Bilqi Forum  
Certified Ethical Hacker (CEH) Eğitimleri

Geri git   Bilqi Forum > > >

ÖDEVLERİNİZİ BULMAKTA ZORLANIYOMUSUNUZ!

SORUN ANINDA CEVAPLIYALIM.

TÜM SORULARINIZA ANINDA CEVAP VERİLECEKTİR !

Sitemize Üye Olmadan Konulara Cevap Yazabilir Ayrıca Soru Cevap Bölümüne Konu Açabilirsiniz !

Certified Ethical Hacker (CEH) Eğitimleri

Ev & Egitim


Yeni Konu aç Cevapla
 
Seçenekler Stil
Alt 08-25-2008, 23:04   #1
Korax
Android Destek
 
Korax - ait Kullanıcı Resmi (Avatar)
 
Üyelik tarihi: Jan 2008
Yaş: 34
Mesajlar: 21.062
Tecrübe Puanı: 1000
Korax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond reputeKorax has a reputation beyond repute
Korax - MSN üzeri Mesaj gönder
Standart Certified Ethical Hacker (CEH) Eğitimleri

Certified Ethical Hacker (CEH) Eğitimleri
This image has been resized. Click this bar to view the full image. The original image is sized 811x642.

This image has been resized. Click this bar to view the full image. The original image is sized 801x635.


Neden CEH Sertifikasyonları ?


CEH eğitimi sadece teorik bir güvenlik eğitimi değil, saldırı tiplerini çok net ayırt etmenizi sağlamakla işe başlayan ve günümüzde güncel exploit’ler, hacking tool’lar kullanılarak firmaların nasıl hacklendiğini anlatan ve hacking tool’ları güncellendikçe devamlı ve çok hızlı bir şekilde güncellenen bir eğitimdir. “Güvenliği sağlamak istiyorsanız hacker’ı iyi tanımalı ve takip etmelisiniz.” Felsefesinden yola çıkarak oluşturulan bu eğitim, şirketlerin hem iyi korunmasını sağlayan, hem de saldır ı sonucu sistemin hizmet dışı kalması durumunda sorunu çok daha hızlı çözebilen uzmanlar yetiştirmeyi amaçlamaktadır.
-------------------------------------------------

LearnKey Hacking Revealed, 5 CD


Description:
In the Hacking Revealed course from LearnKey, system administrators, network security analysts,
and IT professionals, who desire a broader understanding of security, learn how to protect their networks
from external attack. Expert instructor Dale Brice-Nash explains what motivates hackers and examines
hacker tools. He will demonstrate potential system vulnerabilities, hacker methodologies, current exploits,
and effective approaches to risk management. At the conclusion of this course, you?ll understand how to
evaluate hacker threats and how to avoid them.

Benefits
Increase your earning potential with IT security credibility.
Enhance employment opportunities with in-demand IT security knowledge.
LearnKey courses incorporate the latest technology on security issues.

Session 1

Section A: Introduction
Section B: Hacking Fundamentals
Section C: Methodologies
Section D: Methodologies (cont.)
Section E: Network Scanning Phases 1 & 2
Section F: Network Scanning Phases 3 & 4

Session 2

Section A: Management/Physical Threats
Section B: Routers
Section C: Bridges & Switches
Section D: Firewalls
Section E: Wireless
Section F: W2K Hacking Phases 1 & 2
Section G: Enumerating Servers

Session 3

Section A: Enumeration Strategies & Tools
Section B: Using Enumeration Tools
Section C: Penetrating Windows 2000/NT
Section D: Penetration Tools & Strategies
Section E: Elevation on Windows 2000/NT
Section F: Pilfering
Section G: File Permission Auditing

Session 4

Section A: Expansion
Section B: Housekeeping
Section C: Event Log Management
Section D: Terminal Server
Section E: IIS
Section F: Exploiting IIS
Section G: Securing IIS


Session 5

Section A: Securing Windows 2000/NT
Section B: Baseline Security
Section C: UNIX Hacking Phases 1-3
Section D: UNIX Hacking Phases 4-7
Section E: Security Policies
Section F: Prevention

CD 1

http://rapidshare.com/files/14604642/LK__1h.part01 .rar
http://rapidshare.com/files/14605403/LK__1h.part02 .rar
http://rapidshare.com/files/14701304/LK__1h.part03 .rar
http://rapidshare.com/files/14702092/LK__1h.part04 .rar
http://rapidshare.com/files/14702881/LK__1h.part05 .rar
http://rapidshare.com/files/14703669/LK__1h.part06 .rar
http://rapidshare.com/files/14704386/LK__1h.part07 .rar
http://rapidshare.com/files/14705085/LK__1h.part08 .rar
http://rapidshare.com/files/14705860/LK__1h.part09 .rar
http://rapidshare.com/files/14705880/LK__1h.part10 .rar

