SANS SECURITY 560 Network Penetration Testing & Ethical Hacking | 1.5 GB
SANS Security 560 is one of the most technically rigorous courses offered by the SANS Institute. Attendees are expected to have a working knowledge of TCP/IP, cryptographic routines such as DES, AES, and MD5, and the Windows and Linux command lines before they step into class. Although SANS Security 401 (Security Essentials) and then next SANS Security 504 (Hacker Techniques, Exploits, and Incident Handling) are not pre-requisites for 560, these courses cover the groundwork that all 560 attendees are expected to know. While 560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course
download
http://hotfile.com/dl/5818570/3d4edf0/SS560.NetworkPenetration_tdk.part01.rar.html
http://hotfile.com/dl/5818606/37eebef/SS560.NetworkPenetration_tdk.part02.rar.html
http://hotfile.com/dl/5818653/2aab7ee/SS560.NetworkPenetration_tdk.part03.rar.html
http://hotfile.com/dl/5818689/c015048/SS560.NetworkPenetration_tdk.part04.rar.html
http://hotfile.com/dl/5818725/4819575/SS560.NetworkPenetration_tdk.part05.rar.html
http://hotfile.com/dl/5818795/47d1129/SS560.NetworkPenetration_tdk.part06.rar.html
http://hotfile.com/dl/5818840/19516e3/SS560.NetworkPenetration_tdk.part07.rar.html
http://hotfile.com/dl/5818867/2ed8bdb/SS560.NetworkPenetration_tdk.part08.rar.html
http://hotfile.com/dl/5818871/f75b8ea/SS560.NetworkPenetration_tdk.part09.rar.html
OR
http://rapidshare.com/files/242573233/SS560.NetworkPenetration_tdk.part01.rar
http://rapidshare.com/files/242573387/SS560.NetworkPenetration_tdk.part02.rar
http://rapidshare.com/files/242573347/SS560.NetworkPenetration_tdk.part03.rar
http://rapidshare.com/files/242576294/SS560.NetworkPenetration_tdk.part04.rar
http://rapidshare.com/files/242576218/SS560.NetworkPenetration_tdk.part05.rar
http://rapidshare.com/files/242576163/SS560.NetworkPenetration_tdk.part06.rar
http://rapidshare.com/files/242575701/SS560.NetworkPenetration_tdk.part07.rar
http://rapidshare.com/files/242576360/SS560.NetworkPenetration_tdk.part08.rar
http://rapidshare.com/files/242574519/SS560.NetworkPenetration_tdk.part09.rar
Password: KELCYRA4EVER
Hacking Video tutorials
128 Bit Wep Cracking With Injection!.swf
A Penetration Attack Reconstructed.avi
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf
Adding Modules to a Slax or Backtrack Live CD from Windows.swf
Airplay replay attack - no wireless client required.swf
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf
BackTrack LiveCD to HD Installation Instruction Video .swf
Basic Nmap Usage!.swf
Basic Tools for Wardriving!.swf
Bluesnarfer attack tool demonstration.swf
Bluesnarfing a Nokia 6310i hand set.avi
Breaking WEP in 10 minutes.avi
BufferOverflowPart2-Shellcoding ByIDEspinner.avi
BufferOverflowPart3ExploitsByIDEspinner.avi
Cain to ARP poison and sniff passwords!.avi
Complete Hacking Video using Metasploit - Meterpreter.swf
Cracking a 128 bit WEP key (Auditor).swf
Cracking a 128 Bit Wep key + entering the cridentials.swf
Cracking Syskey and the SAM on Windows Using Samdump2 and John!.swf
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!.swf
Cracking WPA Networks (Auditor).swf
DoS attack against Windows FTP Server - DoS.avi
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!.swf
Exploiting some bugs of tools used in Windows.swf.swf
Exploiting weaknesses of PPTP VPN (Auditor).swf
Finding Rogue SMB File Shares On Your Network!.swf
Fun with Ettercap Filters!.swf
hack.txt
How to crack the local windows passwords in the SAM database .swf
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor).swf
How to sniff around switches using Arpspoof and Ngrep!.avi
IDEspinner Buffer Overflows pt1.avi
IDEspinner Feature Addition pt1.avi
IDEspinner Feature Addition pt2.avi
IDEspinnerDNS-PoisonRouting.avi
Install VNC Remotely!.avi
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res).avi
