CBT Nuggets - EC Council Certified Ethical Hacker v8.0

seeders: 4
leechers: 9
Added on September 8, 2014 by nickynilsonin Other > Tutorials
Torrent verified.



CBT Nuggets - EC Council Certified Ethical Hacker v8.0 (Size: 1.99 GB)
 11. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Scanning Demos.flv106.47 MB
 12. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Enumeration.flv96.84 MB
 26. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Cryptography.flv94.72 MB
 9. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Social Engineering.flv91.91 MB
 13. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Cracking Windows Passwords.flv91.12 MB
 5. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Linux.flv88.04 MB
 17. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Malware.flv86.77 MB
 18. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Hack-O-Rama Armitage RAT and Netcat.flv86.34 MB
 22. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Denial of Service.flv85.38 MB
 10. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Scanning Overview.flv83.56 MB
 25. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Hacking Web Sites and Web Apps Demos.flv78.4 MB
 29. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Wireless Overview.flv75.51 MB
 7. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Reconnaissance Powerful Resources.flv71.69 MB
 23. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Hijacking.flv70.75 MB
 4. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Virtualization.flv67.97 MB
 24. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Hacking Web Sites and Web Apps...67.2 MB
 8. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Footprinting and Countermeasures.flv63.24 MB
 20. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Sniffing Overview.flv60.59 MB
 28. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Snort and Honeypots.flv59.47 MB
 3. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Terms and Types of Hackers.flv58.95 MB
 16. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 System Hacking Keyloggers and...58.81 MB
 15. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 System Hacking ADS and Steganography.flv58.78 MB
 19. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Hack-O-Rama Rootkits and Trojans.flv53.99 MB
 14. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Password Principles and Cracking Linux...53.3 MB
 21. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Sniffing Demos.flv50.27 MB
 2. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Introduction to Ethical Hacking.flv49.08 MB
 27. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 IDS.flv46.1 MB
 6. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Reconnaissance Overview.flv39.65 MB
 30. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Wireless Demos.flv33.54 MB
 1. CBT Nuggets - EC Council Certified Ethical Hacker v8.0 Course Introduction.flv8.82 MB


Description

This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more.

Recommended skills:
Familiarity with Windows of all versions back to Windows XP and Windows Server 2003
Familiarity with Linux is not necessary but recommended (a video early in the course provides basic Kali Linux training that is sufficient for the learner to complete the course)

Recommended equipment:
Whatever equipment is being used to view the videos (except a smartphone or tablet) is sufficient to create a basic lab environment in which the learner can mirror demonstrations in the videos. This would also require installation of any virtualization software such as Parallels, VMware, Hyper-V, or VirtualBox.
High-speed internet is recommended to download Kali Linux and some of the additional tools.

Related certifications:
None

Related job functions:
Network Administrator
Systems Administrator
Systems Engineer
Help Desk

Most IT professionals are far too busy with daily tasks and projects to commit themselves to a serious study of security. Problem is, hackers are quite serious about your security and how to exploit it. If a security breach occurs at a company, it can cost millions of dollars, the loss of a priceless reputation, private customer information, and the very jobs of the IT professionals who often get blamed for weak security practices. One of the best ways to ensure good security is to know what hackers do to circumvent it. Security concepts and facts alone do not protect your systems. However, knowledge and experience in exactly how hackers exploit weaknesses will help you to potentially avoid embarrassing security breaches in the future.


Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
1.99 GB
seeders:4
leechers:9
CBT Nuggets - EC Council Certified Ethical Hacker v8.0