Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Science
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Certified Ethical Hacker (CEH)

Ethical Hacking - Invasão de Sistemas (System Hacking)

Aprenda os principais conceitos sobre a Invasão de Sistemas, e se prepare para exames em Cibersegurança
Rating: 4.0 out of 54.0 (8 ratings)
56 students
Created by Ivan N. Gonçalves
Last updated 11/2019
Portuguese
30-Day Money-Back Guarantee

What you'll learn

  • Preparação para a Certificação Certified Ethical Hacker (CEH) na parte de System Hacking - Quebras de senhas (passwords cracking), Autenticação em Plataformas Windows, Execução de Aplicativos e Limpeza dos rastros da invasão.

Requirements

  • Noções de informática. Conhecer a técnica do Footprinting (Rastreamento de Pessoas e Dispositivos), Scanning e Enumeration é um diferencial.

Description

Neste curso o(a) aluno(a) aprenderá a principal etapa da atividade hacker, através de quebra de senhas, autenticações em plataformas windows, execução de aplicativos e limpeza de rastros e evidências.

O(a) aluno(a) aprenderá sobre as etapas da atividade hacker, incluindo senhas a serem evitadas, técnicas de quebras de senha, técnicas de sniffing, MITM (Man-in-the-Middle), injeção de Hashing, conceitos de Trojan, Spyware, Keyloggers, ataques de redes distribuídas, autenticação em plataformas microsoft por meio de SAM, protocolos NTLM e Kerberos, escalação de privilégios ao sistema (privilege escalation), backsoors, keyloggers, malwares e limpeza de evidências da invasão por meio do desativamento de auditoria do sistema, ocultamento de dados por atributo de arquivos e do fluxo de dados alternativos (ADS).

Para se defender dos Hackers, o Ethical Hacker (profisisonal de TI responsável pela defesa de sistemas) deve saber como eles (Hackers) pensam, e o Pentester, profissional de segurança responsável por encontrar vulnerabilidades em sistemas, deve conhecer como eles agem.

Who this course is for:

  • Profissionais de TI, estudantes e público em geral.

Course content

5 sections • 16 lectures • 7h 8m total length

  • Preview16:08

  • Senhas a serem evitadas
    19:42
  • Técnicas de Quebra de Senha
    35:21
  • Ataques Passivos Online
    49:53
  • Ataques Ativos Online
    29:55
  • Ataques Offline
    40:50
  • Opções para Obter Senhas
    12:40
  • Obtenção de Senhas com o uso do Pen Drive (USB Flash Drive)
    18:43

  • SAM (Security Accounts Manager)
    23:25
  • Protocolo NTLM
    15:48
  • Protocolo Kerberos
    26:57
  • Escalação de Privilégios
    30:32

  • Execução de Aplicativos
    40:00

  • Desativando a Auditoria do Sistema
    29:11
  • Apagando evidências com atributos de arquivos (file attributes)
    19:42
  • Apagando evidências com fluxos de dados alternativos (ADS)
    20:08

Instructor

Ivan N. Gonçalves
Professor de Matemática, Física, Finanças e Ethical Hacking
Ivan N. Gonçalves
  • 3.9 Instructor Rating
  • 82 Reviews
  • 339 Students
  • 23 Courses

Mestre em Física Aplicada, Professor de Matemática e Física, Consultor Jurídico, MBA em Finanças de Mercado e Ethical Hacker.

Participou do Treinamento Oficial do CEH (Certified Ethical Hacker) em 2016.

É professor de Matemática, Estatística, Física, Direito e outras disciplinas em instituições educacionais públicas e privadas, e também trabalha com consultoria para pessoas e empresas.


ENGLISH:

Master in Applied Physics, Professor of Mathematics and Physics, Legal Consultant, MBA in Market Finance and Ethical Hacker. Participated in the CEH (Certified Ethical Hacker) Official Training in 2016. He teaches Mathematics, Statistics, Physics and other disciplines in public and private educational institutions, and also works with consulting services for individuals and companies.



  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.