Whether you are a new security professional or a seasoned security engineer, you’ll need experience in working with the most commonly used security tools available. Veteran VTC author Bobby Rogers will show you how to use basic security tools that every security professional should be familiar with, such as Netcat, Nikto, Nessus, Nmap, and many others. You will learn how to use tools covering a wide range of security disciplines, such as penetration testing, computer forensics, and network security. Demonstrations include both Windows and Linux tools, and show how these tools are actually used in the daily jobs of security professionals everywhere.
Introduction
Course Introduction (05:40)
General Utilities
Secure Shell (ssh) (05:03)
VNC (05:31)
NX Client (06:01)
VMware pt. 1 (07:55)
VMware pt. 2 (08:32)
Host Security
Anti-Virus pt. 1 (03:28)
Anti-Virus pt. 2 (06:15)
Anti-Malware (06:33)
Linux Host Lockdown Tools (07:01)
Windows Host Lockdown Tools (SCAT) pt. 1 (08:21)
Windows Host Lockdown Tools (SCAT) pt. 2 (07:35)
Windows Utilities
Windows Command-Line Tools pt. 1 (06:51)
Windows Command-Line Tools pt. 2 (04:07)
Windows Firewall pt. 1 (05:05)
Windows Firewall pt. 2 (04:06)
MBSA (07:00)
MSConfig (06:07)
Linux Tools
User Tools pt. 1 (05:15)
User Tools pt. 2 (03:28)
tcpdump (05:51)
Inetd/TCP Wrappers & Xinetd pt. 1 (03:59)
Inetd/TCP Wrappers & Xinetd pt. 2 (04:50)
md5sum (05:51)
File Security Tools (07:41)
su & sudo (08:13)
Scanning & Reconnaisance Tools
Nmap pt. 1 (02:06)
Nmap pt. 2 (07:10)
Nessus pt. 1 (05:46)
Nessus pt. 2 (06:22)
Hping3 (07:19)
Look-at-Lan (06:06)
nslookup & dig (05:21)
Ping & Traceroute pt. 1 (04:56)
Ping & Traceroute pt. 2 (04:03)
Superscan pt. 1 (04:04)
Superscan pt. 2 (06:27)
Fing (04:57)
Network Security Tools
SmoothWall Firewall pt. 1 (08:28)
SmoothWall Firewall pt. 2 (07:22)
SmoothWall Firewall pt. 3 (07:21)
SmoothWall Firewall pt. 4 (05:39)
Linux Firewalls pt. 1 (02:14)
Linux Firewalls pt. 2 (07:20)
3rd Party Windows Firewalls pt. 1 (06:18)
3rd Party Windows Firewalls pt. 2 (08:38)
Wireshark pt. 1 (02:20)
Wireshark pt. 2 (07:43)
Wireless Security
Net Stumbler (05:20)
inSSIDer (04:43)
Wireless Capture Tools pt. 1 (03:44)
Wireless Capture Tools pt. 2 (03:56)
Web Tools
Google Hacking Techniques pt. 1 (03:55)
Google Hacking Techniques pt. 2 (07:36)
Nikto/Wikto (07:10)
NetCraft (04:02)
whois (06:02)
Paros Proxy (06:41)
Encryption Tools
TrueCrypt (07:55)
Encrypting Files in Linux pt. 1 (04:56)
Encrypting Files in Linux pt. 2 (03:53)
Microsoft Windows EFS (06:15)
Using Encrypted Email – PGP pt. 1 (06:30)
Using Encrypted Email – PGP pt. 2 (05:24)
Penetration Testing tools
Metasploit Framework pt. 1 (08:05)
Metasploit Framework pt. 2 (07:21)
Netcat (05:24)
John the Ripper pt. 1 (06:48)
John the Ripper pt. 2 (05:33)
Cain & Abel pt. 1 (04:01)
Cain & Abel pt. 2 (05:05)
Colasoft Packet Builder (08:13)
Computer Forensics Tools
Adepto (02:50)
Adepto Demonstration (05:53)
Ghost (06:34)
Autopsy (09:32)
Forensics Tool Kit pt. 1 (06:09)
Forensics Tool Kit pt. 2 (06:01)
Live Linux Distros
Backtrack 4 (05:46)
Helix (05:30)
Damn Vulnerable Linux (04:46)
Building a Security Toolbox
Creating a Security Toolbox (04:30)
Dual-Booting a Security Laptop pt. 1 (06:17)
Dual-Booting a Security Laptop pt. 2 (03:59)
Creating a Security USB Stick pt. 1 (06:03)
Creating a Security USB Stick pt. 2 (04:20)
Creating Your Own Live Security CD pt. 1 (04:59)
Creating Your Own Live Security CD pt. 2 (05:24)
Conclusion
Using Security Tools – Conclusion (05:50)
Resources (04:54)
Credits
About this Author (01:02)
Course Introduction (05:40)
General Utilities
Secure Shell (ssh) (05:03)
