W E L C O M E!!!

This is a web blog that provides video training, tutorials and other materials for educational purposes, self-practice only. You can download everything for free of charge, so you "CAN’T SELL", or use it for any commercial purposes. Please support the authors and buy with your money if they could help you earn money or improve your career.

If u need help or have a request for materials just comment it.

http://kompyuterinfo.blogspot.com/

Thanks..

Tuesday, June 10, 2008

Career Academy Hacking Penetration Testing and Countermeasures Training



-Company - careeracademy.
-Type - E-Learning.
-Language - English.
-3250 mb unpacked - 1950 mb packed - 17 cd's - (17 Iso's)
-You can mount the iso's.
-You can burn the iso's to cd's and play from cd.
-You can burn the iso's to a dvd as iso image and mount from the dvd.
-you can download everything (17 cd's) - or the cd that you interest !
-The 17 Modules (cd's) be individual uploaded.
-protection - NO

****************************
-price = $995 - Now $695
****************************

HOME :
http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=95

Career Academy Hacking Penetration Testing and Countermeasures Training:
***************************************************************************
Our training videos will show you how to scan, test, hack and secure your own systems. The intensive
demonstrations give each student in-depth knowledge and practical experience with the current security
systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and
attacking your own networks. You will then learn how intruders escalate privileges and what steps can be
taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Includes :
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook developed by Shon Harris

Course Features:

Main Menu
Move through hours of in-depth content - quickly and easily due to the efficient and organized structure.

PowerPoint
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the
user. This type of representation allows the user to better interpret the material through charts,
definitions, graphs, and more...

Exclusive Learning Zone
Train around the clock, around the world. Our certified online instructors are located at global support
centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to
technology- and soft-skill-related questions 24x7. This means access to a live subject matter expert no
matter where you are - day or night. This level of student/instructor interaction provides real-time training
specific support and extends training beyond content and instructor-led solutions by providing flexibility to
accommodate individual needs and schedules.

Controls
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance
through exercises.

Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking
directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal
lesson and learning experience.

Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed,
and printed for viewing at a later date.

Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material
covered before moving on to a new section.
Resume
All courses are resumed to where you left off last session allowing you to learn when it is convenient for
you without the hassle of remembering where you where.

Live Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing
it on screen in front of them. In this format it gives the user the power to see things done by a
professional in the intended environment as many times as they would like.

Ethical Hacking and Penetration Testing eWorkbook - 725 pages Ethical Hacking and Penetration Testing Student
eWorkbook developed by Shon Harris
This workbook' content is rich with expertly created slides, professionally developed graphics, and extensive
text explaining all of the Hacking, Penetration Test and Countermeasure concepts. It contains the very same
tools that Shon Harris has used over the past four years to effectively teach thousands of individuals all
over the world with fantastic results. You can watch the vital video lectures and explore all of the topics
and concepts that are critical for Penetration Testing and Countermeasures.
The Ethical Hacking and Penetration Testing Workbook contains complete explanations, real-world examples,
and scenarios that are not available in any other resource.
***************************************************

-DOWNLOADINFO: traininga=cd1 – trainingb=cd2 – trainingc=cd3 – trainingd=cd4 ...

Password for all Cd's = jL4XyiI7MxX3afM0

Download Links:

-Training Module 1 Ethical Hacking and Penetration Testing - cd 1 - 250 mb

http://rapidshare.com/files/6870957/traininga.part1.rar.html
http://rapidshare.com/files/6875509/traininga.part2.rar.html
http://rapidshare.com/files/6880184/traininga.part3.rar.html
http://rapidshare.com/files/6884786/traininga.part4.rar.html
http://rapidshare.com/files/6889797/traininga.part5.rar.html
http://rapidshare.com/files/6890170/traininga.part6.rar.html

-Training Module 2 Footprinting and Reconnaissance - cd 2 - 210 mb

http://rapidshare.com/files/6920123/trainingb.part1.rar.html
http://rapidshare.com/files/6925380/trainingb.part2.rar.html
http://rapidshare.com/files/6930474/trainingb.part3.rar.html
http://rapidshare.com/files/6935598/trainingb.part4.rar.html
http://rapidshare.com/files/6937268/trainingb.part5.rar.html

-Training Module 3 TCP IP Basics and Scanning - cd 3 - 153 mb

http://rapidshare.com/files/6950222/trainingc.part1.rar.html
http://rapidshare.com/files/6954540/trainingc.part2.rar.html
http://rapidshare.com/files/6958405/trainingc.part3.rar.html
http://rapidshare.com/files/6958651/trainingc.part4.rar.html

