Archive for May 24, 2011

Network Security & Ethical Hacking

Network Security & Ethical Hacking (CD 1-2-3) [NRG]

Network Security & Ethical Hacking (CD 1-2-3) [NRG]
English | NRG | 478 MB
1. Introduction to Information Security & Ethical Hacking
2. Basics of Networking (Tutorial for beginners)
3. Introduction
4. Hacker Vs Cracker
5. Ethical Hacking
6. Precautions
7. Current Cyber Threats
8. Desktop and Server Security
9. Windows Security
10. Hacking into Windows XP, NT
11. SAM (Security Accounts Manager)
12. Registries
13. Counter Measures
14. Linux Security
15. Hacking into Linux
16. Keyloggers - Hardware & Software
17. Anti Keyloggers
18. Trojans or Remote Administration Tools
19. Spywares
20. Viruses and Worms Introduction
21. Classification of Viruses and Worms
22. Examples of Viruses and Worms
23. Countermeasures
24. Anti Virus
25. LAN Security
26. Threats to LAN
27. Countermeasures
28. Network and File Sharing
29. Firewalls
30. Anti Virus
31. Anti Spywares
32. Network Scanners
33. Introduction to Firewalls
34. Working of a Firewall
35. Types of Firewalls
36. Packet Filters
37. Proxy Gateways
38. Network Address Translation
39. Intrusion Detection
40. Logging
41. Network Tools and Commands (Tutorial)
42. TCP/IP Commands
43. ARP Command
44. Trace route Command
45. Netstat Command
46. Finger Command
47. Ping Command
48. Nbtstat Command
49. Ipconfig Command
50. Telnet Command

Download link:

Download (shareflare):

Download (fileserve)

Download (filesonic)

Hacking Windows Tools and Tranning

Hacking Windows Tools and Tranning Wmv-Wmv3

Hacking Windows Tools and Tranning Wmv-Wmv3
Wmv | 720x540 | 12,5fps 320kbps | wmav2 22500hz | 920 MB

In this tutorial you going to learn more about RAT(s) and how they work. Well RAT(s) are usually used for hacking, and they are detected as backdoors.
Hacking Windows Tools and Tranning Wmv-Wmv3

Download link:

Download (shareflare):
Download (fileserve)
Download (filesonic)

ASP.NET 4.0 AJAX and jQuery Using Visual Basic

AppDev ASP.NET 4.0 AJAX and jQuery Using Visual Basic 2010 DVD

AppDev ASP.NET 4.0 AJAX and jQuery Using Visual Basic 2010 DVD
eLearning | 1.79 GB

Career Academy CEH 6.0 Certified Ethical Hacker

Career Academy CEH 6.0 Certified Ethical Hacker

Career Academy CEH 6.0 Certified Ethical Hacker
6 DVD | 10.3 GB

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed.
Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

Download Links


CISSP Training

PrepLogic - CISSP Training (Video, Audio, Ebook)

PrepLogic - CISSP Training (Video, Audio, Ebook)

PrepLogic - CISSP Training (Video, Audio, Ebook)
English | FLV, MP3, PDF | 640x480 | H.263 718Kbps | MP3 64Kbps | ISO | 4.76 GB
Genre: Training

The CISSP certification is the premier information security certification.
Earning your CISSP certification involves passing the challenging CISSP exam.
PrepLogic helps you get certified with CISSP training including CISSP LearnSmart
Video Training and CISSP Practice Exams. Our CISSP video training features over
33 hours of CBT training for the CISSP exam. Our CISSP Practice Exams provide
multiple practice tests with hundreds of practice questions and authentic CISSP exam
simulation. PrepLogic provides genuine CISSP exam training, as well as video training,
practice exams and study guides for ISC? certifications including SSCP and more.

LearnSmart Video Training

02_The Security Triangle
03_Security Management Training
04_Risk Assessment
05_Security Policy
06_Job Policies and Training
08_Access Control Basics
09_Data Classification
10_Access Control Techniques
11_Identification and Authentication
12_Attack and Monitor
13_Concepts and Methodologies
14_Cryptographic Algorithms
15_Cryptographic Practices
16_Methods of Attack
17_Physical Security Threats
18_Facility Requirements
19_Physical Security Controls
20_Environmental Issues
21_Physical Security
23_Machine Operation
24_Operating Modes _ Protection Mechanisms
25_Evaluation Criteria
26_BCP Project Scope
27_Business Impact Analysis
28_Recovery Plan
29_Recovery Plan Implementation
30_OSI Reference Model
31_OSI Layers
32_Remote Access Security
33_Network Devices
35_Security Protocols and Services
36_Common Network Attacks
37_Application Issues
38_Databases and Warehousing
39_Data and Information Storage
40_System Development Controls
41_Security Develpment Controls
42_Malicious Code
43_Methods of Attack
44_Administrative Management
47_Intrusion Detection
48_Threats and Countermeasures
49_Types of Computer Crime
50_Categories of Law
51_Computer Laws
52_Types of Incidents


Quiz Me Series Audio Training - CISSP Quiz Me Series


Mega Guide
Pocket Guide

More info:

PrepLogic - CISSP Training (Video, Audio, Ebook)

Dear visitor, you went to the site as unregistered user. We encourage you to register or enter the site under your name.