Learn The Basics of Ethical Hacking and Penetration Testing

seeders: 1
leechers: 0
Added on April 3, 2015 by sum1_herein Other > Tutorials
Torrent verified.



Learn The Basics of Ethical Hacking and Penetration Testing (Size: 3.15 GB)
 01. About The Course.mp46.88 MB
 02. Hacking vs Ethical Hacking.mp47.35 MB
 03. Who is a Hacker.mp44.29 MB
 04. Types of Hackers.mp414.42 MB
 05. Hacktivism.mp45.23 MB
 06. Computer Crimes.mp410.17 MB
 07. Important Terms 1.mp410.48 MB
 08. Important Terms 2.mp412.44 MB
 09. Why Penetration Testing.mp45.3 MB
 10. Penetration Testing Types.mp47.44 MB
 11.Introduction to Information Intelligence Techniques.mp45.38 MB
 12. organizing information during a penetration test.mp411.34 MB
 13. how to locally copying company websites.mp417.95 MB
 14. newsgroups and list-servers.mp417.82 MB
 15. online job listing.mp410.72 MB
 16. the power of social media websites.mp415 MB
 17. harvesting a company emails.mp430.31 MB
 18. how to generate a targeted wordlist for password cracking.mp415.33 MB
 19. information intelligence with Maltego.mp414.42 MB
 20. Google Search Techniques for penetration testers.mp463.72 MB
 32. packet Crafting and Manipulating with Scapy.mp437.4 MB
 33. port scanning with scapy.mp416.11 MB
 34. Network Enumeration and Mapping Techniques.mp417.25 MB
 34_1. References.txt263 bytes
 35. Network scanning techniques.mp4115.6 MB
 35_1. References.txt464 bytes
 36. Vulnerability Identification and Assessment techniques.mp492.26 MB
 36_1. References.txt375 bytes
 37. Practical Evasion and avoidance Techniques.mp454.68 MB
 37_1. References.txt283 bytes
 38. Password cracking, MITM, Sniffing SSL and RDP Attacks.mp4140.34 MB
 38_1. References.txt694 bytes
 39. Windows Security Overview for Penetration Testers.mp484.32 MB
 39_1. References.txt328 bytes
 40. Linux Security Overview for Penetration Testers.mp452.19 MB
 41. Attacking and Hacking Windows.mp4232.85 MB
 42. Attacking and Hacking Linux.mp468.03 MB
 43. Windows post exploitation techniques.mp4185.68 MB
 44. Linux post exploitation techniques.mp4159.37 MB
 45. Data mining techniques.mp45.75 MB
 46. Web Application Primer.mp466.79 MB
 46_1. module-7-web-exploitation-techniques.pdf472.99 KB
 47. Web Application Scanning and Mapping.mp480.34 MB
 48. Exploiting SQL Injection to Full System Access (MYSQL).mp4237.49 MB
 48_1. module-8-windows-exploit-development.pdf329.01 KB
 49. Exploiting SQL Injection to Full System Access (MSSQL).mp473.7 MB
 50. Exploiting Blind SQL Injection to Full System Access (MYSQL).mp453.33 MB
 51. Exploiting Blind SQL Injection to Full System Access (MSSQL).mp4141.15 MB
 52. Exploiting RFI, Local File include, File Uploads and RCE.mp4116.84 MB
 53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access.mp4155.57 MB
 54. Using Immunity Debugger and Metasploit to develop a windows exploit.mp4458 MB
 54_1. References.txt359 bytes
 55. The end.mp411.35 MB


Description

Learn The Basics of Ethical Hacking and Penetration Testing





You don’t have to be perfect to be a hacker. Or the smartest person in the room. Or a type-A personality.

Course Description

Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems.

This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.
In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.
Get started with this course today to be on your way towards finding real-world computer security solutions.
Gather Information Intelligence
Find Security Vulnerabilities
Develop Exploits
Scan and Produce Vulnerability Assessments
Learn Network Attacking Techniques
Ethical Hacking for Computer Security
Ethical hackers are computer security experts who focus on penetration testing and weaknesses in an organization’s information systems.

Using the same destructive techniques of intruders, ethical hackers are able to produce security evaluations with information about vulnerabilities and recommend potential solutions.

Contents and Overview
With 55 lectures and over 17 hours of content this course is perfect for beginning to understand ethical hacking and penetration testing from scratch.
Students will be shown how to gather information intelligence, find web application and system security vulnerabilities, how to scan using Nmap and bypass IDS protected targets, how to hack clients using modern web browsers and how to collect important information once a system has been hacked into.

This course is ideal for web developers, IT security professionals, network engineers, Windows and Linux administrators, security engineers, database administrators and webmasters as well as anyone interested in learning basic ethical hacking techniques.

Upon completion, students will be able to apply ethical hacking practices to identify potential weaknesses, and understand the moves hackers would make to attempt to exploit a system. Students will also have the knowledge to recommend security measures that will make systems more impenetrable to hackers.

What are the requirements?

Basic IT skills
Basic knowledge of Linux and Windows
Basic knowledge of networking

What am I going to get from this course?

Over 55 lectures and 17 hours of content!
You will be able to gather information about your target
You will learn how to find open ports your target
You will learn how to find vulnerabilities in your target infrastructure
You will learn how to exploit Windows and Linux Systems
You will learn windows and linux Tactical Post Exploitation Techniques
You will learn how to find and exploit Web Application Vulnerabilities
You will learn how to Develop Windows Exploits

What is the target audience?

You
Anyone want to learn how to hack
Web developers
IT security professionals
Network engineers
Windows and Linux Administrators
Security engineers
Database administrators
Webmasters


Sharing Widget


Download torrent
3.15 GB
seeders:1
leechers:0
Learn The Basics of Ethical Hacking and Penetration Testing

All Comments

Thanks
Thanks
?Looks like the full course this time around!! T/y for posting it all..

;)
thanx u are awsome
what number 7 or 8
thanks man...
Thanks..
Thanks a lot mam
U r damm quick in completing the requests