EC-Council Certified Ethical Hacker v7 (May-June 2011) Official Release

Discussion in 'Archive' started by john_abraham, Aug 16, 2010.

  1. john_abraham

    john_abraham Guest

    [​IMG]

    EC-Council Certified Ethical Hacker v7 (May-June 2011) Official Release
    EC Council | May-June 2011 | Training Videos, Monster Hacking Tool Repository, Codenamed Frankenstien, iLabs | English | 18 DVDs | ISO | 17 GB

    EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent several years in developing this version.

    The Certified Ethical Hacker courseware has undergone tremendous improvement from its predecessor. We have invested 4 times the regular investment in the research and development since the last release, and have given CEHv7 a complete makeover.

    The new version is a breakaway from earlier releases with more emphasis on techniques and methodologies, which attackers may use to carry out possible attacks against system/networks.

    Picture speaks thousand words and we at EC-Council have enforced the saying by practicing it. The instructor slides and student manuals in CEHv7 has it all. The new version empowers the instructor with flawless flow and outstanding diagrammatic representation of the hacking techniques, which makes it easier to teach and enables students to understand the concepts better.
    CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

    In addition to the makeover, CEHv7 includes two additional bundles; a Monster Hacking Tool Repository, Codenamed Frankenstein and a subscription based Virtual Lab Environment codenamed iLabs.

    [​IMG]

    Frankenstein

    Frankenstein provides user with an ease for searching, downloading and installing the latest hacking and penetration testing tools. By using Frankenstein Version 1.0, users can check the release date of the tool, category under which it is published, probable size of the tool, name of the publisher/author, the website details and technical requirements for the tool to run. This will help all the Certified Members to keep themselves updated of tools released in the wild.

    Key benefits:

    • Repository of categorized latest tools
    • User can download the tool in less time with comparison to manual search
    • Helps the user to synchronize & manage the tools from the server
    • Search specific tools from the available list of tools
    • The system provides a means to generate a HTML report of all the tools downloaded by the user


    iLabs

    The iLabs is a subscription based service that allows students to logon to a virtualized remote machine running Windows 2003 Server to perform various exercises featured in the CEHv7Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24x7 x number of days subscribed.

    Benefits

    • Enables students to practice various hacking techniques in a real time and simulated environment
    • The course tools and programs are preloaded on the iLabs machine thereby saving productive time and effort

    Key Features of CEH v7

    • Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques.
    • Well organized content for a better understanding and learning experience
    • Concepts are well-illustrated to create self-explanatory slides.
    • Diagrammatic representation of concepts and attacks
    • Industry standard key tools are featured in detail and other tools are presented as a list for students to try
    • Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment
    • The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security
    • A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are tested against latest Operating Systems with all the patches and hot fixes applied

    Modules:

    CEHv7 - Module 01
    CEHv7 - Module 02 - Footprinting and Reconnaissance
    CEHv7 - Module 03 - Scanning Networks
    CEHv7 - Module 04 - Enumeration
    CEHv7 - Module 05 - System Hacking
    CEHv7 - Module 06 - Trojans and Backdoors
    CEHv7 - Module 07 - Viruses and Worms
    CEHv7 - Module 08 - Sniffers
    CEHv7 - Module 09 - Social Engineering
    CEHv7 - Module 10 - Denial of Service
    CEHv7 - Module 11 - Session Hijacking
    CEHv7 - Module 12 - Hacking Webserver
    CEHv7 - Module 13 - Hacking Web Applications
    CEHv7 - Module 14 - SQL Injection
    CEHv7 - Module 15 - Hacking Wireless Networks
    CEHv7 - Module 16 - Evading IDS, Firewalls and Honeypots
    CEHv7 - Module 17 - Buffer Overflows
    CEHv7 - Module 18 - Cryptography
    CEHv7 - Module 19 - Penetration Testing

    Download links:

