İPUCU

Yayınlar Siber güvenlik ile alakalı dergi ve kitapların, telif haklarını göz önünde bulundurularak paylaşım ve duyurularının yapılması.

Seçenekler

PentesterAcademy & SecurityTube Eğitim dosyaları

17-04-2019 13:48
#1
Nems - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2019
Mesajlar:
24
Teşekkür (Etti):
4
Teşekkür (Aldı):
4
Konular:
11
Ticaret:
(0) %
PentesterAcademy & SecurityTube Eğitim dosyaları yabancı forumlarda paylaşılmıştı bende size ücretsiz olarak sunmak istedim.

Kurs İçerikleri :
  1. Advanced Malware Analysis - Combating Exploit Kits
  2. Advanced Persistent Threats - The Big Picture
  3. Advanced Web Application Penetration Testing with Burp Suite
  4. ASP.NET Security Secrets Revealed
  5. Assessing and Mitigating Security Risks
  6. Auditing AWS Environments for Security and Best Practices
  7. Check Point Certified Security Administrator - Backup and Updating
  8. Check Point Certified Security Administrator - Install & Deploy
  9. CISSP - Asset Security
  10. CISSP - Communications and Network Security
  11. CISSP - Identity and Access Management
  12. CISSP - Security and Risk Management
  13. CISSP - Security Assessment and Testing
  14. CISSP - Security Engineering
  15. CISSP - Security Operations
  16. CISSP - Software Development Security
  17. Claims-based Identity for Windows - The Big Picture
  18. CompTIA Security+ (SY0-401) Access Control and Identity Management
  19. CompTIA Security+ (SY0-401) Application, Data, and Host Security
  20. CompTIA Security+ (SY0-401) Compliance and Operational Security
  21. CompTIA Security+ (SY0-401) Cryptography
  22. CompTIA Security+ (SY0-401) Network Security
  23. CompTIA Security+ (SY0-401) Threats and Vulnerabilities
  24. Computing, Communication, and Business Integration for CASP (CAS-002)
  25. Conducting Network Vulnerability Analysis
  26. Cryptography - The Big Picture
  27. Cryptography Fundamentals for Developers and Security Professionals
  28. CSSLPr - Secure Software Concepts
  29. CSSLPr - Secure Software Requirements
  30. Cybersecurity Threats - Ransomware
  31. Designing and Implementing Security Policies
  32. Digital Forensics - Getting Started with File Systems
  33. Digital Forensics Tools in Kali Linux - Imaging and Hashing
  34. Enterprise Security - Policies, Practices, and Procedures
  35. Enterprise Security for CASP (CAS-002)
  36. Enterprise Strength Mobile Device Security
  37. Ethical Hacking - Buffer Overflow
  38. Ethical Hacking - Cloud Computing
  39. Ethical Hacking - Cryptography
  40. Ethical Hacking - Denial of Service
  41. Ethical Hacking - Enumeration
  42. Ethical Hacking - Evading IDS, Firewalls, and Honeypots
  43. Ethical Hacking - Hacking Mobile Platforms
  44. Ethical Hacking - Hacking Web Applications
  45. Ethical Hacking - Hacking Web Servers
  46. Ethical Hacking - Hacking Wireless Networks
  47. Ethical Hacking - Malware Threats
  48. Ethical Hacking - Penetration Testing
  49. Ethical Hacking - Reconnaissance_Footprinting
  50. Ethical Hacking - Scanning Networks
  51. Ethical Hacking - Session Hijacking
  52. Ethical Hacking - Sniffing
  53. Ethical Hacking - Social Engineering
  54. Ethical Hacking - SQL Injection
  55. Ethical Hacking - System Hacking
  56. Ethical Hacking - Understanding Ethical Hacking
  57. Exploit Development and Execution with the ****sploit Framework
  58. Exploitation - Evading Detection and Bypassing Countermeasures
  59. External Footprinting - Reconnaissance and Mapping
  60. Getting Started Analyzing Malware Infections
  61. Getting Started with CloudFlareT Security
  62. Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
  63. Hack Your API First
  64. Hack Yourself First - How to go on the Cyber-Offense
  65. Hands-On Incident Response Fundamentals
  66. How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps
  67. Implementing a Security Assessment and Authorization Process
  68. Implementing Physical Security
  69. Information Security Manager - Information Security Governance
  70. Information Systems Auditing - The Big Picture
  71. Information Systems Auditor - Acquisition and Development
  72. Information Systems Auditor - Governance and Management
  73. Information Systems Auditor - Operations, Maintenance, and Service
  74. Information Systems Auditor - Protection of Information Assets
