Career academy - Ethical hacker V6 DVD 6 | 1.38 GB
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50Module 21 - Physical Security
Physical Security
Security Facts
Understanding Physical Security
Physical Security 02
What Is the Need for Physical Security
Who Is Accountable for Physical Security
Factors Affecting Physical Security
Physical Security Checklist 01
Physical Security Checklist: Company Surroundings
Gates
Security Guards
Physical Security Checklist: Premises
CCTV Cameras
Physical Security Checklist: Reception
Physical Security Checklist: Server
Physical Security Checklist: Workstation Area
Physical Security Checklist: Wireless Access Points
Physical Security Checklist: Other Equipment
Physical Security Checklist: Access Control
Physical Security Checklist: Biometric Devices
Biometric Identification Techniques
Authentication Mechanisms
Authentication Mechanisms Challenges: Biometrics
Faking Fingerprints
Physical Security Checklist 02
Smart Cards
Security Token
Computer Equipment Maintenance
Wiretapping
Remote Access
Locks
Lock Picking
Lock Picking Tools
Information Security
EPS (Electronic Physical Security)
Wireless Security
Laptop Theft Statistics for 2007
Statistics for Stolen and Recovered Laptops
Laptop Theft
Laptop Security Tools
Laptop Tracker - Xtool Computer Tracker
Laptop Security Countermeasures
Mantrap
TEMPEST
Challenges in Ensuring Physical Security
Spyware Technologies
Physical Security: Lock Down USB Ports
Module 21 Review
Module 22 - Linux Hacking
Linux Hacking
Why Linux
Linux - Basics
Linux Live CD-ROMs
Basic Commands of Linux: Files & Directories
Linux Networking Commands
Directories in Linux
Installing, Configuring, and Compiling Linux Kernel
How to Install a Kernel Patch
Compiling Programs in Linux
Make Files
Make Install Command
Linux Vulnerabilities
Chrooting
Why is Linux Hacked
How to Apply Patches to Vulnerable Programs
Port Scan Detection Tools
Password Cracking in Linux: Xcrack
Firewall in Linux: IPTables
Basic Linux Operating System Defense
Linux Loadable Kernel Modules
Hacking Tool: Linux Rootkits
Rootkit: Countermeasures
Linux Tools: Application Security
Advanced Intrusion Detection Environment (AIDE)
Linux Tools: Encryption
Steps for Hardening Linux
Module 22 Review
Module 23 - Evading IDS, Firewalls and Honeypots
Evading IDS, Firewalls and Honeypots
Introduction to Intrusion Detection Systems
Terminologies
Intrusion Detection System
Intrusion Detection System (IDS)
IDS Placement
Ways to Detect an Intrusion
Types of Intrusion Detection Systems
System Integrity Verifiers (SIV)
Tripwire (www.tripwire.com)
Cisco Security Agent (CSA)
True/False, Positive/Negative
Signature Analysis
General Indications of Intrusion System Indications
General Indications of Intrusion File System Indications
General Indications of Intrusion Network Indications
Intrusion Detection Tools
Snort
Running Snort on Windows 2003
Snort Rules
SnortSam
Steps to Perform After an IDS Detects an Attack
Evading IDS Systems
Ways to Evade IDS
Tools to Evade IDS
Firewall
What is a Firewall
What does a Firewall do
Packet Filtering
What can't a Firewall do
How does a Firewall Work
Hardware Firewall
Types of Firewalls
Packet Filtering Firewall
Circuit-Level Gateway
Application-Level Firewall
Stateful Multilayer Inspection Firewall
Firewall Identification
Firewalking
Banner Grabbing
Breaching Firewalls
Placing Backdoors Through Firewalls
Honeypot
What is a Honeypot
The Honeynet Project
Types of Honeypots
Advantages and Disadvantages of a Honeypot
Where to Place a Honeypot
Physical and Virtual Honeypots
Tools to Detect Honeypots
What to do When Hacked
Module 23 Review
Module 24 - Buffer Overflows
Buffer Overflows
Why are Programs/Applications Vulnerable
Buffer Overflows 02
Reasons for Buffer Overflow Attacks
Knowledge Required to Program Buffer Overflow Exploits
Understanding Stacks
Understanding Heaps
Types of Buffer Overflows: Stack-Based Buffer Overflow
Stack Based Buffer Overflows
Types of Buffer Overflows: Heap-Based Buffer Overflow
Heap-Based Buffer Overflow
Understanding Assembly Language
Shellcode
How to Detect Buffer Overflows in a Program
Attacking a Real Program
NOPS
How to Mutate a Buffer Overflow Exploit
Once the Stack is Smashed…
Defense Against Buffer Overflows
Tool to Defend Buffer Overflow: Return Address Defender (RAD)
Tool to Defend Buffer Overflow: StackGuard
Valgrind
Insure++
Module 24 Review
Module 25 - Cryptography
Cryptography
Cryptography 02
Classical Cryptographic Techniques
Encryption
Decryption
Cryptographic Algorithms
RSA (Rivest Shamir Adleman)
RSA Attacks
RSA Challenge
Data Encryption Standard (DES)
DES Overview
RC4, RC5, RC6, Blowfish
RC5
Message Digest Functions
One-way Bash Functions
MD5
SHA (Secure Hash Algorithm)
SSL (Secure Sockets Layer)
What is SSH
Algorithms and Security
Disk Encryption
Government Access to Keys (GAK)
Digital Signature
Components of a Digital Signature
Method of Digital Signature Technology
Digital Signature Applications
Digital Signature Standard
Digital Signature Algorithms: ECDSA, ElGamal Signature Scheme
Challenges and Opportunities
Digital Certificates
Encryption Engine
Code Breaking: Methodologies
Cryptanalysis
Cryptography Attacks
Brute-Force Attack
Module 25 Review
Course Closure
Download links:My blog
uploading:
part1
part2
part3
part4
part5
part6
part7
part8
part9
part10
part11
part12
part13
part14
rapidshare:
part1
part2
part3
part4
part5
part6
part7
part8
part9
part10
part11
part12
part13
part14
links are interchangeable
password (if needed): avaxhome
NO MIRRORS PLEASE