Licensed Penetration

EC-Council's: Licensed Penetration Tester  Video

Posted by b1u3eyes at Sept. 14, 2009
EC-Council's:  Licensed Penetration Tester

EC-Council's: Licensed Penetration Tester | 2.82GB

EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

Network Security testing via Penetration Testing 6 DVDs  Video

Posted by phoenixy at June 13, 2010
Network Security testing via Penetration Testing 6 DVDs

Network Security testing via Penetration Testing 6 DVDs | ISO | 9.9GB

EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.

Kali Linux: Assuring Security by Penetration Testing (repost)  eBooks & eLearning

Posted by roxul at June 24, 2017
Kali Linux: Assuring Security by Penetration Testing (repost)

Tedi Heriyanto, Lee Allen, "Kali Linux: Assuring Security by Penetration Testing"
2014 | ISBN-10: 184951948X | 454 pages | PDF | 8 MB

Penetration Testing Life Cycle Explained  eBooks & eLearning

Posted by naag at June 23, 2017
Penetration Testing Life Cycle Explained

Penetration Testing Life Cycle Explained
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 268 MB
Genre: eLearning | Language: English

It's becoming more and more essential to understand what a penetration tester does for a business. This course will walk you through the key steps taken by a penetration tester.
Percutaneous Penetration Enhancers Drug Penetration Into/Through the Skin: Methodology and General Considerations [Repost]

Percutaneous Penetration Enhancers Drug Penetration Into/Through the Skin: Methodology and General Considerations by Nina Dragicevic
English | 12 May 2017 | ISBN: 3662532689 | 414 Pages | PDF | 16.5 MB

Percutaneous Penetration Enhancers in a mini-series format comprising five volumes, represents the most comprehensive reference on enhancement methods – both well established and recently introduced – in the field of dermal/transdermal drug delivery.

ECSA Certification Preparation: The CEH v9 Next Step (Part Two)  eBooks & eLearning

Posted by naag at Feb. 9, 2017
ECSA Certification Preparation: The CEH v9 Next Step (Part Two)

ECSA Certification Preparation: The CEH v9 Next Step
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 26.5 Hours | Lec: 141 | 6.2 GB
Genre: eLearning | Language: English

The EC-Council Certified Security Analyst certification comes right after the Certified Ethical Hacker v9 certification.

ECSA Certification Preparation: The CEH v9 Next Step (Part One)  eBooks & eLearning

Posted by naag at Jan. 29, 2017
ECSA Certification Preparation: The CEH v9 Next Step (Part One)

ECSA Certification Preparation: The CEH v9 Next Step
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 13 Hours | Lec: 62 | 8.47 GB
Genre: eLearning | Language: English

The EC-Council Certified Security Analyst certification comes right after the Certified Ethical Hacker v9 certification.

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

Certified Security Analyst Training  eBooks & eLearning

Posted by FenixN at June 15, 2016
Certified Security Analyst Training

Certified Security Analyst Training
HDRips | MP4/AVC, ~1100 kb/s | 1280x720 | Duration: 39 hours | English: AAC, 160 kb/s (2 ch) | 14.9 GB
Genre: Development / Programming / Security / Hacking

Learn penetration testing methodologies while preparing for the CSAT certifications. The Certified Security Analyst Training (CSAT) program teaches information security professionals to conduct realistic penetration tests.

Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)  eBooks & eLearning

Posted by house23 at April 4, 2015
Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)

Udemy - Learn The Basics of Ethical Hacking and Penetration Testing (2015)
MP4 | AVC 328kbps | English | 1280x720 | 5fps | 18 hours | AAC stereo 60kbps | 3.15 GB
Genre: Video Training

Become a Master Computer Security Expert by Learning How to Use Ethical Hacking to Reveal Potential Vulnerabilities in Information Systems. This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system. In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker. Get started with this course today to be on your way towards finding real-world computer security solutions.