Notification

×

Iklan

Iklan

Indeks Berita

Tag Terpopuler

Course Links!!!!

Sunday, August 5, 2018 | August 05, 2018 WIB | 0 Views Last Updated 2018-08-06T05:18:27Z
Course Links!!!!
                                                            
     /\                                                     
    /  \   _ __   ___  _ __  _   _ _ __ ___   ___  _   _ ___
   / /\ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __|
  / ____ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \
 /_/    \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/
                              __/ |                         
                             |___/                          

Courses pirated & dumped by Case, S1rlancelot & dave + some random contributions                                                              
irc.anonops.com/6697
#learninghub

* This series of videocourses will guide you through the core material that an entry-level "ethical" hacker needs.
* Go to pluralsight.com (most links here are from there) and search the course if you want to see the table of contents.
* You may want to use a media player that allows you to increase the speed of the videos
* The number does not mean the order in which you should follow the courses, its just the order in which they were added.
* Use ?desc <coursenumber> to check the description of a course. Eg: ?desc 81
* Special thanks to ClaudiaD who haxed her way and made downloading the videos a lot easier, you rock. I also reused the code of her IRC bot which lead to the birth of SexyTeacherBot. Thanks ;)
* Special thanks to S1rlancelot who has also dumped a great deal of courses as well and helps more than I could ever ask for in #learninghub and is also leet as fuck

Don't know where to start? <-------------------------------------------------------------------------> Don't know where to start? <------------------------------------------------------------------------------------------------------------------------------------------------

-> BEGINNERS MUST WATCH: 10,000 foot view of penetration testing:                                        81. https://ift.tt/2Dhi9Gb

-> The top 10 OWASP vulnerabilities explained & exploited. Good for getting a big picture of present day web hacking:                2. https://ift.tt/2B5sfnD

-> A ~9 hour long course on website vulnerabilities and how to exploit/secure them:                                1. https://ift.tt/2Df6Gql (Hack Yourself First; How to go on the Cyber-Offense)

-------------------------------------------------------------------------------> The rest of the courses listed below will go deeper into each step of hacking and the different attack techniques. <-------------------------------------------------------------------------------

*** IF YOU FEEL THAT YOU NEED TO KNOW MORE BASICS ABOUT COMPUTERS BEFORE GETTING TO HACKING CHECK BELOW WHERE IT SAYS "BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW"
*** IT IS ADVISED THAT YOU LEARN A LOW LEVEL PROGRAMMING LANGUAGE SUCH AS C++ BEFORE GETTING TO HACK
*** TRY NOT TO GET OVERWHELMED BY THE AMOUNT OF CONTENT!!

# EC-Council's Certified Ethical Hacker (CEH)
3. https://ift.tt/2B72aEG                     -- Reconnaissance/Footprinting
4. https://ift.tt/2Df6Hup                             -- SQL Injection
5. https://ift.tt/2B3TNJP                         -- Scanning Networks
6. https://ift.tt/2Df6KGB                             -- Enumeration
7. https://ift.tt/2B41AYp                     -- Hacking Web Servers
8. https://ift.tt/2DeCICU                     -- Hacking Web Applications
9. https://ift.tt/2B4N6r9                             -- Cryptography
10. https://ift.tt/2DhfufG                             -- Sniffing
11. https://ift.tt/2B72bIK                         -- Session Hijacking
12. https://ift.tt/2DgxJBP                         -- Social Engineering
13. https://ift.tt/2B5ADn9                         -- System Hacking
14. https://ift.tt/2Dgw3s6                         -- Denial of Service
15. https://ift.tt/2B5sgId                     -- Hacking Wireless Networks
16. https://ift.tt/2Dgw4MG                         -- Malware Threats
17. https://ift.tt/2B5rURE             -- Evading IDS, Firewalls, and Honeypots
18. https://ift.tt/2DhilVV                         -- Hacking Mobile Platforms