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res).avi
John The Ripper 1.7 password cracker Installation Instruction Video .swf
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!.swf
MAC Bridging with Windows XP and Sniffing!.swf
Mass De-Authentication using void11 (Auditor).swf
Metasploit Flash Tutorial!.swf
MITM Hijacking.wmv
Nmap Video Tutorial 2 Port Scan Boogaloo!.swf
Sniffing logins and passwords.avi
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res).avi
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res).avi
Sniffing VoIP Using Cain!.swf
Snort Instruction video - howto install into backtrack.swf
SSH Dynamic Port Forwarding!.swf
Start a session and get interactive commandline access to a remote Windows box!.avi
Telnet Bruteforce.avi
Tunneling Exploits through SSH.avi
Use Brutus to crack a box running telnet!.avi
Using NetworkActiv to sniff webpages on a Wi-Fi network!.swf
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf
WMF File Code Execution Vulnerability With Metasploit!.swf
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf
Download:
http://rapidshare.com/files/112986178/Huge_Collection_Of_Hacking_Videos.part1.rar
http://rapidshare.com/files/112993588/Huge_Collection_Of_Hacking_Videos.part2.rar
http://rapidshare.com/files/113000538/Huge_Collection_Of_Hacking_Videos.part3.rar
http://rapidshare.com/files/112963118/Huge_Collection_Of_Hacking_Videos.part4.rar
http://rapidshare.com/files/112969973/Huge_Collection_Of_Hacking_Videos.part5.rar
http://rapidshare.com/files/112975843/Huge_Collection_Of_Hacking_Videos.part6.rar
http://rapidshare.com/files/112979640/Huge_Collection_Of_Hacking_Videos.part7.rar
Ec-Council Ceh V6
CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 24 Buffer Overflows.pdf
CEHv6 Module 25 Cryptography.pdf
CEHv6 Module 26 Penetration Testing.pdf
CEHv6 Module 28 Writing Virus Codes.pdf
CEHv6 Module 29 Assembly Language Tutorial.pdf
CEHv6 Module 30 Exploit Writing.pdf
CEHv6 Module 31 Exploit Writing.pdf
CEHv6 Module 32 Exploit Writing.pdf
CEHv6 Module 33 Reverse Engineering Techniques.pdf
CEHv6 Module 34 MAC OS X Hacking.pdf
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
CEHv6 Module 37 Bluetooth Hacking.pdf
CEHv6 Module 38 VoIP Hacking.pdf
CEHv6 Module 39 RFID Hacking.pdf
CEHv6 Module 40 Spamming.pdf
CEHv6 Module 41 Hacking USB Devices.pdf
CEHv6 Module 42 Hacking Database Servers.pdf
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
CEHv6 Module 44 Internet Content Filtering Techniques.pdf
CEHv6 Module 45 Privacy on the Internet.pdf
CEHv6 Module 46 Securing Laptop Computers.pdf
CEHv6 Module 47 Spying Technologies.pdf
CEHv6 Module 48 Corporate Espionage by Insiders.pdf
CEHv6 Module 49 Creating Security Policies.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 52 Hacking RSS and Atom.pdf
CEHv6 Module 53 Hacking Web Browsers.pdf
CEHv6 Module 54 Proxy Server Technologies.pdf
CEHv6 Module 55 Preventing Data Loss.pdf
CEHv6 Module 56 Hacking Global Positioning System.pdf
CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
CEHv6 Module 58 Credit Card Frauds.pdf
CEHv6 Module 59 How to Steal Passwords.pdf
CEHv6 Module 60 Firewall Technologies.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf
Approx 250MB
New Files 10.12.2008 Update
http://rapidshare.com/files/171714960/CEHv6.n-force.org.part1.rar
http://rapidshare.com/files/171714962/CEHv6.n-force.org.part2.rar
http://rapidshare.com/files/171733732/CEHv6.n-force.org.part3.rar
http://rapidshare.com/files/171733733/CEHv6.n-force.org.part4.rar
Ec-Council Ceh V6 Slides
Theses are the slides i have:
CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf
Approx 180MB
http://rapidshare.com/files/158978423/ceh6_videolessons4free.blogspot.com.part1.rar
http://rapidshare.com/files/158983964/ceh6_videolessons4free.blogspot.com.part2.rar
new link will be added Soon!
