Hacking Academy

Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]  eBooks & eLearning

Posted by FenixN at Aug. 15, 2016
Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
HDRips | MP4/AVC, ~414 kb/s | 1280x720 | Duration: 02:46:42 | English: AAC, 50 kb/s (2 ch) | + PDF Guides
Size: 627 Mb | Genre: Hacking, Security

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.

Hacking Academy: Monitoring Transmitted Data [repost]  eBooks & eLearning

Posted by naag at May 30, 2016
Hacking Academy: Monitoring Transmitted Data [repost]

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 1280x720 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: METASPLOIT - Penetration Tests from Scratch  eBooks & eLearning

Posted by Polik88 at Sept. 10, 2015
Hacking Academy: METASPLOIT - Penetration Tests from Scratch

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
English | MP4 | 1280x720 | AVC 642 Kbps 25.000 fps | AAC 54.0 Kbps 48.0 khz | 4 hours | 627 MB
Genre: Video Training

Learn the most popular pentesting framework: METASPLOIT. If you are thinking about IT Security seriously - you have to get to know Metasploit. Learn how to use it, conduct attacks, find vulnerabilities and patch them. Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. First complete training explained from scratch. You will see on step-by-step presentations what to do. IT Security Adacemy Expert will explain how it works and how to use Metasploit.

Hacking Academy: Monitoring Transmitted Data  eBooks & eLearning

Posted by Polik88 at Sept. 9, 2015
Hacking Academy: Monitoring Transmitted Data

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 852x480 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: Monitoring Transmitted Data We are introducing you one of the most insteresting module from IT Security Academy Beginner course. During one hour you will learn how to intercept data in your network.

Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)  eBooks & eLearning

Posted by house23 at June 26, 2015
Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)

Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)
MP4 | AVC 553kbps | English | 1280x720 | 24fps | 15 hours | AAC stereo 40kbps | 2.42 GB
Genre: Video Training

Best Hacking Training Program you can participate. Covers CISSP and CEH program. Get Hacking Academy Certificate. v. 2.0. This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security. Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.
Hacking the Academy: New Approaches to Scholarship and Teaching from Digital Humanities

Hacking the Academy: New Approaches to Scholarship and Teaching from Digital Humanities by Daniel J. Cohen
English | May 13, 2013 | ISBN: 0472051989 | 96 Pages | PDF | 1 MB

On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted the following provocative questions online:
“Can an algorithm edit a journal? Can a library exist without books? Can students build and manage their own learning management platforms? Can a conference be held without a program? Can Twitter replace a scholarly society?”

Warp Academy - Music Hacking for Electronic Musicians (2016)  eBooks & eLearning

Posted by ParRus at Nov. 1, 2016
Warp Academy - Music Hacking for Electronic Musicians (2016)

Warp Academy - Music Hacking for Electronic Musicians
WEBRip | English | MP4 | 1280 x 720 | AVC ~749 kbps | 30 fps
AAC | 235 Kbps | 48.0 KHz | 2 channels | 13:47:06 | 6.05 GB
Genre: Video Tutorial / Sound Processing, Music Production, Sound Engineering

As an educator and musician I’m always working on developing and honing my own skills. This has me on a search for better and better teachers as I learn and grow. I’m excited to share that I’m bringing one of my very own teachers to the table to share his wisdom and expertise with you. I’m thrilled to introduce Ray Harmony, who’ll be teaching our newest course, Music Hacking for Electronic Musicians!

Hacking Online Dating  eBooks & eLearning

Posted by FenixN at May 16, 2016
Hacking Online Dating

Hacking Online Dating
HDRips | MP4/AVC, ~5174 kb/s | 1920x1080 | Duration: 05:11:18 | English: AAC, 102 kb/s (2 ch) | + PDF Guide | 11.3 GB
Genre: Dating, Relationships, Sex

Find a great woman in 60 days using your brain instead of your gonads.

Social Life-Hacking  eBooks & eLearning

Posted by FenixN at Nov. 24, 2015
Social Life-Hacking

Social Life-Hacking
HDRip | MP4/AVC, ~4994 kb/s | 1280x720 | Duration: 00:28:00 | English: AAC, 318 kb/s (2 ch) | + PDF Guide | 1,04 GB
Genre: Dating, Relationships, Sex, Psychology

Harmoniously mesh together social circles, social networking and cold approach to take your lifestyle to the next level. Living a life of abundance and enjoying every moment of it, being a fascinating man women can’t help being drawn into, building a social circle of beautiful women and amazing men are some of those things that aren’t talked about or really even considered in the pickup artist community.

Career academy - Ethical hacker V6 DVD 6 - new version  Video

Posted by moitapchoi at Oct. 13, 2009
Career academy - Ethical hacker V6 DVD 6 - new version

Career academy - Ethical hacker V6 DVD 6 | 1.38 GB

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50