SANS FOR585 (2015) Audio

SANS FOR585 (2015) Audio
English | Size: 1.96 GB
Category: Security

FOR585: Advanced Smartphone Forensics
Contents | Additional Info
Instructor: Heather Mahalik
36 CPEs
Laptop Required
Every day there are so many great bits of real-world knowledge. It isn’t just academic. Mind blowing experience.
Bart Dudek
This was an awesome class! Amazing amount of material and the capstone tied it all together.
D. Mayer, Broomsfield Police Department
It is almost impossible today to conduct a digital forensic investigation that does not include a smartphone or mobile device. Smartphones are replacing the need for a personal computer, and almost everyone owns at least one. The smartphone may be the only source of digital evidence tracing an individual’s movements and motives, and thus can provide the who, what, when, where, why, and how behind a case. FOR585: Advanced Smartphone Forensics teaches real-life, hands-on skills that help digital forensic examiners, law enforcement officers, and information security professionals handle investigations involving even the most complex smartphones currently available.
[Read more…]

SANS FOR500

SANS FOR500
English | Size: 244.54 MB
Category: Security

FOR500: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of Microsoft Windows operating systems. You can’t protect what you don’t know about, and understanding forensic capabilities and artifacts is a core component of information security. You will learn how to recover, analyze, and authenticate forensic data on Windows systems, track particular user activity on your network, and organize findings for use in incident response, internal investigations, and civil/criminal litigation. You will be able to use your new skills to validate security tools, enhance vulnerability assessments, identify insider threats, track hackers, and improve security policies. Whether you know it or not, Windows is silently recording an unbelievable amount of data about you and your users. FOR500 teaches you how to mine this mountain of data.
[Read more…]

SANS SEC 617 – 2015

SANS SEC 617 – 2015
English | Size: 175.75 MB
Category: Security

This review is long overdue. My apologies to EH-Net readers, SANS and especially Joshua Wright, developer and instructor of SEC 617 – Wireless Ethical Hacking, Penetration Testing, and Defenses. Its lateness is more due to my inability to comprehend exactly what I experienced than to a lack of desire to complete the task. I honestly sat down at the keyboard multiple times, but each time I felt I wasn’t doing the course or Mr. Wright justice. OK. so like every other SANS course, it had quality courseware, the instructor was top-notch, and I walked away with much more knowledge than when I arrived. So I could simply state the above sentence, report on each and every day of the course offering endless details, recommend it to the masses and be done with my job. But even that felt like empty rhetoric. [Read more…]

SANS FOR408 PDFs (2014)

SANS FOR408 PDFs (2014)
English | Size: 131.01 MB
Category: Tutorial

FOR500/FOR408 is an intermediate-level Windows forensics course that skips over the introductory material of digital forensics. This class does not include basic digital forensic analysis concepts. FOR500/FOR408 focuses entirely on in-depth, tool-agnostic analysis of the Windows operating system and artifacts. The course has been at the intermediate skill level since 2013 and a course number change to the 5 level reflects this content more accurately. The course is vigorously updated each year. The change in the course number was timed to coincide with the regularly scheduled update of the course in the Spring of 2017. SANS courses are updated as frequently as possible as part of our efforts to keep teaching material hyper-current and relevant for leading-edge problem solving.
[Read more…]

SANS MGT414 (2015) Audio

SANS MGT414 (2015) Audio
English | Size: 1.19 GB
Category: E-learning | Security

SANS MGT414: SANS Training Program for CISSP® Certification is an accelerated review course that is specifically designed to prepare students to successfully pass the CISSP® exam.

MGT414 focuses solely on the 8 domains of knowledge as determined by (ISC)2 that form a critical part of CISSP® exam. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.
[Read more…]

SANS SEC642 Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs

SANS SEC642: Advanced Web App Penetration Testing, and Exploitation Techniques (2016) PDFs
English | Size: 123.79 MB
Category: Tutorial

As web applications and their mobile counterparts become more complex and hardened against attack, penetration testers need to continually update the techniques and tools they use to evaluate the security of these systems. This includes understanding how the various new technologies work, which tools work with cutting-edge technologies like HTTP/2 and NoSQL, how to perform special penetration tests like Web Application Firewall inspections, and how to perform custom exploitation to demonstrate maximum impact for the applications you test. This course is designed to expand past the methodology and the ‘how’ when we are presented with the challenges of web penetration testing, and dig into the more esoteric ‘why’ these techniques and tools work, so that you can adapt as needed in your assessments.
[Read more…]

SANS 401 2016

SANS 401 2016
English | Size: 349.81 MB
Category: Tutorial

SANS SEC401 :: Security Essentials is most popular course and introduces you to the critical components of network security in an in-depth, comprehensive six-day course. We recommend this course to students who are just beginning their security career and technical generalist who wear many different hats. You will gain the essential, up-to-the-minute knowledge and skills required for effective performance when given the responsibility for securing systems and/or organizations. This course will also help you prepare for the GIAC Security Essentials (GSEC). [Read more…]

Sans – SEC560 Network Penetration Testing and Ethical Hacking

Sans – SEC560 Network Penetration Testing and Ethical Hacking
English | Size:
Category:

Section 0 – Getting started with your OnDemand SANS series
0.1 Welcome to your Sans OnDemand course
0.2 Introduction to Lab exercises
Section 1 – Comprehensive pen testing planning, scoping and reconnaissance
1.1 Pen testing foundations
1.2 Pen testing process
1.3 Reconnaissance
1.4 Appendix intro to Linux
[Read more…]

SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs

SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs
English | Size: 4.33 GB
Category: Tutorial

SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems. [Read more…]

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)
English | Size: 513.36 MB
Category: Tutorial

SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), Windows exploit-writing, and much more! [Read more…]