Hacking Team

Red Team Hacking Course  eBooks & eLearning

Posted by FenixN at July 5, 2016
Red Team Hacking Course

Red Team Hacking Course
HDRips | MP4/AVC, ~1018 kb/s | 1280x720 | Duration: 07:34:01 | English: AAC, 157 kb/s (2 ch) | 3,18 GB
Genre: Development / Programming / Security / Hacking

SecureNinja’s Red Team Hacking will teach you the skills, techniques and proven methodology of how to setup and be a Red Team Member. Red Team Hacking by name infers that it is 100% offensive, and that is just what you will learn during this comprehensive and fun-filled course which will show you how to break into and exploit systems.
Hacking Marketing: Agile Practices to Make Marketing Smarter, Faster, and More Innovative [Audiobook]

Scott Brinker, Walter Dixon (Narrator), "Hacking Marketing: Agile Practices to Make Marketing Smarter, Faster, and More Innovative"
ISBN: n/a, ASIN: B06X6GYNWW | 2017 | MP3@64 kbps | ~06:38:00 | 170 MB

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)  eBooks & eLearning

Posted by AlenMiler at Feb. 9, 2017
Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing)

Capture The Flag & Hacking Kioptrix Server (Alexander Lumbantobing) by Alexander Lumbantobing
English | 22 Jan. 2017 | ASIN: B01MTC12G2 | 109 Pages | PDF (conv) | 3.26 MB

This book is the result of collaborative work between "Computer Engineering Study Program - Cyber Security Research Center (CSRC), the Institute of Technology Del (IT Del)" with "Indonesian Backtrack Team (IBT)".

HACKING: THE NO-NONSENSE GUIDE: Learn Ethical Hacking Within 12 Hours!  eBooks & eLearning

Posted by AlenMiler at Feb. 6, 2017
HACKING: THE NO-NONSENSE GUIDE: Learn Ethical Hacking Within 12 Hours!

Hacking: The No-Nonsense Guide: Learn Ethical Hacking Within 12 Hours!: Volume 2 (Cyberpunk Programming Series) by Cyberpunk University
English | 4 Feb. 2017 | ISBN: 154279367X | 78 Pages | PDF (conv) | 1.65 MB

What if you could learn how to stop attackers from hacking into your website or personal accounts. Imagine finding leaks inside large corporate companies and you can help them protecting their data [and make money].

Neil Patel - Growth Hacking Secrets for 2017 Summit  eBooks & eLearning

Posted by ksenya.b at Dec. 29, 2016
Neil Patel - Growth Hacking Secrets for 2017 Summit

Neil Patel - Growth Hacking Secrets for 2017 Summit
Day 1 - Day 4 plus pre event | Video: 29x MP4 @spect ratio> 1280 x 720; Stereo | English | 5.59 GB
Genre: Business / Marketing
Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly (repost)

Mike Myatt, "Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly"
2013 | ISBN: 1118817419 | English | 208 Pages | EPUB | 3 MB

Pluralsight - Ethical Hacking (Entire Series)  eBooks & eLearning

Posted by FenixN at Sept. 15, 2016
Pluralsight - Ethical Hacking (Entire Series)

Pluralsight - Ethical Hacking (Entire Series)
HDRips | MP4/AVC, ~167 kb/s | 1280x720 | Duration: N/A | English: AAC, 73 kb/s (2 ch) | 10.7 GB
Genre: Development / Programming / Security

Ethical hacking is becoming a popular skill for IT operations personnel to have, and an important checkmark for many IT ops positions. By taking the "attacker's perspective," it becomes easier to see the weaknesses in your own environment, and to start shoring up those environments. The EC-Council's Certified Ethical Hacker (CEH) is, for many, their first milestone on a career in ethical hacking and security, and Pluralsight has created this series of courses to help guide you through the core material that an entry-level ethical hacker needs.
Certified Ethical Hacking Certification CEH v.9 full tools + Courseware

Certified Ethical Hacking Certification CEH v.9 full tools + Courseware | 31.5 GB
Tools + PDF Guides

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]  eBooks & eLearning

Posted by FenixN at Aug. 15, 2016
Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
HDRips | MP4/AVC, ~414 kb/s | 1280x720 | Duration: 02:46:42 | English: AAC, 50 kb/s (2 ch) | + PDF Guides
Size: 627 Mb | Genre: Hacking, Security

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.

Computer Hacking Forensic Investigator (CHFI)  eBooks & eLearning

Posted by FenixN at July 10, 2016
Computer Hacking Forensic Investigator (CHFI)

Computer Hacking Forensic Investigator (CHFI)
HDRips | MP4/AVC, ~3224 kb/s | 1920x1080 | Duration: ~15 hours | English: AAC, 40 kb/s (2 ch)
Size: 24,8 Gb | Genre: Development / Programming / Security / Hacking

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.