Filter Keyword to...

Category: IT Professionals

Results Per Page :
C++ is a general purpose, object-oriented programming language with the C language as its core. In the course, you will learn how to use templates, containers, and STL utilities. It is one in a series of...
[READ MORE]
C++ is a general purpose, object-oriented programming language with the C language as its core. In the course, you will learn how to use templates, containers, and STL utilities. It is one in a series of courses that prepares learners for the C++ Institute Certified Professional Programmer certification.
C++ is a general purpose, object-oriented programming language with the C language as its core. In the course, you will learn how to use templates, containers, and STL utilities. It is one in a series of courses that prepares learners for the C++ Institute Certified Professional Programmer certification.
[READ LESS]
Produced by: SkillSoft
The next C++ standard is known as the C++14 standard. This course aims to familiarize the C++ programmer with C++11 features such as lambda expressions, smart pointers and valarray, as well as some of the...
[READ MORE]
The next C++ standard is known as the C++14 standard. This course aims to familiarize the C++ programmer with C++11 features such as lambda expressions, smart pointers and valarray, as well as some of the upcoming language changes introduced in the C++14 standard.
The next C++ standard is known as the C++14 standard. This course aims to familiarize the C++ programmer with C++11 features such as lambda expressions, smart pointers and valarray, as well as some of the upcoming language changes introduced in the C++14 standard.
[READ LESS]
Produced by: SkillSoft
C++ is a general purpose, object-oriented programming language with the C language as its core. The latest release is C++11. This course covers essential C++11 programming essentials, as well as containers,...
[READ MORE]
C++ is a general purpose, object-oriented programming language with the C language as its core. The latest release is C++11. This course covers essential C++11 programming essentials, as well as containers, data structures, and data types. It also features lambda expressions, iterators, and enumeration classes.
C++ is a general purpose, object-oriented programming language with the C language as its core. The latest release is C++11. This course covers essential C++11 programming essentials, as well as containers, data structures, and data types. It also features lambda expressions, iterators, and enumeration classes.
[READ LESS]
Produced by: SkillSoft
C++ includes a number of features for manipulating functions and types and it includes features such as concurrency for optimizing applications. This course covers using function adapters, assertions and type...
[READ MORE]
C++ includes a number of features for manipulating functions and types and it includes features such as concurrency for optimizing applications. This course covers using function adapters, assertions and type traits, and threads and concurrency in C++11. It also covers Smart pointers and valarray.
C++ includes a number of features for manipulating functions and types and it includes features such as concurrency for optimizing applications. This course covers using function adapters, assertions and type traits, and threads and concurrency in C++11. It also covers Smart pointers and valarray.
[READ LESS]
Produced by: SkillSoft
Boost includes a range of free, portable, and peer-reviewed C++ libraries and includes a number of libraries specific to C++11. This course covers a series of commonly used Boost libraries.
Boost includes a range of free, portable, and peer-reviewed C++ libraries and includes a number of libraries specific to C++11. This course covers a series of commonly used Boost libraries.
[READ LESS]
Produced by: SkillSoft
Cascading Style Sheets, commonly referred to as CSS, are a set of formatting conventions allowing you to standardize and enhance the appearance of a web site. By implementing CSS you can fully separate your...
[READ MORE]
Cascading Style Sheets, commonly referred to as CSS, are a set of formatting conventions allowing you to standardize and enhance the appearance of a web site. By implementing CSS you can fully separate your web site's presentation from its content, and give the site a consistent feel. Dreamweaver CS5 provides increased CSS support, with the ability to enter Inspect mode to view the styling associated with page elements. This course explores this new feature along with other CSS features including a set of prebuilt CSS layouts complete with educational inline comments, access to the Adobe CSS Advisor web site, and CSS management features that facilitate moving CSS rules from page to page and converting inline CSS to CSS rules. This course examines the process of creating, editing, and applying the various types of cascading style sheets and style rules. CSS visual layout tools and advanced CSS techniques are also covered.
