Ceh 2015

CEH v9: Certified Ethical Hacker Version 9 Study Guide  eBooks & eLearning

Posted by First1 at Aug. 3, 2017
CEH v9: Certified Ethical Hacker Version 9 Study Guide

CEH v9: Certified Ethical Hacker Version 9 Study Guide by Oriyano
English | April 29th, 2016 | ASIN: B01F0HZ1JW, ISBN: 1119252245 | 648 pages | EPUB | 7.76 MB

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material.

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition  eBooks & eLearning

Posted by First1 at Aug. 3, 2017
CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition by Matt Walker
English | September 16th, 2016 | ASIN: B01KL1FVXI, ISBN: 125983655X | 529 pages | EPUB | 10.56 MB

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

CEH V9 : Certified Ethical Hacker Version 9 Practice Tests  eBooks & eLearning

Posted by readerXXI at June 18, 2017
CEH V9 : Certified Ethical Hacker Version 9 Practice Tests

CEH V9 : Certified Ethical Hacker Version 9 Practice Tests
by Raymond Blockmon
English | 2016 | ISBN: 1119252156 | 192 Pages | True PDF | 25 MB

CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition  eBooks & eLearning

Posted by nebulae at June 10, 2017
CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition

Oriyano, "CEH v9: Certified Ethical Hacker Version 9 Study Guide, 3rd Edition"
English | 2016 | ISBN-10: 1119252245 | 648 pages | PDF True | 31 MB

Certified Ethical Hacker (CEH) Foundation Guide  eBooks & eLearning

Posted by hill0 at April 5, 2017
Certified Ethical Hacker (CEH) Foundation Guide

Certified Ethical Hacker (CEH) Foundation Guide by Sagar Rahalkar
English | 15 Dec. 2016 | ISBN: 1484223241 | 224 Pages | EPUB/MOBI | 5.69 MB

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.
Learning Path: Visual Studio: Simplify App and Web Development with Visual Studio 2015

Learning Path: Visual Studio: Simplify App and Web Development with Visual Studio 2015
HDRips | MP4/AVC, ~461 kb/s | 1920x1080 | Duration: 07:34:50 | English: AAC, 128 kb/s (2 ch) | 2.32 GB
Genre: Development / Programming

Make application development easier, faster, and more productive

ITPro.TV - Certified Ethical Hacker CEH v9  eBooks & eLearning

Posted by FenixN at Jan. 18, 2017
ITPro.TV - Certified Ethical Hacker CEH v9

ITPro.TV - Certified Ethical Hacker CEH v9
HDRips | MP4/AVC, ~3409 kb/s | 1920x1076 | Duration: 33:37:36 | English: AAC, 256 kb/s (2 ch) | 42.9 GB
Genre: Development / Programming / Security

EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.

Certified Ethical Hacker CEH Complete Video Course (Module 1-2)  eBooks & eLearning

Posted by FenixN at Dec. 9, 2016
Certified Ethical Hacker CEH Complete Video Course (Module 1-2)

Certified Ethical Hacker CEH Complete Video Course (Module 1-2)
HDRips | MP4/AVC, ~1250 kb/s | 1280x720 | Duration: 05:41:03 | English: AAC, 128 kb/s (2 ch) | 3.07 GB
Genre: Development / Programming / Security

Learn everything you need to know to pass the Certified Ethical Hacker exam in under 11 hours. Understand the basics of network and Internet accessible application technologies, common discovery, and analysis techniques as well as more advanced security concepts such as malware and cryptography.

Preparing for CompTIA A+ - Exam 220-902 (2015 Objectives)  eBooks & eLearning

Posted by FenixN at Nov. 10, 2016
Preparing for CompTIA A+ - Exam 220-902 (2015 Objectives)

Preparing for CompTIA A+ - Exam 220-902 (2015 Objectives)
HDRips | MP4/AVC, ~319 kb/s | 1280x720 | Duration: 09:19:01 | English: AAC, 128 kb/s (2 ch) | 1.66 GB
Genre: Development / Programming / Security

Holding the CompTIA A+ certification is an IT career builder. Why? Because it indicates to IT hiring managers worldwide that you have the knowledge needed to set up and operate the technologies commonly deployed in today's IT centers. Obtaining the A+ certification requires that you pass two exams: The CompTIA A+ 220-901 and the CompTIA A+ 220-902.

DefCon USA 2015  eBooks & eLearning

Posted by FenixN at Oct. 3, 2016
DefCon USA 2015

DefCon USA 2015
HDRips | MP4/AVC, ~401 kb/s | 1280x720 | Duration: 152:05:24 | English: AAC, 32 kb/s (1 ch)
Audio CDs in MP3 / English: MP3, 24 kb/s (1 ch) | Duration: 152:06:09 | 2015
Size: 29.7 GB | Genre: Development / Programming / Security / Hacking

DEF CON is all about thinking up cool and new ways to approach everything from the most complex modern technology to hacking grandma's toaster. Show us and the world what you have been up to and what attack exploits, defensive techniques, or unique research you have been working on.