CeH Unit 5: Linux and Automated Security Assessment Tools
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Explore Linux systems and automated security assessment tools in this comprehensive 34-minute video lecture. Delve into essential topics such as VMware vCenter, file systems, key files, password files, key parameters, and shadow files. Learn about performance reconnaissance and Remote Procedure Call (RPC) in the context of ethical hacking. Gain valuable insights from Bill Buchanan OBE as he covers crucial aspects of Unit 5 in the Certified Ethical Hacker (CEH) curriculum, providing a solid foundation for understanding Linux security and automated assessment techniques.
Syllabus
Intro
VMware vCenter
File System
Key Files
Password File
Key Parameters
Shadow File
Performance Reconnaissance
RPC
Taught by
Bill Buchanan OBE
Related Courses
Introduction to LinuxLinux Foundation via edX 操作系统原理(Operating Systems)
Peking University via Coursera Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera Information Security-3
Indian Institute of Technology Madras via Swayam Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera