Offensive Security

Offensive Security 101 v2.0 [Tutorial] [Re-Uploaded]  Video

Posted by baloch at Feb. 21, 2009
Offensive Security 101 v2.0 [Tutorial] [Re-Uploaded]

Offensive Security 101 v2.0 [Tutorial] | 386 MB

“Offensive Security 101 v.2.0″ is a course designed for network administrators and security professionals who need to get acquainted with the world of offensive security. The course introduces the latest hacking tools and techniques, and includes remote live labs for exercising the material presented to the students.

Offensive Security Wireless Attacks - WiFu v. 3.0  eBooks & eLearning

Posted by IrGens at Nov. 11, 2014
Offensive Security Wireless Attacks - WiFu v. 3.0

Offensive Security Wireless Attacks - WiFu v. 3.0
.SWF, 1024x768 | English, MP3, 2 Ch | + PDF | 828 MB
Instructors: Mati Aharoni, Devon Kearns, Thomas d’Otreppe de Bouvette

Offensive Security: Penetration Testing with BackTrack  eBooks & eLearning

Posted by Max-X at Jan. 9, 2013
Offensive Security: Penetration Testing with BackTrack

Offensive Security: Penetration Testing with BackTrack
English | Format: Flash swf | Included Ebook | 312.92 MB
Audio: 44100 Hz, stereo, 96 kb/s | Video: yuv420p, 944x528, 700 kb/s, 24.92 fps
Genre: Video training

Penetration Testing with BackTrack (PWB) is an online training course designed for network administrators and security professionals who need to acquaint themselves with the world of offensive information security.

Udemy - Python For Offensive PenTest: A Complete Practical Course  eBooks & eLearning

Posted by IrGens at Dec. 12, 2015
Udemy - Python For Offensive PenTest: A Complete Practical Course

Udemy - Python For Offensive PenTest: A Complete Practical Course
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 54 Lectures | 5 hours | 1.25 GB
Instructor: Hussam Khrais
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition by Mark Collier and David Endler
English | 2013 | ISBN: 0071798765 | ISBN-13: 9780071798761 | 560 pages | PDF + EPUB | 22 + 29 MB

The latest techniques for averting UC disaster
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures.

Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos  eBooks & eLearning

Posted by serpmolot at Jan. 27, 2015
Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos

Offensive Computer Security (CIS4930 – CIS5930) Spring 2014 Lectures & Videos
English | mp4 | H264 1126x720 | AAC 2 ch | pdf, pptx | 7.14 GB
eLearning

INE - Certified Ethical Hacker (CEH) Module 1 :: Introduction to Ethical Hacking  eBooks & eLearning

Posted by serpmolot at Dec. 21, 2016
INE - Certified Ethical Hacker (CEH) Module 1 :: Introduction to Ethical Hacking

INE - Certified Ethical Hacker (CEH) Module 1 :: Introduction to Ethical Hacking
English | mp4 | H264 1912x1088 | AAC 2 ch | 1 hr 53 min | 258 MB
eLearning
Patrick Engebretson, "The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy"

Patrick Engebretson, "The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy"
Syngress | 2013 | ISBN: 0124116442 | English | EPUB/PDF | 223 pages | 3.5/5 MB

'The Basics of Hacking and Penetration Testing', 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. …

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Repost)  eBooks & eLearning

Posted by step778 at Oct. 28, 2016
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Repost)

EC-Council, "Ethical Hacking and Countermeasures: Secure Network Infrastructures"
2009 | pages: 195 | ISBN: 1435483650 | PDF | 7,9 mb

Hacking Android  eBooks & eLearning

Posted by naag at July 28, 2016
Hacking Android

Hacking Android
Packt Publishing | 4 Aug 2016 | English | ISBN: 1785883143 | 376 pages | PDF | 56 Mb

Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
About This Book