Search This Blog

Showing posts with label Forensics. Show all posts
Showing posts with label Forensics. Show all posts

Friday, February 8, 2019

Certified Digital Forensics Examiner - CDFE Exam Video Training Course on 2 DVDs




Duration : 6.40 hours

16 Modules

30 Video Lessons 



Module 01 – Introduction 

Module 02 – Computer Forensic Incidents 

Module 03 – Investigation Process 

Module 04 – Disk Storage Concepts

Module 05 – Digital Acquisition & Analysis 

Module 06 – Forensic Examination Protocols 

Module 07 – Digital Evidence Protocols

Module 08 – CFI Theory 

Module 09 – Digital Evidence Presentation 

Module 10 – Computer Forensic Laboratory Protocols 

Module 11 – Computer Forensic Processing 

Module 12 – Digital Forensics Reporting

Module 13 – Specialized Artifact Recovery

Module 14 – e-Discovery and ESI 

Module 15 – Cell Phone Forensics

Module 16 – USB Forensics 

Buy This Course DVD Now @







                                   







Thursday, July 31, 2014

Certified Ethical Hacker (CEH) v8 (Exam 312-50) Video Course DVD Rs 400/-





Duration:10.5 hrs / 109 tutorials Videos

Introduction
Welcome(02:58)
Exam Info(04:10) 
Course Outline(03:14) 
Lab Setup(03:17)

Intro to Ethical Hacking
 About Hacking(06:20) 
About Hackers(06:27) 
Types of Tests(06:24) 
Defenses(06:26)T 
Methodology(06:32)
Hacking Tools(06:08) 
BackTrack 5 Tour(06:23)

Reconnaissance
Footprinting(06:33)
Footprinting Methods(06:03) 
Internet Searching(06:04)
Google Hacking pt. 1(06:03)
Google Hacking pt. 2(05:48) 
Email(05:13)T WHOIS and DNS(06:05) 
Defeating Footprinting(05:52)

Scanning
Scanning Intro(05:17) 
TCP Scans(06:20) 
ICMP and UDP(05:16)
Scan Captures(05:19)
Nmap pt. 1(06:15) 
Nmap pt. 2(06:16) 
Nessus pt. 1(06:08) 
Nessus pt. 2(05:54)
Mitigation(05:35)

Enumeration
Enumeration Intro(05:18) 
Windows Enumeration pt. 1(06:07) 
Windows Enumeration pt. 2(05:58) 
Linux Enumeration(06:13) 
Network Enumeration pt. 1(06:28) 
Network Enumeration pt. 2(06:16) 
Mitigation(05:18)

System Attacks
System Attacks Intro(05:40) 
Passwords 101(06:04)
Password Theft(05:33)
Password Cracking(06:06)
Cracking Demo pt. 1(05:54)
Cracking Demo pt. 2(06:19)
Steganography(05:54) 
System Hacking Tools(03:35) 
Netcat Demo(06:02) 
Remote Control Demo(05:17) 
Physical Security(06:31) 
Physical Attack Demo(04:58)

Malware
Malware Attacks(06:13) 
Trojans(05:54) 
Using Trojans(06:45) 
Trojan Demo(05:24) 
Viruses pt. 1(06:58) 
Viruses pt. 2(04:57) 
Worms pt. 1(06:11) 
Worms pt. 2(05:28)

Network 
Network Attacks Intro(05:21) 
Sniffing pt. 1(04:19)
Sniffing pt. 2(05:08) 
Sniffing pt. 3(06:03) 
Packet Manipulation(03:52) 
Spoofing an IP Address(06:10) 
Session Hijacking(06:29) 
Wireless Hacking(06:40) 
Aircrack-ng Demo pt. 1(05:39) 
Aircrack-ng Demo pt. 2(05:32) 
Aircrack-ng Demo pt. 3(04:38) 
Denial of Service(06:13)

Application 
Application Hacking Intro(04:45) 
Buffer Overflows(03:30) 
Buffer Overflow Demo(03:49) 
Mobile Application Attacks(06:22) 
Android Emulator Demo(05:21)

Web Hacking
Web Server Hacking(06:42) 
Web Server Attacks(06:28) 
Web Server Hacking Tools pt. 1(04:27)
Web Server Hacking Tools pt. 2(06:10) 
Web Application Hacking(06:40) 
Acunetix Demo(05:20) 
Metasploit Pro Demo(05:47)