    Code:
    http://www.filemaze.ws/y6w2ld465mv3/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part01.rar.html
    http://www.filemaze.ws/ojh92mwn7llm/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part02.rar.html
    http://www.filemaze.ws/qyyt47u9rm1d/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part03.rar.html
    http://www.filemaze.ws/5kah2q3tkuxv/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part04.rar.html
    http://www.filemaze.ws/ch0kr3f92a3w/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part05.rar.html
    http://www.filemaze.ws/o0krw3xszcxp/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part06.rar.html
    http://www.filemaze.ws/pdujkdi4dthy/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part07.rar.html
    http://www.filemaze.ws/ozc31339l80j/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part08.rar.html
    http://www.filemaze.ws/ii3t7i26molx/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part09.rar.html
    http://www.filemaze.ws/pyu0dgzw8h1k/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part10.rar.html
    http://www.filemaze.ws/u2r2msuetnj8/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part11.rar.html
    http://www.filemaze.ws/fq6cvb6n7gmo/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part12.rar.html
    http://www.filemaze.ws/1kqffxs7askg/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part13.rar.html
    http://www.filemaze.ws/bl7k57mg6880/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part14.rar.html
    http://www.filemaze.ws/zqo8k77wgul4/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part15.rar.html
    http://www.filemaze.ws/zyqcpckh4tzw/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part16.rar.html
    http://www.filemaze.ws/pskhzp7jc18z/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part17.rar.html
    http://www.filemaze.ws/58zpel2k5xqo/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part18.rar.html
    If links are dead, kindly visit the following link:
    Code:
    http://www.filemaze.ws/users/sepstica/171/6
     
  2. john_abraham

    john_abraham Guest

    Ethical Hacking (EC-Council Exam 312-50): Student Courseware

    [​IMG]

    Code:
    http://hotfile.com/dl/62172706/1c36092/EHAC.rar.html
     
  3. xhushito

    xhushito Guest

    thanks for taking the time to upload the material, all links are ok, download take me a few days, if someone falls I hope I can tell thee rise again, greetings.
     
  4. xhushito

    xhushito Guest

    Please, encrypted files, what's the password?...
     
  5. john_abraham

    john_abraham Guest

    Password:
    Code:
    www.amaderforum.com
     
  6. xhushito

    xhushito Guest

    Esto esta muy bueno, acabo de terminar de descargar todo, empecé el día 27 de Agosto y finalmente he visto frutos... Gracias por el material... todo Ok, no hay fallas ni nada que bueno que se esmeren por hacer las cosas muy bien.

    Saludos.
     
  7. john_abraham

    john_abraham Guest

    English please...
     
  8. rahmiy

    rahmiy Guest

  9. john_abraham

    john_abraham Guest

    New links added!
     
  10. john_abraham

    john_abraham Guest

    New links added!
     
  11. john_abraham

    john_abraham Guest

    New links added!
     
  12. woaini

    woaini Guest

    Thanks
     
  13. john_abraham

    john_abraham Guest

    New links added
     
  14. john_abraham

    john_abraham Guest

    [​IMG]

    Kimberly Graves, "CEH Certified Ethical Hacker Study Guide (with CD)"
    Publisher: Sybex | April 2010 | ISBN: 0470525207 | 432 pages | PDF & ISO | 76 MB

    Prepare for the new version of CEH certification with this advanced guide. Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book pres full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.

    Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more

    * Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
    * Includes a CD with review questions, bonus exams, and more study tools

    This is the ideal guide to prepare you for the new CEH certification exam.

    Download link:

    Code:
    http://www.filemaze.ws/x77l7suxsdxx/Sybex.CEH.Certified.Ethical.Hacker.Study.Guide.Exam.with.CD.April.2010.iso.html
     
  15. john_abraham

    john_abraham Guest

    [​IMG]

    EC-Council Certified Ethical Hacker v7 (May-June 2011) Official Release
    EC Council | May-June 2011 | Training Videos, Monster Hacking Tool Repository, Codenamed Frankenstien, iLabs | English | 18 DVDs | ISO | 17 GB

    EC-Council releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. EC-Council has spent several years in developing this version.

    The Certified Ethical Hacker courseware has undergone tremendous improvement from its predecessor. We have invested 4 times the regular investment in the research and development since the last release, and have given CEHv7 a complete makeover.

    The new version is a breakaway from earlier releases with more emphasis on techniques and methodologies, which attackers may use to carry out possible attacks against system/networks.

    Picture speaks thousand words and we at EC-Council have enforced the saying by practicing it. The instructor slides and student manuals in CEHv7 has it all. The new version empowers the instructor with flawless flow and outstanding diagrammatic representation of the hacking techniques, which makes it easier to teach and enables students to understand the concepts better.
    CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

    In addition to the makeover, CEHv7 includes two additional bundles; a Monster Hacking Tool Repository, Codenamed Frankenstein and a subscription based Virtual Lab Environment codenamed iLabs.

