Jump to content
Un.Neuron

Pentru cunoscatori - CEH v7 + SANS 504

Recommended Posts

Am pe un FTP astea>

1. CEH v7 - Video How To use tools and setup lab required for CEH Practice

14,2 GB

More info:

CEHv7

Course Outline Version 7 :

1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Webservers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Evading IDS, Firewalls and Honeypots

17. buffer Overflows

18. Cryptography

19. Penetration Testing.

CEH 7 Video Howto:

CEH 7 Hacking Tool:

CEH v7 Instructor Slides_VeriSign Encrypted Sig

CEHv7 Lab Prerequisites

CEHv7 - Module 02 - Footprinting and Reconnaissance

CEHv7 - Module 03 - Scanning Networks

CEHv7 - Module 04 - Enumeration

CEHv7 - Module 05 - System Hacking

CEHv7 - Module 06 - Trojans and backdoors

CEHv7 - Module 07 - Viruses and Worms

CEHv7 - Module 08 - Sniffers

CEHv7 - Module 09 - Social Engineering

CEHv7 - Module 10 - Denial of Service

CEHv7 - Module 11 - Session Hijacking

CEHv7 - Module 12 - Hacking Webserver

CEHv7 - Module 13 - Hacking Web Applications

CEHv7 - Module 14 - SQL Injection

CEHv7 - Module 15 - Hacking Wireless Networks

CEHv7 - Module 16 - Evading IDS, Firewalls and Honeypots

CEHv7 - Module 17 - buffer Overflows

CEHv7 - Module 18 - Cryptography

CEHv7 - Module 19 - Penetration Testing

2. CEH v7 - Instructor Slides (Unencrypted)

253 MB

CEHv7 Module 01 Introduction to Ethical Hacking.pdf

CEHv7 Module 02 Footprinting and Reconnaissance.pdf

CEHv7 Module 03 Scanning Networks.pdf

CEHv7 Module 04 Enumeration.pdf

CEHv7 Module 05 System Hacking.pdf

CEHv7 Module 06 Trojans and Backdoors.pdf

CEHv7 Module 07 Viruses and Worms.pdf

CEHv7 Module 08 Sniffers.pdf

CEHv7 Module 09 Social Engineering.pdf

CEHv7 Module 10 Denial of Service.pdf

CEHv7 Module 11 Session Hijacking.pdf

CEHv7 Module 12 Hacking Webservers.pdf

CEHv7 Module 13 Hacking Web Applications.pdf

CEHv7 Module 14 SQL Injection.pdf

CEHv7 Module 15 Hacking Wireless Networks.pdf

CEHv7 Module 16 Evading IDS, Firewalls, and Honeypots.pdf

CEHv7 Module 17 Buffer Overflow.pdf

CEHv7 Module 18 Cryptography.pdf

CEHv7 Module 19 Penetration Testing.pdf

3. SANS Security 504 - Hacker Techniques, Exploits & Incident Handling

670 MB

SANS: Hacker Techniques, Exploits & Incident Handling

PM pt usr/psw

postacii de meserie sa nu ceara...

Edited by Un.Neuron
  • Like 1
  • Upvote 1
Link to comment
Share on other sites

UPDATE

1. SANS SECURITY 517 - Cutting-Edge Hacking Techniques

SANS: Cutting-Edge Hacking Techniques

2. SANS SECURITY 560 - Network Penetration Testing and Ethical Hacking

SANS: Network Penetration Testing and Ethical Hacking

3. SANS SECURITY 617 - Wireless Ethical Hacking, Penetration Testing, and Defenses

SANS: Wireless Ethical Hacking, Penetration Testing, and Defenses

4. DEF CON 18 Archive

DEF CON® 18 Hacking Conference

5. Trainsignal CWNA PW0-104 Exam - Wireless Networking, Administration and Security

Certified Wireless Network Administrator (CWNA) Training, PW0-104 Exam, MOS Certification | Train Signal

PM pt usr/psw

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...