Cryptography
Cryptography Intro(05:35) 
Algorithms and Keys(06:09) 
CrypToolDemo(06:09) 
Types of Encryption(05:51) 
Encryption Algorithms(06:31) 
Hashing(05:12) 
Hashing Tools(06:14) 
PKI pt. 1(05:54) 
PKI pt. 2(06:13) 
Digital Signatures(04:41) 
File Encryption(06:29) 
Disk Encryption(05:39) 
Cryptography Attacks pt. 1(06:18) 
Cryptography Attacks pt. 2(06:34)

Social Engineering
Social Engineering Intro(04:56) 
Targets(06:29) 
Methods(06:04) 
Human-Based Attacks(06:30) 
Technology-Based Attacks(06:29) 
Physical Attacks(06:28)
Mitigations(06:08)
Formal Penetration Testing
Types of Testing(06:12) 
Methods(06:21)
Preparation(06:07) 
Deliverables(06:11) 
Managing Tests(06:16)

Conclusion
Course Wrap Up(05:49) 
Resources(05:48) 
Practice Exam(03:47)

Credits
 About the Author(01:55)

And

CEHv8 Question Paper 100 Page Pdf Document


========================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV

========================================================================


VLC Player, Flash Player and Other Video Tools Also Provided in this Course DVD





Any Advanced Graphic Design Software Tutorials, IT Software Tutorials, Multimedia  Software Tutorials, All Engineering purpose Software Tutorials & All Software Tutorials Available

For more details

Email : digitalcollections4u@gmail.com
https://www.facebook.com/TutorialsDvDs

Tuesday, June 17, 2014

EC-Council Certified Security Analyst / Licensed Penetration Tester Video training + LAB & Tools 7 DVDs Rs 1200/-





Course outline:-

Module 00 – Student Introduction
Module 01 – The Need for Security Analysis
Module 02 – Advanced Googling
Module 03 – TCP/IP Packet Analysis
Module 04 – Advanced Sniffing
Module 05 – Vulnerability Analysis
Module 06 – Advanced Wireless
Module 07 – Designing a DMZ
Module 08 – Snort Analysis
Module 09 – Log Analysis
Module 10 – Advanced Exploits and Tools
Module 11 – Penetration Testing Methodologies
Module 12 – Customers and Legal Agreements
Module 13 – Rules of Engagement
Module 14 – Penetration Testing Planning and Scheduling
Module 15 – Customers and Legal Agreements
Module 16 – Information Gathering
Module 17 – Vulnerability Analysis
Module 18 – External Penetration Testing
Module 19 – Internal Network Penetration Testing
Module 20 – Router and Switches Penetration Testing
Module 21 – Firewall Penetration Testing
Module 22 – IDS Penetration Testing
Module 23 – Wireless Network Penetration Testing
Module 24 – Denial of Service Penetration Testing
Module 25 – Password Cracking Penetration Testing
Module 26 – Social Engineering Penetration Testing
Module 27 – Stolen Laptops, PDAs, and Cell Phones Penetration Testing
Module 28 – Application Penetration Testing
Module 29 – Physical Security Penetration Testing
Module 30 – Database Penetration Testing
Module 31 – VoIP Penetration Testing
Module 32 – VPN Penetration Testing
Module 33 – War Dialing
Module 34 – Virus and Trojan Detection
Module 35 – Log Management Penetration Testing
Module 36 – File Integrity Checking
Module 37 – Bluetooth and Hand Held Device Penetration Testing
Module 38 – Telecommunication and Broadband Communication Penetration Testing
Module 39 – Email Security Penetration Testing
Module 40 – Security Patches Penetration Testing
Module 41 – Data Leakage Penetration Testing
Module 42 – Penetration Testing Deliverables and Conclusion
Module 43 – Penetration Testing Report and Documentation Writing
Module 44 – Penetration Testing Report Analysis
Module 45 – Post Testing Actions
Module 46 – Ethics of a Licensed Penetration Tester
Module 47 – Standards and Compliance

47 Module Training On 6 DVDs

And

1 DVD containing the latest Tools and Exploits

_________________________________________________________________



This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 





_________________________________________________________________




VLC Player, Flash Player and Other Video Tools Also Provided in this Course DVD






Any Advanced Graphic Design Software Tutorials, IT Software Tutorials, Multimedia  Software Tutorials, All Engineering purpose Software Tutorials & All Software Tutorials Available

