Category
Recent News
Category: Tutorial

Cloud Ethical Hacking  Use Kali Linux on Amazon AWS

Cloud Ethical Hacking : Use Kali Linux on Amazon AWS
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | Lec: 41 | 687 MB
Genre: eLearning | Language: English

Download Now
Author: voska89Comments (0)
Read More...
Category: Tutorial
Learn Ethical Hacking From Scratch
Learn Ethical Hacking From Scratch
English | Size: 1.91 GB
Category: CBTs


Welcome to this comprehensive course on ethical hacking! This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in Zaid's lab. The course is structured in a way that will take you through the basics of Linux, computer systems, networks, and how devices communicate with each other.
Download Now
Author: u2uaComments (0)
Read More...
Category: Tutorial
INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas
INE | Ethical Hacking: Module 7 :: Sniffing | Josue Vargas
English | Size: 507.52 MB
Category: CBTs


This course prepares viewers for the Sniffing portion of the Certified Ethical Hacker (CEHv9) exam. During this module you will learn about gathering valuable data through sniffing techniques. Attaining sniffing capabilities is a great achievement for hackers, because even when it's difficult to get there, the rewards might be worth the risk. We will learn LAN based and Internet based sniffing attacks and even use an experimental setting in Wireshark as a remote sniffing tool.
Download Now
Author: u2uaComments (0)
Read More...
Category: Tutorial
INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
English | Size: 387.04 MB
Category: CBTS


In this module you will learn how malware works, the different categories of malware and how to use it to your advantage. Encompassing a lot of different tools, malware refers to software used for malicious purposes and currently, threats related to malware are causing millions of dollars in damage, data and reputation loss worldwide. As an ethical hacker, you're expected to know how to use malware offensively, but also recognize symptoms and signals that point to malware infections; in this module you will build and use malware to infect computers and you will also learn how to detect its presence in a system. Enjoy!
Download Now
Author: u2uaComments (0)
Read More...
Category: Tutorial
INE | Ethical Hacking: Module 5 :: System Hacking | Josue Vargas
INE | Ethical Hacking: Module 5 :: System Hacking | Josue Vargas
English | Size: 591.36 MB
Category: CBTs


The System Hacking module is the start of what you were looking for in all the previous phases of the Hacking Lifecycle. With the information gathered during previous stages, we will learn how we can force our way into a system, crack passwords, create backdoors, maintaining access to the system, hiding our files in plain sight and covering tracks. After this module, everything else revolves around different techniques and technologies that can be used to hack systems and networks, being the present module the theoretical foundation for what's to come.
Download Now
Author: u2uaComments (0)
Read More...
Category: Tutorial
Ethical Hacking: Module 4 :: Enumeration
Ethical Hacking: Module 4 :: Enumeration
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 345 MB
Genre: eLearning | Language: English

This course prepares viewers for the Enumeration portion of the Certified Ethical Hacker (CEHv9) exam. In the enumeration module you will learn how to use the discovered services and protocols running in your target network to gather more details and difficult to obtain intelligence prior to the actual System Hacking phase.

Download Now
Author: LeeAndroComments (0)
Read More...
Category: Tutorial
Ethical Hacking: Module 7 :: Sniffing
Ethical Hacking: Module 7 :: Sniffing
MP4 | Video: AVC 1920x1080 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 507 MB
Genre: eLearning | Language: English

This course prepares viewers for the Sniffing portion of the Certified Ethical Hacker (CEHv9) exam. During this module you will learn about gathering valuable data through sniffing techniques. Attaining sniffing capabilities is a great achievement for hackers, because even when it's difficult to get there, the rewards might be worth the risk.

Download Now
Author: LeeAndroComments (0)
Read More...
Category: Tutorial
Ethical Hacking Module 6  Malware Threats

Ethical Hacking: Module 6 :: Malware Threats
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 387 MB
Genre: eLearning | Language: English

Download Now
Author: voska89Comments (0)
Read More...
Category: Tutorial
Ethical Hacking Module 5  System Hacking

Ethical Hacking: Module 5 :: System Hacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours 49M | 591 MB
Genre: eLearning | Language: English

Download Now
Author: voska89Comments (0)
Read More...
Category: Tutorial
Packt Publishing - The Complete Ethical Hacking Series - Honeypots, IDS and FW's

Packt Publishing - The Complete Ethical Hacking Series - Honeypots, IDS and FW's
English | Size: 535.23 MB
Category: Tutorial
A real-world scenario based video course that takes a gradual learning curve, building up your knowledge about security, right from scratch.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Honey drive - HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot SCADA/ICS honeypot, Thug and PhoneyC honeyclients and more. Additionally it includes many useful pre-configured scripts and utilities to analyze, visualize and process the data it can capture, such as Kippo-Graph, Honeyd-Viz, DionaeaFR, an ELK stack and much more.
Download Now
Author: luixo2014Comments (0)
Read More...