Licensed Penetration

EC-Council's: Licensed Penetration Tester  Video

Posted by b1u3eyes at Sept. 14, 2009
EC-Council's:  Licensed Penetration Tester

EC-Council's: Licensed Penetration Tester | 2.82GB

EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

Network Security testing via Penetration Testing 6 DVDs  Video

Posted by phoenixy at June 13, 2010
Network Security testing via Penetration Testing 6 DVDs

Network Security testing via Penetration Testing 6 DVDs | ISO | 9.9GB

EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.

Writing Penetration Testing Reports  eBooks & eLearning

Posted by naag at Aug. 17, 2017
Writing Penetration Testing Reports

Writing Penetration Testing Reports
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 163 MB
Genre: eLearning | Language: English

Writing penetration testing reports is a critical skill in your career. This course will teach you how to write penetration testing reports.

Penetration Testing Bootcamp  eBooks & eLearning

Posted by readerXXI at Aug. 17, 2017
Penetration Testing Bootcamp

Penetration Testing Bootcamp
by Jason Beltrame
English | 2017 | ISBN: 1787288749 | 253 Pages | True PDF | 23 MB
Percutaneous Penetration Enhancers Drug Penetration Into/Through the Skin: Methodology and General Considerations

Nina Dragicevic and Howard I. Maibach, "Percutaneous Penetration Enhancers Drug Penetration Into/Through the Skin: Methodology and General Considerations"
English | ISBN: 3662532689 | 2017 | 414 pages | PDF | 17 MB
Percutaneous Penetration Enhancers Chemical Methods in Penetration Enhancement: Modification of the Stratum Corneum (Repost)

Nina Dragicevic, Howard I. Maibach, "Percutaneous Penetration Enhancers Chemical Methods in Penetration Enhancement: Modification of the Stratum Corneum"
English | 2016 | 415 Pages | ISBN: 3662470381 | PDF | 16 MB

ECSA Certification Preparation: The CEH v9 Next Step (Part Two)  eBooks & eLearning

Posted by naag at Feb. 9, 2017
ECSA Certification Preparation: The CEH v9 Next Step (Part Two)

ECSA Certification Preparation: The CEH v9 Next Step
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 26.5 Hours | Lec: 141 | 6.2 GB
Genre: eLearning | Language: English

The EC-Council Certified Security Analyst certification comes right after the Certified Ethical Hacker v9 certification.

ECSA Certification Preparation: The CEH v9 Next Step (Part One)  eBooks & eLearning

Posted by naag at Jan. 29, 2017
ECSA Certification Preparation: The CEH v9 Next Step (Part One)

ECSA Certification Preparation: The CEH v9 Next Step
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 13 Hours | Lec: 62 | 8.47 GB
Genre: eLearning | Language: English

The EC-Council Certified Security Analyst certification comes right after the Certified Ethical Hacker v9 certification.

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

Certified Security Analyst Training  eBooks & eLearning

Posted by FenixN at June 15, 2016
Certified Security Analyst Training

Certified Security Analyst Training
HDRips | MP4/AVC, ~1100 kb/s | 1280x720 | Duration: 39 hours | English: AAC, 160 kb/s (2 ch) | 14.9 GB
Genre: Development / Programming / Security / Hacking

Learn penetration testing methodologies while preparing for the CSAT certifications. The Certified Security Analyst Training (CSAT) program teaches information security professionals to conduct realistic penetration tests.