New Links !!!
All slides!!
Approx 250MG
http://rapidshare.com/files/165244311/slides.part1.rar
http://rapidshare.com/files/165265350/slides.part2.rar
http://rapidshare.com/files/165265546/slides.part3.rar
http://rapidshare.com/files/165270232/slides.part4.rar
http://rapidshare.com/files/165242442/slides.part5.rar
Astalavista's Security Toolbox DVD 2008 - v5.0
Astalavista's Security Toolbox DVD 2008 (v5.0)
is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on "how to hack", or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!
Direct Download:
http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part1.rar
http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part2.rar
http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part3.rar
LearnKey CISSP Certification Course
LearnKey understands that security certification is highly desired by students. Partnering with International Information Systems Security Certification Consortium or (ISC)², enables LearnKey to compile a comprehensive CISSP course that covers the topics in the (ISC)² exam such as, Access Control Systems, Cryptography, and Security Management Practices. This enables students to confidently prepare for the (ISC)² CISSP exam.
http://rapidshare.com/files/89571034/LearnKey.CISSP.Solutions-CD2.part4.rar
http://rapidshare.com/files/89571028/LearnKey-Cissp.Solutions-CD8.part2.rar
http://rapidshare.com/files/89571025/LearnKey.CISSP.Solutions-CD10.part2.rar
http://rapidshare.com/files/89571024/LearnKey-Cissp.Solutions-CD5.part3.rar
http://rapidshare.com/files/89571018/LearnKey-Cissp.Solutions-CD8.part1.rar
http://rapidshare.com/files/89571011/LearnKey-Cissp.Solutions-CD7.part3.rar
http://rapidshare.com/files/89571005/LearnKey.CISSP.Solutions-CD3.part2.rar
http://rapidshare.com/files/89571004/LearnKey.CISSP.Solutions-CD11.part2.rar
http://rapidshare.com/files/89571001/LearnKey-Cissp.Solutions-CD6.part3.rar
http://rapidshare.com/files/89571000/LearnKey.CISSP.Solutions-CD5.part1.rar
http://rapidshare.com/files/89570997/LearnKey-Cissp.Solutions-CD9.part1.rar
http://rapidshare.com/files/89570989/LearnKey-Cissp.Solutions-CD7.part2.rar
http://rapidshare.com/files/89570984/LearnKey.CISSP.Solutions-CD1.part1.rar
http://rapidshare.com/files/89570983/LearnKey-Cissp.Solutions-CD9.part2.rar
http://rapidshare.com/files/89570980/LearnKey.CISSP.Solutions-CD4.part2.rar
http://rapidshare.com/files/89570979/LearnKey.CISSP.Solutions-CD10.part3.rar
http://rapidshare.com/files/89570974/LearnKey.CISSP.Solutions-CD2.part6.rar
http://rapidshare.com/files/89570969/LearnKey-Cissp.Solutions-CD8.part3.rar
http://rapidshare.com/files/89570967/LearnKey.CISSP.Solutions-CD5.part2.rar
http://rapidshare.com/files/89570962/LearnKey.CISSP.Solutions-CD2.part3.rar
http://rapidshare.com/files/89570960/LearnKey.CISSP.Solutions-CD2.part5.rar
http://rapidshare.com/files/89570954/LearnKey.CISSP.Solutions-CD2.part2.rar
http://rapidshare.com/files/89570953/LearnKey.CISSP.Solutions-CD2.part1.rar
http://rapidshare.com/files/89570933/LearnKey.CISSP.Solutions-CD1.part3.rar
http://rapidshare.com/files/89570924/LearnKey.CISSP.Solutions-CD4.part4.rar
http://rapidshare.com/files/89570899/LearnKey-Cissp.Solutions-CD9.part3.rar
http://rapidshare.com/files/89570894/LearnKey.CISSP.Solutions-CD11.part3.rar
http://rapidshare.com/files/89570884/LearnKey.CISSP.Solutions-CD3.part3.rar
http://rapidshare.com/files/89570882/LearnKey.CISSP.Solutions-CD10.part1.rar
http://rapidshare.com/files/89570878/LearnKey.CISSP.Solutions-CD2.part7.rar