    [​IMG]

    Frankenstein

    Frankenstein provides user with an ease for searching, downloading and installing the latest hacking and penetration testing tools. By using Frankenstein Version 1.0, users can check the release date of the tool, category under which it is published, probable size of the tool, name of the publisher/author, the website details and technical requirements for the tool to run. This will help all the Certified Members to keep themselves updated of tools released in the wild.

    Key benefits:

    • Repository of categorized latest tools
    • User can download the tool in less time with comparison to manual search
    • Helps the user to synchronize & manage the tools from the server
    • Search specific tools from the available list of tools
    • The system provides a means to generate a HTML report of all the tools downloaded by the user


    iLabs

    The iLabs is a subscription based service that allows students to logon to a virtualized remote machine running Windows 2003 Server to perform various exercises featured in the CEHv7Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24x7 x number of days subscribed.

    Benefits

    • Enables students to practice various hacking techniques in a real time and simulated environment
    • The course tools and programs are preloaded on the iLabs machine thereby saving productive time and effort

    Key Features of CEH v7

    • Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques.
    • Well organized content for a better understanding and learning experience
    • Concepts are well-illustrated to create self-explanatory slides.
    • Diagrammatic representation of concepts and attacks
    • Industry standard key tools are featured in detail and other tools are presented as a list for students to try
    • Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment
    • The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security
    • A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are tested against latest Operating Systems with all the patches and hot fixes applied

    Modules:

    CEHv7 - Module 01
    CEHv7 - Module 02 - Footprinting and Reconnaissance
    CEHv7 - Module 03 - Scanning Networks
    CEHv7 - Module 04 - Enumeration
    CEHv7 - Module 05 - System Hacking
    CEHv7 - Module 06 - Trojans and Backdoors
    CEHv7 - Module 07 - Viruses and Worms
    CEHv7 - Module 08 - Sniffers
    CEHv7 - Module 09 - Social Engineering
    CEHv7 - Module 10 - Denial of Service
    CEHv7 - Module 11 - Session Hijacking
    CEHv7 - Module 12 - Hacking Webserver
    CEHv7 - Module 13 - Hacking Web Applications
    CEHv7 - Module 14 - SQL Injection
    CEHv7 - Module 15 - Hacking Wireless Networks
    CEHv7 - Module 16 - Evading IDS, Firewalls and Honeypots
    CEHv7 - Module 17 - Buffer Overflows
    CEHv7 - Module 18 - Cryptography
    CEHv7 - Module 19 - Penetration Testing

    Download links:

    Code:
    http://www.filemaze.ws/y6w2ld465mv3/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part01.rar.html
    http://www.filemaze.ws/ojh92mwn7llm/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part02.rar.html
    http://www.filemaze.ws/qyyt47u9rm1d/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part03.rar.html
    http://www.filemaze.ws/5kah2q3tkuxv/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part04.rar.html
    http://www.filemaze.ws/ch0kr3f92a3w/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part05.rar.html
    http://www.filemaze.ws/o0krw3xszcxp/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part06.rar.html
    http://www.filemaze.ws/pdujkdi4dthy/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part07.rar.html
    http://www.filemaze.ws/ozc31339l80j/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part08.rar.html
    http://www.filemaze.ws/ii3t7i26molx/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part09.rar.html
    http://www.filemaze.ws/pyu0dgzw8h1k/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part10.rar.html
    http://www.filemaze.ws/u2r2msuetnj8/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part11.rar.html
    http://www.filemaze.ws/fq6cvb6n7gmo/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part12.rar.html
    http://www.filemaze.ws/1kqffxs7askg/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part13.rar.html
    http://www.filemaze.ws/bl7k57mg6880/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part14.rar.html
    http://www.filemaze.ws/zqo8k77wgul4/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part15.rar.html
    http://www.filemaze.ws/zyqcpckh4tzw/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part16.rar.html
    http://www.filemaze.ws/pskhzp7jc18z/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part17.rar.html
    http://www.filemaze.ws/58zpel2k5xqo/EC_Council_Certified_Ethical_Hacker_v7_May_2011_Training_Videos_and_Labs_Tools.part18.rar.html
    If links are dead, kindly visit the following link:
    Code:
    http://www.filemaze.ws/users/sepstica/171/6
     
  16. john_abraham

    john_abraham Guest

    Update:

    Instructions slides (decrypted)


    Code:
    http://www.filemaze.ws/i5v4zfea40oe/CEH.v7.Instructor.Slides__decrypted.rar.html
     

Share This Page