This contains the complete package to the Certified Ethical Hacker course, version 7 (the most recent at the time of this upload). It contains the lectures (as videos), the study guide, unencrypted copies of the teacher's instructor slides, and all the programs you'll need in the course. Note that the programs are put in ISO images. To open the ISOs, you can either burn them to a disk and open them like any other data-containing disk, or you can open them with software such as 7-zip (which is what I prefer, because after all ISOs are only containers). Along with the tools are animations that explain how to use them (and how to install them). Also, just because this focuses on "ethical hacking" (or authorized hacking as I prefer to call it) doesn't mean it doesn't teach you black hat methods.
The official Certified Ethical Hacker course costs something like $500, and you can only take the exam once. If you fail, you have to pay another $500 to retake it. That's what this torrent is for, studying. And its not just studying for the CEH exam, its also simply a great way to learn hacking. Note that this course assumes you have moderate understanding of computers, a computer with Windows (the course is oriented around Windows, but if you have Linux then many of the Windows tools can be run through Wine), and plenty of time on your hands. You do not need to be a Linux guru or have programming knowledge to learn from this course.
The course is broken up into different sections, called "modules", each teaching a slightly different subject. The modules are:
-Module 02: Footprinting and Reconnaissance
-Module 03: Scanning Networks
-Module 04: Enumeration
-Module 05: System Hacking
-Module 06: Trojans and Backdoors
-Module 07: Viruses and Worms
-Module 08: Sniffers
-Module 09: Social Engineering
-Module 10: Denial of Service
-Module 11: Session Hijacking
-Module 12: Hacking Webserver
-Module 13: Hacking Web Applications
-Module 14: SQL Injection
-Module 15: Hacking Wireless Networks
-Module 16: Evading IDS, Firewalls, and Honeypots
-Module 17: Buffer Overflows
-Module 18: Cryptography
-Module 19: Penetration Testing
I originally found this torrent on TPB, but it was so tremendously helpful I decided to upload it elsewhere. Enjoy this torrent, remember to seed, and get hacking!
|Click to see files:|
thanks a trillion frnd...