1. Linux Hardening.zip
567.6 MB
1 - Intro
2 - Memory Attacks and Overflows
3 - Minimization and Patching
4 - Stopping Boot Services
5 - Session Hijacking and Sniffing
6 - SSH
7 - Host Based Firewalls
8 - WrapUp
2 - Memory Attacks and Overflows
3 - Minimization and Patching
4 - Stopping Boot Services
5 - Session Hijacking and Sniffing
6 - SSH
7 - Host Based Firewalls
8 - WrapUp
2. Linux Hardening.zip
566.6 MB
1 - Rootkits and File Integrity Assessment
2 - Physical Attacks and Defenses
3 - Password Attacks and Access Controls
4 - Sudo
5 - Warning Banners
6 - Kernel Settings for Security
7 - WrapUp
2 - Physical Attacks and Defenses
3 - Password Attacks and Access Controls
4 - Sudo
5 - Warning Banners
6 - Kernel Settings for Security
7 - WrapUp
3. Linux Hardening.zip
735.6 MB
1 - Automated Tasks Via SSH
2 - Unix Logging Overview
3 - SSH Port Forwarding
4 - SyslogNG
5 - Final Remarks
6 - Appendix A Password Alternatives
2 - Unix Logging Overview
3 - SSH Port Forwarding
4 - SyslogNG
5 - Final Remarks
6 - Appendix A Password Alternatives
4. Linux Application Security.zip
962.3 MB
1 - Notes on chroot
2 - SCPOnly Shell
3 - SELinux
2 - SCPOnly Shell
3 - SELinux
5. Linux Application Security.zip
562.5 MB
1 - DNS and BIND
2 - Splithorizon DNS
3 - Configuring BIND
4 - DNSSEC
5 - WrapUp
6 - Appendix A Sendmail
7 - Appendix B PortSentry
2 - Splithorizon DNS
3 - Configuring BIND
4 - DNSSEC
5 - WrapUp
6 - Appendix A Sendmail
7 - Appendix B PortSentry
6. Digital Forensics for Linux.zip
736.9 MB
1 - Linux Filesystems Basics
2 - Introduction to Forensics
3 - Forensic Preparation
4 - Incident Response Process
5 - Evidence Collection
6 - MAC Timelines
7 - Analyze Media
8 - Section 6 WrapUp
2 - Introduction to Forensics
3 - Forensic Preparation
4 - Incident Response Process
5 - Evidence Collection
6 - MAC Timelines
7 - Analyze Media
8 - Section 6 WrapUp
Section 1.zip
679.5 MB
1 - Course Overview
2 - Ensure Your Success
3 - Accessing The Network
4 - Manipulating the Network
5 - Routing Attacks
6 - IPv6 for Penetration Testers
7 - Bootcamp
2 - Ensure Your Success
3 - Accessing The Network
4 - Manipulating the Network
5 - Routing Attacks
6 - IPv6 for Penetration Testers
7 - Bootcamp
Section 2.zip
484.3 MB
1 - Crypto For Pen Testers
2 - Escaping Restricted Desktops
3 - Powershell Essentials for Pen Testers
4 - Escape and Escalation
5 - Modern Bypass Tools
6 - Bootcamp
7 - Appendix A
8 - Appendix B
2 - Escaping Restricted Desktops
3 - Powershell Essentials for Pen Testers
4 - Escape and Escalation
5 - Modern Bypass Tools
6 - Bootcamp
7 - Appendix A
8 - Appendix B