  75. Information Systems Auditor - The Process of Auditing
  76. Introduction to Browser Security Headers
  77. Introduction to Penetration Testing Using ****sploit
  78. ISO_IEC 27001 Information Security - The Big Picture
  79. Malware Analysis - The Big Picture
  80. Malware Analysis Fundamentals
  81. Managing Information Security Incidents (ISO_IEC 27002)
  82. Managing Information Security Threats & Risks (ISO_IEC 27002)
  83. ****sploit Basics for Protecting SharePoint
  84. Network Fundamentals and Protocols
  85. Network Penetration Testing Using Python and Kali Linux
  86. Network Security Testing With NMAP
  87. Network Vulnerability Scanning with OpenVAS
  88. OPSEC for Penetration Testers
  89. OWASP Top 10 Web Application Security Risks for ASP.NET
  90. Payment Card Security, Processing, and the PCI Standards
  91. PCI DSS - The Big Picture
  92. Penetration Testing - Setting the Scope and Rules of Engagement
  93. Penetration Testing and Ethical Hacking with Kali Linux
  94. Penetration Testing Automation Using Python and Kali Linux
  95. Penetration Testing Life Cycle Explained
  96. Penetration Testing OSINT Gathering with Recon-ng
  97. Penetration Testing SharePoint
  98. Performing and Analyzing Network Reconnaissance
  99. Performing OSINT Gathering on Corporate Targets
  100. Play by Play - Ethical Hacking - Deconstructing the Hack
  101. Play by Play - Ethical Hacking with Troy Hunt
  102. Play by Play - Exploring the Internet of Vulnerabilities
  103. Play by Play - Social Engineering with Troy Hunt and Lars Klint
  104. Play by Play - Website Security Review with Troy Hunt and Lars Klint
  105. Pluralsight - Cybersecurity Threats Insider Threats
  106. Pluralsight - Information Systems Auditor Path
  107. Pluralsight - Troubleshooting Processes and Registry with Sysinternals Process Monitor
  108. Post Exploitation - Performing Infrastructure Analysis
  109. Research and Analysis for CASP (CAS-002)
  110. Risk Management
  111. Risk Management and Incident Response for CASP (CAS-002)
  112. Risk Management and Information Systems Control - Introduction to Risk
  113. Risk Management and Information Systems Control - IT Risk Assessment
  114. Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting
  115. Risk Management and Information Systems Control - Risk Identification
  116. Risk Management and Information Systems Control - Risk Response and Mitigation
  117. Risks, Vulnerabilities, and Threats
  118. Secure Account Management Fundamentals
  119. Securing Your Node.js Web App
  120. Security for Hackers and Developers - Code Auditing
  121. Security for Hackers and Developers - Fuzzing
  122. Security for Hackers and Developers - Overview
  123. Security for Hackers and Developers - Reverse Engineering
  124. Security Management - The Big Picture
  125. SSCP - Access Controls
  126. SSCP - Cryptography
  127. SSCP - Incident Response and Recovery
  128. SSCP - Introduction and the Exam Requirements
  129. SSCP - Network and Communications Security
  130. SSCP - Risk Identification, Monitoring, and Analysis
  131. SSCP - Security Operations and Administration
  132. SSCP - Systems and Application Security
  133. Technical Integration of Enterprise Components for CASP (CAS-002)
  134. The Information Security Big Picture
  135. The Issues of Identity and Access Management (IAM)
  136. Threat Intelligence - The Big Picture
  137. Threat Modeling - The Big Picture
  138. Threat Modeling Fundamentals
  139. Understanding the Java Virtual Machine - Security
  140. Understanding the Shellshock Bash Bug
  141. USB Forensics - Duplication
  142. USB Forensics - Fundamentals
  143. USB Forensics - Writeblocking and Impersonation
  144. Web App Hacking - Caching Problems
  145. Web App Hacking - Cookie Attacks
  146. Web App Hacking - Hacking Authentication
  147. Web App Hacking - Hacking Password Reset Functionality
  148. Web App Hacking - Sensitive Data Exposure
  149. Web Application Penetration Testing Fundamentals
  150. Web Application Penetration Testing with Burp Suite
  151. Web Security and the OWASP Top 10 - The Big Picture
  152. What's New in the OWASP Top 10 for 2013
  153. Windows - How It's Hacked, How to Protect It
  154. Wireless Network Penetration Testing
  155. Wireless Network Penetration Testing Advanced Technique

