Posts tagged as:

Hacking

Instructor: Mohamed Ramadan
Video Format: MP4 / AVC
Resolution: 1280×720
File Size: 3.15 GB
Duration: 17:14:50
More Info

“LEARN The Secrets and The Arts of Penetration Testing. The best course to start your journey in the penetration testing and ethical hacking world.” Read more…

{ 0 comments }

Continue Reading

Released: May 2013
Format: PDF files
File Size: 2.68 GB
CEH v8 Tools

Course Files :
CEHv8 Module 00 Table Of contents
CEHV8 Module 01 Introduction to Ethical Hacking
CEHv8 Module 02 Footprinting and Reconnaissance
CEHv8 Module 03 Scanning Networks
CEHv8 Module 04 Enumeration
CEHv8 Module 05 System Hacking Read more…

{ 0 comments }

Continue Reading

EC-Council Ethical Hacking CEHv7

Duration: 5 days
Released: 2011
Video: Executable / Intel i386
File Size: 16.2 GB
More info

CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Read more…

{ 0 comments }

Continue Reading

6 Tools DVDs
Released: May 2013
Format: .ISO (DVD image)
File Size: 23.6 GB
More info

This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Read more…

{ 0 comments }

Continue Reading

Video Training

Author: Vivek Ramachandran
Duration: 12 hours +
Released: 2011
Video Format: M4V
Resolution: 900×720
File Size: 4.23 GB
Home Page

This Megaprimer will provide a highly technical and in-depth treatment of WLAN security and hacking. The emphasis will be to provide the viewers with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools Read more…

{ 0 comments }

Continue Reading

Video Training CreativeLIVE Photography

Instructor: Dale J. Stephens
School: Lifestyle, Business
Length: 3-Day Weekend Workshop (1-2-3 February 2013)
Video Format: WMV
Resolution: 944×528
File Size: 5.07 GB
Home Page

Dale J. Stephens is changing the notion that college is the only path to success and the only way to become educated. In his ‘Learn Anything’ course, Dale will show you how to design your own education outside the traditional institutions. Read more…

{ 0 comments }

Continue Reading

Video Training Infinite Skills

Instructor: Ric Messier
Duration: 10.5 hours – 103 lessons
Released: 2012-10-05
Video Format: MP4
Resolution: 1280×720
File Size: 1.34 GB
Home Page

In this Ethical Hacking – Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Read more…

{ 0 comments }

Continue Reading

Video Training DEF CON 18 Hacking

Released: 2011
Video Format: MP4 |Resolution: 800×600
File Size: Pack 1: 3.95GB, Pack 2: 3.96GB, Pack 3: 3.99GB, Pack 4: 3.97GB
Home Page

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. Read more…

{ 0 comments }

Continue Reading

Video Training VTC

Author: Brad Causey & Bobby Rogers
Duration: 7 hrs – 82 tutorials
Released: 2006-10-06
Subject : Networking & Security
Video Format: MOV |Resolution: 800×600
File Size: 192 MB
Home Page

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. Read more…

{ 0 comments }

Continue Reading

Video Training EC-Council CHFI

22 Modules
Author: Robert Reed
Released: 2012
Video Format: FLV |Resolution: 480×360
File Size: 10.04 GB
Home Page

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Read more…

{ 0 comments }

Continue Reading