Scroll To Top

Learn Hacking Techniques For It Professionals Video Training DVD

₹475₹999

Product Sold Out

We will notify you when product is available

MULTIMEDIA STORE

Learn Hacking Techniques For It Professionals Video Training DVD

Learn Hacking Techniques For It Professionals Video Training DVD Buy Learn Hacking Techniques For It Professionals Video Training Dvd at lowest prices in India. Shop Online Learn Hacking Techniques For It Professionals Video Training Dvd with best deals at Shopclues.com MULTIMEDIA STORE Product Id : 88381615
Product Discontinued
  • No Returns & Replacement

    If applicable customer can place a return/replacement request within 10 Days of order delivery.

    In case of damaged/missing/wrong product or empty parcel, the return/replacement request should be placed within 2 days of delivery.

    Know More
  • Payment Options: (Credit Card , Debit Card , Net Banking , Wallets , COD)
Sold by :

MULTIMEDIA STORE

THANJAVUR , Tamil Nadu

4.5 (5) Reviews
Visit Seller Store
Product Details:

Learn Hacking Techniques For It Professionals Video Training DVD

Introduction to Social Engineering and rogue software 04:19
Threat Modelling and Classification - notes for the examination
SE with BackTrack 07:06
Data encryption standard 06:51
Answer sample questions which you can find during the examination
Introduction to Risk Management 01:27
EXERCISE: Analyze the application
Block cipher modes 07:16
Blocking applications 07:35
Digital signature 05:56
Attack Methodologies - notes for the examination
EXERCISE: Application control rules
Risk Assessment - notes for the examination
Planning the PKI 08:33
Software updates 02:39
Asymmetric-key algorithms 08:11
Security issues 04:50
Symmetric and Asymmetric Ciphers - notes for the examination
ELGAMAL 02:05
Passive scanning 02:06
How to use Defence in depth model? 05:45
STRIDE: Tampering with Data 04:28
How to reduce losses? 05:24
Immutable Laws of Security - notes for the examination
Information security - level up 04:04
HASH functions 05:56
Security policy issues 04:50
System Center Configuration Manager 02:46
DiD: Demonstration 02:48
Introduction to Immutable laws of security - Law #1 04:35
Software restrictions policies 05:57
Collecting and analysing evidence 07:13
Certificate life cycle 06:24
EXERCISE: Risk Assessment 07:17
Advanced encryption standards 05:28
Automated SQL Injection 11:44
Stream Ciphers - RC4 03:40
Isolating applications 06:30
What will PKI allow you? 06:29
SQL Injection 08:10
Threat discovery #2 03:40
Program security assessment 05:10
The Defence in Depth Model - notes for the examination
How to reduce losses - notes for the examination
Ensuring continous availability 04:08
High risk users 03:23
Here’s what you’ll learn in this module 01:05
Forensics example 03:52
PKI Administration 07:29
Why are security solutions fallible? 05:42
site scripting - XSS
Application Attacks - notes for the examination
Introduction to cryptography 09:42
Local attacks 02:56
Public key infrastructure
MS Update 06:53
Attack Methods 06:42
Hybrid Schemes 06:24
Symmetric and asymmetric ciphers 06:13
STRIDE: Denial of Service 03:51
DiD: Perimeter and Physical Access Layers 06:06
EXERCISE: Engineering attacks 06:44
Program Security Assessment - notes for the examination
Public Key Infrastructure - Trust but verify - notes for the examination
How to protect users without interrupting their work - notes for the examination
Block ciphers 06:01
Introduction to threat modelling and classification 05:14
Information security 04:13
Introduction to Application Security 08:18
Symmetric-key algorithms 05:49
Automated attack targeting a service 05:23
Quiz 1
RSA 05:33
Fraud tools #2 06:32
Audit users and keep control accounts
Managing applicaltions
Target scanning and enumeration techniques #2 03:30
DiD: OS and LAN layers 06:39
Introduction to cryptology 02:12
DREAD: Risk assessment model 04:50
Attacks on applications 10:18
Social Engineering and Rogue Software - notes for the examination
Unsafe applications 10:11
CONFICKER: CASE STUDY 07:11
Automated user-targeting attack 04:31
What is security? 03:53
Blind SQL Injection 09:33
History of ciphers 10:57
Target scanning and enumeration techniques #1 05:52
Fraud tools #10 7:10
Introduction to risk assessment 06:20
BONUS: Examination - your voucher
Manipulation tactics 09:01
Rogue Software02:28
DREAD: Exploitability 05:24
DES-X 07:35
Security policies - introduction 01:56
Introduction to Disaster Recovery 01:33
EXERCISE: Certificates 08:37
Implementing public key infrastructure 05:39
Threat discovery #1 04:28
Introduction to Defence in depth 01:32
Threat modelling - STRIDE 04:06
STRIDE: Spoofing identity 05:03
======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================
Term


Shipping Banner

Key Feature

Brand :   MULTIMEDIA STORE

Educational CD Specificaton

Ideal Course :   Education

Media Specifications

Author(s) :   
Subject :   Programming

More Details

Maximum Retail Price (inclusive of all taxes) Rs.999
Common or Generic Name -
Net Contents / Net Quantity -
Manufacturer's Name and Address -
Packer's Name and Address -
Marketer's name and Address -
Importer's Name and Address -
Country of Origin / Manufacture / Assembly India

Rating & Reviews

0
5
0
4
0
3
0
2
0
1
0

0 Ratings, 0 Reviews

Please Note: Seller assumes all responsibility for the products listed and sold . If you want to report an intellectual property right violation of this product, please click here.
Some text some message..