http://rapidshare.com/files/89570877/LearnKey.CISSP.Solutions-CD11.part1.rar
http://rapidshare.com/files/89570866/LearnKey-Cissp.Solutions-CD6.part1.rar
http://rapidshare.com/files/89570863/LearnKey-Cissp.Solutions-CD5.part5.rar
http://rapidshare.com/files/89570862/LearnKey-Cissp.Solutions-CD5.part4.rar
http://rapidshare.com/files/89570853/LearnKey.CISSP.Solutions-CD4.part3.rar
http://rapidshare.com/files/89570852/LearnKey-Cissp.Solutions-CD7.part1.rar
http://rapidshare.com/files/89570845/LearnKey-Cissp.Solutions-CD8.part4.rar
http://rapidshare.com/files/89570844/LearnKey.CISSP.Solutions-CD3.part1.rar
http://rapidshare.com/files/89570841/LearnKey.CISSP.Solutions-CD4.part1.rar
http://rapidshare.com/files/89570839/LearnKey-Cissp.Solutions-CD6.part2.rar
http://rapidshare.com/files/89570838/LearnKey-Cissp.Solutions-CD6.part4.rar
http://rapidshare.com/files/89570833/LearnKey-Cissp.Solutions-CD9.part4.rar
http://rapidshare.com/files/89570829/LearnKey.CISSP.Solutions-CD1.part2.rar
http://rapidshare.com/files/89570828/LearnKey-Cissp.Solutions-CD7.part4.rar
Password: yoknall
VTC Microsoft Windows Vista Security
Title: Microsoft Windows Vista Security
Release Date: 2007-10-19
Duration: 6 hrs / 67 lessons
Windows Vista is Microsoft’s newest operating system. Although it’s considered to be the most secure version of the Microsoft Windows operating system to date, configuring its new security features and winding your way through Vista’s new user interfaces can be a daunting task. VTC author & experienced security administrator Bobby Rogers will guide you to the key information that both beginners and seasoned professionals will need to securely deploy Windows Vista in a home, small business, or enterprise-level environment.
http://rapidshare.com/files/89598288/VTCMWVSTNSD.part1.rar
http://rapidshare.com/files/89589115/VTCMWVSTNSD.part2.rar
http://rapidshare.com/files/89588759/VTCMWVSTNSD.part3.rar
Offensive Security 101 v.2.0
This site is an Online Training spinoff of the BackTrack live CD. Our courses are tailored for System Administrators and Security Professionals who want to learn how to get the most out of BackTrack - directly from it's creators! Our two flagship online courses are "Offensive Security 101" and "BackTrack to the Max".
What Is BackTrack?
BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions - Whax and Auditor. BackTrack has been dubbed as the best Security Live CD today, and has been rated 1st in its category, and 32nd overall in Insecure.org. Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.
About the Courses
The courses are designed for busy professionals who need to step into the offensive security world, but do not have the time to attend a full blown course. Pre recorded sessions can be viewed in your own free time, at your leisure - and can be played over in case a topic needs further clarification.
A student chatroom and forum allow you to interact with our trainers as well as other students and experience hacking tools and techniques in a real live computer lab. The lab is confined to a local network and is legally safe and sterile for exercise.
Upon completion of the course, you may decide to take the Certification Challenge. In this final exam, your newly learned skills will be tested by a Hack Challenge in an unfamiliar environment. Once the challenge has been successfully completed, you will receive an OSCP (Offensive Security Certified Professional) Certification.