VNC (05:31)
NX Client (06:01)
VMware pt. 1 (07:55)
VMware pt. 2 (08:32)
Host Security
Anti-Virus pt. 1 (03:28)
Anti-Virus pt. 2 (06:15)
Anti-Malware (06:33)
Linux Host Lockdown Tools (07:01)
Windows Host Lockdown Tools (SCAT) pt. 1 (08:21)
Windows Host Lockdown Tools (SCAT) pt. 2 (07:35)
Windows Utilities
Windows Command-Line Tools pt. 1 (06:51)
Windows Command-Line Tools pt. 2 (04:07)
Windows Firewall pt. 1 (05:05)
Windows Firewall pt. 2 (04:06)
MBSA (07:00)
MSConfig (06:07)
Linux Tools
User Tools pt. 1 (05:15)
User Tools pt. 2 (03:28)
tcpdump (05:51)
Inetd/TCP Wrappers & Xinetd pt. 1 (03:59)
Inetd/TCP Wrappers & Xinetd pt. 2 (04:50)
md5sum (05:51)
File Security Tools (07:41)
su & sudo (08:13)
Scanning & Reconnaisance Tools
Nmap pt. 1 (02:06)
Nmap pt. 2 (07:10)
Nessus pt. 1 (05:46)
Nessus pt. 2 (06:22)
Hping3 (07:19)
Look-at-Lan (06:06)
nslookup & dig (05:21)
Ping & Traceroute pt. 1 (04:56)
Ping & Traceroute pt. 2 (04:03)
Superscan pt. 1 (04:04)
Superscan pt. 2 (06:27)
Fing (04:57)
Network Security Tools
SmoothWall Firewall pt. 1 (08:28)
SmoothWall Firewall pt. 2 (07:22)
SmoothWall Firewall pt. 3 (07:21)
SmoothWall Firewall pt. 4 (05:39)
Linux Firewalls pt. 1 (02:14)
Linux Firewalls pt. 2 (07:20)
3rd Party Windows Firewalls pt. 1 (06:18)
3rd Party Windows Firewalls pt. 2 (08:38)
Wireshark pt. 1 (02:20)
Wireshark pt. 2 (07:43)
Wireless Security
Net Stumbler (05:20)
inSSIDer (04:43)
Wireless Capture Tools pt. 1 (03:44)
Wireless Capture Tools pt. 2 (03:56)
Web Tools
Google Hacking Techniques pt. 1 (03:55)
Google Hacking Techniques pt. 2 (07:36)
Nikto/Wikto (07:10)
NetCraft (04:02)
whois (06:02)
Paros Proxy (06:41)
Encryption Tools
TrueCrypt (07:55)
Encrypting Files in Linux pt. 1 (04:56)
Encrypting Files in Linux pt. 2 (03:53)
Microsoft Windows EFS (06:15)
Using Encrypted Email – PGP pt. 1 (06:30)
Using Encrypted Email – PGP pt. 2 (05:24)
Penetration Testing tools
Metasploit Framework pt. 1 (08:05)
Metasploit Framework pt. 2 (07:21)
Netcat (05:24)
John the Ripper pt. 1 (06:48)
John the Ripper pt. 2 (05:33)
Cain & Abel pt. 1 (04:01)
Cain & Abel pt. 2 (05:05)
Colasoft Packet Builder (08:13)
Computer Forensics Tools
Adepto (02:50)
Adepto Demonstration (05:53)
Ghost (06:34)
Autopsy (09:32)
Forensics Tool Kit pt. 1 (06:09)
Forensics Tool Kit pt. 2 (06:01)
Live Linux Distros
Backtrack 4 (05:46)
Helix (05:30)
Damn Vulnerable Linux (04:46)
Building a Security Toolbox
Creating a Security Toolbox (04:30)
Dual-Booting a Security Laptop pt. 1 (06:17)
Dual-Booting a Security Laptop pt. 2 (03:59)
Creating a Security USB Stick pt. 1 (06:03)
Creating a Security USB Stick pt. 2 (04:20)
Creating Your Own Live Security CD pt. 1 (04:59)
Creating Your Own Live Security CD pt. 2 (05:24)
Conclusion
Using Security Tools – Conclusion (05:50)
Resources (04:54)
Credits
About this Author (01:02)
Download Links:
http://hotfile.com/dl/19611438/5f3fa7c/VTC20-20Using20Security20Tools.part1.rar.html
http://hotfile.com/dl/19611462/54dabbb/VTC20-20Using20Security20Tools.part2.rar.html
http://hotfile.com/dl/19611556/30bd1a8/VTC20-20Using20Security20Tools.part3.rar.html
http://hotfile.com/dl/19611660/7706099/VTC20-20Using20Security20Tools.part4.rar.html
http://hotfile.com/dl/19611695/85fdca6/VTC20-20Using20Security20Tools.part5.rar.html
http://hotfile.com/dl/19611462/54dabbb/VTC20-20Using20Security20Tools.part2.rar.html
http://hotfile.com/dl/19611556/30bd1a8/VTC20-20Using20Security20Tools.part3.rar.html
http://hotfile.com/dl/19611660/7706099/VTC20-20Using20Security20Tools.part4.rar.html
http://hotfile.com/dl/19611695/85fdca6/VTC20-20Using20Security20Tools.part5.rar.html
Cheers!!!

0 comments
Post a Comment