For more details

Email : digitalcollections4u@gmail.com
https://www.facebook.com/TutorialsDvDs

Saturday, May 3, 2014

Certified Ethical Hacker v7 Complete Video Course And Tools 6 DVDs Rs 999/-









EC-Council Certified Ethical Hacker v7 

English | ISO + PDF | 19 Modules 


CEH Exam 312-50



CEH Exam 312-50 Information

Number of Questions: 125

Passing Score: 70%

Test Duration: 4 Hours

Test Format: Multiple Choice

Test Delivery: Prime Prometric (IBT), VUE, and APTC

Exam Prefix: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350 CEHv8 (APTC)


Video Lessons



Topics Covered 

DVD 1:

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffers
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Evading IDS, Firewalls and Honeypots
17. Buffer Overflows
18. Cryptography
19. Penetration Testing.

 
How to Use Tools Video Lessons And Tools 5 DVDs :


  CEHv7 - Module 12 - Hacking Webserver 1.6 GB
  CEHv7 - Module 07 - Viruses and Worms 1.53 GB
  CEHv7 - Module 05 - System Hacking 1.47 GB
  CEHv7 - Module 13 - Hacking Web Applications 1.39 GB
  CEH Linux Build 1.21 GB
  CEHv7 - Module 16 - Evading IDS, Firewalls and Honeypots1.08 GB
  CEHv7 - Module 03 - Scanning Networks 1.07 GB
  CEHv7 - Module 06 - Trojans and Backdoors 839.19 MB
  CEHv7 - Module 04 - Enumeration 808.23 MB
  CEHv7 - Module 15 - Hacking Wireless Networks 752.29 MB
  CEHv7 - Module 08 - Sniffers 679.64 MB
  CEHv7 - Module 14 - SQL Injection 618.76 MB
  CEHv7 - Module 19 - Penetration Testing 556.95 MB
  CEHv7 - Module 02 - Footprinting and Reconnaissance 525.2MB
  CEH v7 Instructor Slides_VeriSign.Encrypted.Sig 381.67 MB
  CEHv7 Lab Prerequisites 323.6 MB
  CEHv7 - Module 18 - Cryptography 296.33 MB
  CEHv7 - Module 10 - Denial of Service 185.78 MB
  CEHv7 - Module 17 - Buffer Overflows 73.75 MB
  CEHv7 - Module 11 - Session Hijacking 17.04 MB
  CEHv7 - Module 09 - Social Engineering 3.63 MB
  Frankenstein Slides.pdf 1.91 MB
  SCAN.NFO 109.08 KB
  Legal_Disclaimer.htm




_________________________________________________________________


This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 



_________________________________________________________________



VLC Player, Flash Player and Other Video Tools Also Provided in this Course DVD





Any Advanced Graphic Design Software Tutorials, IT Software Tutorials, Multimedia  Software Tutorials, All Engineering purpose Software Tutorials & All Software Tutorials Available

For more details

Email : digitalcollections4u@gmail.com
https://www.facebook.com/TutorialsDvDs

Tuesday, April 8, 2014

ISACA Certification CISA Video Training Complete Course 2 DVDs Rs 500







Course Duration: 10:38:34

Video Lessons Details 

Introduction to CISA
Why should you become a CISA? In this first Nugget you'll discover why CISA is a valuable certification. You'll also learn about the six core CISA knowledge areas. And you'll get a few helpful tips for success on the CISA path.
00:14:19

The IS Audit Process (part 1)
Before digging deep into information technology auditing, you need to cover the basics. Learn what your responsibilities are as an auditor of information systems. Explore the IT auditing process, risk analysis, and the importance of internal controls.
00:27:25

The IS Audit Process (part 2)
This Nugget investigates audit classifications as well as phases of the auditing process. Learn to apply the risk-based audit methodology, including what qualifies as evidence. Also, explore how to apply Computer Assisted Audit Technique (CAAT) and the Control Self-Assessment (CSA) framework and techniques.
00:30:17

Information Technology Governance (part 1)
Define corporate and IT governance, including what governance practices and procedures are critical to the auditing process. Discover the realm of Information Security (IS) governance, as well as IS strategy.
00:34:22

