Ethical Hacking Basic to Advanced!

Ethical Hacking Basic to Advanced!
English | Size: 2.36 GB
Category: CBTs

Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics that are added every month! [Read more…]

CEH v10: EC-Council Certified Ethical Hacker

CEH v10: EC-Council Certified Ethical Hacker
English | Size: 56.7 MB
Category: Cloud-Comp | HACKING | Linux | Networking | Security

EC-Council Certified Ethical Hacking (CEH) v10 Exam 312-50 Latest v10.
This updated version includes two major enhancement,
New modules added to cover complete CEHv10 blueprint.
Book scrutinized to rectify grammar, punctuation, spelling and vocabulary errors.
CEHv10 Update CEH v10 covers new modules for the security of IoT devices, vulnerability analysis, focus on emerging attack vectors on the cloud, artificial intelligence, and machine learning including a complete malware analysis process. [Read more…]

Udemy – Ethical Hacking – USB Keystroke injection with DigiSpark

Udemy – Ethical Hacking – USB Keystroke injection with DigiSpark
English | Size: 554.98 MB
Category: CBTs

Everybody is talking about BadUSB attacks:
“If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin
“The BadUSB attack is quickly gaining global attention, and rightfully so.” Ken Jones, VP engineering and product management, IronKey Secure USB Devices
“Until strategies and plans to implement protection against firmware manipulation come into play, we can only urge you to be cautious.” Niall Mackey [Read more…]

Certified Professional Ethical Hacker (CPEH)

Certified Professional Ethical Hacker (CPEH)
English | Size: 12.01 GB
Category: Security

The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. [Read more…]

Udemy – Complete Nmap Ethical Hacking Training for Network Security

Udemy – Complete Nmap Ethical Hacking Training for Network Security
English | Size: 315.91 MB
Category: CBTs

Welcome to the “Complete Nmap Ethical Hacking Training for Network Security”course. This is our 3rd course in our Ethical Hacking series.I wanted to use “Hacking Essentials” in front of the name of the course, but size limit didn’t allow it.To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation.On my complete course, you`ll discover the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands on lessons, you will be able to use it as an ip port scanner, open port tester and checking for devices’ operating system and other features. [Read more…]

INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas

INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas
English | Size: 507.52 MB
Category: CBTs

This course prepares viewers for the Sniffing portion of the Certified Ethical Hacker (CEHv9) exam. During this module you will learn about gathering valuable data through sniffing techniques. Attaining sniffing capabilities is a great achievement for hackers, because even when it’s difficult to get there, the rewards might be worth the risk. We will learn LAN based and Internet based sniffing attacks and even use an experimental setting in Wireshark as a remote sniffing tool. [Read more…]

Udemy The Complete NMAP Ethical Hacking Course Network Security

Udemy The Complete NMAP Ethical Hacking Course Network Security
English | Size: 730.52 MB
Category: Tutorial

What Will I Learn?
You will become an expert in using Nmap for ethical hacking, system administration and network security.
Learn how to successfully discover active and vulnerable hosts on a network.
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
[Read more…]

Udemy – The Complete Nmap Ethical Hacking Course Network Security

Udemy – The Complete Nmap Ethical Hacking Course Network Security
English | Size: 730.58 MB
Category: Tutorial

What Will I Learn?
You will become an expert in using Nmap for ethical hacking, system administration and network security.
Learn how to successfully discover active and vulnerable hosts on a network.
Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.
You will explore the Nmap Scripting Engine (NSE) used for more advanced discovery and hacking. We look at many scripts including those used for brute forcing passwords in email and databases, cross-site scripting (XSS) and SQL injection (SQLi) discovery and other cool Nmap scripts.
Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap. [Read more…]

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing

UDEMY – Ethical Hacking – Whitehat Hacking and Penetration Testing
English | Size: 0.99GB
Category: Tutorial

In this Ethical Hacking – Whitehat Hacking and Penetration testing tutorial, expert ethical hacker Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. [Read more…]

The Complete Nmap Ethical Hacking Course : Network Security

The Complete Nmap Ethical Hacking Course : Network Security
English | Size: 598.46 MB
Category: CBTs

Nmap is the Internets most popular network scanner with advanced features that most people don’t know even exists!

Discover the secrets of ethical hacking and network discovery, using Nmap on this complete course.

Nmap is an indispensable tool that all techies should know well. It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. [Read more…]