Search This Blog
Showing posts with label CEH. Show all posts
Showing posts with label CEH. Show all posts
Monday, July 8, 2019
CEH - Certified Ethical Hacking 2019 updated Video Training Course DVD
Duration : 23.5 hours
220 Video Lessons
Size : 4.40 GB
Subtitle also Available
IT Security Trends
23 Lessons
01:36:18
Computer Network Security
23 Lessons
01:45:42
Designing Secure Computer Networks
11 Lessons
01:05:13
Network administration
11 Lessons
01:06:56
Wireless Networks Security
16 Lessons
01:17:07
Operating Systems Security
17 Lessons
01:56:55
Access Control
12 Lessons
01:15:38
Windows Security
13 Lessons
01:12:36
Security Policies
12 Lessons
52:10
Risk Management
20 Lessons
01:29:44
Defence in Depth
20 Lessons
01:03:43
Disaster Recovery
11 Lessons
46:11
Application Security
11 Lessons
01:27:06
Application Security - Configuration and Management
10 Lessons
54:03
Cryptography
17 Lessons
01:43:38
Public Key Infrastructure
10 Lessons
51:33
Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs
Duration : 10 Hours
DOWNLOAD Size : 6.42 GB
2 DVDs
01 - Security Penetration Testing Introduction
02 - 1.0 Learning objectives
03 - 1.1 Introducing Ethical Hacking and Pen Testing
04 - 1.2 Getting Started with Ethical Hacking and Pen Testing
05 - 1.3 Understanding the Legal Aspects of Penetration Testing
06 - 1.4 Exploring Penetration Testing Methodologies
07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications
08 - 1.6 Building Your Own Lab
09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits
10 - 1.8 Understanding the Current Threat Landscape
11 - 2.0 Learning objectives
12 - 2.1 Installing Kali
13 - 2.2 Examining Kali Modules and Architecture
14 - 2.3 Managing Kali Services
15 - 3.0 Learning objectives
16 - 3.1 Understanding Passive Reconnaissance
17 - 3.2 Exploring Passive Reconnaissance Methodologies
18 - 3.3 Surveying Essential Tools for Passive Reconnaissance
19 - 4.0 Learning objectives
20 - 4.1 Understanding Active Reconnaissance
21 - 4.2 Exploring Active Reconnaissance Methodologies
22 - 4.3 Surveying Essential Tools for Active Reconnaissance
23 - 5.0 Learning objectives
24 - 5.1 Understanding Web Applications
25 - 5.2 Understanding Web Architectures
26 - 5.3 Uncovering Web Vulnerabilities
27 - 5.4 Exploring Methodologies for Testing Web Applications
28 - 5.5 Understanding the Exploitation of Web Applications
29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking
30 - 6.0 Learning objectives
31 - 6.1 Understanding Authentication and Authorization Mechanisms
32 - 6.2 Understanding Authentication and Authorization Attacks
33 - 6.3 Exploring Password Storage Mechanisms
34 - 6.4 Attacking Password Storage
35 - 6.5 Exploring Password Cracking
36 - 7.0 Learning objectives
37 - 7.1 Reviewing Database Fundamentals
38 - 7.2 Attacking a Database
39 - 7.3 Surveying Defenses to Mitigate Database Hacking
40 - Security Penetration Testing Summary
Product Tags:
CEH,
Certification Exam,
IT,
security
Thursday, July 4, 2019
Certified Professional Ethical Hacker (CPEH) 14 modules Video Course DVD
Duration : 7 Hours
14 Moduels
27 Video Lessons
Size : 1.62 GB
0-Security Fundamentals
1-Malware
2-Firewalls
3-Access Controls Part1
4-Access Controls Part2
5-Protocols Part1
6-Protocols Part2
7-Cryptography Part1
8-Cryptography Part2
9-Cryptography Part3
10-Cryptography Part4
11-Why Vulnerability Assessments Part1
12-Why Vulnerability Assessments Part2
13-Vulnerability Tools of the Trade
14-Output Analysis and Reports
15-Reconnaissance, Enumeration and Scanning Part1
16-Reconnaissance, Enumeration and Scanning Part2
17-Reconnaissance, Enumeration and Scanning Part3
18-Gaining Access Part 1
19-Gaining Access Part 2
20-Maintaining Access
21-Covering Tracks
22-Malware Part 1
23-Malware Part 2
24-Buffer Overflows Part 1
25-Buffer Overflows Part 2
26-Password Cracking Part 1
27-Password Cracking Part 2
CPEH .pdf
CPEH-Cert Professional Ethical Hacker .pdf
Product Tags:
CEH,
Certification Exam,
IT,
security
Certified Digital Forensics Examiner - CDFE Exam Video Training Course DVD
Duration : 6.40 hours
16 Modules
30 Video Lessons
Size : 1.25 GB
Module 01 – Introduction
Module 02 – Computer Forensic Incidents
Module 03 – Investigation Process
Module 04 – Disk Storage Concepts
Module 05 – Digital Acquisition & Analysis
Module 06 – Forensic Examination Protocols
Module 07 – Digital Evidence Protocols
Module 08 – CFI Theory
Module 09 – Digital Evidence Presentation
Module 10 – Computer Forensic Laboratory Protocols
Module 11 – Computer Forensic Processing
Module 12 – Digital Forensics Reporting
Module 13 – Specialized Artifact Recovery
Module 14 – e-Discovery and ESI
Module 15 – Cell Phone Forensics
Module 16 – USB Forensics
Thursday, May 2, 2019
Certified Ethical Hacking 2019 MEGA Course Video Training DVD
1. IT Security Trends
2. Computer Network Security
3. Designing Secure Computer Networks
4. Network administration
5. Wireless Networks Security
6. Operating Systems Security
7. Access Control
8. Windows Security
9. Security Policies
10. Risk Management
11. Defence in Depth
12. Disaster Recovery
13. Application Security
14. Application Security - Configuration and Management
15. Cryptography
16. Public Key Infrastructure
Subscribe to:
Posts (Atom)