# Offensive Security Certification - by mickers, you rock dude!
https://ift.tt/2B3yV5I

# More hacking courses
 0. https://ift.tt/2Df2wiy                      -- Introduction to Pentesting and Ethical Hacking with Kali Linux
19. https://ift.tt/2B5w1x9                     -- Introduction to Firewalls
20. https://ift.tt/2Dhfuwc             -- Introduction to browser security headers
21. https://ift.tt/2B6dYXw                     -- Introduction to Wireshark
22. https://ift.tt/2DfU56r     -- Troubleshooting with Wireshark
80. https://ift.tt/2B5oxuc                            -- Wireshark 2.0
82. https://ift.tt/2KvCB4K                                -- Network Security Testing with Nmap
23. https://ift.tt/2DjpAwg                        -- All about buffer overflows           
24. https://ift.tt/2B5sjDT             -- Network Pentesting using Python and Kali linux
25. https://ift.tt/2DhiubV                         -- Metasploit Basics
26. https://ift.tt/2B4V8Ac                         -- CloudFlare Security
27. https://ift.tt/2DfU5mX                        -- Hack your API first
28. https://ift.tt/2B4Wrz4    -- SSCP: Risk Identification, Monitoring, and Analysis
29. https://ift.tt/2DeWs9z Check Point Certified Security Administrator; Install & Deploy
73. https://ift.tt/2MnRKXw                        -- Cloud Security
79. https://ift.tt/2B5SmL5                        -- Cloud Computing
74. https://ift.tt/2KvMXBQ        -- Introduction to Pentesting using Metasploit

# Computer Hacking Forensic Investigator (CHFI)
88. https://ift.tt/2M5pD2t                    —- 1 Introduction
89. https://ift.tt/2DhiBEn            —- 2 Forensics & Investigation Process
90. https://ift.tt/2B5rVoG                —- 3 Searching & Seizing
91. https://ift.tt/2DhiDft                —- 4 Digital Evidence
92. https://ift.tt/2M6qQXp                —- 5 Responder Procedures
93. https://ift.tt/2KvN4xg                    —- 6 Forensic Lab
94. https://ift.tt/2OJvrx3            —- 7 Hard Disks & File Systems
95. https://ift.tt/2B4WxXs                    —- 8 Windows Forensics
96. https://ift.tt/2OJvsB7            —- 9 Data Akquisition & Duplication
97. https://ift.tt/2MkJpUw        —- 10 Recovering deleted Files & & partitions
98. https://ift.tt/2M6P2ZA                —- 11 Using Access Data FTK
99. https://ift.tt/2MquQ1C                    —- 12 Using EnCase
100. https://ift.tt/2OH5vSK                    —- 13 Steganography
101. https://ift.tt/2KwqaFI                    —- 14 Password Crackers
102. https://ift.tt/2OH5y0S                    —- 15 Log Correlation
103. https://ift.tt/2KxiR0F                    —- 16 Network Forensics
104. https://ift.tt/2OH5z4W                    —- 17 Wireless Attacks
105. https://ift.tt/2MmqcSk                    —- 18 Web Attacks
106. https://ift.tt/2M5pKuV                    —- 19 Email Crimes
107. https://ift.tt/2MlfZWu                —- 20 Mobile Investigation
108. https://ift.tt/2OJvyZv                —- 21 Investigative Reports
109. https://ift.tt/2KtUNMh                    —- 22 Expert Witness
   
# Certified Information Systems Security Pro (CISSP)
110. https://ift.tt/2OJvzwx            —- 1 Security and Risk Management
111. https://ift.tt/2Mm6hDf                    —- 2 Asset Security
112. https://ift.tt/2M5jjYH                —- 3 Security Engineering
113. https://ift.tt/2Mlg24C        —- 4 Communication and Network Security
114. https://ift.tt/2OH5C0C            —- 5 Identity and Access Management
115. https://ift.tt/2KuuSE4            —- 6 Security Assessment Testing
116. https://ift.tt/2M5pPid                —- 7 Security Operations
117. https://ift.tt/2MjEUtf            —- 8 Software Development Security   

