EC Council

EC Council Certified Ethical Hacker v9.0 [repost]  eBooks & eLearning

Posted by ParRus at Jan. 3, 2017
EC Council Certified Ethical Hacker v9.0 [repost]

EC Council Certified Ethical Hacker v9.0 (2016)
WEBRip | English | MP4 | 1280 x 720 | AVC ~500 kbps | 15 fps
AAC | 64 Kbps | 22.05 KHz | 1 channel | 19:34:42 | 4.66 GB
Genre: Video Tutorial / Networking & Security

This Certified Ethical Hacker (CEH) v9.0 video training course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. CBT Nuggets trainer Keith Barker walks you through building your own practice lab, including using evaluation software, and encourages you to not only watch and enjoy the videos, but practice everything hands-on in your own lab environment.

cbtnuggets - EC Council Certified Ethical Hacker v9.0  eBooks & eLearning

Posted by serpmolot at Aug. 21, 2016
cbtnuggets - EC Council Certified Ethical Hacker v9.0

cbtnuggets - EC Council Certified Ethical Hacker v9.0
English | mp4 | H264 1280x720 | AAC 2 ch | 4.66 GB
eLearning | System

CBT Nuggets - EC Council CEH Certified Ethical Hacker v8.0 (312-50) (2014)  eBooks & eLearning

Posted by FenixN at April 3, 2015
CBT Nuggets - EC Council CEH Certified Ethical Hacker v8.0 (312-50) (2014)

CBT Nuggets - EC Council CEH Certified Ethical Hacker v8.0 (312-50) (2014)
30xHDRip | MP4/AVC, ~500 kb/s | 1280x720 | Duration: 14:29:45 | English: AAC, 56 kb/s (1 ch) | 3.07 GB
Genre: Security, Hacking

This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more.
Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer Forensics) by EC-Council (Repost)

Computer Forensics: Investigating Data and Image Files (Ec-Council Press Series: Computer Forensics) by EC-Council (Repost)
Publisher: Course Technology; 1 edition (September 16, 2009) | ISBN: 1435483510 | Pages: 224 | PDF | 15.22 MB

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks.

Wireless Safety (Ec-Council Press Series) by EC-Council  eBooks & eLearning

Posted by tvladb at Oct. 1, 2012
Wireless Safety (Ec-Council Press Series) by EC-Council


Publisher: Course Technology; 1 edition (September 21, 2009) | ISBN: 1435483766 | Pages: 224 | PDF | 3.31 MB

Intended for anyone from the mobile user to a student or professional working in a wireless environment, Wireless Safety serves to expose the reader to diverse technologies while mapping them to real world applications. It provides an overview of WAP (wireless application protocol) and how developers view these enabling technologies, and gives a peek into future trends.
Virtualization Security (EC-Council Disaster Recovery Professional (Edrp)) by EC-Council

Virtualization Security (EC-Council Disaster Recovery Professional (Edrp)) by EC-Council
Publisher: Course Technology; 1 edition (June 23, 2010) | ISBN: 1435488695 | Pages: 144 | PDF | 7.63 MB

This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure.

EC Council Certified Ethical Hacker v7.0  eBooks & eLearning

Posted by FenixN at Feb. 15, 2012
EC Council Certified Ethical Hacker v7.0

EC Council Certified Ethical Hacker v7.0
21хFlash Video | AVC, ~256 kb/s | 800x600 | ~13 hour | English: AAC, 44.1 KHz (1 ch) | 943 mb
Genre: Security related

IT training guru James Conrad's newest Certified Ethical Hacker training will show you just how important it is to know thy enemy. You'll see how frighteningly easy it can be to hack into a system, elevate your privilege and quickly “own” a machine. You'll learn how easy it can be to crack passwords – even those that would be considered “secure.” You'll learn how hackers create the dreaded Trojans that can potentially infect the computer of an unsuspecting user and taking control of the machine to infiltrate networks.

EC-Council's: Licensed Penetration Tester  Video

Posted by b1u3eyes at Sept. 14, 2009
EC-Council's:  Licensed Penetration Tester

EC-Council's: Licensed Penetration Tester | 2.82GB

EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

Ethical Hacking (EC-Council Exam 312-50): Student Courseware  eBooks & eLearning

Posted by ganelon at June 28, 2007
Ethical Hacking (EC-Council Exam 312-50): Student Courseware

ICECC, "Ethical Hacking (EC-Council Exam 312-50): Student Courseware"
OSB | 2004 | ISBN: 0972936211 | English | 990 pages | CHM | 14 MB (for download)

Computer Forensics: Hard Disk and Operating Systems - EC-Council (Repost)  eBooks & eLearning

Posted by Maroutan at March 26, 2017
Computer Forensics: Hard Disk and Operating Systems - EC-Council (Repost)

Computer Forensics: Hard Disk and Operating Systems - EC-Council
English | 2009 | 240 Pages | ISBN: 1435483502 | PDF | 10.28 MB

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence…