Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)

Sans SEC660 Advanced Penetration Testing – Exploits and Ethical Hacking (2014 PDFs)
English | Size: 217.2 MB
Category: Programming | HACKING | Security

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]

Sans 506 Securing Linux Unix PDF v2017

Sans 506 Securing Linux Unix PDF v2017
English | Size: 214.38 MB
Category: HACKING | Linux | Security

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2
English | Size: 1.27 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS MGT514 Security Strategic Planning, Policy, and Leadership [2016 PDF]

SANS MGT514: Security Strategic Planning, Policy, and Leadership [2016 PDF]
English | Size: 252.08 MB
Category: Security

As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams have more visibility, more budget, and more opportunity. However, with this increased responsibility comes more scrutiny. [Read more…]

SANS FOR572: Advanced Network Forensics and Analysis [2017 PDF]

SANS FOR572: Advanced Network Forensics and Analysis [2017 PDF]
English | Size: 475.96 MB
Category: Networking | Security

FOR572: ADVANCED NETWORK FORENSICS: THREAT HUNTING, ANALYSIS AND INCIDENT RESPONSE was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. We focus on the knowledge necessary to expand the forensic mindset from residual data on the storage media from a system or device to the transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker compromised a system with an undetectable exploit, the system still has to communicate over the network. Without command-and-control and data extraction channels, the value of a compromised computer system drops to almost zero. Put another way: Bad guys are talking – we’ll teach you to listen. [Read more…]

SANS FOR610 GREM2 – 2015

SANS FOR610 GREM2 – 2015
English | Size: 2.32 GB
Category: Security

Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that target and infect Windows systems.
[Read more…]

SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES


SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES
English | Size: 4.46 GB
Genre: eLearning

[Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2


SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 Ondemand Videos Part 2
English | Size: 1.27 GB
Genre: eLearning

[Read more…]

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos


SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Genre: eLearning

[Read more…]