SANS Security 542 CD-ROM Version 1009

SANS Security 542 CD-ROM Version 1009
English | Size: 688.54 MB
Category: Programming | Linux


SANS SEC 542 (GWAPT) Web App Penetration Testing and Ethical Hacking
SANS Security 542 CD-ROM Version 1009 [Read more…]

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016

SANS SEC542 Web App Penetration Testing and Ethical Hacking 2016
English | Size: 485.56 MB
Category: Security


SEC542.1: Web Penetration Testing and Ethical Hacking: Introduction and Information Gathering
SEC542.2: Web Penetration Testing and Ethical Hacking: Configuration, Identity, and Authentication Testing…. [Read more…]

SANS 760 VMs (2014)

SANS 760 VMs (2014)
English | Size:1.98 GB
Category:HACKING


SANS 760 Advanced Exploit Development for Penetration Testers Virtual Machines. [Read more…]

SANS-ICS-410-2014-AUDIO

SANS-ICS-410-2014-AUDIO
English | Size:364.53 MB
Category: Misc Learning


SANS has joined forces with industry leaders to equip security professionals and control system engineers with the cybersecurity skills they need to defend national critical infrastructure. ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats. [Read more…]

SANS SEC 710 Advanced Exploit Development (2011) [eBook (PDF)]

SANS SEC 710: Advanced Exploit Development (2011) [eBook (PDF)]
English | Size: 137.76 MB
Category: Security/Encryption


SANS SEC710 is an advanced two-day course on exploit development. Students attending this course should know their way around a debugger and have prior experience exploiting basic stack overflows on both Windows and Linux. Terms such as “jmp esp” and “pop/pop/ret” should be nothing new to you. We will move beyond these attack techniques to explore more advanced topics on heap exploitation, format string attacks, and Microsoft patch reversal and exploitation. We will be taking a real Microsoft security patch, reversing it to model the discovery of an undisclosed vulnerability, and developing a client-side exploit that defeats controls such as Address Space Layout Randomization (ASLR). [Read more…]

Build a Note-taking App With AngularJS

Build a Note-taking App With AngularJS
English | Size: 1.82 GB
Category: Programming


Bring together Angular, Bootstrap, and Node as you learn to build your first Angular app. Watch us build NoteWrangler, the app we started in Staying Sharp with Angular.js that helps you create and categorize notes. [Read more…]

SANS GIAC Certified Forensic Analyst GCFA – AUDIO 2015 + OnDemand Videos 2012

SANS GIAC Certified Forensic Analyst | GCFA – AUDIO 2015 + OnDemand Videos 2012

English | Size: 4.10 GB (4,399,059,244 Bytes)
Category: Tutorial


Audio Files + OnDemand Videos from the year 2015
[Read more…]

[VM]Sans SEC660 (Only VMs)

[VM]Sans SEC660 (Only VMs)

English | Size: 3.21 GB (3,448,725,923 Bytes)
Category: Tutorial


SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a real-world lab environment to solidify advanced concepts and allow for the immediate application of techniques in the workplace. Each day includes a two-hour evening bootcamp to allow for additional mastery of the techniques discussed and even more hands-on exercises. A sample of topics covered include weaponizing Python for penetration testers, attacks against network access control (NAC) and VLAN manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as ASLR and DEP, Return Oriented Programming (ROP), Windows exploit-writing, and much more! [Read more…]