SEC504 – Hacker Tools, Techniques, Exploits, and Incident Handling

SEC504 – Hacker Tools, Techniques, Exploits, and Incident Handling
English | Size: 2.31 GB
Category: E-learning | HACKING | Security


504.1 – Incident Handling Step-by Step & Comp Crime Investigation
504.3 – Computer & Network Hacker Exploits, Part 2
504.4 – Computer & Network Hacker Exploits, Part 3
504.5 – Computer & Network Hacker Exploits, Part 4
504.6 – Hacker Tools Workshop [Read more…]

SANS – SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

SANS – SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
English | Size: 104.54 MB
Category: Security/Hacking

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these hacking tools and techniques.
[Read more…]

Packt Binary Exploits with Python-XQZT

Packt Binary Exploits with Python-XQZT
English | Size: 664.16 MB
Category: CBTs

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.
[Read more…]

SANS 504 Hacker Tools, Techniques, Exploits and Incident Handling PDFs (2016) & MP3 (2017)

SANS 504: Hacker Tools, Techniques, Exploits and Incident Handling PDFs (2016) & MP3 (2017)
English | Size: 868.01 MB
Category: CBTs

SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. [Read more…]

Lynda – Ethical Hacking – Exploits

Lynda – Ethical Hacking – Exploits
English | Size: 203.96 MB
Category: Tutorial

In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid being hacked or attacked by explaining the mechanics of malware and other exploits-harmful software that takes advantage of flaws. Malcolm shows how to test if your organization’s network is vulnerable, a crucial skill for IT security professionals. He also demonstrates how to use basic and advanced debugging tools by taking you through the uses for each. [Read more…]

SANS Security 660 – Advanced Penetration Testing, Exploits and Ethical Hacking

SANS Security 660 - Advanced Penetration Testing, Exploits and Ethical Hacking

Title: SANS Security 660 – Advanced Penetration Testing, Exploits and Ethical Hacking
Video Format: MP4
File Size: 3.53 GB
More info
[Read more…]

SANS – SEC660 Advanced Penetration Testing, Exploits, and Ethical Hacking 2012

SANS - SEC660 Advanced Penetration Testing, Exploits, and Ethical Hacking 2012

Title: SANS – SEC660 Advanced Penetration Testing, Exploits, and Ethical Hacking 2012
Video Format: MP4
File Size: 3.53 GB
More info
[Read more…]