# Certified Information Systems Auditor (CISA)
118. https://ift.tt/2M5jm6P                            —- CISA Lesson 1
119. https://ift.tt/2Mn1HEP                            —- CISA Lesson 2
120. https://ift.tt/2OJvDfL                            —- CISA Lesson 3
121. https://ift.tt/2MquQyE                            —- CISA Lesson 4
122. https://ift.tt/2OJvEQR                            —- CISA Lesson 5
123. https://ift.tt/2KuxH7W                            —- CISA Lesson 6
124. https://ift.tt/2OJvGbr                            —- CISA Lesson 7

# Certified Information Security Manager (CISM)
125. https://ift.tt/2Kur59V            -- Information Security Governance
126. https://ift.tt/2M5pVGB                    -- Risk Management
127. https://ift.tt/2Kv3hCF            -- Information Security Program
128. https://ift.tt/2OH5Ip0    -- Information Security Program Implementation
129. https://ift.tt/2KvNlQO        -- Incident Management and Response
130. https://ift.tt/2OH5KNE

# Coursera
30. https://ift.tt/2KuCTJ6                         -- Software Security
31. https://ift.tt/2M5pZGl                         -- Hardware Security
32. http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z    -- Bitcoin & Cryptocurrency tech, by anominous - thanks!

=== OTHER VIDEO COURSES ===

# Programming
33. https://ift.tt/2KtvN7S                         -- C++ Fundamentals
34. https://ift.tt/2OH5NZQ                     -- C++ Advanced topics
75. https://ift.tt/2KuHMSH                        -- C Fundamentals
76. https://ift.tt/2M5jwLt                            -- C in Action
77. https://ift.tt/2Kxp8JM                        -- Java Fundamentals
35. https://ift.tt/2OJvRU9                     -- Javascript from Scratch
36. https://ift.tt/2Kv4A4D                -- Introduction to Javascript, by anominous - thanks dude, you rock!
37. https://ift.tt/2M5jyTB                 -- Introduction to HTML (for designers - you don't really need to be a designer)
38. https://ift.tt/2Mp6N39                 -- Introduction to JQuery
39. https://ift.tt/2OMhjTR                 -- Introduction to CSS
84. https://ift.tt/2Kur3Pl                            -- Introduction to Arduino
40. https://ift.tt/2M5q9xr                     -- Get started with AngularJS
41. https://ift.tt/2Kw0JEf     -- Building Angular and Node JS Apps with the MEAN Stack
42. https://ift.tt/2ON9GMT                     -- ExtJS Desktop Fundamentals
43. https://ift.tt/2KAyOU0                        -- Python Fundamentals
44. https://ift.tt/2M5qdgF                 -- Python Beyond the basics
87. https://ift.tt/2MmsCAv                        -- Django Fundamentals
45. https://ift.tt/2M5jD9R                        -- Ruby 2.0, by anominous - thanks dude!
46. https://ift.tt/2MquSXi            -- Getting started with BackBone.js, by anominous - thanks dude!
83. https://ift.tt/2M5jEdV                    -- Introduction to PowerShell
85. https://ift.tt/2MluBoM                    -- Raspberry Pi Home Server
86. https://ift.tt/2M5qf8h                        -- Raspberry Pi for Developers

[We need feedback on the following courses]

132. Code-Clinic-Python,
     Programming-Fundamentals-Real-World,
     Python-3-Essential-Training.zip,
     Python-GUI-Development-Tkinter.zip
     Up-Running-Python.zip
     Up-Running-Python-Django.zip -> https://ift.tt/2KuxHVu

133. Penetration-Testing-Essential-Training https://ift.tt/2M5qhwV
134. Become a C++ developer (6 courses): https://ift.tt/2MiD2Bi

# Cisco CCNA Security (640-554)
47. https://ift.tt/2M5jFhZ     -- Introduction to Network Security
48. https://ift.tt/2KuxKk8             -- AAA and IP Security
49. https://ift.tt/2ONc06r             -- Firewalls and VPNs


## BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW

# CompTIA A+ (220-801)
50. https://ift.tt/2KvOo31             -- CompTIA A+ Part 1: Computer Hardware
51. https://ift.tt/2M1XQA4                 -- CompTIA A+ Part 2: Networking
52. https://ift.tt/2Mjuqu5     -- CompTIA A+ Part 3: Peripherals and best practices
53. https://ift.tt/2ONjZ3t             -- CompTIA A+ Part 4: Operating System
54. https://ift.tt/2MoACkG     -- CompTIA A+ Part 5: Mobile Devices and Troubleshooting

# CompTIA Security+ (SY0-401)
55. https://ift.tt/2ONk1bB                        -- CompTIA Security+ Domain 1 - Network Security.