Cascading Style Sheets, commonly referred to as CSS, are a set of formatting conventions allowing you to standardize and enhance the appearance of a web site. By implementing CSS you can fully separate your web site's presentation from its content, and give the site a consistent feel. Dreamweaver CS5 provides increased CSS support, with the ability to enter Inspect mode to view the styling associated with page elements. This course explores this new feature along with other CSS features including a set of prebuilt CSS layouts complete with educational inline comments, access to the Adobe CSS Advisor web site, and CSS management features that facilitate moving CSS rules from page to page and converting inline CSS to CSS rules. This course examines the process of creating, editing, and applying the various types of cascading style sheets and style rules. CSS visual layout tools and advanced CSS techniques are also covered.
[READ LESS]
Produced by: SkillSoft
This course will support the students understanding of Cassandra and NoSQL, and will highlight the differences between traditional RDBMS (SQL systems)and Cassandra (NoSQL). In addition the course will discuss...
[READ MORE]
This course will support the students understanding of Cassandra and NoSQL, and will highlight the differences between traditional RDBMS (SQL systems)and Cassandra (NoSQL). In addition the course will discuss the benefits of using Cassandra in a distributed framework to provide availability, scalability, and business continuity. The course will cover the mechanics and architecture of Casandra, the fundamentals of Cassandra data modeling and best practices, and the Cassandra Query Language (CQL). The first course serves as a foundation for course #2.
This course will support the students understanding of Cassandra and NoSQL, and will highlight the differences between traditional RDBMS (SQL systems)and Cassandra (NoSQL). In addition the course will discuss the benefits of using Cassandra in a distributed framework to provide availability, scalability, and business continuity. The course will cover the mechanics and architecture of Casandra, the fundamentals of Cassandra data modeling and best practices, and the Cassandra Query Language (CQL). The first course serves as a foundation for course #2.
[READ LESS]
Produced by: SkillSoft
Active Directory Certificate Services is a built-in Certificate Authority that is included with Windows Server 2008. Certificate Authorities are responsible for issuing certificates that validate the identity...
[READ MORE]
Active Directory Certificate Services is a built-in Certificate Authority that is included with Windows Server 2008. Certificate Authorities are responsible for issuing certificates that validate the identity of users and can be used to secure e-mail correspondence and for web-based authentication. This course discusses planning considerations for CA deployment as well as considerations for deploying storage area networks. High availability is another key consideration when implementing Windows Server 2008. This course covers planning for availability and scalability through the use of technologies such as Failover Clustering and Network Load Balancing. This course is one in a series that covers the objectives for Microsoft exam 70-646 PRO: Windows Server 2008, Server Administration. Passing this exam completes the requirements for the MCITPro: Server Administrator certification.
Active Directory Certificate Services is a built-in Certificate Authority that is included with Windows Server 2008. Certificate Authorities are responsible for issuing certificates that validate the identity of users and can be used to secure e-mail correspondence and for web-based authentication. This course discusses planning considerations for CA deployment as well as considerations for deploying storage area networks. High availability is another key consideration when implementing Windows Server 2008. This course covers planning for availability and scalability through the use of technologies such as Failover Clustering and Network Load Balancing. This course is one in a series that covers the objectives for Microsoft exam 70-646 PRO: Windows Server 2008, Server Administration. Passing this exam completes the requirements for the MCITPro: Server Administrator certification.
[READ LESS]
Produced by: SkillSoft
Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer...
[READ MORE]
Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer overflow attack methodology and tools, and countermeasures. This course is the sixteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold. This course looks at buffer overflow attack methodology and tools, and countermeasures. This course is the sixteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In...
[READ MORE]
Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Denial-of-service attacks reduce, restrict or prevent legitimate use of a computer's resources. Session hijacking is an attack where an attacker takes over a valid computer session between two computers. In this course, we look at denial of service and session hijacking attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the ninth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
During the enumeration phase of an attack, the attacker creates active connections to an organization's network environment and performs directed queries to gain additional information. In this course, we...
