最新消息:请大家多多支持

Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos

其他教程 dsgsd 165浏览 0评论


Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos

English | mp4 | H264 1126×720 | AAC 2 ch | pdf, pptx | 7.14 GB eLearning
The primary incentive for an attacker to exploit a vulnerability, or series of vulnerabilities is to achieve a return on an investment (his/her time usually). This return need not be strictly monetary—an attacker may be interested in obtaining access to data, identities, or some other commodity that is valuable to them. The field of penetration testing involves authorized auditing and exploitation of systems to assess actual system security in order to protect against attackers. This requires thorough knowledge of vulnerabilities and how to exploit them. Thus, this course provides an introductory but comprehensive coverage of the fundamental methodologies, skills, legal issues, and tools used in white hat penetration testing, secure system administration, and incident response.
Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & VideosOffensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos
Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & VideosOffensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos
Download 百度云

你是VIP 1个月(1 month)赞助会员,

资源下载此资源仅限VIP下载,请先

转载请注明:0daytown » Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos

您必须 登录 才能发表评论!