THT DUYURU

Yayınlar Siber güvenlik ile alakalı dergi ve kitapların, telif haklarını göz önünde bulundurularak paylaşım ve duyurularının yapılması.

takipci
chat
Seçenekler

PentesterAcademy & SecurityTube Eğitim dosyaları

Nems - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2019
Mesajlar:
26
Konular:
11
Teşekkür (Etti):
4
Teşekkür (Aldı):
6
Ticaret:
(0) %
4
2569
17-04-2019 13:48
#1
Lightbulb
PentesterAcademy & SecurityTube Eğitim dosyaları
PentesterAcademy & SecurityTube Eğitim dosyaları yabancı forumlarda paylaşılmıştı bende size ücretsiz olarak sunmak istedim.

Kurs İçerikleri :
  1. Advanced Malware Analysis - Combating Exploit Kits
  2. Advanced Persistent Threats - The Big Picture
  3. Advanced Web Application Penetration Testing with Burp Suite
  4. ASP.NET Security Secrets Revealed
  5. Assessing and Mitigating Security Risks
  6. Auditing AWS Environments for Security and Best Practices
  7. Check Point Certified Security Administrator - Backup and Updating
  8. Check Point Certified Security Administrator - Install & Deploy
  9. CISSP - Asset Security
  10. CISSP - Communications and Network Security
  11. CISSP - Identity and Access Management
  12. CISSP - Security and Risk Management
  13. CISSP - Security Assessment and Testing
  14. CISSP - Security Engineering
  15. CISSP - Security Operations
  16. CISSP - Software Development Security
  17. Claims-based Identity for Windows - The Big Picture
  18. CompTIA Security+ (SY0-401) Access Control and Identity Management
  19. CompTIA Security+ (SY0-401) Application, Data, and Host Security
  20. CompTIA Security+ (SY0-401) Compliance and Operational Security
  21. CompTIA Security+ (SY0-401) Cryptography
  22. CompTIA Security+ (SY0-401) Network Security
  23. CompTIA Security+ (SY0-401) Threats and Vulnerabilities
  24. Computing, Communication, and Business Integration for CASP (CAS-002)
  25. Conducting Network Vulnerability Analysis
  26. Cryptography - The Big Picture
  27. Cryptography Fundamentals for Developers and Security Professionals
  28. CSSLPr - Secure Software Concepts
  29. CSSLPr - Secure Software Requirements
  30. Cybersecurity Threats - Ransomware
  31. Designing and Implementing Security Policies
  32. Digital Forensics - Getting Started with File Systems
  33. Digital Forensics Tools in Kali Linux - Imaging and Hashing
  34. Enterprise Security - Policies, Practices, and Procedures
  35. Enterprise Security for CASP (CAS-002)
  36. Enterprise Strength Mobile Device Security
  37. Ethical Hacking - Buffer Overflow
  38. Ethical Hacking - Cloud Computing
  39. Ethical Hacking - Cryptography
  40. Ethical Hacking - Denial of Service
  41. Ethical Hacking - Enumeration
  42. Ethical Hacking - Evading IDS, Firewalls, and Honeypots
  43. Ethical Hacking - Hacking Mobile Platforms
  44. Ethical Hacking - Hacking Web Applications
  45. Ethical Hacking - Hacking Web Servers
  46. Ethical Hacking - Hacking Wireless Networks
  47. Ethical Hacking - Malware Threats
  48. Ethical Hacking - Penetration Testing
  49. Ethical Hacking - Reconnaissance_Footprinting
  50. Ethical Hacking - Scanning Networks
  51. Ethical Hacking - Session Hijacking
  52. Ethical Hacking - Sniffing
  53. Ethical Hacking - Social Engineering
  54. Ethical Hacking - SQL Injection
  55. Ethical Hacking - System Hacking
  56. Ethical Hacking - Understanding Ethical Hacking
  57. Exploit Development and Execution with the ****sploit Framework
  58. Exploitation - Evading Detection and Bypassing Countermeasures
  59. External Footprinting - Reconnaissance and Mapping
  60. Getting Started Analyzing Malware Infections
  61. Getting Started with CloudFlareT Security
  62. Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
  63. Hack Your API First
  64. Hack Yourself First - How to go on the Cyber-Offense
  65. Hands-On Incident Response Fundamentals
  66. How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps
  67. Implementing a Security Assessment and Authorization Process
  68. Implementing Physical Security
  69. Information Security Manager - Information Security Governance
  70. Information Systems Auditing - The Big Picture
  71. Information Systems Auditor - Acquisition and Development
  72. Information Systems Auditor - Governance and Management
  73. Information Systems Auditor - Operations, Maintenance, and Service
  74. Information Systems Auditor - Protection of Information Assets
  75. Information Systems Auditor - The Process of Auditing
  76. Introduction to Browser Security Headers
  77. Introduction to Penetration Testing Using ****sploit
  78. ISO_IEC 27001 Information Security - The Big Picture
  79. Malware Analysis - The Big Picture
  80. Malware Analysis Fundamentals
  81. Managing Information Security Incidents (ISO_IEC 27002)
  82. Managing Information Security Threats & Risks (ISO_IEC 27002)
  83. ****sploit Basics for Protecting SharePoint
  84. Network Fundamentals and Protocols
  85. Network Penetration Testing Using Python and Kali Linux
  86. Network Security Testing With NMAP
  87. Network Vulnerability Scanning with OpenVAS
  88. OPSEC for Penetration Testers
  89. OWASP Top 10 Web Application Security Risks for ASP.NET
  90. Payment Card Security, Processing, and the PCI Standards
  91. PCI DSS - The Big Picture
  92. Penetration Testing - Setting the Scope and Rules of Engagement
  93. Penetration Testing and Ethical Hacking with Kali Linux
  94. Penetration Testing Automation Using Python and Kali Linux
  95. Penetration Testing Life Cycle Explained
  96. Penetration Testing OSINT Gathering with Recon-ng
  97. Penetration Testing SharePoint
  98. Performing and Analyzing Network Reconnaissance
  99. Performing OSINT Gathering on Corporate Targets
  100. Play by Play - Ethical Hacking - Deconstructing the Hack
  101. Play by Play - Ethical Hacking with Troy Hunt
  102. Play by Play - Exploring the Internet of Vulnerabilities
  103. Play by Play - Social Engineering with Troy Hunt and Lars Klint
  104. Play by Play - Website Security Review with Troy Hunt and Lars Klint
  105. Pluralsight - Cybersecurity Threats Insider Threats
  106. Pluralsight - Information Systems Auditor Path
  107. Pluralsight - Troubleshooting Processes and Registry with Sysinternals Process Monitor
  108. Post Exploitation - Performing Infrastructure Analysis
  109. Research and Analysis for CASP (CAS-002)
  110. Risk Management
  111. Risk Management and Incident Response for CASP (CAS-002)
  112. Risk Management and Information Systems Control - Introduction to Risk
  113. Risk Management and Information Systems Control - IT Risk Assessment
  114. Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting
  115. Risk Management and Information Systems Control - Risk Identification
  116. Risk Management and Information Systems Control - Risk Response and Mitigation
  117. Risks, Vulnerabilities, and Threats
  118. Secure Account Management Fundamentals
  119. Securing Your Node.js Web App
  120. Security for Hackers and Developers - Code Auditing
  121. Security for Hackers and Developers - Fuzzing
  122. Security for Hackers and Developers - Overview
  123. Security for Hackers and Developers - Reverse Engineering
  124. Security Management - The Big Picture
  125. SSCP - Access Controls
  126. SSCP - Cryptography
  127. SSCP - Incident Response and Recovery
  128. SSCP - Introduction and the Exam Requirements
  129. SSCP - Network and Communications Security
  130. SSCP - Risk Identification, Monitoring, and Analysis
  131. SSCP - Security Operations and Administration
  132. SSCP - Systems and Application Security
  133. Technical Integration of Enterprise Components for CASP (CAS-002)
  134. The Information Security Big Picture
  135. The Issues of Identity and Access Management (IAM)
  136. Threat Intelligence - The Big Picture
  137. Threat Modeling - The Big Picture
  138. Threat Modeling Fundamentals
  139. Understanding the Java Virtual Machine - Security
  140. Understanding the Shellshock Bash Bug
  141. USB Forensics - Duplication
  142. USB Forensics - Fundamentals
  143. USB Forensics - Writeblocking and Impersonation
  144. Web App Hacking - Caching Problems
  145. Web App Hacking - Cookie Attacks
  146. Web App Hacking - Hacking Authentication
  147. Web App Hacking - Hacking Password Reset Functionality
  148. Web App Hacking - Sensitive Data Exposure
  149. Web Application Penetration Testing Fundamentals
  150. Web Application Penetration Testing with Burp Suite
  151. Web Security and the OWASP Top 10 - The Big Picture
  152. What's New in the OWASP Top 10 for 2013
  153. Windows - How It's Hacked, How to Protect It
  154. Wireless Network Penetration Testing
  155. Wireless Network Penetration Testing Advanced Technique

