IT Security and Ethical Hacking

seeders: 1
leechers: 0
Added on July 24, 2015 by hawaiizfynestin Other > Unsorted
Torrent verified.



IT Security and Ethical Hacking (Size: 17.51 GB)
 000 Orientation Video.mp415.32 MB
 Thumbs.db9.5 KB
 010 Vulnerability Management.mp423.7 MB
 009 Methodology for Penetration TestingEthical Hacking.mp447.82 MB
 012 Security Policy.mp433.77 MB
 013 Conclusion.mp419.21 MB
 011 Incident Management.mp448.58 MB
 008 Pentesting Demo 4.mp440.62 MB
 002 Vulnerabilities.mp4125.67 MB
 001 Introduction to Ethical Hacking.mp4195.1 MB
 004 Penetration Testing.mp4139.21 MB
 003 Defense-in-depth.mp464.98 MB
 003 How to Analyze Risk.mp495.3 MB
 002 Strategies For Managing Risk.mp435.6 MB
 004 Risk Assessment Demo.mp482.94 MB
 006 Plan Testing and Execution.mp437.33 MB
 007 Conclusion.mp417.86 MB
 001 Defining Risk Management.mp436.87 MB
 005 DR Strategies.mp486.54 MB
 005 Awareness and Compliance.mp423 MB
 006 Educating Employees.mp422.21 MB
 004 Areas of Pentest.mp480.46 MB
 003 Vulnerability Assessment Demo.mp455.5 MB
 002 Penetration Testing Types.mp469.91 MB
 007 Conclusion.mp415.26 MB
 001 Security Auditing.mp490.03 MB
 001 Introduction.mp440.92 MB
 011 Patch Management.mp411.9 MB
 012 Conclusion.mp416.95 MB
 002 Testing Overview.mp413.62 MB
 003 Security Alerts.mp464.1 MB
 006 IBM AppScan Demo.mp438.45 MB
 005 Nessus Demo.mp446.78 MB
 004 Scanners.mp467.01 MB
 007 GFI Languard Demo.mp48.73 MB
 008 Analyzing the Scan Results.mp473.36 MB
 009 Fire Prevention, Detection, and Suppression.mp453.42 MB
 008 Environment Control.mp438.92 MB
 011 External Boundary Protection.mp427.56 MB
 012 Locks and Fencing.mp425.86 MB
 013 Lighting and Patrols.mp440.09 MB
 007 Power Supply and Protection.mp492.4 MB
 006 Introduction.mp437.03 MB
 002 Importance of Physical Security.mp450.07 MB
 001 Introduction.mp412.99 MB
 003 Physical Security Planning.mp457.22 MB
 015 Exploit Database Demo.mp413.88 MB
 016 Google Hacking for Charity Demo.mp48.86 MB
 017 Google Advance Search Operations.mp418.46 MB
 014 Google Hacking.mp45.87 MB
 011 Knowledge Check DNS Zone Data.mp416.61 MB
 018 Google Hacking Tools.mp422.73 MB
 012 Social Engineering.mp474.78 MB
 013 Footprinting with Google.mp418.73 MB
 024 Conclusion.mp415.54 MB
 023 Footprinting PenTesting.mp429.41 MB
 002 Reconnaissance Threats.mp447.28 MB
 001 Introduction.mp422.91 MB
 003 7 Steps of Information Gathering.mp464.77 MB
 013 Enumeration.mp417.69 MB
 014 Reconnaissance Countermeasures.mp426.98 MB
 012 Nmap Scan Demo.mp48.01 MB
 011 Scanning Networks and Ports.mp462.62 MB
 009 Active Footprinting.mp422 MB
 010 Visualroute Trace Demo.mp45.41 MB
 008 Shodanhq.com Demo.mp45.26 MB
 003 Angry IP Demo.mp477.67 MB
 004 Nmap Demo.mp445.21 MB
 002 Techniques for Private Network Scanning.mp441.51 MB
 005 Hping Demo.mp423.54 MB
 001 Defining Private and Public Scanning.mp413.95 MB
 008 Conclusion.mp411.63 MB
 006 Public Scanning with Zmap.mp442.6 MB
 007 Zmap Demo.mp444.1 MB
 006 Netstat Demo.mp417.09 MB
 007 Informational Sites.mp411.7 MB
 008 Port Scanning Techniques I.mp4148.69 MB
 005 Well-Known Ports.mp441.42 MB
 004 Ping Tester Demo.mp419.89 MB
 009 Nmap Demo.mp47.82 MB
 002 Port Scanning Methods.mp465.5 MB
 003 Ping Demo.mp420.75 MB
 015 Port Scanning Techniques II.mp448.6 MB
 017 Conclusion.mp418.5 MB
 003 Types of Banner Grabbing.mp425.93 MB
 004 Banner Grabbing Tools.mp432.79 MB
 001 Introduction.mp414.16 MB
 007 Conclusion.mp47.49 MB
 005 Banner Grabbing Using Telnet Demo.mp413.34 MB
 006 Contermeasures.mp418.25 MB
 002 What is Banner Grabbing.mp428.08 MB
 001 Introduction.mp49.35 MB
 002 Applications.mp417.72 MB
 003 NetBIOS Demo.mp429.33 MB
 004 SNMP.mp434.28 MB
 005 LDAP.mp45.04 MB
 008 SMTP.mp413.56 MB
 007 NTP.mp411.07 MB
 010 NSlookup Demo.mp419.27 MB
 011 conclusion.mp46.99 MB
 006 LDAP Demo.mp428.61 MB
 009 DNS Enumeration.mp416.34 MB
 007 Navigating in Linux.mp424.12 MB
 008 Linux Navigation Demo.mp424.46 MB
 010 Compression Demo.mp410.17 MB
 011 Configuring Subdirectories.mp427.31 MB
 006 Linux Commands.mp429.47 MB
 009 Tar.mp418.08 MB
 003 Linux Shell.mp411.58 MB
 012 Vi Demo.mp45.52 MB
 001 Linux History.mp418.09 MB
 002 GUI Shell.mp450.61 MB
 005 Iptables.mp410.43 MB
 006 Iptables Demo.mp444.41 MB
 008 Conclusion.mp47.48 MB
 004 Essential Tools and GUI Demo.mp465.17 MB
 007 IP Forwarding Demo.mp423.69 MB
 001 Installing Applications.mp425.02 MB
 002 apt-get Demo.mp417.3 MB
 003 Applications for Pentesting.mp411.44 MB
 008 Triple As.mp419.09 MB
 009 RADIUS Demo.mp456.05 MB
 007 Authentication Methods Demo.mp462.11 MB
 004 CHAP and MS-CHAP.mp437.7 MB
 003 Introduction to Authentication Protocols.mp49.86 MB
 010 RADIUS 2 Demo.mp410.93 MB
 005 NTLM.mp483.99 MB
 006 NTLM Continued.mp450.24 MB
 012 Single Sign-on.mp429.9 MB
 013 Conclusion.mp427.51 MB
 015 Conclusion.mp435.68 MB
 014 Knowledge Check.mp48.68 MB
 013 Understanding Rootkits.mp452.94 MB
 012 Knowledge Check.mp410.19 MB
 007 Countermeasures.mp487.53 MB
 011 Steganography and Its Uses.mp473.69 MB
 010 Knowledge Check.mp415.21 MB
 003 Password Guessing.mp462.08 MB
 004 Password Hashing and Encryption.mp4136.55 MB
 005 Password Cracking Technique.mp4353.7 MB
 001 Introduction.mp4112.24 MB
 010 Knowledge Check.mp49.79 MB
 011 conclusion.mp415.74 MB
 009 Protecting Yourself.mp4165.5 MB
 007 Keyloggers Examples.mp491.04 MB
 006 Software Keylogger.mp446.62 MB
 005 Hardware Keyloggers.mp450.18 MB
 008 Kernel Keyloggers.mp427.49 MB
 002 Spyware Distribution.mp4149.9 MB
 004 Understanding Keyloggers.mp424.42 MB
 003 Knowledge Check.mp411.53 MB
 006 Meterpreter Timestomp Demo.mp48.13 MB
 005 Meterpreter Event Manager Demo.mp414.84 MB
 007 Linux History and Events.mp438.61 MB
 008 Clearing the Bash History Demo.mp421.17 MB
 010 File Shredding.mp426.85 MB
 009 Clearing Linux Events Demo.mp420.01 MB
 004 Using Metasploit to Cover Tracks.mp425.75 MB
 001 Dealing with Windows Logs.mp498.38 MB
 002 Working with WinZapper.mp433.95 MB
 003 MRU-Blaster.mp428.52 MB
 015 Additional Countermeasure Tools.mp427.26 MB
 014 Software Restriction Policies.mp444.9 MB
 016 Countermeasures Knowledge Check.mp413.81 MB
 007 Wrappers.mp461.18 MB
 013 System File Monitorization.mp424.62 MB
 011 Investigation Tools.mp426.28 MB
 010 Countermeasure Considerations.mp480.68 MB
 012 Port Monitorization.mp425.4 MB
 008 Avoiding Detection.mp451.86 MB
 009 Tools of the Trade Knowledge Check.mp49.68 MB
 008 Virus Infection.mp432.99 MB
 006 Stealth Strategies and Infection.mp475.66 MB
 005 JPS Demo.mp435.06 MB
 004 Virus Types.mp4150.88 MB
 002 DELme Demo.mp439.8 MB
 007 Virus Mutation Demo.mp423.22 MB
 012 Known Dangerous Worms.mp4178.99 MB
 011 Worms Demo.mp459.97 MB
 010 Defining Worms.mp426.77 MB
 009 Viruses Examples.mp441.44 MB
 003 Sniffing Passive vs Active.mp438.84 MB
 001 Packet Sniffers.mp4216.26 MB
 005 ARP Poisoning Demo.mp4128.61 MB
 002 Wireshark Demo.mp4123.26 MB
 007 Countermeasures.mp417.98 MB
 010 Conclusion.mp415.39 MB
 009 Cisco Switch Security Configuration.mp428.9 MB
 008 XARP Demo.mp430.67 MB
 006 Sniffing and Spoofing Tools.mp4141.18 MB
 004 Techniques for Poisoning the Network.mp453.14 MB
 008 SET-spear phishing Demo.mp432.32 MB
 009 SET-trojan Demo.mp433.7 MB
 010 SET-SMS Spoofing Demo.mp412.07 MB
 011 Using Social Media.mp416.77 MB
 007 SET-webTemplate Demo.mp442.64 MB
 006 Phishing Email Demo.mp430.77 MB
 001 Introduction.mp427.9 MB
 002 Security Policy.mp420.49 MB
 003 Human-based Attacks.mp428.58 MB
 005 Computer-based Attacks.mp417.46 MB
 001 Introduction.mp438.56 MB
 014 HOIC Demo.mp411.98 MB
 023 Advanced DDoS Protection Method.mp410.62 MB
 024 Conclusion.mp433.74 MB
 022 DDoS in Penetration Testing.mp427.77 MB
 021 Advanced DoS, DDoS Protection Tools.mp428.33 MB
 008 DoS, DDoS Attacks.mp4110.58 MB
 009 Introduction to Botnets.mp435.04 MB
 010 Botnet Ecosystem.mp4123.94 MB
 007 Digital Attack Map Demo.mp432.12 MB
 004 Session Hijacking Strategies.mp434.85 MB
 005 Session Hijacking Process.mp443.13 MB
 006 Types of Session Hijacking.mp4144.22 MB
 003 Impact of Session Hijacking.mp412.85 MB
 002 Contributors to Session Hijacking.mp435.74 MB
 001 Introduction.mp479.79 MB
 007 Session Hijacking Tools.mp412.35 MB
 008 ZAP Tool Demo.mp450.69 MB
 013 Penetration Testing in Session Hijacking.mp457.38 MB
 014 Conclusion.mp422.71 MB
 007 Vulnerabilites.mp469.67 MB
 009 Conclusion.mp44.32 MB
 008 WMAP Demo.mp429.22 MB
 004 Website Mirroring Demo.mp424.23 MB
 006 W3AF Demo.mp438.56 MB
 002 Apache2 Demo.mp467.01 MB
 001 Gathering Information.mp420.47 MB
 003 Netcraft Demo.mp450.37 MB
 005 Web server Attacks.mp458.83 MB
 007 Metasploit.mp427.79 MB
 010 Exploiting Vulnerabilities.mp421.49 MB
 009 Hands on Metasploit.mp414.65 MB
 008 Armitage Demo.mp421.95 MB
 011 Payload.mp422.32 MB
 012 Armitage-mimkatz Demo.mp441.25 MB
 014 Conclusion.mp47.56 MB
 013 Core Impact Pro.mp437.98 MB
 006 Meterpreter Demo.mp485.66 MB
 005 Armitage.mp426.14 MB
 011 conclusion.mp419.79 MB
 010 SQL Injection Detection Tools.mp414.52 MB
 005 Buffer Overflow Exploit.mp414.17 MB
 001 Introduction to SQL Injections.mp484.81 MB
 009 Countermeasures.mp446.67 MB
 008 Testing for SQL Injection.mp424.1 MB
 003 SQL Injection Attacks.mp460.34 MB
 004 SQL Injection Detection.mp414.64 MB
 002 SQL Injection Methodology.mp481.11 MB
 006 BSQL Tool Demo.mp412.83 MB
 007 SQL Injection Username and Password Demo.mp429.17 MB
 012 Conclusion.mp48.26 MB
 006 WPA2 Encryption.mp438.13 MB
 007 Systems.mp499.64 MB
 008 Jammer Demo.mp416.17 MB
 005 Encryption Protocols.mp4118.19 MB
 004 InSSIDer Demo.mp436.21 MB
 001 Introduction.mp48.23 MB
 002 Wireless Communication Systems.mp424.08 MB
 003 Standards.mp466.17 MB
 009 Fake AP Demo.mp424.41 MB
 004 WPA2 Demo.mp424.35 MB
 003 WEP Demo.mp461.06 MB
 002 Aircrack Suite.mp456.98 MB
 005 Using Reaver.mp425.57 MB
 009 Conclusion.mp48.77 MB
 001 Introduction.mp434.19 MB
 008 DOS Demo.mp423.22 MB
 007 Windows Hacking Demo.mp430.29 MB
 006 Using Windows.mp426.89 MB
 016 The Virtualization Option.mp426.35 MB
 015 App Permissions Demo.mp429.33 MB
 014 Options.mp461.45 MB
 012 BYOD Concerns.mp431.27 MB
 005 Android Security Features Demo.mp419.59 MB
 004 Device Security.mp485.69 MB
 003 Areas to Consider.mp439.68 MB
 002 Rise of Mobility.mp468.19 MB
 006 Lookout Demo.mp415.93 MB
 007 Application Security.mp425.91 MB
 018 Penetration Testing.mp430.31 MB
 007 Evading Firewalls Using Tunneling.mp434.28 MB
 006 Configuring Proxy Demo.mp49.42 MB
 008 Evading Firewalls Using External Systems.mp415.53 MB
 009 Evading Firewalls Using MitM Attacks.mp411.79 MB
 010 Firewall Evasion Tools.mp421.98 MB
 005 Evading Firewalls.mp479.91 MB
 004 Types of Firewalls.mp459.58 MB
 001 Introduction.mp420.4 MB
 002 Understanding Firewalls.mp449.55 MB
 012 Denial-of-Service Attack.mp427.26 MB
 013 Application-Layer Attacks.mp415.37 MB
 011 Evasion Attack.mp410.2 MB
 010 Insertion Attack.mp410.41 MB
 009 How to Avoid IDS Demo.mp48.5 MB
 014 Time to Live Attacks.mp421.15 MB
 015 False Positive Generation.mp411.28 MB
 019 Post Connection SYN.mp417.37 MB
 018 Pre Connection SYN.mp419.11 MB
 017 Session Splicing.mp419.21 MB
 009 Vulnerability to Buffer Overflows.mp448.89 MB
 010 Buffer Overflow Demo.mp49.89 MB
 003 Stack Overflow Demo.mp413.18 MB
 017 Conclusion.mp411.37 MB
 006 Format Strings.mp415.2 MB
 004 Heaps.mp431.52 MB
 011 Handling Buffer Overflow.mp467.76 MB
 008 Integer Overflow Demo.mp46.85 MB
 007 Format String Buffer Overflow Demo.mp415.98 MB
 015 Buffer Overflow Security Tools.mp436.26 MB
 010 CA Management Demo.mp424.38 MB
 009 Certificate Management.mp429.81 MB
 011 conclusion.mp48.88 MB
 005 Confi-complete Demo.mp443.54 MB
 006 CRL Demo.mp428.96 MB
 007 Enroll Certificate Demo.mp414.99 MB
 004 Certificate Authority CA.mp412.96 MB
 003 PKI Installation Demo.mp49.17 MB
 002 Public key Infrastructure PKI.mp442.14 MB
 008 Secure Communication with Certificates.mp447.86 MB
 001 Introduction.mp44.58 MB
 002 BitLocker Demo.mp420.77 MB
 001 Introduction.mp448.53 MB
 004 Introduction.mp413.43 MB
 006 Stream and Block Ciphers.mp462.59 MB
 007 AES.mp4154.17 MB
 005 Symmetric Demo.mp414.91 MB
 003 Cryptographic Schemes.mp414.11 MB
 017 Conclusion.mp412.4 MB
 011 Hashing.mp417.28 MB
 010 Key Exchange Methods.mp457.9 MB

