Search This Blog

Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Friday, February 12, 2016

LEARN HACKING TECHNIQUES FOR IT PROFESSIONALS VIDEO TRAINING DVD




Section 1: Security Policies
Lecture 1
Security policies - introduction 01:56
Lecture 2
What is security? 03:53
Lecture 3
Information security 04:13
Lecture 4
Information security - level up 04:04
Lecture 5
Security issues 04:50
Lecture 6
Why are security solutions fallible? 05:42
Lecture 7
Security policy issues 04:50
Lecture 8
Introduction to threat modelling and classification 05:14
Lecture 9
Threat modelling - STRIDE 04:06
Lecture 10
STRIDE: Spoofing identity 05:03
Lecture 11
STRIDE: Tampering with Data 04:28
Lecture 12
STRIDE: Denial of Service 03:51
Lecture 13
Threat Modelling and Classification - notes for the examination
19 pages
Section 2: Risk Managment
Lecture 14
Introduction to Risk Management 01:27
Lecture 15
Attack Methods 06:42
Lecture 16
Local attacks 02:56
Lecture 17
Target scanning and enumeration techniques #1 05:52
Lecture 18
Target scanning and enumeration techniques #2 03:30
Lecture 19
Passive scanning 02:06
Lecture 20
Attack Methodologies - notes for the examination
Lecture 21
Introduction to risk assessment 06:20
Lecture 22
DREAD: Risk assessment model 04:50
Lecture 23
DREAD: Exploitability 05:24
Lecture 24
EXERCISE: Risk Assessment 07:17
Lecture 25
Risk Assessment - notes for the examination
Lecture 26
Introduction to Social Engineering and rogue software 04:19
Lecture 27
Manipulation tactics 09:01
Lecture 28
EXERCISE: Engineering attacks 06:44
Lecture 29
SE with BackTrack 07:06
Lecture 30
Rogue Software02:28
Lecture 31
Fraud tools #10 7:10
Lecture 32
Fraud tools #2 06:32
Lecture 33
Social Engineering and Rogue Software - notes for the examination
Section 3: Defence in Depth
Lecture 34
Introduction to Defence in depth 01:32
Lecture 35
How to use Defence in depth model? 05:45
Lecture 36
DiD: OS and LAN layers 06:39
Lecture 37
DiD: Perimeter and Physical Access Layers 06:06
Lecture 38
DiD: Demonstration 02:48
Lecture 39
Automated attack targeting a service 05:23
Lecture 40
Automated user-targeting attack 04:31
Lecture 41
The Defence in Depth Model - notes for the examination
25 pages
Lecture 42
Introduction to Immutable laws of security - Law #1 04:35
Lecture 43
Law #2 02:56
Lecture 44
Law #3 02:23
Lecture 45
Law #4
01:52
Lecture 46
Law #5 03:28
Lecture 47
Law #6 02:07
Lecture 48
Law #7 01:11
Lecture 49
Law #8
01:43
Lecture 50
Law #9
03:57
Lecture 51
Law #10
00:48
Lecture 52
Laws for administrators 05:59
Lecture 53
Immutable Laws of Security - notes for the examination
21 pages
Section 4: Disaster Recovery
Lecture 54
Introduction to Disaster Recovery 01:33
Lecture 55
How to reduce losses? 05:24
Lecture 56
Ensuring continous availability 04:08
Lecture 57
Threat discovery #1 04:28
Lecture 58
Threat discovery #2 03:40
Lecture 59
Audit users and keep control accounts
05:18
Lecture 60
High risk users 03:23
Lecture 61
Collecting and analysing evidence 07:13
Lecture 62
Forensics example 03:52
Lecture 63
CONFICKER: CASE STUDY 07:11
Lecture 64
How to reduce losses - notes for the examination
31 pages
Section 5: Application Security
Lecture 65
Introduction to Application Security 08:18
Lecture 66
Attacks on applications 10:18
Lecture 67
SQL Injection 08:10
Lecture 68
EXERCISE: Analyze the application
13:31
Lecture 69
Blind SQL Injection 09:33
Lecture 70
Automated SQL Injection 11:44
Lecture 71
Cross-site scripting - XSS
10:10
Lecture 72
Application Attacks - notes for the examination
29 pages
Lecture 73
Program security assessment 05:10
Lecture 74
Unsafe applications 10:11
Lecture 75
Program Security Assessment - notes for the examination
10 pages
Section 6: Application Security - Configuration and Managment
Lecture 76
Here’s what you’ll learn in this module 01:05
Lecture 77
Managing applicaltions
08:26
Lecture 78
Software updates 02:39
Lecture 79
MS Update 06:53
Lecture 80
System Center Configuration Manager 02:46
Lecture 81
Blocking applications 07:35
Lecture 82
Software restrictions policies 05:57
Lecture 83
EXERCISE: Application control rules
12:11
Lecture 84
Isolating applications 06:30
Lecture 85
How to protect users without interrupting their work - notes for the examination
25 pages
Section 7: Cryptography
Lecture 86
Introduction to cryptography 09:42
Lecture 87
History of ciphers 10:57
Lecture 88
Symmetric and asymmetric ciphers 06:13
Lecture 89
Symmetric-key algorithms 05:49
Lecture 90
Block ciphers 06:01
Lecture 91
Data encryption standard 06:51
Lecture 92
DES-X 07:35
Lecture 93
Advanced encryption standards 05:28
Lecture 94
Block cipher modes 07:16
Lecture 95
Stream Ciphers - RC4 03:40
Lecture 96
Asymmetric-key algorithms 08:11
Lecture 97
RSA 05:33
Lecture 98
ELGAMAL 02:05
Lecture 99
HASH functions 05:56
Lecture 100
Digital signature 05:56
Lecture 101
Hybrid Schemes 06:24
Lecture 102
Symmetric and Asymmetric Ciphers - notes for the examination
57 pages
Section 8: Public Key Infrastructure
Lecture 103
Introduction to cryptology 02:12
Lecture 104
Public key infrastructure
06:10
Lecture 105
Implementing public key infrastructure 05:39
Lecture 106
What will PKI allow you? 06:29
Lecture 107
EXERCISE: Certificates 08:37
Lecture 108
Certificate life cycle 06:24
Lecture 109
Planning the PKI 08:33
Lecture 110
PKI Administration 07:29
Lecture 111
Public Key Infrastructure - Trust but verify - notes for the examination
37 pages
Section 9: Prepare yourself for the examination
Quiz 1
Answer sample questions which you can find during the examination
5 questions
Section 10: Your BONUS
Lecture 112
BONUS: Examination - your voucher

