YoVDO

CeH Unit 5: Linux and Automated Security Assessment Tools

Offered By: Bill Buchanan OBE via YouTube

Tags

Linux Courses Ethical Hacking Courses VMware vCenter Courses

Course Description

Overview

Explore Linux systems and automated security assessment tools in this comprehensive 34-minute video lecture. Delve into essential topics such as VMware vCenter, file systems, key files, password files, key parameters, and shadow files. Learn about performance reconnaissance and Remote Procedure Call (RPC) in the context of ethical hacking. Gain valuable insights from Bill Buchanan OBE as he covers crucial aspects of Unit 5 in the Certified Ethical Hacker (CEH) curriculum, providing a solid foundation for understanding Linux security and automated assessment techniques.

Syllabus

Intro
VMware vCenter
File System
Key Files
Password File
Key Parameters
Shadow File
Performance Reconnaissance
RPC


Taught by

Bill Buchanan OBE

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX