Subcategories

Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Posted By: naag
Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Ethical Hacking: Reconnaissance/Footprinting
MP4 | AVC 90kbps | English | 1024x768 | 15fps | 3h 28mins | AAC stereo 103kbps | 500 MB
Genre: Video Training

Learn How To Create a Hacking / Penetration Testing Lab

Posted By: naag
Learn How To Create a Hacking / Penetration Testing Lab

Learn How To Create a Hacking / Penetration Testing Lab
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 11 | 321 MB
Genre: eLearning | Language: English

Learn how to install Kali Linux, Windows and Metasploitable on a single computer inside your current operating system.

Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Posted By: readerXXI
Cybersecurity and Information Security at Depository Institutions : Selected Assessments

Cybersecurity and Information Security at Depository Institutions :
Selected Assessments

by Lauren Hubbard
English | 2016 | ISBN: 1634842855 | 104 Pages | PDF | 1.94 MB

Depository institutions experienced cyber attacks in recent years that are estimated to have resulted in hundreds of millions of dollars in losses.

The Ethical Hacking Starter Kit: 12 Techniques

Posted By: naag
The Ethical Hacking Starter Kit: 12 Techniques

The Ethical Hacking Starter Kit: 12 Techniques
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | Lec: 59 | 901 MB
Genre: eLearning | Language: English

This course is focused on practice and will help you learn the basic techniques of Ethical Hacking & Penetration Testing

Best Internet Links

Posted By: Alex

Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Posted By: viserion
Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving

Damian Conway, chromatic, Curtis 'Ovid' Poe, "Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving"
ISBN: 0596526741 | 2006 | PDF | 298 pages | 2 MB

Cyberspace in Peace and War

Posted By: readerXXI
Cyberspace in Peace and War

Cyberspace in Peace and War
by Martin Libicki
English | 2016 | ISBN: 1682470326 | 652 Pages | ePUB | 2.75 MB

This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.).

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

Posted By: AlenMiler
How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK by Sparc FLOW
English | 28 Jan. 2017 | ISBN: 1520478518 | 107 Pages | PDF (conv) | 2.17 MB

This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.

Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Posted By: AlenMiler
Hacking Innovation: The New Growth Model from the Sinister World of Hackers

Hacking Innovation: The New Growth Model from the Sinister World of Hackers by Josh Linkner
English | 24 Jan. 2017 | ISBN: 1499902298 | 269 Pages | PDF (conv) | 6.43 MB

Hackers are a global fascination with cybercrime representing our single biggest threat to national security.

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Posted By: AlenMiler
Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing

Hacking: A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing (How to hack and secure your computer for beginners, Arduino, python) by John Slavio
English | 26 Jan. 2017 | ISBN: 1520467559 | 50 Pages | PDF (conv) | 425.3 KB

This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking and security measures that you should undertake.

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Posted By: AlenMiler
Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing) by Alexander Lumbantobing
English | 22 Jan. 2017 | ASIN: B01MTC12G2 | 109 Pages | PDF (conv) | 3.26 MB

This book is the result of collaborative work between "Computer Engineering Study Program - Cyber Security Research Center (CSRC), the Institute of Technology Del (IT Del)" with "Indonesian Backtrack Team (IBT)".

Hacking mit Security Onion

Posted By: roxul
Hacking mit Security Onion

Chris Sanders, Jason Smith, "Hacking mit Security Onion: Sicherheit im Netzwerk überwachen: Daten sammeln, analysieren und Angriffe rechtzeitig erkennen"
2016 | ISBN-10: 3645604960 | 560 pages | PDF | 27 MB

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Posted By: Nice_smile)
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It(Repost)

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by Jesse Varsalone
English | 2011 | ISBN: 1439821194 | 412 Pages | PDF | 47.07 MB

Ethical Hacking and Penetration Testing Guide (repost)

Posted By: roxul
Ethical Hacking and Penetration Testing Guide (repost)

Rafay Baloch, "Ethical Hacking and Penetration Testing Guide"
2014 | ISBN-10: 1482231611 | 531 pages | PDF | 22 MB

Ethical Hacking - Session Hijacking

Posted By: naag
Ethical Hacking - Session Hijacking

Ethical Hacking - Session Hijacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 10 | 221 MB
Genre: eLearning | Language: English

Learn session hijacking techniques and countermeasures.

Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)

Posted By: house23
Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)

Certified Ethical Hacker Bootcamp CEH V9 600 Q&A (2017)
MP4 | AVC 592kbps | English | 1280x720 | 30fps | 23 hours | AAC stereo 189kbps | 4.55 GB
Genre: Video Training

Prepare for the CEH V9 Exam with our bootcamp designed exclusively to help you ace the exam. The cyber world has brought many good things along - quick and easy access to large sources of information, e-mailing, new media of advertising and electronic commerce. Just as in our physical world, the cyber world too has a dark side that revolves around criminal hackers. Irrespective of the nature and size of the organization, everyone is worried about hackers playing havoc with their site, confidential information and site. This is where the ethical hackers step in.