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner

Ethical Hacking Course Beginner to Advanced Video Training DVD Rs 399/-





Section 1: Ethical hacking and penetration testing. What is it and how can you use it?
How can you earn money legally with your ethical hacking skills online? 04:19
Section 2: Prerequisites for getting started with this course.
Lecture 7
Introduction to Ethical Hacking. What is it in detail? 
08:02
Lecture 8
Prerequisites success tips for getting the most out of this course. 
07:28
Lecture 9
How can you become intermediate and advanced with this course?
03:40
Section 3: Basic hacking terms you will want to know getting started.
Lecture 10
Basic terminology such as white hat, grey hat, and black hat hacking. 
12:00
Lecture 11
Basic terminology including SQL injections, VPN , proxy, VPS, and key loggers. 
18:18
Section 4: Build your hacking environment!
Lecture 12
Getting started successfully PDF with common questions answered and helpful tips
29 pages
Lecture 13
Installing VirtualBox with rpm plus why use a virtual machine. 
08:58
Lecture 14
Installing VirtualBox using the default package manager from repositories. 
15:01
Lecture 15
Creating the virtual environment. 
13:35
Lecture 16
Installing VirtualBox in a Windows 8.1 environment. 
05:16
Lecture 17
Kali Linux installation within a virtual environment. 
16:00
Lecture 18
Kali Linux installation after it is running and getting starting using it. 
12:18
Lecture 19
Installing VirtualBox Guest Additions 
14:40
Section 5: Set up instructions for Mac users ONLY
Lecture 20
Installing VirtualBox on a Mac
18:09
Lecture 21
Setting up Kali Linux with VirtualBox part 1
13:38
Lecture 22
Setting up Kali Linux with VirtualBox part 2
15:23
Lecture 23
How to set up a USB passthrough on a Mac part 1
19:02
Lecture 24
How to set up a USB passthrough on a Mac part 2
09:00
Lecture 25
Kali Linux Live USB on a MacBook Pro part 1 ( OPTIONAL )
19:47
Lecture 26
Kali Linux Live USB on a MacBook Pro part 2 ( OPTIONAL )
11:37
Lecture 27
Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL )
13:40
Section 6: How to create a bootable USB of Kali Linux ( optional )
Lecture 28
How to create a bootable USB of Kali with persistent storage > 4 GB part 1
19:17
Lecture 29
How to create a bootable USB of Kali with persistent storage > 4 GB part 2
18:01
Lecture 30
How to create a bootable USB of Kali with persistent storage > 4 GB part 3
06:26
Lecture 31
How to create a bootable USB of Kali with persistent storage > 4 GB part 4
10:48
Section 7: Updates: How to install VirtualBox on Fedora 22 + Kali Sana VM ( OPTIONAL )
Lecture 32
Fedroa 22 VirtualBox set up
17:10
Lecture 33
Kali Sana virtual machine installation
05:37
Lecture 34
How to install VBox GuestAdditions in Kali Sana
07:13
Section 8: Linux Terminal including basic functionalities and CLI.
Lecture 35
Introduction to the Linux terminal. 
09:31
Lecture 36
Linux Command-Line Interface (CLI) basics.
14:04
Lecture 37
The Linux CLI explained in greater detail to give you a good understanding.
15:26
Section 9: What is Tor? How can you use it to protect your anonymity online?
Lecture 38
Tor part 1.
10:58
Lecture 39
Tor part 2.
15:05
Section 10: ProxyChains for using proxy servers, hiding your ip, and obtaining access.
Lecture 40
Proxychains part 1.
12:01
Lecture 41
Proxychains part 2.
14:15
Lecture 42
Proxychains part 3. 
12:57
Section 11: What is a Virtual Private Network (VPN) and how you can stay anonymous with VPN?
Lecture 43
VPN part 1. 
13:29
Lecture 44
VPN part 2. 
14:54
Section 12: What is a macchanger? How can you use it to change your mac address?
Lecture 45
Macchanger part 1 (updated)
17:28
Lecture 46
Macchanger part 2 (updated)
19:02
Section 13: Footprinting with Nmap and external resources.
Lecture 47
Nmap part 1. 
17:34
Lecture 48
Nmap part 2. 
19:22
Lecture 49
External resources using public listings of known vulnerabilities. 
10:11
Section 14: Attacking wireless networks. Overview of the tools.
Lecture 50
Intro to wifi hacker cracking WPA⁄WPA2. 
15:14
Lecture 51
Aircrack and reaver installation. 
12:44
Lecture 52
Installing aircrack-ng on Windows + crunch on Linux. 
11:34
Lecture 53
For Windows Users. How To Set Up USB wireless Adapter with Virtualbox Part 1. 
07:42
Lecture 54
For Windows Users. How To Set Up USB wireless Adapter with VirtualBox part 2. 
07:11
Section 15: Breaking WPA/WPA2 encryption. Wifi hacking and wifi hacker training.
Lecture 55
Aircrack-ng _ crunch usage example_1 
11:04
Lecture 56
Aircrack-ng _ crunch usage example_2 
10:26
Lecture 57
Aircrack-ng _ crunch usage example_3 
20:39
Lecture 58
Cracking WPS pins with reaver part 1.
15:24
Lecture 59
Cracking WPS pins with reaver part 2.
10:41
Lecture 60
Cracking WPS pins with reaver part 3.
16:25
Section 16: Signal jamming and denial of service.
Lecture 61
Performing denial of service on wireless networks part 1. 
13:14
Lecture 62
Performing denial of service on wireless networks part 2. 
17:55
Section 17: SSL strips.
Lecture 63
SSL strip part 1. 
08:49
Lecture 64
SSL strip part 2. 
10:37
Lecture 65
SSL strip part 3. 
18:13
Section 18: Let's have a bit of fun!
Lecture 66
Funny things part 1. 
07:03
Lecture 67
Funny things part 2. 
12:12
Lecture 68
Funny things part 3.
18:21
Section 19: Evil twin method! Clone wireless access points to steal data.
Lecture 69
Evil twin part 1. 
10:34
Lecture 70
Evil twin part 2 
07:28
Lecture 71
Evil twin part 3. 
11:19
Section 20: Attacking routers to give you free reign over the entire network!
Lecture 72
Using known vulnerabilities part 1.
09:40
Lecture 73
Using known vulnerabilities part 2.
09:21
Lecture 74
Using known vulnerabilities part 3.
18:54
Section 21: DNS setting hacking to redirect users with post authentication exploitation.
Lecture 75
Post authentication exploitation ( DNS ) part 1.
09:38
Lecture 76
Post authentication exploitation ( DNS ) part 2.
12:22
Lecture 77
Post authentication exploitation ( DNS ) part 3.
13:41
Section 22: Website attacks with SQL injections.
Lecture 78
sql-injection-part-1
12:32
Lecture 79
sql-injection-part-2
14:46
Lecture 80
sql-injection-part-3
13:22
Lecture 81
sql-injection-part-4
11:24
Lecture 82
sql-injection-part-5
16:55
Section 23: Brute-forcing methods for cracking passwords.
Lecture 83
cracking-hashes 
12:03
Lecture 84
cracking-linux-password-with-john-the-ripper-part-1 
12:44
Lecture 85
cracking-linux-password-with-john-the-ripper-part-2 
08:50
Lecture 86
cracking-windows-password-with-john-the-ripper
19:25
Lecture 87
hydra-usage-part-1 
17:13
Lecture 88
hydra-usage-part-2 
18:21
Section 24: Denial of Service (DoS) attacks demonstrated and explained.
Lecture 89
DoS attack demonstration part 1. Introduction to Denial of Service attacks.
18:37
Lecture 90
DoS attack demonstration part 2. Combine slowloris.pl with nmap.
08:19
Lecture 91
DoS attack demonstration part 3 featuring ha.ckers.org.
09:45
Section 25: Reverse shells. Gain remote control of any device!
Lecture 92
Intro to Metasploit and reverse shells. What are reverse shells and why use them
18:28
Lecture 93
Metasploit ( reverse shell ) part 2 starting from a two terminal setup.
18:24
Lecture 94
Making reverse shells persistent on another system and escalating privileges.
16:35
Lecture 95
Creating a persistent reverse shell with Metasploit.
10:56
Lecture 96
Using NetCat to make any kind of connection you might need.
20:00
Lecture 97
How to upload a reverse shell onto a web server.
16:33
Section 26: Make your own Keylogger in C++
Lecture 98
General stuff 
14:15
Lecture 99
Setting up the Environment part 1 
19:58
Lecture 100
Setting up the Environment part 2 
19:28

