Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Career academy - Ethical hacker V6 DVD 6 - new version

    Posted By: moitapchoi
    Career academy - Ethical hacker V6 DVD 6 - new version

    Career academy - Ethical hacker V6 DVD 6 | 1.38 GB

    This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
    Module 21 - Physical Security
    Physical Security
    Security Facts
    Understanding Physical Security
    Physical Security 02
    What Is the Need for Physical Security
    Who Is Accountable for Physical Security
    Factors Affecting Physical Security
    Physical Security Checklist 01
    Physical Security Checklist: Company Surroundings
    Gates
    Security Guards
    Physical Security Checklist: Premises
    CCTV Cameras
    Physical Security Checklist: Reception
    Physical Security Checklist: Server
    Physical Security Checklist: Workstation Area
    Physical Security Checklist: Wireless Access Points
    Physical Security Checklist: Other Equipment
    Physical Security Checklist: Access Control
    Physical Security Checklist: Biometric Devices
    Biometric Identification Techniques
    Authentication Mechanisms
    Authentication Mechanisms Challenges: Biometrics
    Faking Fingerprints
    Physical Security Checklist 02
    Smart Cards
    Security Token
    Computer Equipment Maintenance
    Wiretapping
    Remote Access
    Locks
    Lock Picking
    Lock Picking Tools
    Information Security
    EPS (Electronic Physical Security)
    Wireless Security
    Laptop Theft Statistics for 2007
    Statistics for Stolen and Recovered Laptops
    Laptop Theft
    Laptop Security Tools
    Laptop Tracker - Xtool Computer Tracker
    Laptop Security Countermeasures
    Mantrap
    TEMPEST
    Challenges in Ensuring Physical Security
    Spyware Technologies
    Physical Security: Lock Down USB Ports
    Module 21 Review
    Module 22 - Linux Hacking
    Linux Hacking
    Why Linux
    Linux - Basics
    Linux Live CD-ROMs
    Basic Commands of Linux: Files & Directories
    Linux Networking Commands
    Directories in Linux
    Installing, Configuring, and Compiling Linux Kernel
    How to Install a Kernel Patch
    Compiling Programs in Linux
    Make Files
    Make Install Command
    Linux Vulnerabilities
    Chrooting
    Why is Linux Hacked
    How to Apply Patches to Vulnerable Programs
    Port Scan Detection Tools
    Password Cracking in Linux: Xcrack
    Firewall in Linux: IPTables
    Basic Linux Operating System Defense
    Linux Loadable Kernel Modules
    Hacking Tool: Linux Rootkits
    Rootkit: Countermeasures
    Linux Tools: Application Security
    Advanced Intrusion Detection Environment (AIDE)
    Linux Tools: Encryption
    Steps for Hardening Linux
    Module 22 Review
    Module 23 - Evading IDS, Firewalls and Honeypots
    Evading IDS, Firewalls and Honeypots
    Introduction to Intrusion Detection Systems
    Terminologies
    Intrusion Detection System
    Intrusion Detection System (IDS)
    IDS Placement
    Ways to Detect an Intrusion
    Types of Intrusion Detection Systems
    System Integrity Verifiers (SIV)
    Tripwire (www.tripwire.com)
    Cisco Security Agent (CSA)
    True/False, Positive/Negative
    Signature Analysis
    General Indications of Intrusion System Indications
    General Indications of Intrusion File System Indications
    General Indications of Intrusion Network Indications
    Intrusion Detection Tools
    Snort
    Running Snort on Windows 2003
    Snort Rules
    SnortSam
    Steps to Perform After an IDS Detects an Attack
    Evading IDS Systems
    Ways to Evade IDS
    Tools to Evade IDS
    Firewall
    What is a Firewall
    What does a Firewall do
    Packet Filtering
    What can't a Firewall do
    How does a Firewall Work
    Hardware Firewall
    Types of Firewalls
    Packet Filtering Firewall
    Circuit-Level Gateway
    Application-Level Firewall
    Stateful Multilayer Inspection Firewall
    Firewall Identification
    Firewalking
    Banner Grabbing
    Breaching Firewalls
    Placing Backdoors Through Firewalls
    Honeypot
    What is a Honeypot
    The Honeynet Project
    Types of Honeypots
    Advantages and Disadvantages of a Honeypot
    Where to Place a Honeypot
    Physical and Virtual Honeypots
    Tools to Detect Honeypots
    What to do When Hacked
    Module 23 Review
    Module 24 - Buffer Overflows

    Buffer Overflows
    Why are Programs/Applications Vulnerable
    Buffer Overflows 02
    Reasons for Buffer Overflow Attacks
    Knowledge Required to Program Buffer Overflow Exploits
    Understanding Stacks
    Understanding Heaps
    Types of Buffer Overflows: Stack-Based Buffer Overflow
    Stack Based Buffer Overflows
    Types of Buffer Overflows: Heap-Based Buffer Overflow
    Heap-Based Buffer Overflow
    Understanding Assembly Language
    Shellcode
    How to Detect Buffer Overflows in a Program
    Attacking a Real Program
    NOPS
    How to Mutate a Buffer Overflow Exploit
    Once the Stack is Smashed…
    Defense Against Buffer Overflows
    Tool to Defend Buffer Overflow: Return Address Defender (RAD)
    Tool to Defend Buffer Overflow: StackGuard
    Valgrind
    Insure++
    Module 24 Review
    Module 25 - Cryptography
    Cryptography
    Cryptography 02
    Classical Cryptographic Techniques
    Encryption
    Decryption
    Cryptographic Algorithms
    RSA (Rivest Shamir Adleman)
    RSA Attacks
    RSA Challenge
    Data Encryption Standard (DES)
    DES Overview
    RC4, RC5, RC6, Blowfish
    RC5
    Message Digest Functions
    One-way Bash Functions
    MD5
    SHA (Secure Hash Algorithm)
    SSL (Secure Sockets Layer)
    What is SSH
    Algorithms and Security
    Disk Encryption
    Government Access to Keys (GAK)
    Digital Signature
    Components of a Digital Signature
    Method of Digital Signature Technology
    Digital Signature Applications
    Digital Signature Standard
    Digital Signature Algorithms: ECDSA, ElGamal Signature Scheme
    Challenges and Opportunities
    Digital Certificates
    Encryption Engine
    Code Breaking: Methodologies
    Cryptanalysis
    Cryptography Attacks
    Brute-Force Attack
    Module 25 Review
    Course Closure
    Download links:
    uploading:
    part1
    part2
    part3
    part4
    part5
    part6
    part7
    part8
    part9
    part10
    part11
    part12
    part13
    part14

    rapidshare:
    part1
    part2
    part3
    part4
    part5
    part6
    part7
    part8
    part9
    part10
    part11
    part12
    part13
    part14
    links are interchangeable
    password (if needed): avaxhome
    NO MIRRORS PLEASE
    My blog