Information Technology Governance (part 2)
In this second Nugget on IT governance you'll learn what goes into IT policies and the IS Policy document. You'll also discover what risk management processes and risk analysis methods can be applied.
00:35:08

Information Technology Governance (part 3)
This last Nugget on IT governance explores a few more vital aspects of governance -- personnel management, insourcing, outsourcing, organizational change management, IS quality management, and performance management.
00:29:49

Systems and Infrastructure Life Cycle Management (part 1)
Four key areas of systems and infrastructure life cycle management are explored in this Nugget. These areas are project management structure, practical project management, business application development, and the software development process.
00:24:03

Systems and Infrastructure Life Cycle Management (part 2)
This Nugget continues the flow from part 1, looking at waterfall application development as an alternative method of life cycle management. Then you'll learn about infrastructure development and acquisition, IS maintenance methods, tools and aids you can use, and finally about techniques you can use for improving the audit process.
00:34:43

Systems and Infrastructure Life Cycle Management (part 3)
In part 3 of systems and infrastructure life cycle management you will learn about application controls and auditing application controls. You will also learn about developing, acquiring and maintaining business application systems.
00:34:14

IT Service Delivery and Support (part 1)
This first of three videos on IT service delivery and support explores the ISO/OSI model with a story called "The Fellowship of the Token Ring."
00:30:03

IT Service Delivery and Support (part 2)
In part 2 of this section, you learn all about IS operation and hardware, plus hardware management, IS architecture, and the types of IS software available.
00:30:49

IT Service Delivery and Support (part 3)
The third and last Nugget on IT service delivery and support investigates different network infrastructure taxonomies. We apply the OSI model to LANs, WANs, and VPNs, as well as looking at the difference between wired and wireless VPNs.
00:40:33

Protection of Information Assets (part 1)
What are the key elements, roles, and responsibilities of the IS auditor in protecting information assets? Learn these, plus the importance of classifying information assets. Also, learn about assigning system access permissions, Mandatory Access Controls (MACs) and Discretionary Access Controls (DACs), what the IS auditor's role is in maintaining privacy, and finally, how to deal with external parties such as service providers, vendors, contractors, and customers.
00:30:40

Protection of Information Assets (part 2)
This Nugget teaches you about logical access control vulnerabilities and access paths. Learn about identification and authentication mechanisms, as well as authorization. You'll wrap up the Nugget by exploring how auditors deal with the storage, retrieval, transport, and disposal of data.
00:38:48

Protection of Information Assets (part 3)
In this Nugget, you'll cover the general topics of LAN security, client-server security, wireless security, and internet security.
00:37:01

Protection of Information Assets (part 4)
Dive into encryption! Learn about encryption mechanisms plus issues with communications through voice over IP and PBX networks.
00:26:36

Protection of Information Assets (part 5)
This final Nugget on protection of information assets explores auditing IS management framework, auditing infrastructure security, physical access controls, and environmental controls.
00:34:15

Disaster Recovery and Business Continuity (part 1)
You can do a lot to prepare but what do you do when disaster strikes? Learn critical concepts surrounding disaster recovery and business continuity. This includes the business continuity planning (BCP) process, doing a Business Impact Analysis (BIA), and recovery strategies.
00:26:25

Disaster Recovery and Business Continuity (part 2)
This final Nugget in both the topic and series continues where the previous Nugget left off. You'll learn how to organize and assign responsibilities dealing with business continuity, deal with the separate BCP components, and finally perform an audit on disaster recovery and business continuity plans.
00:24:33

Introduction to the CISA Update Series
This opening Nugget is an overview of the CISA update series and the main topics to be covered.
00:03:21



Payment & Shipping Terms





Payments:
Pay or Transfer to my Bank account , Buying via eBay   



Shipping : By Courier through all over India (Dtdc Lite Couriers, Professional Couriers  Or INDIAN Speed Post)

Shipping charge : Rs 50/- Flat Rate shipping anywhere in India



What You Will Receive:




This IS NOT a Digital Download; The Course will be posted to the buyer on a DVD.

The DVD is fully printed with top Sony DVD and it will be sent to you in a CD/DVD Sleeve and Pack a Bubbles Cover  in a mailer. 




_________________________________________________________________


This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 



_________________________________________________________________


VLC Player, Flash Player and Other Video Tools Also Provided in this Course DVD



You can get with in two days

Any Advanced Graphic Design Software Tutorials, IT Software Tutorials, Multimedia  Software Tutorials, All Engineering purpose Software Tutorials & All Software Tutorials Available

For more details

Email : digitalcollections4u@gmail.com
https://www.facebook.com/TutorialsDvDs

Wednesday, March 26, 2014

Certified Information Systems Auditor (CISA) Video Training Complete Course in 3 DVDs Rs 900/-






Module 01 - The Process of Auditing Information Systems

Lesson 1: Management of the Audit Function

  • Organization of the IS Audit Function
  • IS Audit Resource Management
  • Audit Planning
  • Effect of Laws and Regulations on IS Audit Planning

Wednesday, January 8, 2014

Computer Hacking Forensic Investigator Video Training complete 6 DVDs Package Rs 950/-





 

Computer Hacking Forensic Investigator 

Course Outline CHFI v4

Module 01: Computer Forensics in Today’s World

Module 02: Computer Forensics Investigation Process

Module 03: Searching and Seizing of Computers

Module 04: Digital Evidence

Module 05: First Responder Procedures

Module 06: Incident Handling

Module 07: Computer Forensics Lab

Module 08: Understanding Hard Disks and File Systems

Module 09: Digital Media Devices

Module 10: CD/DVD Forensics

Module 11: Windows Linux Macintosh Boot Process

Module 12: Windows Forensics I

Module 13: Windows Forensics II

Module 14: Linux Forensics

Module 15: Mac Forensics

Module 16: Data Acquisition and Duplication

Module 17: Recovering Deleted Files and Deleted Partitions

Module 18: Forensics Investigations Using AccessData FTK

Module 19: Forensics Investigations Using Encase

Module 20: Steganography

Module 21: Image Files Forensics

Module 22: Audio file forensics

Module 23: Video File Forensics

Module 24: Application Password Crackers

Module 25: Log Capturing and Event Correlation

Module 26: Network Forensics and Investigating Logs

Module 27: Investigating Network Traffic

Module 28: Router Forensics

Module 29: Investigating Wireless Attacks

Module 30: Investigating Web Attacks

Module 31: Investigating DoS Attacks

Module 32: Investigating virus, Trojan, spyware and Rootkit Attacks

Module 33: Investigating Internet Crimes

Module 34: Tracking Emails and Investigating Email crimes

Module 35: PDA Forensics

Module 36: Blackberry Forensics

Module 37: iPod and iPhone Forensics

Module 38: Cell Phone Forensics

Module 39: USB Forensics

Module 40: Printer Forensics

Module 41: Investigating Corporate Espionage

Module 42: Investigating Computer Data Breaches

Module 43: Investigating Trademark and Copyright Infringement

Module 44: Investigating Sexual Harassment Incidents

Module 45: Investigating Child Pornography Cases

Module 46: Investigating Identity Theft Cases

Module 47: Investigating Defamation over Websites and Blog Postings

Module 48: Investigating Social Networking Websites for Evidences

Module 49: Investigation Search Keywords

Module 50: Investigative Reports

Module 51: Becoming an Expert Witness

Module 52: How to Become a Digital Detective

Module 53: Computer Forensics for Lawyers

Module 54: Law and Computer Forensics

Module 55: Computer Forensics and Legal Compliance

Module 56: Security Policies

Module 57: Risk Assessment

Module 58: Evaluation and Certification of Information Systems

Module 59: Ethics in Computer Forensics

Module 60: Computer Forensic Tools

Module 61: Windows Based Command Line Tools

Module 62: Windows Based GUI Tools

Module 63: Forensics Frameworks

Module 64: Forensics Investigation Templates

Module 65: Computer Forensics Consulting Companies



Total 10.5 GB DATAs in 6 DVDs

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 

=======================================================================
Payment mode : Pay on my account ,Buying via ebay or Paypal  


Shipping : By Courier through all over India


Shipping charge : Rs 50/- Flat Rate shipping anywhere in India


You can get with in two days

Any Advanced Graphic Design Software Tutorials, IT Software Tutorials, Multimedia  Software Tutorials, All Engineering purpose Software Tutorials & All Software Tutorials Available

For more details

Email : digitalcollections4u@gmail.com
https://www.facebook.com/TutorialsDvDs