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner

Sunday, August 2, 2015

Certified Hadoop Developer (Exam CCD-410) Video Training DVD Rs 399/-





Exam : Hadoop Developer CCDH 

Exam Code : CCD-410

Video Lessons 47

Duration : 5.45 Hours

Skill level : Intermediate & Advanced

Index Of Video Lessons


Section 1: Welcome to the Course


  • Certified Hadoop Developer 02:30
  • Welcome to the Course 03:34


Section 2: Introduction to Hadoop

  • Big Data - Big value 05:46
  • Understanding Big Data 05:16
  • Hadoop and other Solutions 07:25
  • Distributed Architecture - A Brief Overview 02:54
  • Hadoop Releases  05:16
  • Features between the releases


Section 3: Hadoop Setup

  • Setup Hadoop  28:57
  • Linux (Ubuntu) - Tips and Tricks 04:34
  • HDFS commands 10:32
  • Running a MapRed Program 07:48


Section 4: HDFS Architecture and Concepts

  • HDFS Concepts 04:35
  • HDFS Architecture 06:35
  • HDFS Read and Write 04:54
  • HDFS Concepts II 04:04
  • Special Commands 06:34


Section 5: Understanding MapReduce

  • MapReduce Introduction 06:05
  • Understanding MapReduce Part 1 05:12
  • Understanding MapReduce Part 2 05:19
  • Running First MapReduce Program 10:31
  • Combiner And Tool Runner 11:05
  • Recap Map, Reduce and Combiner Part 1 07:27
  • Recap Map, Reduce and Combiner Part 2 07:45


Section 6: MapReduce Types and Formats

  • MapReduce Types and Formats 05:37
  • Experiments with Defaults 07:11
  • IO Format Classes 06:16
  • Experiments with File Output - Advanced Concept 03:38


Section 7: Classic MapReduce and YARN

  • Job Run- Classic MapReduce 07:54
  • Failure Scenarios - Classic Map Reduce 03:45
  • Job Run - YARN 09:45
  • Failure Scenario - YARN 05:18
  • Job Scheduling in MapReduce 05:06
  • Shuffle and Sort 04:32
  • Performance Tuning Features 07:10


Section 8: Advanced MapReduce Concepts

  • Looking at Counters 06:21
  • Hands on - Counters 03:32
  • Sorting Ideas with Partitioner - Part 1 07:19
  • Sorting Ideas with Partitioner - Part 2 05:31
  • Map Side Join Operation 04:42
  • Reduce Side Join Operation 04:29
  • Side Distribution of Data 03:47
  • Hadoop Streaming and Hadoop Pipes 02:24


Section 9: Introduction to Hadoop Ecosystem
Introduction to Pig 09:24
Introduction to Hive 10:07
Introduction to Sqoop 08:43
Knowing Sqoop 04:05

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Shipping Banner
Read More... CCNA Routing and Switching 200-120 Complete Video Course on 3 DVDs Rs 750/-
You might also like: