Ethical Hacking Ebooks Collection

Ethical Hacking Ebooks Collection
English | Size: 198.57 MB
Category: Programming | HACKING


Black Belt Hacking & Complete Hacking Book
Hackers High School 13 Complete Hacking E-books
Penentration Testing With Backtrack 5
A Beginners Guide To Hacking Computer Systems
Black Book of Viruses and Hacking
[Read more…]

Udemy – Career Hacking: Resume/CV, LinkedIn®, Interviewing, +More

Udemy – Career Hacking: Resume/CV, LinkedIn®, Interviewing, +More
English | Size: 2.29 GB
Category: CBTs


You know how competitive the job market is and also that a great job is key to living a happy life, but you weren’t taught how to job hunt in school. After investing two or three afternoons or evenings learning to master the labor market and your professional presentation skills, you’ll be able to qualify yourself for positions that pay more (one participant qualified themselves for a position paying $20,000/yr. more within 3 weeks), to source opportunities so that you don’t waste your valuable time, and to present yourself articulately, with confidence, and with purpose.
[Read more…]

Pluralsight-Web App Hacking-Cookie Attacks

Pluralsight-Web.App.Hacking-Cookie.Attacks
English | Size: 112.2 MB
Category: HACKING | Security


In this course, you will learn how severe consequences can happen as a result of insecure cookie processing. You will see how cookie attacks work in practice and how to test web applications for various cookie processing flaws. [Read more…]

Pluralsight – Web App Hacking Hacking – Password Reset Functionality

Pluralsight – Web App Hacking Hacking – Password Reset Functionality
English | Size:87.63 MB
Category:Tutorial


This course helps you understand different types of vulnerabilities in password reset functionality. You will learn how to test web applications for various flaws in password reset functionality and how to provide countermeasures for these problems. [Read more…]

Web App Hacking: Cookie Attacks | Pluralsight

Web App Hacking: Cookie Attacks | Pluralsight
English | Size:
Category:


In this course, you will learn how severe consequences can happen as a result of insecure cookie processing. You will see how cookie attacks work in practice and how to test web applications for various cookie processing flaws.
[Read more…]

Udemy – Ethical password hacking and protecting

Udemy – Ethical password hacking and protecting

English | Size: 283.69 MB (297,469,571 Bytes)
Category: Tutorial


“Course is great, in the guessing section, you almost knew my password, immediately changed it to 23 letters, I am very careful now with it, thanks!” – Ziad Ahmed Amer

“I have taken this course twice because there is so much valuable information. I was not aware that hacking software is available by Googling it. I found this to be very disturbing, however, I am grateful that this course is available to educate us on the software that is available to anyone. My gratefulness is extended due to the counter measures that are provided. Numerous scams are exposed for unsuspecting victims of phishing and hacking. Take advantage of this course so that you can be better prepared and secure. The content is informative, and the quality of the production met my expectations.” – Matt Hayes [Read more…]

The Complete Ethical Hacking Course for 2016/2017!

The Complete Ethical Hacking Course for 2016/2017!
English | Size: 2.49 GB
Category: Security


If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 50 lectures & 9.5 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course: [Read more…]

Ec-Council Computer Hacking and Forensic Investigator v4

Ec-Council Computer Hacking and Forensic Investigator v4
English | Size: 12.17 GB
Category: Security


Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crimes or misuse, including but not limited to; theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw from an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
[Read more…]

Wi-Fi Hacking with Kali bm

Wi-Fi Hacking with Kali bm
English | Size: 230.15 MB (241,334,305 bytes)
Category: Tutorial


Learn to hack and protect Wi-Fi system secured by WEP,WPA and WPA2 with Kali Linux
[Read more…]

SecureNinja – Red Team Hacking Course

SecureNinja – Red Team Hacking Course

English | Size: 3.18 GB (3,417,990,080 Bytes)
Category: CBTs


SecureNinja’s Red Team Hacking will teach you the skills, techniques and proven methodology of how to setup and be a Red Team Member. Red Team Hacking by name infers that it is 100% offensive, and that is just what you will learn during this comprehensive and fun-filled course which will show you how to break into and exploit systems.
[Read more…]