Pages

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sep 9, 2012

Windows Server 2008 Security


Windows Server 2008 Security
English | 800 x 600 | 15fps | WMV | Audio: WMA – 48kbps MONO | 447 MB
Windows Server 2008 Security contains the following Training Videos:

Security Baseline
Duration: 19:58
In this Video you’ll learn all about creating a security baseline configuration that ensures that not only are your systems as secure as possible, but also management of your systems is easier.
Security Configuration Wizard
Duration: 22:27
In this Video you’ll learn all how to use the Security Configuration Wizard to reduce the attack surface of your server by locking it down with a secure policy. You’ll also learn how to manually apply this policy to a server and apply it to a group of servers using Group Policy.
Securing Windows 2008 Active Directory Domain Services

Aug 16, 2012

CA – Certified Ethical Hacker v7.1 Volume 1 – 6


CA – Certified Ethical Hacker v7.1 Volume 1 – 6
English | DVDs | ISO | 34.3 Gb
Genre: Career Academy , eLearning

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student completes the course they will have hands on understanding and experience in Ethical Hacking.

Aug 8, 2012

Microsoft Security ISA Server 2004 70-350: Implementing Microsoft Internet Security and Acceleration Server 2004 CBT Training Video


Microsoft Security ISA Server 2004 70-350: Implementing Microsoft Internet Security and Acceleration Server 2004 CBT Training Video
Genre: eLearning

The Microsoft exam covered by this training has been retired. If you are still using the equipment covered by this retired exam, however, you’ll find that this training holds significant value as an on the job reference.
This Jeremy Cioara video training for ISA Server 2004 maps to Microsoft Exam 70-350. You’ll be earning elective credit towards both the MCSE and MCSA 2003 certifications, while you gain on-the-job skills for deploying ISA Server 2004 on your network from start-to-finish.

Jul 30, 2012

CEH Training Boot Camp CBT- Certified Ethical Hacker v.7


CEH Training Boot Camp CBT- Certified Ethical Hacker v.7
English | DVD-ISO | Video Tutorials + PDF + Labs + Tools | 19 Modules | 2.49 GB

Genre: eLearning
EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent several years in developing this version.
The Certified Ethical Hacker courseware has undergone tremendous improvement from its predecessor. We have invested 4 times the regular investment in the research and development since the last release, and have given CEHv7 a complete makeover.

Wireshark Network Forensics & Security Video Trainings With Tools


Wireshark Network Forensics & Security Video Trainings With Tools
En | 1.95GB
Genre: Video Training

Description:
This course focuses on network forensics including capture locations, stealth-mode capture,optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware behavior, backdoor communications and virus traffic.
Recommended prerequisite knowledge:
Basic security knowledge (resources, viruses, worms, denial of service)
Basic and advanced network components (hubs, switches, routers, firewalls, IDS)
Very strong knowledge of Wireshark functionality and features

Jul 26, 2012

Certified Ethical Hacker CBT


Certified Ethical Hacker CBT
Size: 13.11 GB
Genre: eLearning
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors

Apr 4, 2012

Backtrack Full and Complete Video Tutorials


Backtrack Full and Complete Video Tutorials
Enghlish | H264 603kbps | 1200×600 15fps | MP3 124kbps | 6.2 GB

Genre: Video Training
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date.
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.

Mar 25, 2012

Career Academy – Certified Ethical Hacker v7 (CEH) 3 DVDs


Career Academy – Certified Ethical Hacker v7 (CEH) 3 DVDs
English | 3 DVDs | ISO | 5.36 GB
Genre: Video Training
Official CBT from Career Academy
EC-Council CEH Certified Ethical Hacker v7.1 Training – OnDemand Learning
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

Mar 1, 2012

C-AcademyTraining: Hacking, Penetration Testing & Countermeasures – M 1 & 2


C-AcademyTraining: Hacking, Penetration Testing & Countermeasures – M 1 & 2
Career Academy | English | 212 MB
Genre: Video Training

Our training videos will show you how to scan, test, hack and secure your own systems.
The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Feb 27, 2012

C-AcademyTraining: Advanced Digital Forensic Techniques

1290177119 cbtscreenshoot640x480wx C AcademyTraining:  Advanced Digital Forensic Techniques
C-AcademyTraining: Advanced Digital Forensic Techniques
CareerAcademy – 2.1 GB
The dramatic increase in computer-related crime requires corporate security personnel and law enforcement agents to understand how to legally obtain electronic evidence stored in computers.

Electronic records such as computer network logs, e-mails, word processing files, and “.jpg” picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.
One of the purposes of this course is to provide law enforcement agents and corporate security personnel with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.

Feb 26, 2012

C-AcademyTraining: CEHv6 6 DVD Disc set


C-AcademyTraining: CEHv6 6 DVD Disc set
Applications : Windows : English – Career Academy 10.6 GB
This is the 6 DVD Disc set (10GB) from Career Academy for Certified Ethical Hacking V.6.
It contains the CBT portion of the training, the 4 disc set more commonly available on all the sites are the Lab Discs (13GB). Discs are in ISO format. Enjoy!
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

C-AcademyTraining: Hacking Penetration Testing & Countermeasures Part 1 2


C-AcademyTraining: Hacking Penetration Testing & Countermeasures Part 1 2
Career Academy | 3 GB
Genre: Video Training

Career Academy Hacking Penetration Testing and Countermeasures Training with new younger guy (O.K. guy) but not balding one. These training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection,Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

C-AcademyTraining: Ec Council Certified Security Analyst & Licensed Penetration Tester


C-AcademyTraining: Ec Council Certified Security Analyst & Licensed Penetration Tester
6 DVDs | iso | English | 3.55 GB

Genre: eLearning
Description:
The ECSA/LPT training program is a highly interactive security course designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this course will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the course providing complete coverage of analysis and network security testing topics.

C-AcademyTraining: Career Academy Certified Ethical Hacker CBT Training Boot Camp


C-AcademyTraining: Career Academy Certified Ethical Hacker CBT Training Boot Camp
Video: wmv1 (yuv420p) .WMV | 12hours | Resolution: 800×592

Career Academy | 2.45 Gb
Career Academy is an EC-Council endorsed training provider. We have invited the best security trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass your certification exams. This officially endorsed product gives our students access to the exam by providing you with a Voucher Number. The EC-Council Voucher Number can be used at any Prometric center, this voucher number is required and mandatory for you to schedule and pay for your exam. Without this voucher number Prometric will not entertain any of your requests to schedule and take the exam. See our Joint Press Release with EC-Council. Note: The cost of the exam is not included in this package.

C-AcademyTraining: Security Certified Network Professional – SCNP


C-AcademyTraining: Security Certified Network Professional – SCNP
Video: Format:.FLV1 | Bitrate:786 kbps| Codec:ffflv | Resolution:480 x 360
English | ISOAudio: Format: 85 | Bitrate:128kbps | Codec:ffmp3 | Rate:44100Hz | Channels:2

Career Academy | 3.43GB
The Strategic Infrastructure Security course picks up right where Tactical Perimeter Defense leaves off. The second course in the SCP line-up leads to a certification of Security Certified Network Professional (SCNP). It will give a network administrator the additional hands on skills needed to protect their network from the inside out. This course teaches you about prevention techniques as well as giving the candidate an understanding of risk analysis and security policy creation in a blended technology environment. The up-to-date security lessons and intense, hands-on labs bring a real world network security to training candidates.

Feb 23, 2012

Wireshark Network Forensics & Security course With Tools


Wireshark Network Forensics & Security course With Tools
English | 2011 | PDF/AVI | eLearning | 1.95GB

This course focuses on network forensics including capture locations, stealth-mode capture,optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware behavior, backdoor communications and virus traffic.

Dec 11, 2011

Specialized Solutions Certified Ethical Hacker

Specialized Solutions Certified Ethical Hacker
Language: English | ISO | 2.52 GB
Genre: eLearning

The Certified Ethical Hacker v5 certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.
This certification is a great compliment to any MCSE. An MCSE would be able to handle security initiatives productively rather than restricting the efficiency of the organization. Functionality is expanded instead of lost in the process of securing the organization. For this reason the Certified Ethical Hacker v5 certification from Specialized Solutions compliments any MCSE in a practical manner. Microsoft’s operating systems are the most widely deployed systems and for this reason they are also subjected to the most intrusion attempts.

Hacking is conducted by an individual that illegally uses or accesses a computer or computer network. There are several common ways of “Hacking”. Viruses and Worms are the most common security issues for US businesses today. 79% of US businesses reported that security training improved their ability to identify risks in their company network.

Hackers have changed targets; now they’re attacking Firewalls and other security products that are supposed to protect PCs. Protect your corporate information. Get certified in Ethical Hacking and Countermeasures v5 (312-50) from Specialized Solutions, an Authorized EC-Council Training Center. At a time when security – especially Internet security – is paramount, no sole product can be current enough to protect against known vulnerabilities. That’s why there’s no better time to master the hacking tools and security systems that pertain to Windows 2000 ®, Linux ®, and wireless networks.

Understanding what an individual does once he’s in your system is far more important than learning how to patch a box, and that’s what these (ethical hacker) classes from Specialized Solutions are for. This Training Solution will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience. There is no better way to “make real” the threats out there than to practice them in a lab setting. The chain of events that can turn a very small ‘chink in the armor’ into ‘complete site compromise’ sounds obscure until you see it done for yourself.

Ethical Hacking delivers the core skill sets for every security professional seeking to test, prevent, and protect their corporate network. This certification from Specialized Solutions ensures that security professionals have the knowledge to identify and close exploits that make computer systems susceptible to attack and if compromised, how to track down the offender.

The Certified Ethical Hacker v5 Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 22 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

Download
http://www.filesonic.com/file/4148663175/Specialized.Solutions.Certified.Ethical.Hacker.part1.rar
http://www.filesonic.com/file/4148663035/Specialized.Solutions.Certified.Ethical.Hacker.part2.rar
http://www.filesonic.com/file/4148662935/Specialized.Solutions.Certified.Ethical.Hacker.part3.rar
http://www.filesonic.com/file/4148675615/Specialized.Solutions.Certified.Ethical.Hacker.part4.rar
http://www.filesonic.com/file/4148675595/Specialized.Solutions.Certified.Ethical.Hacker.part5.rar
http://www.filesonic.com/file/4148662895/Specialized.Solutions.Certified.Ethical.Hacker.part6.rar

Dec 2, 2011

Wireshark University Network Training Course Full 4 DVD

Wireshark University Network Training Course Full 4 DVD
Filesonic | 1.74 GB

Course Outline can be found here:
_http://www.wiresharktraining.com/Files/wsu-course_list080708.pdf

This course focuses on network forensics including capture locations, stealth-mode capture, optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware ehavior, backdoor communications and virus traffic.

Course Information:

WSU01: Wireshark Functionality and Fundamentals

Section 1: Introduction to Wireshark
Section 2: Capturing Packets
Section 3: Configuring Global Preferences
Section 4: Navigation and Colorization Techniques
Section 5: Using Time Values and Summaries
Section 6: Examining Basic Trace File Statistics
Section 7: Examining Advanced Trace File Statistics
Section 8: Creating Display Filters
Section 9: Save, Export and Print
Section 10: Expert System and Miscellaneous Tasks
Section 11: Using Command-Line Tools

