The Art of Hacking (Video Collection) - The Complete Hacking Guide

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size42.2 GB
  • Uploaded BySeedHash
  • Downloads53
  • Last checkedDec. 07th '23
  • Date uploadedDec. 07th '23
  • Seeders 3
  • Leechers40

Infohash : B4708A772687B2B7516C4011836DCA5B378DFBDC

The Art of Hacking (Video Collection) - The Complete Hacking Guide

Join For More :- https://t.me/SeedHash



26 Hours of Video Instruction

Code:

Description

Your complete guide to help you get up and running with your cybersecurity career!

Overview

The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture.

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker.

Courses include:

Security Penetration Testing (The Art of Hacking Series) LiveLessons
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series) LiveLessons
Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments

About the Authors

Omar Santos is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar is the author of over 20 books and video courses; numerous white papers, articles, and security configuration best practices. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, TechCrunch, Fortune Magazine, Ars Technica, and more. Omar is often delivering presentations at conferences around the world.

Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG). He has over 20 years of experience in the networking and security industry. He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries. He was formerly with Spirent Communications and the U.S. Air Force. He is CCIE certified in the Routing & Switching and Service Provider tracks, which he has held for over 10 years.

Jon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcare and credit union industries. Jon has been a lead contributor to securing a wide variety of organizations in healthcare, education, finance, legal, and government industries throughout his 13+ years in the security field. He co-chairs the Privacy and Security Workgroup at the North Carolina Healthcare Information and Communications Alliance (NCHICA). Jon was the former President of the BSides Raleigh Security conference.
Ron Taylor has been in the Information Security field for almost 20 years. Ten of those years were spent in consulting where he gained experience in many areas. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance. In 2012, he moved into a position with the Security Research & Operations group (PSIRT) where his focus was mostly on penetration testing of Cisco products and services.

Ron was also involved in developing and presenting security training to internal development and test teams globally. Additionally, he provided consulting support to many product teams as an SME on product security testing. In his current role, he is a Consulting Systems Engineer specializing in Cisco's security product line. Certifications include GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP and MCSE. Ron is also a Cisco Security Blackbelt, SANS mentor, Co-Founder and President of the Raleigh BSides Security Conference, and member of the Packet Hacking Village team at Defcon.

Who Should Take This Course

Any network and security professional who is starting a career in ethical hacking and penetration testing
Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP)and any other ethical hacking certification
Any cyber security professional who wants to learn the skills required to becoming a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts.

Course Requirements

Requires basic knowledge of networking and cybersecurity concepts and technologies.

Table of Contents

Security Penetration Testing (The Art of Hacking Series) LiveLessons
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series) LiveLessons
Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments

We appreciate your generosity :)
Please seed after download!!

Files:

Code:

  • udp://tracker.opentrackr.org:1337/announce
  • https://tracker2.ctix.cn:443/announce
  • https://tracker1.520.jp:443/announce
  • udp://opentracker.i2p.rocks:6969/announce
  • udp://tracker.openbittorrent.com:6969/announce
  • http://tracker.openbittorrent.com:80/announce
  • udp://open.demonii.com:1337/announce
  • udp://open.stealth.si:80/announce
  • udp://exodus.desync.com:6969/announce
  • udp://tracker.moeking.me:6969/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://tracker.bitsearch.to:1337/announce
  • udp://p4p.arenabg.com:1337/announce