https://mega.nz/#F!ej5BzKhS!UU5pafvf-911URcq4oNugw

https://mega.nz/#F!WUg2zIgI!Jrl_0ILGnqkNrC0XP40Ccg


Virüs Total
Konu Nems tarafından (17-04-2019 15:46 Saat 15:46 ) değiştirilmiştir.
ByQueny - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
12/2018
Nereden:
Bilinmiyor
Mesajlar:
663
Konular:
16
Teşekkür (Etti):
18
Teşekkür (Aldı):
74
Ticaret:
(0) %
17-04-2019 15:28
#2
Teşekkür ederim dostum yalnız virüs total eklemelisin bu arada kurs içeriği ne ingilizce mi yoksa
---------------------
Ben Yapmaya Cesaret Edemediğin Herşeyin Vücut Bulmuş Haliyim .

Cyber Security & Defacer
Nems - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2019
Mesajlar:
26
Konular:
11
Teşekkür (Etti):
4
Teşekkür (Aldı):
6
Ticaret:
(0) %
17-04-2019 15:33
#3
İçerikler İngilizce , Virüs total ekliyorum.
teguardian - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
03/2019
Mesajlar:
590
Konular:
19
Teşekkür (Etti):
81
Teşekkür (Aldı):
116
Ticaret:
(0) %
17-04-2019 15:42
#4
Merhaba virüs total olması gerekiyor ayrıca kurs sizin değilse bunu belirtmeniz gerekmektedir.Gerçek sahibini vs.
---------------------
“Bu Ülkeye 5 kuruş katkın yoksa 10 kuruşluk zarar Verme!”
Bir Hacker.

Eski Sosyal Medya Yöneticisi
Klavye19 - ait Kullanıcı Resmi (Avatar)
Üye
Üyelik tarihi:
01/2017
Mesajlar:
847
Konular:
260
Teşekkür (Etti):
53
Teşekkür (Aldı):
296
Ticaret:
(0) %
17-04-2019 16:11
#5
Bu videoların hepsi konferans (bilgi) videosu sadece slayt üzerinde anlatım var nasıl yapılacağını anlatmıyor

Bookmarks


« Önceki Konu | Sonraki Konu »
Seçenekler





1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291