SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling(2017)

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:3.10 GB
  3. Creat Time:2024-07-22
  4. Active Degree:15
  5. Last Active:2024-11-20
  6. File Tags:SEC504  Hacker  Tools  Techniques  Exploits  and  Incident  Handling  2017  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling(2017)

  1. Selfstudy - SEC504-13339810.zip 718.48 MB
  2. Section 6 Hacker Tools Workshop/6.1 Hacker Exploits Hands-On/SANS OnDemand_60.webm 120.11 MB
  3. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.9 Enterprise-Wide Identification and Analysis/SANS OnDemand_19.WEBM 80.81 MB
  4. Section 4 Computer and Network Hacker Exploits - Part 3/4.3 Worms, Bots, and Bot-Nets/SANS OnDemand_22_2.webm 60.76 MB
  5. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_36.WEBM 57.79 MB
  6. Section 3 Computer and Network Hacker Exploits - Part 2/3.10 Lab Metasploit Attack and Analysis/SANS OnDemand_2_2.webm 35.91 MB
  7. Section 2 Computer and Network Hacker Exploits - Part 1/2.6 Scanning Evading IDSIPS and Web Vulnerability Scanning/SANS OnDemand_18.webm 34.50 MB
  8. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.12 Appendix A Intro to Linux Workshop/SANS OnDemand_19.WEBM 28.70 MB
  9. Section 2 Computer and Network Hacker Exploits - Part 1/2.6 Scanning Evading IDSIPS and Web Vulnerability Scanning/SANS OnDemand_17.webm 27.58 MB
  10. 1-Getting Start with SANS OnDemand/1.Welcome To Your Sans OnDemond Course/8.webm 26.67 MB
  11. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.4 Scanning War Dialing and War Driving/SANS OnDemand_9.WEBM 25.25 MB
  12. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_33.WEBM 24.55 MB
  13. Section 5 Computer and Network Hacker Exploits - Part 4/5.4 Rootkits Techniques and Examples/SANS OnDemand_30.webm 23.48 MB
  14. Section 3 Computer and Network Hacker Exploits - Part 2/3.6 Session Hijacking, Tools, and Defenses/SANS OnDemand_13.webm 23.10 MB
  15. Section 2 Computer and Network Hacker Exploits - Part 1/2.6 Scanning Evading IDSIPS and Web Vulnerability Scanning/SANS OnDemand_2.webm 22.81 MB
  16. Section 5 Computer and Network Hacker Exploits - Part 4/5.4 Rootkits Techniques and Examples/SANS OnDemand_23_2.webm 20.78 MB
  17. Section 2 Computer and Network Hacker Exploits - Part 1/2.6 Scanning Evading IDSIPS and Web Vulnerability Scanning/SANS OnDemand_16.webm 16.76 MB
  18. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.11 Legal Issues and Cyber Crime Laws/SANS OnDemand_5.WEBM 16.25 MB
  19. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_28.WEBM 16.24 MB
  20. Section 5 Computer and Network Hacker Exploits - Part 4/5.3 Memory Analysis/SANS OnDemand_10_2.webm 15.44 MB
  21. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.5 Scanning Network and Port Scanning with Nmap/SANS OnDemand_5_2.WEBM 15.26 MB
  22. Section 4 Computer and Network Hacker Exploits - Part 3/4.2 Password Attacks/SANS OnDemand_18.webm 12.36 MB
  23. Section 4 Computer and Network Hacker Exploits - Part 3/4.5 Web Application Attacks/SANS OnDemand_10.webm 12.10 MB
  24. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.4 Incident Handling Phase Two Identification/SANS OnDemand_4_2.WEBM 12.03 MB
  25. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_16.WEBM 11.99 MB
  26. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_11_2.WEBM 11.06 MB
  27. Section 5 Computer and Network Hacker Exploits - Part 4/5.7 Covering Tracks on the Network/SANS OnDemand_23.webm 10.93 MB
  28. Section 4 Computer and Network Hacker Exploits - Part 3/4.5 Web Application Attacks/SANS OnDemand_61_2.webm 10.66 MB
  29. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.4 Incident Handling Phase Two Identification/SANS OnDemand_19.WEBM 10.52 MB
  30. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.12 Appendix A Intro to Linux Workshop/SANS OnDemand_40.WEBM 10.38 MB
  31. Section 5 Computer and Network Hacker Exploits - Part 4/5.10 Future Attack Trends/SANS OnDemand_6_2.webm 10.01 MB
  32. Section 2 Computer and Network Hacker Exploits - Part 1/2.6 Scanning Evading IDSIPS and Web Vulnerability Scanning/SANS OnDemand_14.webm 10.00 MB
  33. Section 3 Computer and Network Hacker Exploits - Part 2/3.4 Multi-purpose Netcat/SANS OnDemand_15.webm 9.79 MB
  34. Section 5 Computer and Network Hacker Exploits - Part 4/5.5 Covering Tracks in Linux and Unix/SANS OnDemand_16_2.webm 9.65 MB
  35. Section 2 Computer and Network Hacker Exploits - Part 1/2.7 SMB Sessions/SANS OnDemand_16_2.webm 9.60 MB
  36. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.4 Scanning War Dialing and War Driving/SANS OnDemand_3.WEBM 9.57 MB
  37. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.3 Incident Handling Phase One Preparation/SANS OnDemand_12_2.WEBM 9.57 MB
  38. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.2 Roadmap and Overview/SANS OnDemand_12.webm 9.19 MB
  39. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_6_2.WEBM 9.19 MB
  40. Section 5 Computer and Network Hacker Exploits - Part 4/5.7 Covering Tracks on the Network/SANS OnDemand_15_2.webm 9.15 MB
  41. Section 5 Computer and Network Hacker Exploits - Part 4/5.3 Memory Analysis/SANS OnDemand_25.webm 9.13 MB
  42. Section 4 Computer and Network Hacker Exploits - Part 3/4.2 Password Attacks/SANS OnDemand_9.webm 9.08 MB
  43. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.12 Appendix A Intro to Linux Workshop/SANS OnDemand_32.WEBM 8.92 MB
  44. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.3 Reconnaissance/SANS OnDemand_23.WEBM 8.55 MB
  45. 2-Section 1 (Incident Handling Step-By-Step and Computer Crime Investigations)/1.5 Incident Handling Phase Three Containment/SANS OnDemand_5.WEBM 8.55 MB
  46. Section 5 Computer and Network Hacker Exploits - Part 4/5.7 Covering Tracks on the Network/SANS OnDemand_14_2.webm 8.45 MB
  47. 3-Section 2 Computer and Network Hacker Exploits - Part 1/2.2 General Trends in the Hacker Underground/SANS OnDemand_9.WEBM 8.42 MB
  48. Section 5 Computer and Network Hacker Exploits - Part 4/5.9 Putting it all together/SANS OnDemand_12.webm 8.21 MB
  49. Section 5 Computer and Network Hacker Exploits - Part 4/5.7 Covering Tracks on the Network/SANS OnDemand_20.webm 8.16 MB
  50. Section 4 Computer and Network Hacker Exploits - Part 3/4.2 Password Attacks/SANS OnDemand_17.webm 8.13 MB