https://mega.nz/#F!ej5BzKhS!UU5pafvf-911URcq4oNugw

https://mega.nz/#F!WUg2zIgI!Jrl_0ILGnqkNrC0XP40Ccg


Virüs Total
Konu Nems tarafından (17-04-2019 15:46 Saat 15:46 ) değiştirilmiştir.

17-04-2019 15:28
#2
ByQueny - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
12/2018
Nereden:
Bilinmiyor
Mesajlar:
637
Teşekkür (Etti):
18
Teşekkür (Aldı):
66
Konular:
16
Ticaret:
(0) %
Teşekkür ederim dostum yalnız virüs total eklemelisin bu arada kurs içeriği ne ingilizce mi yoksa
Kullanıcı İmzası
Ben Yapmaya Cesaret Edemediğin Herşeyin Vücut Bulmuş Haliyim .

Cyber Security & Defacer
17-04-2019 15:33
#3
Nems - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2019
Mesajlar:
24
Teşekkür (Etti):
4
Teşekkür (Aldı):
4
Konular:
11
Ticaret:
(0) %
İçerikler İngilizce , Virüs total ekliyorum.
17-04-2019 15:42
#4
teguardian - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
03/2019
Mesajlar:
590
Teşekkür (Etti):
80
Teşekkür (Aldı):
115
Konular:
17
Ticaret:
(0) %
Merhaba virüs total olması gerekiyor ayrıca kurs sizin değilse bunu belirtmeniz gerekmektedir.Gerçek sahibini vs.
Kullanıcı İmzası
“Bu Ülkeye 5 kuruş katkın yoksa 10 kuruşluk zarar Verme!”
Bir Hacker.

Eski Sosyal Medya Yöneticisi
17-04-2019 16:11
#5
Klavye19 - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2017
Mesajlar:
814
Teşekkür (Etti):
41
Teşekkür (Aldı):
231
Konular:
242
Ticaret:
(0) %
Bu videoların hepsi konferans (bilgi) videosu sadece slayt üzerinde anlatım var nasıl yapılacağını anlatmıyor
Kullanıcı İmzası
Tehdide dayanan ahlak, bir erdemlilik olmadığından başka, güvenilmeye de layık değildir.

Siber Güvenlik Uzmanı & Grafik Tasarımcı
youtube/siberdünya

Bookmarks


« Önceki Konu | Sonraki Konu »
Seçenekler

Yetkileriniz
Sizin Yeni Konu Acma Yetkiniz var yok
You may not post replies
Sizin eklenti yükleme yetkiniz yok
You may not edit your posts

BB code is Açık
Smileler Açık
[IMG] Kodları Açık
HTML-Kodları Kapalı
Trackbacks are Kapalı
Pingbacks are Kapalı
Refbacks are Kapalı