Network Security Coding

Beginner 0(0 Penilaian) 0 Peserta mengikuti
Dibuat oleh Jundi Harsya Terakhir diperbarui Fri, 20-Aug-2021 Bahasa
Apa yang akan saya pelajari ?
  • Able to apply basic network security concepts, as well as forms and techniques for developing Network Security Applications
  • Mampu mengaplikasikan teknik-teknik pengamanan sistem jaringan komputer dan mampu merancang sistem jaringan komputer yang secure.

Topik untuk training ini
37 Materi & Ujian 00:00:00 Waktu
9 Materi & Ujian 00:00:00 Waktu
  • Introduction
  • Privileges
  • Type of attacks and potential targets
  • Changing privilege levels
  • Running external commands
  • Dangers of the system() function
  • Solutions
  • Indirect execution of commands
  • Conclusion
  • Introduction
  • The different areas
  • Detailed example
  • The stack and the heap
  • The registers
  • The functions
  • The prolog
  • The call
  • The Return
  • Disassembling
  • Creating a shellcode
  • With C language
  • Assembly calls
  • Locating the shellcode within memory
  • The null bytes problem
  • Building the shellcode
  • Generalization and last details
  • Conclusion
  • Introduction
  • Position in memory
  • Launch program
  • shell(s) problems
  • Prevention
  • Checking indexes
  • Using n functions
  • Validating the data in two steps
  • Using dynamic buffers
  • Conclusion
+ Tampilkan lebih banyak

A network is a collection of computers and other devices that can send data to and receive data from one another, more or less in real time. A network is often connected by wires, and the bits of data are turned into electromagnetic waves that move through the wires. However, wireless networks transmit data using radio waves; and most longdistance transmissions are now carried over fiber-optic cables that send light waves through glass filaments.

A network program is any application that uses a computer network to transfer information to and from other applications. All of these pieces of software share the ability to communicate with other computers, and in so doing, become more useful to the end-user and secure. Users generally trust network applications; therefore, these programs have much greater control over the computers on which they are running than a Web site has over the computers viewing it.

+ Tampilkan lebih banyak
Training lain yang sejenis
Tentang instruktur
  • 6 Ulasan
  • 54 Peserta
  • 8 Training
+ Tampilkan lebih banyak
Penilaian peserta
Rata-rata penilaian
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Rp 200.000 Rp 250000
Beli sekarang
Training ini terdiri dari:
  • 37 Materi & Ujian
  • Akses di smartphone dan laptop
  • Certificate of Excellence