Details for this torrent 


EC-Council: Certified Ethical Hacker CEH v8 (Tools)
Type:
Other > Other
Files:
6
Size:
23.6 GB

Tag(s):
Certified Ethical Hacker CEH EC-Council Tools

Uploaded:
Jun 29, 2013
By:
Anonymous

Seeders:
31
Leechers:
191
Comments:
2


EC-Council: Certified Ethical Hacker CEH v8 Tools
English | 6 DVDs | ISO | 23.6 GB | Incl. only tools | Eccouncil | Released: May 2013

ESP: Esto es el más avanzado curso hacking ético del mundo, con 20 de los dominios de seguridad más actuales, cualquier hacker ético que desea saber cuando se está planeando para reforzar la postura de seguridad de la información de su organización. El objetivo de este curso es ayudar a dominar una metodología de hacking ético que se puede utilizar en una prueba de penetración o situación hacking ético. Si sales por la puerta con las habilidades de hacking que son muy de la demanda, así como la certificación Certified Ethical Hacker reconocido internacionalmente!

CEHV8 viene con algunos cambios notables, no sólo en el contenido, sino también a los sistemas de distribución de contenidos y herramientas, por lo que es una herramienta muy valiosa para las organizaciones que van desde compañías Fortune 500 a los gobiernos del mundo, la preparación de la nueva generación de guerreros cibernéticos para proteger sus redes como nunca antes. Los estudiantes pueden esperar un fuerte énfasis en los conceptos avanzados de hacking, plataformas móviles, técnicas de hacking de Tablet PC, y estudios de casos en tiempo real. 100% de los conceptos presentados en el curso V8 CEH se refuerza con ejercicios prácticos en EC-Council nueva gama cyber. Además CEHV8, ahora es un ANSI 17024 certificación profesional acreditada.

ENG: This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

CEHV8 comes with some remarkable updates, not just to the content, but to the content delivery systems and tools, making it an invaluable tool for organizations ranging from Fortune 500 companies to the world’s governments, preparing the next generation of cyber warriors to protect their networks like never before. Students can expect a strong focus on advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real time case studies. 100% of the concepts presented in the CEH V8 course are reinforced by hands-on exercises in EC-Councils newest cyber range. In addition CEHV8, is now an ANSI 17024 accredited professional certification.

 

Real Life Scenario
The CEH class deals with real life scenario and real threats by real life experts in the field. Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests. The class is weaved around real-time information security incident and cases to inculcate a capability of making knowledgeable decisions while defending your organizations’ information resources.

Global Recognition
Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/penetration tester. The CEH program provides you an industry standard information security curriculum and is accompanied by a highly sought-after CEH certification that helps establish your career as an information security expert.

Hacking Underground
Play with real life tools that are used by the hacking underground. The courseware is over 3200 pages, covering 20 modules with over 20 GB of real life underground hacking tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!

Hands on labs
Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space. The CEH lab environment simulates a real time information infrastructure and facilitates an objective and modular learning. The result oriented, descriptive and analytical labs are designed by industry experts to reinforce the learning and demonstrate your proficiency in handling real time information security threats.

Reference Material
Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment, EC-Council has always sought to provide reference material that continues to be valuable long after the course has concluded. The CEH references to valuable resources including whitepapers, tools and videos are updated continuously and delivered across multiple channels to facilitate a comprehensive learning.

This product consists of:
* 6 Tools DVDs



Nota: En esta entrega solo se incluye los 6 DVDs con herramientas, mas adelante se añadira los videos, libros y manuales de laboratorio.

Note: In this release only includes 6 DVDs with tools, will be added later videos, books and laboratory manuals.
::::::::::::::::::::::::::::>>>>>>>>

Herramientas incluidas en los DVDs:

    CEHv8 Lab Prerequisites
    CEHv8 Module 02 Footprinting and Reconnaissance
    CEHv8 Module 03 Scanning Networks
    CEHv8 Module 04 Enumeration
    CEHv8 Module 05 System Hacking
    CEHv8 Module 06 Trojans and Backdoors
    CEHv8 Module 07 Viruses and Worms
    CEHv8 Module 08 Sniffing
    CEHv8 Module 09 Social Engineering
    CEHv8 Module 10 Denial-of-Service
    CEHv8 Module 11 Session Hijacking
    CEHv8 Module 12 Hacking Webservers
    CEHv8 Module 13 Hacking Web Applications
    CEHv8 Module 14 SQL Injection
    CEHv8 Module 15 Hacking Wireless Networks
    CEHv8 Module 16 Hacking Mobile Platforms
    CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots
    CEHv8 Module 18 Buffer Overflow
    CEHv8 Module 19 Cryptography
    CEHv8 Module 20 Penetration Testing
    BackTrack 5 R3

Comments

Thanks
Seed Guys ... very less seeders ... :(