About the Trainers
The trainers giving the online courses are seasoned security professionals with over 10 years of experience in offensive security, pentesting and risk assessment. In addition, all trainers have at least 6 years of experience in public speaking and corporate security training.
http://rapidshare.com/files/128661423/Offsec101_Release.part1.rar
http://rapidshare.com/files/128673846/Offsec101_Release.part2.rar
1x195mb + 1x125mg
Backtrack Shmoo to the max!
the Backtrack phenomenom is very amazing,especially the tools which is provide in 1 packet cd,in the 25/02/2008 the Shmoo people present the teaser of some how to use B2m (backtrack 2 the max).
http://rapidshare.com/files/96411747/WarungPlus.Backtrack.2.the.max.part5.rar
http://rapidshare.com/files/96419319/WarungPlus.Backtrack.2.the.max.part1.rar
http://rapidshare.com/files/96428613/WarungPlus.Backtrack.2.the.max.part2.rar
http://rapidshare.com/files/96434338/WarungPlus.Backtrack.2.the.max.part3.rar
http://rapidshare.com/files/96442408/WarungPlus.Backtrack.2.the.max.part4.rar
password: warungplus.com
Certified Penetration Testing Specialist (CPTS) Training by Mile2[ReUpload]
CPTS is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their expertise by practicing what they teach because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The CPTS presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to “Hack” -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.
Upon completion, CPTS - Certified Penetration Testing Specialist students will be able to confidently undertake the Thompson Prometric CPTS examination (recommended) or the easier Certified Ethical Hacker (312-50) Self Study. Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever changing security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world .
Competitive Advantages
Career Academy Computer-Based Training is a cost effective method that meets the critical demands of computer users. Experience our expert-led computer training courses in a comfortable and convenient environment. You get the feel of a computer training school delivered through flexible and familiar technology.
Following 9/11 ** Career Academy's security training partner, Mile2 has through necessity, been thrust into position as the World's largest specialty IT security training organization. Mile2 has provided training services to every US military and intelligence agency, as well as similar agencies for some of the USA's closest allies. These same classes are available to the corporate world with students coming from industries ranging from charities, banking, insurance, health, communications, transport, law enforcement, education and almost any sector imaginable. Mile2's distinction over the competition is that our instructors eat, drink, sleep and breath IT security.
Training comes to life with our full motion video, challenging labs, critical assessment and real-world insight from experts with vast experience in the subject matter. Engage in dynamic learning where multiple senses help reinforce learning concepts. See the steps, hear the explanations then put your skills to work. Our proven methodology provides an unequalled training experience with exceptional results.
Choosing Career Academy’s training with our expert-created study guides and interactive labs will result in an engaging learning experience. You will find that Career Academy’s training is second to none. Career Academy alone is the best site to offer the equivalent to an actual Microsoft training. See the steps, hear the explanations then put your skills to work. Our proven methodology provides an unequalled training experience with exceptional results. Distinguish your knowledge. Enhance your career.
Course Outline
Module 1 - Business and Technical Logistics for Pen Testing
Module 2 - Reconnaissance: Information Gathering
Module 3 - Linux Fundamentals
Module 4 - Reconnaissance: Detecting Live Systems
Module 5 - Reconnaissance: Enumeration
Module 6 - Cryptography: Decrypting the Cipher
Module 7 - Vulnerability Assessments
Module 8 - Windows Hacking: Staying Ahead of the Hacker
Module 9 - Advanced Exploit Techniques
Module 10 - Malware: Software Goes Undercover
Module 11 - Attacking Wireless Networks: Securing the Air
Module 12 - Networks, Sniffing and IDS: Intercept and Redirect!
Module 13 - Injecting the Database
Module 14 - Attacking Web Technologies
http://rapidshare.com/files/132712663/CPTS-DVD1.part1.rar
http://rapidshare.com/files/132740216/CPTS-DVD1.part2.rar
http://rapidshare.com/files/132740229/CPTS-DVD1.part3.rar
http://rapidshare.com/files/132740233/CPTS-DVD1.part4.rar
http://rapidshare.com/files/132736099/CPTS-DVD1.part5.rar
http://rapidshare.com/files/132851019/CPTS-DVD2.part1.rar
http://rapidshare.com/files/132851391/CPTS-DVD2.part2.rar
http://rapidshare.com/files/132850864/CPTS-DVD2.part3.rar
http://rapidshare.com/files/132850061/CPTS-DVD2.part4.rar
http://rapidshare.com/files/132855346/CPTS-DVD3.part1.rar
http://rapidshare.com/files/132932422/CPTS-DVD3.part2.rar
http://rapidshare.com/files/133018977/CPTS-DVD3.part3.rar
http://rapidshare.com/files/132855847/CPTS-DVD3.part4.rar
no password
upload by : http://videolessons4free.blogspot.com/
Offensisive-security 101
This site is an Online Training spinoff of the BackTrack live CD. Our courses are tailored for System Administrators and Security Professionals who want to learn how to get the most out of BackTrack - directly from it's creators! Our two flagship online courses are "Offensive Security 101" and "BackTrack to the Max".
