Jump to content

Search the Community

Showing results for tags 'elearnsecurity'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 11 results

  1. I want to share these resources, but I have no idea where to upload that much of files (150 GB+) at once. If anyone want the courses listed, comment below and tell me which courses you want, I will upload if many users request on a particular course. Knowledge is free. Try harder! Here is some SANS course requested by you guys in comment [hide][Hidden Content]]
  2. NOTES: Please Quickly Download this all files. Contents eAres. eDFP. eIHRP. eMASPT. ePTP. ePTX. ePWD. eTHP. eWAPT. eWAPTX. eWPTX. eXDS. [hide][Hidden Content]]
  3. Start from the very basics, all the way to advanced post-exploitation activities Wide coverage of OWASP’s TOP 10 Master Burp Suite In-depth Web application analysis, information gathering and enumeration XSS & SQL Injection Session related vulnerabilities LFI/RFI HTML5 attacks Pentesting Content Management Systems (CMS) Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections Start from Web Application Attacks and land to Network and Infrastructure Penetration Testing Gives you access to dedicated forums Makes you a proficient professional web application pentester After obtaining the eWPTv1 certification qualifies you for 40 CPE Download Links Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]]
  4. eLearnSecurity Practical Web Defense | 4.21 GB | 25 hours eLearnSecurity Penetration Tester eXtreme | 975 MB | 3 Hours eLearnSecurity Threat Hunting Professional | 1.54 GB | 9 Hours [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  5. Looking for elearnsecurty MAP(MALWARE ANALYSIS PROFESSIONAL) course online. Share if you have it please ! Thanks!
  6. eLearnSecurity Malware Analysis Professional only PDF. Thanks to original uploader Get them before they deleted [hide][Hidden Content]]
  7. Course Info For absolute beginners in IT Security Minimal pre-requisites Learn about: Routing, Forwarding, and TCP/IP; Information Gathering; Scanning; Vulnerability Assessments; Buffer Overflows; XSS; SQL Injection; System and Network Attacks; and Basics of Web App Pentesting Learn how to: Analyze Traffic with Wireshark, Exploit Vulnerable Hosts, Move Laterally, Manipulate Traffic, Crack Passwords, and Exfiltrate Data Develop Pentesting tools in C and Python Learn how to use tools like Nmap, Nessus, Hydra, Metasploit, and Burp Suite Preparation for the Penetration Testing Professional (PTP) course Obtaining the eJPT certification qualifies you for 40 CPE Download Links Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]]
  8. eLearnSecurity Penetration Tester eXtreme English | Size: 975.91 MB Category: Security Course at a glance Obscure ways of exploitation and backdooring Advanced client side exploitation techniques Custom attack vector and payload creation In depth Active Directory Reconnaissance & Enumeration In depth analysis of Active Directory exploitation Stealthy lateral movement and evasion against modern defenses In depth analysis of critical domain infrastructure exploitation In depth details of common misconfigurations and weaknesses Details for covert operations and stealthy persistence Extremely Hands-on with challenges in virtual-labs Obtaining the eCPTX certification qualifies you for 40 CPE Download Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]]
  9. My Friend share this with me, i don't if they already shared here or not but it worth re-share them again. [Hidden Content]
  10. Threat Hunting Professional - THPv2 [PDFs] [hide][Hidden Content]] New Link [hide][Hidden Content]]
  11. I need the eXDS labs Any helps please
×
×
  • Create New...