VTC Ethical Hacking Videos


Introduction
Course Overview (04:54)

Ethical Hacking & Penetration Testing
What is Ethical Hacking? (04:58)
Types of Ethical Hacking (05:31)
Responsibilities of the Ethical Hacker (03:12)
Customer Expectations (04:04)
Skills of the Hacker (04:16)
Relevant Laws (04:54)
Preparation (04:46)
Types of Attacks (02:12)

Methodology Overview
Your Goals (02:34)
Reconnaissance [passive, active] (05:11)
Scanning (03:42)
Service Enumeration (03:05)
Vulnerability Assessment (03:35)
Vulnerability Exploitation (02:52)
Penetration & Access (03:24)
Privilege Escalation & Owning the Box (02:40)
Evading Defenses & Erasing Tracks (04:01)
Maintaining & Expanding Access (03:22)

Reconnaissance (Footprinting)
Passive Reconnaissance (05:03)
Using WHOIS & Other Tools (03:03)
Active Reconnaissance (04:10)
Active Reconnaissance Tools & Methods (04:55)
Putting It All Together (03:09)
Reconnaissance Demo (07:04)

Scanning
Scanning For Hosts (02:20)
TCP Connection Basics (04:14)
TCP Scan Types (07:18)
UDP & ICMP Scanning (03:44)
Scanning Demonstration using NMAP (05:19)

Port & Service Enumeration
Identifying Ports & Services (03:06)
OS Fingerprinting (02:57)
Popular Scanners (01:54)
Demonstration (05:15)

Data Enumeration
Data Enumeration (05:12)
SNMP Enumeration (07:14)
DNS Zone Transfers (06:36)
Windows Null Sessions (05:03)
NetBIOS Enumeration (06:44)
Active Directory Extraction (03:02)

Vulnerability Assessment
Vulnerabilities & Exploits (06:07)
OS Vulnerabilities (05:59)
Web Server Vulnerabilities (06:54)
Database Vulnerabilities (05:25)
TCP Stack Vulnerabilities (04:13)
Application Vulnerabilities (03:05)
Vulnerability Assesment (07:21)

Penetration/Access/Compromise Pt.1
Penetrating the System Pt.1 (05:28)
Penetrating the System Pt.2 (03:11)
Bypassing Access Controls (06:34)
Password Cracking Pt.1 (04:58)
Password Cracking Pt.2 (03:52)
Social Engineering (06:28)

Penetration/Access/Compromise Pt.2
Session Hijacking Pt.1 (05:46)
Session Hijacking Pt.2 (04:01)
Privilege Escalation (04:45)
Maintaining & Expanding Access (07:01)
System Compromise (04:40)

Evading Defenses & Erasing Tracks
Where Your Actions Recorded Pt.1 (02:04)
Where Your Actions Recorded Pt.2 (06:50)
Deleting Log Files & Other Evidence Pt.1 (03:16)
Deleting Log Files & Other Evidence Pt.2 (04:26)
Rootkits (05:21)
Steganography (06:58)
Evading IDS & Firewalls (04:29)

Introduction to Hacking Techniques Pt.1
Encryption (06:07)
Sniffers (04:15)
Wireless hacking (06:29)
SQL Injection (04:18)

Introduction to Hacking Techniques Pt.2
Buffer Overflows (05:19)
Rootkits (03:52)
Spoofing (04:33)
Denial of Service Attacks (03:59)
Web Hacking (07:00)

Popular Tools
nmap Pt.1 (06:38)
nmap Pt.2 (02:14)
SuperScan (04:30)
Nessus (06:27)

Penetration Test Demo
Penetration Test Demo Pt.1 (01:41)
Penetration Test Demo Pt.2 (00:59)
Penetration Test Demo Pt.3 (01:05)



http://rapidshare.com/files/356976336/VTC_-_Ethical_Hacking_and_Penetration_testing.part1.rar
http://rapidshare.com/files/356981516/VTC_-_Ethical_Hacking_and_Penetration_testing.part2.rar


 
 
Password :  macd3v

5 Responses to “VTC Ethical Hacking Videos”

Anonymous said...
February 21, 2011 at 9:59 AM

Hey bro what is the password for the rar archives.
And thanks for the youserial survey skip trick.


sameer_wani@rocketmail.com said...
February 22, 2011 at 8:51 AM

bro i m waiting what is the paswrd.


Shubham Mittal said...
February 24, 2011 at 8:30 AM

I highly apologize for the mistake. Well the password is "macd3v", without quotes.


Sorry once again.


Anonymous said...
March 27, 2011 at 7:10 AM

Thanks for This Nice Videos..... Well i m Downloading it. Keep the Nice Work going on....


Harry Sehgal said...
March 29, 2011 at 8:46 PM

There is some problem in These Videos. After Downloading and using the Password it says that Volume is Not Specific. So plz check this out and inform me..... You should update a new link.


Post a Comment