What Is BackTrack?
BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions - Whax and Auditor. BackTrack has been dubbed as the best Security Live CD today, and has been rated 1st in its category, and 32nd overall in Insecure.org. Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.
About the Courses
The courses are designed for busy professionals who need to step into the offensive security world, but do not have the time to attend a full blown course. Pre recorded sessions can be viewed in your own free time, at your leisure - and can be played over in case a topic needs further clarification.
A student chatroom and forum allow you to interact with our trainers as well as other students and experience hacking tools and techniques in a real live computer lab. The lab is confined to a local network and is legally safe and sterile for exercise.
Upon completion of the course, you may decide to take the Certification Challenge. In this final exam, your newly learned skills will be tested by a Hack Challenge in an unfamiliar environment. Once the challenge has been successfully completed, you will receive an OSCP (Offensive Security Certified Professional) Certification.
About the Trainers
The trainers giving the online courses are seasoned security professionals with over 10 years of experience in offensive security, pentesting and risk assessment. In addition, all trainers have at least 6 years of experience in public speaking and corporate security training.
http://rapidshare.com/files/128661423/Offsec101_Release.part1.rar
http://rapidshare.com/files/128673846/Offsec101_Release.part2.rar
1x195mb + 1x125mg
CRACKING (Reverse Engineering) Video Tutorials
This cracking video tutorials is very good for beginner until advance user,
who like to learn more about cracking (it's really recomended).
No previous knowledge is really needed !!!
With this video, you will learn :
• Olly + assembler + patching a basic reverseme
• Keyfiling the reverseme + assembler
• Basic nag removal + header problems
• Basic + aesthetic patching
• Comparing on changes in cond jumps, animate over/in, breakpoints
• "The plain stupid patching method", searching for textstrings
• Intermediate level patching, Kanal in PEiD
• Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
• Explaining the Visual Basic concept, introduction to SmartCheck and configuration
download:
http://rapidshare.com/files/87331229/_file_snd-reversingwithlena-tutorial9.tutorial.zip
http://rapidshare.com/files/87331227/_file_snd-reversingwithlena-tutorial10.tutorial.zip
http://rapidshare.com/files/87331226/_file_snd-reversingwithlena-tutorial8.tutorial.zip
http://rapidshare.com/files/87331224/_file_snd-reversingwithlena-tutorial5.tutorial.zip
http://rapidshare.com/files/87331221/_file_snd-reversingwithlena-tutorial7.tutorial.zip
http://rapidshare.com/files/87331217/_file_snd-reversingwithlena-tutorial4.tutorial.zip
http://rapidshare.com/files/87331215/_file_snd-reversingwithlena-tutorial6.tutorial.zip
http://rapidshare.com/files/87331210/_file_snd-reversingwithlena-tutorial1.tutorial.zip
http://rapidshare.com/files/87331209/_file_snd-reversingwithlena-tutorial2.tutorial.zip
http://rapidshare.com/files/87331206/_file_snd-reversingwithlena-tutorial3.tutorial.zip
• Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
• Intermediate patching using Olly's "pane window"
• Guiding a program by multiple patching.
