io.kent Posted September 21, 2012 Report Posted September 21, 2012 aici va las niste tutoriale superbe... This class will immerse the student into an interactive environment where you will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then lead into scanning and attacking their own networks, no real network is harmed. Here, students learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 The latest certified ethical hacker (CEH) courses is about to be released and presented for the first time in U.S. hacker arrested in June 2008. Many small details of CEH Version 6 have been peppered on the Internet, as well as fragments of claim copy of the EC and the Council's own website. "With a total of 28 new and never seen before modules, covering the latest concepts with more real-life cases, and show the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will increasingly advanced course. " So I requested an interview with the EC and the Council for see if we can get confirmation and clarification. The questions are compiled from my own list as well as some others that were suggested by readers of The Ethical Hacker Network (EH-Net). EC and the Council responded in a very timely manner with answers from both Haja Mohideen, co-founder of the EC and the Council, and Chuck Swanson, the instructor scheduled to teach the first v6 offering the course. curriculum consists of CEHv6 instructor-led training and self-study. The instructor will provide the details of self-study modules to the students from the class.Module 1: Introduction to Ethical Hacking Module 2: Hacking Laws Module 3: Footprinting Module 4: Google Hacking Module 5: Scanning Module 6: Enumeration Module 7: System Hacking Module 8: Trojans and rear Module 9: Viruses and Worms Module 10: Sniffers Module 11: Social Engineering Module 12: Phishing Module 13: Hacking Email Accounts Module 14: Denial of Service Module 15: Session Hijacking Module 16: Hacking Web Servers Module 17: Web Application Vulnerabilities Module 18: Web-Based Password Cracking Techniques Module 19: SQL Injection Module 20: Hacking Wireless Networks Module 21: Physical Security Module 22: Linux Hacking Module 23: Evading IDS, Firewalls and detection of Honey Pots Module 24: Buffer Overflow Module 25: Cryptography Module 26: Penetration Testing Module 27: Covert Hacking Module 28: Writing Virus Codes Module 29: Assembly Language Tutorial Module 30: Exploit Writing Module 31: Smashing the Stack for Fun and Profit Module 32: Windows based buffer overflow exploit Writing Module 33: Reverse Engineering Module 34: MAC OS X Hacking Module 35: Hacking Routers, Cable Modems and Firewalls Module 36: Hacking Mobile Phones, PDA and Handheld Devices Module 37: Bluetooth Hacking Module 38: VoIP Hacking Module 39: RFID Hacking Module 40: Spamming Module 41: Hacking USB Devices Module 42: Hacking Database Servers Module 43: Cyber-War Hacking, Al-Qaida and Terrorism Module 44: Techniques of Internet content filtering Module 45: Privacy on the Internet Module 46: Getting laptops Module 47: Spying Technologies Module 48: Corporate espionage Use Executives-Hacking Module 49: Creating Security Policies Module 50: Software Piracy and Warez Module 51: Hacking and cheating online Games Module 52: Hacking RSS and Atom Module 53: Hacking browsers (Firefox, IE) Module 54: Proxy Server Technologies Module 55: Prevention Data Loss Module 56: Hacking Global Positioning System (GPS) Module 57: Computer Forensics and Incident Handling Module 58: Credit Card Fraud Module 59: How to Steal Passwords Module 60: Firewall Technologies Module 61: Threats and Countermeasures Module 62: Case Studies Module 63: Botnets Module 64: Economic Espionage Module 65: Patch Management Module 66: Security Convergence Module 67: Identifying the Terrorist Video Tutorial Parte 1 DepositFiles Partea 2 DepositFiles Partea 3 DepositFiles Partea 4 DepositFiles Partea 5 DepositFiles Partea 6 DepositFiles Partea 7 DepositFiles Partea 8 DepositFiles Partea 9 DepositFiles Partea 10 DepositFiles Partea 11 DepositFiles Partea 12 DepositFiles Partea 13 DepositFiles Partea 14 DepositFilesPartea 15 DepositFiles Partea 16 DepositFiles Partea 17 DepositFiles Cartii parte 1 DepositFiles partea 2 DepositFilespartea 3 DepositFiles Video Tutorial Hotfile.com: 1-CLICK Dateihoster Cartii Hotfile.com: 1-CLICK Dateihoster Quote
fallen_angel Posted September 21, 2012 Report Posted September 21, 2012 La ?la de pe hotfile eu nu v?d nimic acolo, doar .htaccessAcolo vrea s? fie Video-ul întreg, iar pe depositfiles e t?iat în mai multe p?r?i ? Quote
me.mello Posted September 21, 2012 Report Posted September 21, 2012 E demult asa ceva, cauta 7, oricum sunt cateva papere interesante din cate imi aduc aminte. Quote
aelius Posted September 21, 2012 Report Posted September 21, 2012 @fallen_angel: Index of /IT/Ethical Hacking/CEH v7 Instructor Slides/ Quote
aelius Posted September 21, 2012 Report Posted September 21, 2012 Mai era unul la comments pe filelist de intreba la un pr0n daca are subtitrare )Nu stiu daca le am sau nu, sunt plecat cu laptopul dupa mine ... duminica ajung acasa si le caut Quote
tuxiqul Posted September 22, 2012 Report Posted September 22, 2012 up cu video cand se poate ms Quote
adonisslanic Posted September 22, 2012 Report Posted September 22, 2012 (edited) CEH V7 + CBT Nuggets (download torrent) - TPBNu stiu daca are video, dar pare destul de mare cat sa fie plauzibil acest fapt....Career Academy EC-Council CEH Certified Ethical Hacker v7 DVD 1, (download torrent) - TPBNotes: 1. This is my first torrent, so please tell me if anything is wrong with it. 2. This is CEH v7 and not CEH v7.1 which is 6 DVD thing and is large. 3. This torrent doesn't have any hacking tools included. It only has video training of above mentioned modules. 4. My internet connection isn't stable and great, so please seed when you finished downloading.Career Academy - Certified Ethical Hacker v7.1 (CEH) Tools 6 DVDs ( DVD1) › ceh v7.1 › isoHunt › the BitTorrent & P2P search engineNu stiu daca chiar e 7.1...Daca e, ar trebui sa fie mai bun decat CEH v7(evident)http://filelist.ro/details.php?id=30982Forensics stuffz to de la cei care au facut CEH(Career Academy) Edited September 22, 2012 by adonisslanic Quote