-Training Module 4 Enumeration and Verification - cd 4 - 200 mb

http://rapidshare.com/files/6995889/trainingd.part1.rar.html
http://rapidshare.com/files/6999123/trainingd.part2.rar.html
http://rapidshare.com/files/7002551/trainingd.part3.rar.html
http://rapidshare.com/files/7005909/trainingd.part4.rar.html
http://rapidshare.com/files/7006074/trainingd.part5.rar.html

-Training Module 5 Hacking Defending Wireless Modems - cd 5 - 94 mb

http://rapidshare.com/files/7017480/traininge.part1.rar.html
http://rapidshare.com/files/7021255/traininge.part2.rar.html

-Training Module 6 Hacking Defending Web Servers - cd 6 - 150 mb

http://rapidshare.com/files/7029199/trainingf.part1.rar.html
http://rapidshare.com/files/7034545/trainingf.part2.rar.html
http://rapidshare.com/files/7039580/trainingf.part3.rar.html
http://rapidshare.com/files/7040200/trainingf.part4.rar.html

-Training Module 7 Hacking Defending Web Applications - cd 7 - 110 mb

http://rapidshare.com/files/7049302/trainingg.part1.rar.html
http://rapidshare.com/files/7054559/trainingg.part2.rar.html
http://rapidshare.com/files/7056051/trainingg.part3.rar.html

-Training Module 8 Sniffers and Session Hijacking - cd 8 - 115 mb

http://rapidshare.com/files/7069844/trainingh.part1.rar.html
http://rapidshare.com/files/7076146/trainingh.part2.rar.html
http://rapidshare.com/files/7084439/trainingh.part3.rar.html

-Training Module 9 Hacking Defending Windows Systems - cd 9 - 120 mb

http://rapidshare.com/files/7090868/trainingi.part1.rar.html
http://rapidshare.com/files/7095821/trainingi.part2.rar.html
http://rapidshare.com/files/7097885/trainingi.part3.rar.html

-Training Module 10 Hacking Defending Unix Systems - cd 10 - 150 mb

http://rapidshare.com/files/7136591/trainingJ.part1.rar.html
http://rapidshare.com/files/7139658/trainingJ.part2.rar.html
http://rapidshare.com/files/7142501/trainingJ.part3.rar.html

-Training Module 11 Rootkits Backdoors Trojans Tunnels - cd 11 - 115 mb

http://rapidshare.com/files/7147118/trainingk.part1.rar.html
http://rapidshare.com/files/7159091/trainingk.part2.rar.html
http://rapidshare.com/files/7160611/trainingk.part3.rar.html

-Training Module 12 Denial of Service and Botnets - cd 12 - 100 mb

http://rapidshare.com/files/7182977/trainingL.part1.rar.html
http://rapidshare.com/files/7187533/trainingL.part2.rar.html

-Training Module 13 Automated Pen Testing Tools - cd 13 - 102 mb

http://rapidshare.com/files/7202752/trainingm.part1.rar.html
http://rapidshare.com/files/7208149/trainingm.part2.rar.html
http://rapidshare.com/files/7208549/trainingm.part3.rar.html

-Training Module 14 Intrusion Detection Systems - cd 14 - 140 mb

http://rapidshare.com/files/7224433/trainingn.part1.rar.html
http://rapidshare.com/files/7230417/trainingn.part2.rar.html
http://rapidshare.com/files/7234950/trainingn.part3.rar.html

-Training Module 15 Firewalls - cd 15 - 160 mb

http://rapidshare.com/files/7252545/trainingo.part1.rar.html
http://rapidshare.com/files/7255895/trainingo.part2.rar.html
http://rapidshare.com/files/7258850/trainingo.part3.rar.html
http://rapidshare.com/files/7259491/trainingo.part4.rar.html

-Training Module 16 Honeypots and Honeynets - cd 16 - 120 mb

http://rapidshare.com/files/7262593/trainingp.part1.rar.html
http://rapidshare.com/files/7265259/trainingp.part2.rar.html
http://rapidshare.com/files/7266075/trainingp.part3.rar.html

-Training Module 17 Ethics and Legal Issues - cd 17 - 90 mb

http://rapidshare.com/files/7268140/trainingq.part1.rar.html
http://rapidshare.com/files/7269823/trainingq.part2.rar.html

Live CD For Wireless Hacking



This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). Live CD with all the tools you need to hack a WLAN / wireless Access point.

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, crackinging WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"

Basic Directions:

* Boot From CD
* Get The WEP Key
* Write It Down
* Reboot Into Windows
* Connect Using Wep Key.

DOWNLOAD:

http://www.filefactory.com/file/0ecdf2/
http://www.filefactory.com/file/247443/
http://www.filefactory.com/file/7b401f/
http://www.filefactory.com/file/1f42f3/
http://www.filefactory.com/file/a12e33/
http://www.filefactory.com/file/13e2b2/
http://www.filefactory.com/file/7a9bf0/

 
Free Blog CounterJoytech