# CompTIA Network+ (N10-006)
56. https://ift.tt/2MiyHOm             -- Network Architecture
57. https://ift.tt/2M5jIub               -- Network Operations
58. https://ift.tt/2KwxGAN               -- Network Security

# Linux
59. https://ift.tt/2M5jJyf             -- Linux Installation and Initial Configuration
60. https://ift.tt/2MmltAc                 -- Introduction to the Bash Shell
61. https://ift.tt/2ON9Js3                     -- Shell Scripting with Bash
62. https://ift.tt/2KxiV0p         -- Linux Command Line Interface Fundamentals

# Video editing
63. https://ift.tt/2ONYNuu                 -- Adobe Premiere Pro CC Fundamentals
64. https://ift.tt/2Mmlwfm             -- Animation and Video Editing in Photoshop CS6
65. https://ift.tt/2ONjXbR -- Color Correction and Grading in Adobe Premiere Pro and SpeedGrade
66. https://ift.tt/2MmlwMo     -- Action Scene Editing Techniques in Adobe Premiere Pro
67. https://ift.tt/2ONk1Z9                     -- Adobe Premiere Pro CS6 Setup [This is the software, not a course]

# Others
68. https://ift.tt/2Mmlxjq                             -- Clean Code
69. https://ift.tt/2M2J5gl                         -- Test Driven Development with Brad Wilson
70. https://ift.tt/2MmLNtX                         -- The fundamentals of Scrum methodology
71. https://ift.tt/2M5jN0X                 -- Building a successful blog
72. https://ift.tt/2KuHNpJ         -- Building a high traffic profitable blog
78. https://ift.tt/2M6hlHF                            -- Fiddler

=== Other Resources ===
https://ift.tt/2MmLP53     -- Useful PDFs about a huge amount of topics regarding hacking, extracted from repository.root-me.org
https://ift.tt/2M435yZ            -- Perl documents
https://ift.tt/2MmLPC5        -- Red hat documents
https://ift.tt/2OJw1uJ   -- Reverse Engineering
https://ift.tt/2MmlBQc              -- Assembly

https://ift.tt/2eF2e66                     -- Free course series by University of Helsinki in collaboration with F-Secure
https://ift.tt/2MmLRdb        -- 160 books on security stuff
https://ift.tt/1h3YZUe                -- A curated list of awesome information security resources
https://ift.tt/2MmLSxL            -- A curated list of awesome self hosted alternatives to cloud services.
https://ift.tt/1E0qyl6                -- A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes.
https://ift.tt/2IHx5wo            -- OSCP Prepare
https://ift.tt/2bp3WYM    -- All you need to pass OSCP
https://ift.tt/2MmlEvm                -- A collection of handy bookmarks

** Ask Case for PDFs and other stuff on a specific topic. There are also the following courses available which have not been categorized yet:
Introduction to game development with Unity https://ift.tt/2M6FIVy
FMOD https://ift.tt/2KuuUvG
Digital audio fundamentals https://ift.tt/2OK9aiJ
Alchemy synth https://ift.tt/2Kur6L1


=== Practice what you learn ===
* https://ift.tt/1ajHYOj
* root-me.org -> webclient and webserver challenges can be done on the go, Capture The Flag, etc.
* hackerrank.com -> Very good for learning programming, has on-the-go exercises
* codeacademy.com
* use fucking google
* hacksplaining.com
* vulnhub.com

Other free hacking/IT videos: www.cybrary.it
Interesting github: https://ift.tt/1GaumkM -- Check out Hacking Team if you haven't!


from BITCOIN NEWS https://ift.tt/2AQbIJ4
via Bitcoin News Update

from Bitcoin News Update https://ift.tt/2M2w06I
via IFTTT