Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly

Posted by manhneovn on January 13th, 2017 in Uncategorized
http://s2.1pic.org/files/2017/01/04/7d6df3dbf650025d779d.jpg

Mike Myatt, "Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly"
2013 | ISBN: 1118817419 | English | 208 Pages | EPUB | 3 MB

Lynda.com – Ethical Hacking: Website and Web Application Testing 2016 TUTORiAL

Posted by tuongyda14 on January 11th, 2017 in Uncategorized
https://s29.postimg.org/7ldjg1q4n/image.jpg
Lynda.com – Ethical Hacking: Website and Web Application Testing 2016 TUTORiAL | 286 MB

Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attack. Knowing how to prevent and detect web attacks is a critical skill for developers and information security professionals alike.

stackskills-The Complete Ethical Hacking Course:Go from Beginner to Advanced Sequel for2016/17

Posted by manhneovn on December 29th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/26/8131b6978416ce1ec873.jpg

stackskills-The Complete Ethical Hacking Course:Go from Beginner to Advanced Sequel for2016/17
English | Size: 2.49 GB
Category:CBTs

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world.

The Complete Ethical Hacking with Kali for Beginners (2016)

Posted by LeeAndro on December 27th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/25/f5321135c83b7a1dcad9.jpg

The Complete Ethical Hacking with Kali for Beginners
MP4 | Video: AVC 1280×720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | Lec: 47 | 1.23 GB
Genre: eLearning | Language: English

Learn ethical hacking with Kali in your own lab, scan targets with Nmap and exploit victims with metasploit!

Penetration Testing: A Hands-On Introduction to Hacking

Posted by manhneovn on December 27th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/26/4a9c81a79332e5b30c9e.jpg

Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman
English | 2014 | ISBN: 1593275641 | 528 pages | PDF | 12 MB

Hacking Your Education: Ditch the Lectures, Save Tens of Thousands, and Learn More Than Your Peers Ever Will

Posted by manhneovn on December 27th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/26/d70101c0c528e82e92d5.jpg

Hacking Your Education: Ditch the Lectures, Save Tens of Thousands, and Learn More Than Your Peers Ever Will by Dale J. Stephens
English | 2013 | ISBN: 0399159967 | 208 pages | EPUB | 0,3 MB

Lynda – Ethical Hacking: Trojans and Backdoors

Posted by manhneovn on December 13th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/09/6db8f75bf68252959cb8.jpg

Lynda – Ethical Hacking: Trojans and Backdoors
Size: 191 MB | Duration: 1h 15m | Video: AVC (.mp4) 1280×720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Beginner | Language: English

It is crucial to maintain a network secure enough to prevent sophisticated attacks, especially if you are part of an enterprise organization. Some of the more dangerous threats to your systems are Trojans and backdoors, which get into computers and compromise the integrity of the system. Data leaks, dissemination, and destruction are just some of the unfortunate outcomes caused by such attacks. Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more. Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.

Lynda – Ethical Hacking: Mobile Devices and Platforms 2016 TUTORiAL

Posted by tuongyda14 on December 13th, 2016 in eBooks
https://s27.postimg.org/tuhya9jlv/image.jpg
Lynda – Ethical Hacking: Mobile Devices and Platforms 2016 TUTORiAL | 305 MB

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks.

Hacking STEM: Improve your performance in class (2016)

Posted by manhneovn on December 6th, 2016 in eBooks
http://s2.1pic.org/files/2016/12/01/cf060d4fc2d2602bc3bb.jpg

Hacking STEM: Improve your performance in class
MP4 | Video: AVC 1280×720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 23 | 100 MB
Genre: eLearning | Language: English

An Effective Approach to Tackling Textbook Problems to Stop Struggling and Really Start Learning

SQL Hacking: SQL-Injektion auf relationale Datenbanken im Detail verstehen und abwehren

Posted by manhneovn on December 4th, 2016 in eBooks
http://s2.1pic.org/files/2016/11/27/e54bc1f9b6ce4a675c4e.jpg

SQL Hacking: SQL-Injektion auf relationale Datenbanken im Detail verstehen und abwehren
2016 | ISBN: 3645604669 | German | 680 pages | EPUB | 9 MB
Page 1 of 212
css.php