Hacking Revealed

vaga18

New member
Katılım
19 Şub 2007
Mesajlar
62
Reaction score
0
Puanları
0
Konum
okpklş
http://www.learnkey.com/store/images/HackingRevealed.asp


Hacking Revealed


Hacking Revealed
5 Sessions –
15 Hours of Interactive Training
--------------------------------------------------------------------------------

In the Hacking Revealed course from LearnKey, system administrators, network security analysts, and IT professionals, who desire a broader understanding of security, learn how to protect their networks from external attack. Expert instructor Dale Brice-Nash explains what motivates hackers and examines hacker tools. He will demonstrate potential system vulnerabilities, hacker methodologies, current exploits, and effective approaches to risk management. At the conclusion of this course, you’ll understand how to evaluate hacker threats and how to avoid them.

Benefits
Increase your earning potential with IT security credibility.
Enhance employment opportunities with in-demand IT security knowledge.
LearnKey courses incorporate the latest technology on security issues.



--------------------------------------------------------------------------------

About The Author
Dale Brice-Nash has been teaching about information security principles for more than six years. His consulting clients include Fortune 500 companies and others with enterprise networks of more than 10,000 supported users. Brice-Nash's areas of expertise include vulnerability assessment, intrusion detection and incident response handling. Among the many IT certifications he holds are Security+, Certified Ethical Hacker, MCSE, MCT, CCNA, Citrix Certified Enterprise Administrator, and Citrix Certified Instructor.

Session 1
Section A: Introduction
· CD Tour
· Certifications
· Security Intro
· Resource Types
· Risk

Section B: Hacking Fundamentals
· Exploiting Weaknesses
· Exploit Process
· Threat/Vulnerability Types
· White-Hat vs. Black-Hat
· Persistent vs. Casual
· Motivations

Section C: Methodologies
· Overview
· Reconnaissance
· Scanning
· NMap Scan
· Enumeration
· Penetration
· System Elevation
· Network Elevation

Section D: Methodologies (cont.)
· Pilfer
· Expansion
· Housekeeping
· Common Tools
· Other Tools

Section E: Network Scanning Phases 1 & 2
· Overview
· Network Topology
· Network as a Target
· Discovery
· Scanning the Network
· Scanning Tools

Section F: Network Scanning Phases 3 & 4
· Enumerating
· Packet Analyzers
· CDP
· CDP Demo
· Weak Passwords
· Common Conventions


Session 2
Section A: Management/Physical Threats
· Device Management
· Design Errors
· SolarWinds
· Physical Security
· Physical Tools

Section B: Routers
· Router Components
· Routers & Domains
· Dynamic Routing
· Tools
· Attacks
· RIP

Section C: Bridges & Switches
· Concepts
· Root Bridges
· Vulnerabilities/Attacks
· ARP Poisoning
Section D: Firewalls
· Firewall Concepts
· Vulnerabilities
· Design Vulnerabilities
· Firewall Setup
· Firewall Traversal

Section E: Wireless
· Wireless Concepts
· WEP
· Management Console
· Wireless Security
· Wireless Modes
· Wireless Vulnerabilities
· Attacks
· Warchalking/WarDriving

Section F: W2K Hacking Phases 1 & 2
· Overview
· Discovery/Reconnaissance
· Scanning

Section G: Enumerating Servers
· Overview
· Database Servers
· Mail/IM Servers
· Network/Web Servers
· Syslog/IAS Servers


Session 3
Section A: Enumeration Strategies & Tools
· Tool Concepts
· Terminal Services
· General Banner Grabbing
· Assorted Tools
· Anonymous Connections
· Browser/Client
· Net Commands
· LDAP Query Tools

Section B: Using Enumeration Tools
· NetCat
· Cain & Abel
· Null Session
· DumpSec

Section C: Penetrating Windows 2000/NT
· Identification
· Weaknesses
· Default Configuration
· Default Accounts
· Account Management
· Inherent OS Weaknesses
· NetBIOS API
· Tools

Section D: Penetration Tools & Strategies
· LSA
· Sniffer
· Password Cracker
· Notepad Execution

Section E: Elevation on Windows 2000/NT
· Overview
· SAM Dump
· Tools/Vulnerabilities
· L0phtCrack
· SAM File
· Registry
Section F: Pilfering
· Permissions
· Use Data
· Targets
· More Targets

Section G: File Permission Auditing
· Folder Permissions
· Registry Permissions
· File Delete Child
· File Delete Child Process


Session 4
Section A: Expansion
· Scanning/Enumeration
· Authentication
· Relays & Proxies
· Service Accounts
· User Rights
· Account Policies
· Local Policies

Section B: Housekeeping
· Cleaning Up
· Reentry
· File Header
· Tools
· Strategies

Section C: Event Log Management
· Log Utilities
· Set Up Audits
· Audit Object Access

Section D: Terminal Server
· Vulnerabilities
· Detection Tools
· Monitoring Tools
· Attack Applications
· Pipeupadmin

Section E: IIS
· Evaluation
· Weaknesses
· Input Validation
· Permissions
· Application Analysis
· Tools

Section F: Exploiting IIS
· File Traversal
· View Results

Section G: Securing IIS
· Directory Structure
· IDS
· Internet Service Manager
· DLLs
· ISAPI Filters
· Directory Browsing
· Authentication
· Lockdown


Session 5
Section A: Securing Windows 2000/NT
· Analyze
· Best Practices
· Communication
· User Education
· Penetration Analysis
· Backups
· Tools
· Restriction


http://rapidshare.com/files/29742243/Learnkey_Hacking_Revealed.part01.rar
http://rapidshare.com/files/29744606/Learnkey_Hacking_Revealed.part02.rar
http://rapidshare.com/files/29790658/Learnkey_Hacking_Revealed.part03.rar
http://rapidshare.com/files/29795344/Learnkey_Hacking_Revealed.part04.rar
http://rapidshare.com/files/29800367/Learnkey_Hacking_Revealed.part05.rar
http://rapidshare.com/files/29805443/Learnkey_Hacking_Revealed.part06.rar
http://rapidshare.com/files/29810268/Learnkey_Hacking_Revealed.part07.rar
http://rapidshare.com/files/29815704/Learnkey_Hacking_Revealed.part08.rar
http://rapidshare.com/files/29840818/Learnkey_Hacking_Revealed.part09.rar
http://rapidshare.com/files/29841013/Learnkey_Hacking_Revealed.part10.rar


Şifre gerekmez.
Bu programla artık herkes hacker olabilmenin yolunu kavramış olacak.
Learnkey sitesinden alınan ve son derece kaliteli eğitim cdlerinden oluşan(5cdlik) bir set.



Uploader : vaga18
Total Size : 924.95 MB
 
indirdim gzl bir kaynak saol,eng bilmeyen indirmsn
go on
 
tesekkürler inşallah anlarız.
 
tşkler emeğine sağlı yalnız linkler uçmuş yenilersen sevinirim....rapid dışında başka bi siteye upload edemezmisin,?
 
Teşekkürler.Çok Güzel bir Paylaşım. Ancak 8. Part'ı rapidshare.com dan kaynaklı bir problem nedeniyle indiremiyorum. 8.Part!ı tekrar upload etme şansınız var mı ?

The server 60.rapidshare.com is momentarily not available. We are aware of this and are working to get this resolved.
 
3.part çalışmıyor İlgilenirmisiniz Teşekkürler
 
Bilader 3.part çalışmıyor bi iLgilensen
 
Geri
Üst