WSU02: TCP/IP Network Analysis

Section 1: TCP/IP Functionality Overview
Section 2: Analyze DNS Traffic
Section 3: Analyze ARP Traffic
Section 4: Analyze IPv4 Traffic
Section 5: Analyze ICMP Traffic
Section 6: Analyze UDP Traffic
Section 7: Analyze TCP Traffic
Section 8: Analyze DHCP Traffic
Section 9: Analyze HTTP Traffic
Section 10: Analyze Telnet Traffic
Section 11: Analyze FTP Traffic
Section 12: Analyze POP Traffic
Section 13: Analyze SMTP Traffic

WSU03: Troubleshooting Network Performance

Section 1: Analyzer Placement
Section 2: Normal Network Communications
Section 3: Causes of Performance Problems
Section 4: Wireshark Functions for Troubleshooting
Section 5: Latency Issues
Section 6: Packet Loss and Retransmissions
Section 7: Misconfigurations and Redirections
Section 8: Dealing with Congestion
Section 9: Baseline Network Communications

WSU04: Network Forensics and Security

Section 1: Analyzer Placement
Section 2: Unusual Network Communications
Section 3: Reconnaissance Processes
Section 4: Analyzing ICMP Traffic
Section 5: TCP Security
Section 6: Address Spoofing
Section 7: Building Firewall ACL Rules
Section 8: Signatures of Attacks
Home:http://www.top2read.info/

Download
http://www.filesonic.com/folder/16129145
Mirror For Japan, EU, UAE, China, Au, Ru, SA, Brazil and Sing…
http://www.filesonic.com/file/4055293714/sevno.org_wireshark university network training.part1.rar
http://www.filesonic.com/file/4055296894/sevno.org_wireshark university network training.part2.rar
http://www.filesonic.com/file/4055337324/sevno.org_wireshark university network training.part3.rar
http://www.filesonic.com/file/4055320814/sevno.org_wireshark university network training.part4.rar

Hacking, Penetration Testing, Countermeasures collection Caree video [+ebook]

Hacking, Penetration Testing, Countermeasures collection Caree video [+ebook]
Filesonic – 2.71 GB

He training videos will show you how to scan, test, hack and secure your own systems.

The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Our training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Package Includes:

* 1 DVD Featuring live instructor-led classroom sessions with full audio, video and demonstration components

* Printable courseware

* 300+ Penetration Testing Review Questions

* eWorkbook – 725 pages Student eWorkbook by Logical Security

* Free 1 Year Upgrade Policy

Info _http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=95
http://www.top2read.info/

Download
http://www.filesonic.com/folder/16129095
Mirror For Japan, EU, UAE, China, Au, Ru, SA, Brazil and Sing…
http://www.filesonic.com/file/4054940074/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part1.rar
http://www.filesonic.com/file/4054953534/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part2.rar
http://www.filesonic.com/file/4054965694/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part3.rar
http://www.filesonic.com/file/4054967604/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part4.rar
http://www.filesonic.com/file/4054979854/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part5.rar
http://www.filesonic.com/file/4054990334/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part6.rar
http://www.filesonic.com/file/4054998064/sevno.org_Hacking, Penetration Testing, Countermeasures collection Caree.part7.rar

Nov 26, 2011

Cisco CCNP Security SECURE 642-637 CBTtraining

Cisco CCNP Security SECURE 642-637 CBTtraining
English | avi 800 x 592 | mpeg4 546 Kbps | 20 fps | pcm 352 Kbps | 1.39 GB

Genre: eLearning

Why does Cisco CCNP Security certification give you instant job security?
Because IT managers, CEOs and corporate shareholders are really nervous about network security.

Take your first big step towards CCNP Security certification by passing Cisco’s 642-637 exam. You’ll be advancing your security knowledge and career, upping your odds for scoring a promotion and building your clout within any IT team.

By the time you’ve finished this training series, you’ll understand Cisco defense-in-depth and how to deploy, implement, and configure Cisco security features.

Plus, you’ll be ready for the CCNP Security 642-637 exam.

Download
http://www.filesonic.com/folder/15645265