Description

DONT FORGET TO SEED!

UPDATE!!!! i have purchased a seedbox and currently it is seeding. if you feel the need to donate to me for my seedbox and everything (because the seedbox costs money) feel free to message me. if not, enjoy!

The following is from the course description:

Welcome to our IT Security and Ethical Hacking Course.

Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.

Section 1: In the pre-assessment quiz you'll face questions from all sections of this Ethical Hacking training. Test your current knowledge and know your strengths and weaknesses.

Sections 2-4: In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing.

Sections 5-7: You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems.

Sections 8-10: Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network.

Sections 11-13: Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux.

Sections 14-16: Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords — how they're created, how they're stored, and different methods used to crack them.

Section 17-19: You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover.

Section 20-22: You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information.

Sections 23-26: Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing.

Section 27: Final Exam

What are the requirements?

No prerequisites for this course - A computer with Internet
What am I going to get from this course?

Over 467 lectures and 25.5 hours of content!
Upon completion of this course, students will have a basic introduction to ethical hacking and its various concepts.
You will be able to understand and apply information technologies concepts that include: vulnerabilities, defense-in-depth, penetration testing, the methodology for pentesting/ethical hacking, vulnerability management, incident management, and creating and implementing a security policy.
You will also know the countermeasures that can be taken to protect yourself from the dangers of hacking, and all that that may entail.
You will be able to identify what a SQL injection is along with the different wireless types and vulnerabilities. You will also gain a basic understanding of the concepts behind buffer overflow, cryptography and their weaknesses, mobile hacking, how to evade both firewalls and honeypots, and successfully evade IDS.
What is the target audience?

This course is intended for individuals looking to expand their knowledge of different IT Security principals.

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
17.51 GB
seeders:1
leechers:0
IT Security and Ethical Hacking