jueves, 21 de mayo de 2015

cursos libres de seguridad informatica




El material parece que es de hace 2 ó 3 años, pero los conceptos son válidos todavía.
Copio y pego el índice por  interesa.
General Knowledge – Start here. This knowledge will help you better understand how to go about learning the rest of the courses.
1.1 Purpose
1.2 Hacking
1.3 Programming
1.4 Networking Basics
Password Hacking – All types of password hacking attacks.
Modules
0. Introduction
1. Passwords
2. Password Cracking
3. Password Hash
4. Online vs. Offline
5. Attack Types
a. Dictionary
b. Bruteforce
c. Hybrid
d. Rainbow Tables
e. Salts
6. Alternative
7. Speed
8. Secure Passwords
Examples
1. Hash Types
2. Cracking Windows Passwords
3. Create Rainbow Tables
4. Database Dump
5. Web Form
6. Distributed Cracking
Network Hacking – Learn how to hack networks by going through the five phases starting with Reconnaissance.
1. Reconnaissance
DNS (Domain Name System)
Network Reconnaissance
DNS Cache Snooping
2. Network Scanning
3. Network Mapping
4. Metasploit
Metasploit Intro
Metasploit Basics
Reconnaissance Scanning
Vulnerability Scanners Part 1
Vulnerability Scanners Part 2
Vulnerability Scanners Part 3
5. Nessus
6. ARP Spoofing
Intro to ARP Spoofing
ARP Spoofing Examples
ARP Spoofing with DSNIFF
Web Hacking – Learn about all the different types of attacks against web applications, the most popular form of hacking today.
0. Web Hacking
1. Phishing
Tabnabbing
Tabnabbing Examples
2. Cross Site Scripting (XSS)
Reflected Cross Site Scripting (XSS)
Session Hijacking
Session Hijacking Examples
Stored Cross Site Scripting (XSS)
3. Cross Site Request Forgery (CSRF)
4. SQL Injection
SQL Injection Intro
Mysql Intro
Mysql Injection
Information Schema
5. Clickjacking
Facebook Hacking Course
1. Introduction
2. Phishing
What is phishing?
Creating The Phishing Page
Uploading Files
Uploading Situation
3. Social Engineering
What is Social Engineering?
Telephone Example
Telephone Example Analysis
Email
Spoofing
4. Malware
Introduction
Creating a Keylogger
Binding
Crypting
Keylogger Infecting
Trojans
Trojan Infecting
Spreading
5. Anonymizing
Anonymous Signup
Link Shortener
More Techniques
More Techniques Part 2

No hay comentarios:

Publicar un comentario