5 MB)
      08
      • reviewing-fileless-malware-slides.pdf (1.6 MB)
      09
      • detecting-malware-slides.pdf (7.8 MB)
      10
      • deploying-countermeasure-for-malware-slides.pdf (1.4 MB)
      11
      • domain-summary-slides.pdf (124.5 KB)
      • Study Guide.docx (73.9 KB)

Description

Ethical Hacking: Malware Threats (Updated 1/2022)



https://CourseBoat.com

Instructors: Dale Meredith
Duration: 5h 12m • 11 sections
Video: MP4 1280x720 44 KHz | English
Level: Intermediate | Size: 575 MB

Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 concerning malware.

What you'll learn
The easiest way to get into a system or network is…to get someone to let us in. Malware is on the rise due to the sheer volume of new devices and users being added daily to network infrastructures. In this course, Ethical Hacking: Malware Threats, you’ll learn how malware is created, utilized, and detected on networks. First, you’ll explore the different concepts and types of trojans, viruses, and worms. Next, you’ll discover malware concepts and components. Finally, you’ll learn the different countermeasures every organization should be following. When you’re finished with this course, you’ll have the skills and knowledge of malware threats needed for the CEH 312-50 exam.



Download torrent
573.7 MB
seeders:12
leechers:8
Ethical Hacking - Malware Threats (Updated 1 - 2022)


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
573.7 MB
seeders:12
leechers:8
Ethical Hacking - Malware Threats (Updated 1 - 2022)


Torrent hash: 0C920EE1AB93D31A7F6A7F77D502CE4A17C7E3B6