Search This Blog

Showing posts with label CEH. Show all posts
Showing posts with label CEH. Show all posts

Monday, July 8, 2019

CompTIA Pentest+ (Ethical Hacking) PT0-001 Exam Video Training Course 2 DVD




Duration : 8 Hours
Video Lessons : 82
Subtitle : Yes
Size :  8.23 GB 

CEH - Certified Ethical Hacking 2019 updated Video Training Course DVD




Duration : 23.5 hours

220 Video Lessons

Size : 4.40 GB 

Subtitle also Available

Course content


IT Security Trends
23 Lessons
01:36:18

Computer Network Security
23 Lessons
01:45:42

Designing Secure Computer Networks
11 Lessons
01:05:13

Network administration
11 Lessons
01:06:56

Wireless Networks Security
16 Lessons
01:17:07

Operating Systems Security
17 Lessons
01:56:55

Access Control
12 Lessons
01:15:38

Windows Security
13 Lessons
01:12:36

Security Policies
12 Lessons
52:10

Risk Management
20 Lessons
01:29:44

Defence in Depth
20 Lessons
01:03:43

Disaster Recovery
11 Lessons
46:11

Application Security
11 Lessons
01:27:06

Application Security - Configuration and Management
10 Lessons
54:03

Cryptography
17 Lessons
01:43:38

Public Key Infrastructure
10 Lessons

51:33

Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs



Duration : 10 Hours

DOWNLOAD Size : 6.42 GB 

2 DVDs



01 - Security Penetration Testing  Introduction

02 - 1.0 Learning objectives

03 - 1.1 Introducing Ethical Hacking and Pen Testing

04 - 1.2 Getting Started with Ethical Hacking and Pen Testing

05 - 1.3 Understanding the Legal Aspects of Penetration Testing

06 - 1.4 Exploring Penetration Testing Methodologies

07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications

08 - 1.6 Building Your Own Lab

09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits

10 - 1.8 Understanding the Current Threat Landscape

11 - 2.0 Learning objectives

12 - 2.1 Installing Kali

13 - 2.2 Examining Kali Modules and Architecture

14 - 2.3 Managing Kali Services

15 - 3.0 Learning objectives

16 - 3.1 Understanding Passive Reconnaissance

17 - 3.2 Exploring Passive Reconnaissance Methodologies

18 - 3.3 Surveying Essential Tools for Passive Reconnaissance

19 - 4.0 Learning objectives

20 - 4.1 Understanding Active Reconnaissance

21 - 4.2 Exploring Active Reconnaissance Methodologies

22 - 4.3 Surveying Essential Tools for Active Reconnaissance

23 - 5.0 Learning objectives

24 - 5.1 Understanding Web Applications

25 - 5.2 Understanding Web Architectures

26 - 5.3 Uncovering Web Vulnerabilities

27 - 5.4 Exploring Methodologies for Testing Web Applications

28 - 5.5 Understanding the Exploitation of Web Applications

29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking

30 - 6.0 Learning objectives

31 - 6.1 Understanding Authentication and Authorization Mechanisms

32 - 6.2 Understanding Authentication and Authorization Attacks

33 - 6.3 Exploring Password Storage Mechanisms

34 - 6.4 Attacking Password Storage

35 - 6.5 Exploring Password Cracking

36 - 7.0 Learning objectives

37 - 7.1 Reviewing Database Fundamentals

38 - 7.2 Attacking a Database

39 - 7.3 Surveying Defenses to Mitigate Database Hacking

40 - Security Penetration Testing  Summary

Thursday, July 4, 2019

Certified Professional Ethical Hacker (CPEH) 14 modules Video Course DVD



Duration : 7 Hours
14 Moduels
27  Video Lessons
Size : 1.62 GB

0-Security Fundamentals
1-Malware
2-Firewalls
3-Access Controls Part1
4-Access Controls Part2
5-Protocols Part1
6-Protocols Part2
7-Cryptography Part1
8-Cryptography Part2
9-Cryptography Part3
10-Cryptography Part4
11-Why Vulnerability Assessments Part1
12-Why Vulnerability Assessments Part2
13-Vulnerability Tools of the Trade
14-Output Analysis and Reports
15-Reconnaissance, Enumeration and Scanning Part1
16-Reconnaissance, Enumeration and Scanning Part2
17-Reconnaissance, Enumeration and Scanning Part3
18-Gaining Access Part 1
19-Gaining Access Part 2
20-Maintaining Access
21-Covering Tracks
22-Malware Part 1
23-Malware Part 2
24-Buffer Overflows Part 1
25-Buffer Overflows Part 2
26-Password Cracking Part 1
27-Password Cracking Part 2

CPEH .pdf
CPEH-Cert Professional Ethical Hacker .pdf

Certified Digital Forensics Examiner - CDFE Exam Video Training Course DVD




Duration : 6.40 hours

16 Modules

30 Video Lessons 

Size : 1.25 GB 


Module 01 – Introduction 

Module 02 – Computer Forensic Incidents 

Module 03 – Investigation Process 

Module 04 – Disk Storage Concepts

Module 05 – Digital Acquisition & Analysis 

Module 06 – Forensic Examination Protocols 

Module 07 – Digital Evidence Protocols

Module 08 – CFI Theory 

Module 09 – Digital Evidence Presentation 

Module 10 – Computer Forensic Laboratory Protocols 

Module 11 – Computer Forensic Processing 

Module 12 – Digital Forensics Reporting

Module 13 – Specialized Artifact Recovery

Module 14 – e-Discovery and ESI 

Module 15 – Cell Phone Forensics

Module 16 – USB Forensics 

Thursday, May 2, 2019

Certified Ethical Hacking 2019 MEGA Course Video Training DVD





1. IT Security Trends

2. Computer Network Security

3. Designing Secure Computer Networks

4. Network administration

5. Wireless Networks Security

6. Operating Systems Security

7. Access Control

8. Windows Security

9. Security Policies

10. Risk Management

11. Defence in Depth

12. Disaster Recovery

13. Application Security

14. Application Security - Configuration and Management

15. Cryptography

16. Public Key Infrastructure