CD 2

http://rapidshare.com/files/14706730...00h.part01. rar
http://rapidshare.com/files/14707608...00h.part02. rar
http://rapidshare.com/files/14708483...00h.part03. rar
http://rapidshare.com/files/14709288...00h.part04. rar
http://rapidshare.com/files/14709967...00h.part05. rar
http://rapidshare.com/files/14710688...00h.part06. rar
http://rapidshare.com/files/14711420...00h.part07. rar
http://rapidshare.com/files/14712167...00h.part08. rar
http://rapidshare.com/files/14713230...00h.part09. rar
http://rapidshare.com/files/14713917...00h.part10. rar
http://rapidshare.com/files/14714770...00h.part11. rar
http://rapidshare.com/files/14714937...00h.part12. rar

CD 3

http://rapidshare.com/files/14715899...aHa.part01. rar
http://rapidshare.com/files/14716610...aHa.part02. rar
http://rapidshare.com/files/14717405...aHa.part03. rar
http://rapidshare.com/files/14718032...aHa.part04. rar
http://rapidshare.com/files/14718786...aHa.part05. rar
http://rapidshare.com/files/14719480...aHa.part06. rar
http://rapidshare.com/files/14720125...aHa.part07. rar
http://rapidshare.com/files/14720781...aHa.part08. rar
http://rapidshare.com/files/14721500...aHa.part09. rar
http://rapidshare.com/files/14722267...aHa.part10. rar
http://rapidshare.com/files/14723008...aHa.part11. rar
http://rapidshare.com/files/14723484...aHa.part12. rar

CD 4

http://rapidshare.com/files/14724147...030.part01. rar
http://rapidshare.com/files/14724829...030.part02. rar
http://rapidshare.com/files/14725457...030.part03. rar
http://rapidshare.com/files/14726129...030.part04. rar
http://rapidshare.com/files/14726876...030.part05. rar
http://rapidshare.com/files/14727548...030.part06. rar
http://rapidshare.com/files/14728265...030.part07. rar
http://rapidshare.com/files/14728924...030.part08. rar
http://rapidshare.com/files/14729706...030.part09. rar
http://rapidshare.com/files/14730431...030.part10. rar
http://rapidshare.com/files/14731027...030.part11. rar

CD 5

http://rapidshare.com/files/14731752...hha.part01. rar
http://rapidshare.com/files/14732516...hha.part02. rar
http://rapidshare.com/files/14733297...hha.part03. rar
http://rapidshare.com/files/14734061...hha.part04. rar
http://rapidshare.com/files/14734811...hha.part05. rar
http://rapidshare.com/files/14735496...hha.part06. rar
http://rapidshare.com/files/14736242...hha.part07. rar
http://rapidshare.com/files/14736997...hha.part08. rar
http://rapidshare.com/files/14737795...hha.part09. rar
http://rapidshare.com/files/14738539...hha.part10. rar
http://rapidshare.com/files/14739043...hha.part11. rar

Şifre : www.braindropz.org
-------------------------------------------------------------------------------------------

The CEH certification from Specialized Solution (9 cd lik set rardan çıkarılınca 2 gb civarı yer kaplıyor)

The Certified Ethical Hacker certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

• Ethics and Legal Issues
• Footprinting Techniques
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web Based Password Cracking
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Hacking Linux
• IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing Methodologies
Korax isimli Üye şimdilik offline konumundadır   Alıntı ile Cevapla
Sponsored Links
Cevapla

Bookmarks


Konuyu Toplam 1 Üye okuyor. (0 Kayıtlı üye ve 1 Misafir)
 
Seçenekler
Stil

Yetkileriniz
Sizin Yeni Konu Acma Yetkiniz var yok
You may not post replies
You may not post attachments
You may not edit your posts

BB code is Açık
Smileler Açık
[IMG] Kodları Açık
HTML-KodlarıKapalı

Gitmek istediğiniz klasörü seçiniz

Benzer Konular
Konu Konuyu Başlatan Forum Cevaplar Son Mesaj
hacker temel уυѕυƒ Fıkralar 0 07-02-2008 15:32
Resource Hacker 3.4.0.79 Yaso Araçlar 0 06-25-2008 20:33
HaCKeR 1.3.2 Yaso Araçlar 0 06-25-2008 14:20
Hacker Eliminator 1.2 Yaso Araçlar 0 06-16-2008 23:38


Şu Anki Saat: 06:06


İçerik sağlayıcı paylaşım sitelerinden biri olan Bilqi.com Forum Adresimizde T.C.K 20.ci Madde ve 5651 Sayılı Kanun'un 4.cü maddesinin (2).ci fıkrasına göre TÜM ÜYELERİMİZ yaptıkları paylaşımlardan sorumludur. bilqi.com hakkında yapılacak tüm hukuksal Şikayetler doganinternet@hotmail.com ve streetken27@gmail.com dan iletişime geçilmesi halinde ilgili kanunlar ve yönetmelikler çerçevesinde en geç 1 (Bir) Hafta içerisinde bilqi.com yönetimi olarak tarafımızdan gereken işlemler yapılacak ve size dönüş yapacaktır.
Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Search Engine Optimisation provided by DragonByte SEO v2.0.36 (Lite) - vBulletin Mods & Addons Copyright © 2017 DragonByte Technologies Ltd.

Android Rom

Android Oyunlar

Android samsung htc

Samsung Htc

Nokia Windows