• The use of API's in software, avoiding doublechecking tricks
• More difficult schemes and an introduction to inline patching
• How to study behaviour in the code, continued inlining using a pointer
• Reversing using resources
• Insights and practice in basic (self)keygenning
• Diversion code, encryption/decryption, selfmodifying code and polymorphism
• Debugger detected and anti-anti-techniques
• Packers and protectors : an introduction
download:
http://rapidshare.com/files/87333440/_file_snd-reversingwithlena-tutorial11.tutorial.zip
http://rapidshare.com/files/87332606/_file_snd-reversingwithlena-tutorial13.tutorial.zip
http://rapidshare.com/files/87332603/_file_snd-reversingwithlena-tutorial20.tutorial.zip
http://rapidshare.com/files/87332596/_file_snd-reversingwithlena-tutorial12.tutorial.zip
http://rapidshare.com/files/87332595/_file_snd-reversingwithlena-tutorial14.tutorial.zip
http://rapidshare.com/files/87332594/_file_snd-reversingwithlena-tutorial18.tutorial.zip
http://rapidshare.com/files/87332592/_file_snd-reversingwithlena-tutorial15.tutorial.zip
http://rapidshare.com/files/87332589/_file_snd-reversingwithlena-tutorial19.tutorial.zip
http://rapidshare.com/files/87332584/_file_snd-reversingwithlena-tutorial16.tutorial.zip
http://rapidshare.com/files/87332582/_file_snd-reversingwithlena-tutorial17.tutorial.zip
• Imports rebuilding
• API Redirection
• Stolen bytes
• Patching at runtime using loaders from lena151 original
• Continued patching at runtime & unpacking armadillo standard protection
• Machine specific loaders, unpacking & debugging armadillo
• tElock + advanced patching
• Bypassing & killing server checks
• Killing & inlining a more difficult server check
• SFX, Run Trace & more advanced string searching
dwonload:
http://rapidshare.com/files/87334609/_file_snd-reversingwithlena-tutorial25.tutorial.zip
http://rapidshare.com/files/87334596/_file_snd-reversingwithlena-tutorial26.tutorial.zip
http://rapidshare.com/files/87334583/_file_snd-reversingwithlena-tutorial21.tutorial.zip
http://rapidshare.com/files/87334581/_file_snd-reversingwithlena-tutorial24.tutorial.zip
http://rapidshare.com/files/87334576/_file_snd-reversingwithlena-tutorial22.tutorial.zip
http://rapidshare.com/files/87334567/_file_snd-reversingwithlena-tutorial23.tutorial.zip
http://rapidshare.com/files/87334564/_file_snd-reversingwithlena-tutorial29.tutorial.zip
http://rapidshare.com/files/87334563/_file_snd-reversingwithlena-tutorial27.tutorial.zip
http://rapidshare.com/files/87334561/_file_snd-reversingwithlena-tutorial28.tutorial.zip
• Delphi in Olly & DeDe
• Author tricks, HIEW & approaches in inline patching
• The FPU, integrity checks & loader versus patcher
• Reversing techniques in packed soft & A S&R loader for aspr
• Inlining inside polymorphic code
• Keygenning
download:
http://rapidshare.com/files/87335366/_file_snd-reversingwithlena-tutorial33.tutorial.zip
http://rapidshare.com/files/87335337/_file_snd-reversingwithlena-tutorial37.tutorial.zip
http://rapidshare.com/files/87335317/_file_snd-reversingwithlena-tutorial31.tutorial.zip
http://rapidshare.com/files/87335316/_file_snd-reversingwithlena-tutorial40.tutorial.zip
http://rapidshare.com/files/87335314/_file_snd-reversingwithlena-tutorial30.tutorial.zip
http://rapidshare.com/files/87335307/_file_snd-reversingwithlena-tutorial32.tutorial.zip
http://rapidshare.com/files/87335301/_file_snd-reversingwithlena-tutorial35.tutorial.zip
http://rapidshare.com/files/87335294/_file_snd-reversingwithlena-tutorial34.tutorial.zip
http://rapidshare.com/files/87335292/_file_snd-reversingwithlena-tutorial36.tutorial.zip
http://rapidshare.com/files/87335289/_file_snd-reversingwithlena-tutorial39.tutorial.zip
http://rapidshare.com/files/87335285/_file_snd-reversingwithlena-tutorial38.tutorial.zip
http://rapidshare.com/files/87334609/_file_snd-reversingwithlena-tutorial25.tutorial.zip
http://rapidshare.com/files/87334596/_file_snd-reversingwithlena-tutorial26.tutorial.zip
AppDev - .NET Security
View the Course Outline
(Level 1 Level 2)
Entire course includes...
