Udemy – Ethical Hacking – USB Keystroke injection with DigiSpark

Udemy – Ethical Hacking – USB Keystroke injection with DigiSpark
English | Size: 554.98 MB
Category: CBTs

Everybody is talking about BadUSB attacks:
“If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin
“The BadUSB attack is quickly gaining global attention, and rightfully so.” Ken Jones, VP engineering and product management, IronKey Secure USB Devices
“Until strategies and plans to implement protection against firmware manipulation come into play, we can only urge you to be cautious.” Niall Mackey [Read more…]

Certified Professional Ethical Hacker (CPEH)

Certified Professional Ethical Hacker (CPEH)
English | Size: 12.01 GB
Category: Security

The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. [Read more…]

Udemy – Complete Nmap Ethical Hacking Training for Network Security

Udemy – Complete Nmap Ethical Hacking Training for Network Security
English | Size: 315.91 MB
Category: CBTs

Welcome to the “Complete Nmap Ethical Hacking Training for Network Security”course. This is our 3rd course in our Ethical Hacking series.I wanted to use “Hacking Essentials” in front of the name of the course, but size limit didn’t allow it.To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation.On my complete course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands on lessons, you will be able to use it as an ip port scanner, open port tester and checking for devices’ operating system and other features. [Read more…]

INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas

INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas
English | Size: 507.52 MB
Category: CBTs

This course prepares viewers for the Sniffing portion of the Certified Ethical Hacker (CEHv9) exam. During this module you will learn about gathering valuable data through sniffing techniques. Attaining sniffing capabilities is a great achievement for hackers, because even when it’s difficult to get there, the rewards might be worth the risk. We will learn LAN based and Internet based sniffing attacks and even use an experimental setting in Wireshark as a remote sniffing tool. [Read more…]

Udemy The Complete NMAP Ethical Hacking Course Network Security

Udemy The Complete NMAP Ethical Hacking Course Network Security
English | Size: 730.52 MB
Category: Tutorial

What Will I Learn?
You will become an expert in using Nmap for ethical hacking, system administration and network security.
Learn how to successfully discover active and vulnerable hosts on a network.
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
[Read more…]

Udemy – The Complete Nmap Ethical Hacking Course Network Security

Udemy – The Complete Nmap Ethical Hacking Course Network Security
English | Size: 730.58 MB
Category: Tutorial

What Will I Learn?
You will become an expert in using Nmap for ethical hacking, system administration and network security.
Learn how to successfully discover active and vulnerable hosts on a network.
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap. [Read more…]

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing
English | Size: 0.99GB
Category: Tutorial

In this Ethical Hacking – Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. [Read more…]

The Complete Nmap Ethical Hacking Course : Network Security

The Complete Nmap Ethical Hacking Course : Network Security
English | Size: 598.46 MB
Category: CBTs

Nmap is the Internets most popular network scanner with advanced features that most people don’t know even exists!

Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. [Read more…]

Packt Publishing – Complete Ethical Hacking Series – Pen Testing the Right Way

Packt Publishing – Complete Ethical Hacking Series – Pen Testing the Right Way
English | Size: 337.94 MB
Category: Tutorial

A real-world scenario based video course that takes a gradual learning curve, building up your knowledge about security, right from scratch.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. [Read more…]

O’Reilly – Special Considerations for Legal and Ethical Management of Data

O’Reilly – Special Considerations for Legal and Ethical Management of Data
English | Size: 705.53 MB
Category: CBTs

“Big data” is ubiquitous, but legal considerations regarding the collection and use of such data can get overlooked with significant consequences for all involved. This video walks through the best practices businesses should follow when working with big data to avoid triggering legal scrutiny. Topics include: providing transparency and choice around data practices; special considerations when dealing with sensitive data; attention to the organization’s data collection philosophy; support for a compliant culture; exercising due diligence on the frontend; including appropriate terms in contracts; and considerations for managing the data life cycle and data hygiene. [Read more…]