[READ MORE]
During the enumeration phase of an attack, the attacker creates active connections to an organization's network environment and performs directed queries to gain additional information. In this course, we look at enumeration and the types of enumeration an attacker can perform. We also look at encryption and the technologies and protocols used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fourth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
During the enumeration phase of an attack, the attacker creates active connections to an organization's network environment and performs directed queries to gain additional information. In this course, we look at enumeration and the types of enumeration an attacker can perform. We also look at encryption and the technologies and protocols used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fourth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
IDS systems are network hosts designed to monitor for signs of suspicious activity that may indicate an attack. Firewalls are the front-line of network defence against attacks, allowing or disallowing traffic...
[READ MORE]
IDS systems are network hosts designed to monitor for signs of suspicious activity that may indicate an attack. Firewalls are the front-line of network defence against attacks, allowing or disallowing traffic based on rules. A honeypot is a trap host set to either detect attacks, or deflect them away from more sensitive hosts. This course covers the tools and techniques used in evading these three types of network security. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
IDS systems are network hosts designed to monitor for signs of suspicious activity that may indicate an attack. Firewalls are the front-line of network defence against attacks, allowing or disallowing traffic based on rules. A honeypot is a trap host set to either detect attacks, or deflect them away from more sensitive hosts. This course covers the tools and techniques used in evading these three types of network security. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and...
[READ MORE]
Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and reconnaissance, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the second in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Footprinting is a set of intelligence gathering techniques whereby an attacker attempts to gain information about a target network and computer devices. In this course, we discuss footprinting and reconnaissance, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the second in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and...
[READ MORE]
Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a...
[READ MORE]
Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Most organizations have to think about mobile device management as more and more people are using either their own device or a company supplied device to access the organization's data. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities, including mobile device vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at how hackers target mobile devices and their users, the tools they use and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Web applications provide the interface between end users and web servers. In this course, we look at web application attacks, the associated tools and techniques used, and mitigation strategies. An ethical...
[READ MORE]
Web applications provide the interface between end users and web servers. In this course, we look at web application attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers This course is the eleventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Web applications provide the interface between end users and web servers. In this course, we look at web application attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers This course is the eleventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or...
[READ MORE]
When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or services. In this course we look at how hackers attack web servers, the tools they use, and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
When an organization's web servers are attacked, valuable information can be exposed. A web server attack may include data theft, or web site defacement, but can also pose threats to other servers or services. In this course we look at how hackers attack web servers, the tools they use, and the countermeasures you can implement to protect the organization. This course is one of a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Wireless networks pose unique security challenges and any wireless strategy must have security as a central requirement. In this course we look at hacking wireless networks, the associated tools and...
[READ MORE]
Wireless networks pose unique security challenges and any wireless strategy must have security as a central requirement. In this course we look at hacking wireless networks, the associated tools and techniques used, and mitigation strategies. This course is the thirteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Wireless networks pose unique security challenges and any wireless strategy must have security as a central requirement. In this course we look at hacking wireless networks, the associated tools and techniques used, and mitigation strategies. This course is the thirteenth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what...
[READ MORE]
Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an...
[READ MORE]
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and...
[READ MORE]
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the...
[READ MORE]
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or...
[READ MORE]
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at...
[READ MORE]
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the...
[READ MORE]
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs. Students taking this course can receive a solid basis in the Java programming language upon which to base continued work and training. The course features the Java Platform, Standard Edition 6 (Java SE 6) platform, and uses the Java SE Development Kit 6 (JDK 6) product.
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs. Students taking this course can receive a solid basis in the Java programming language upon which to base continued work and training. The course features the Java Platform, Standard Edition 6 (Java SE 6) platform, and uses the Java SE Development Kit 6 (JDK 6) product.
[READ LESS]
Produced by: LearnKey