• 700 pages of courseware
• 32 hours of hands-on content
• Step-by-step hands-on labs
• Sample Files
• PowerPoint slides for instructors
AppDev - .NET Security
In this course, you'll learn about the security features in .NET. You'll gain an understanding of the new security architecture in the .NET Framework, and about Code Access Security in the Common Language Runtime. You'll explore how to administer security policy using visual and command-line tools. You also learn how to write script to implement security.
http://pointupload.com/en/server/C3AAE9725/AppD---NET-Sec-part06-rar.html
http://pointupload.com/en/server/C1E6AE715/AppD---NET-Sec-part08-rar.html
http://pointupload.com/en/server/C65958445/AppD---NET-Sec-part01-rar.html
http://pointupload.com/en/server/5CCA82075/AppD---NET-Sec-part07-rar.html
http://pointupload.com/en/server/DE9226AE5/AppD---NET-Sec-part03-rar.html
http://pointupload.com/en/server/FEF5A2F15/AppD---NET-Sec-part02-rar.html
http://pointupload.com/en/server/D4BED25A5/AppD---NET-Sec-part10-rar.html
http://pointupload.com/en/server/4AE715205/AppD---NET-Sec-part05-rar.html
http://pointupload.com/en/server/A9AE9E5B5/AppD---NET-Sec-part09-rar.html
http://pointupload.com/en/server/90B56BCB5/AppD---NET-Sec-part04-rar.html
http://pointupload.com/en/server/E1A5CF535/AppD---NET-Sec-part16-rar.html
http://pointupload.com/en/server/832B7E175/AppD---NET-Sec-part11-rar.html
http://pointupload.com/en/server/C28372D95/AppD---NET-Sec-part13-rar.html
http://pointupload.com/en/server/8D4275045/AppD---NET-Sec-part12-rar.html
http://pointupload.com/en/server/C3C41F575/AppD---NET-Sec-part15-rar.html
http://pointupload.com/en/server/6B305EC55/AppD---NET-Sec-part14-rar.html
mirror:
Code:
http://rapidshare.com/files/51242195/AppD.--NET_Sec.part01.rar
http://rapidshare.com/files/51242304/AppD.--NET_Sec.part02.rar
http://rapidshare.com/files/51242428/AppD.--NET_Sec.part03.rar
http://rapidshare.com/files/51242523/AppD.--NET_Sec.part04.rar
http://rapidshare.com/files/51242699/AppD.--NET_Sec.part05.rar
http://rapidshare.com/files/51242921/AppD.--NET_Sec.part06.rar
http://rapidshare.com/files/51243251/AppD.--NET_Sec.part07.rar
http://rapidshare.com/files/51243534/AppD.--NET_Sec.part08.rar
http://rapidshare.com/files/51243810/AppD.--NET_Sec.part09.rar
http://rapidshare.com/files/51244053/AppD.--NET_Sec.part10.rar
http://rapidshare.com/files/51244302/AppD.--NET_Sec.part11.rar
http://rapidshare.com/files/51244522/AppD.--NET_Sec.part12.rar
http://rapidshare.com/files/51244717/AppD.--NET_Sec.part13.rar
http://rapidshare.com/files/51244892/AppD.--NET_Sec.part14.rar
http://rapidshare.com/files/51245075/AppD.--NET_Sec.part15.rar
http://rapidshare.com/files/51242052/AppD.--NET_Sec.part16.rar
VTC Microsoft Windows Vista Security
Title: Microsoft Windows Vista Security
Release Date: 2007-10-19
Duration: 6 hrs / 67 lessons
Windows Vista is Microsoft’s newest operating system. Although it’s considered to be the most secure version of the Microsoft Windows operating system to date, configuring its new security features and winding your way through Vista’s new user interfaces can be a daunting task. VTC author & experienced security administrator Bobby Rogers will guide you to the key information that both beginners and seasoned professionals will need to securely deploy Windows Vista in a home, small business, or enterprise-level environment.
To begin learning simply click the links.
http://rapidshare.com/files/89598288/VTCMWVSTNSD.part1.rar
http://rapidshare.com/files/89589115/VTCMWVSTNSD.part2.rar
http://rapidshare.com/files/89588759/VTCMWVSTNSD.part3.rar
No comments:
Post a Comment