You are on page 1of 34

Harga : Rp.50.

000,-

Debian merupakan salah satu OS terlama dan stabil di kalangan Linux BAGI ANDA YANG MASIH AWAM JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI.

Berikut ini isi dari DVD FULL PACKET 1. Debian 5.0


1

- Installations Local Media Network LVM- RAID5 VMWare Kickstart - Common BASH Shell commands Command Line Interface (CLI) - Permissions Symlinks Quotas File System Management - Kickstart-based RAID Installation - RPM | YUM Package Management Tools - Concepts & Usage - CRON - System Scheduler - Explore System Logging via SYSLOG and Logrotate - Common Network Utilities - Network Interface Configuration - Implement Network Time Protocol (NTP) Client/Server - Trivial File Transfer Protocol Daemon (TFTPD) - Very Secure File Transfer Protocol Daemon (VSFTPD) - TelnetD - Dynamic Host Configuration Protocol (DHCP) - Samba Implementation 2. Fedora

3. Squid

- Squid Proxy Initialization - General Proxy Usage - Squid Proxy Logs - Squid Network Configuration & System Stats - Squid Access Control Lists (ACLs) - Squid Proxy Hierarchies - Squid on Windows - Reverse Proxy

Harga : Rp.50.000,DVD ini cocok untuk yang mau serius di Product Juniper BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD Juniper

1. Juniper AIO bs | Ebooks + CD - Addison Wesley Juniper Field Guide & Reference.chm - Advanced.Juniper.Networks.Routing.in.the.Enterprise.Detailed.Lab.Guide.8.a.pdf - Advanced.Juniper.Networks.Routing.in.the.Enterprise.Lab.Diagrams.8.a.pdf - Addison Wesley Juniper Field Guide & Reference.chm - Advanced.Juniper.Networks.Routing.in.the.Enterprise.Detailed.Lab.Guide.8.a.pdf - Advanced.Juniper.Networks.Routing.in.the.Enterprise.Lab.Diagrams.8.a.pdf - Advanced.Juniper.Networks.Routing.in.the.Enterprise.Student.Guide.8.a.pdf - For.Dummies.JUNOS.For.Dummies.Sep.2008.pdf - Interdomain.Multicast.Routing.Practical.Juniper.Networks.and.Cisco.Systems.Solutions.2002.chm - JNCIA.studyguide.pdf - JNCIE.studyguide.pdf - JNCIP.studyguide.pdf - JNCIS.studyguide.pdf - John.Wiley.&.Sons.Juniper.and.Cisco.Routing.pdf - Juniper.Networks.Reference.Guide.JUNOS.Routing.Configuration.and.Architecture.2002.chm - JUNOS.Internet.Software.Configuration.Guide.MPLS.Applications.V5.0.pdf - Operating.Juniper.Networks.Routers.in.the.Enterprise.Detailed.Lab.Guide.8.a.R.pdf - Operating.Juniper.Networks.Routers.in.the.Enterprise.Lab.Diagrams.8.a.R.pdf
3

- Operating.Juniper.Networks.Routers.in.the.Enterprise.Student.Guide.8.a.R.pdf - OReilly.JUNOS.Cookbook.Apr.2006.chm - OReilly.JUNOS.Enterprise.Routing.Mar.2008.chm - Sybex.JNCIA.Juniper.Networks.Certified.Internet.Associate.Study.Guide.2003.chm - Sybex.JNCIE.Juniper.Networks.Certified.Internet.Expert.Study.Guide.2003.pdf - Sybex.JNCIP.Juniper.Networks.Certified.Internet.Professional.2003.chm - Sybex.JNCIS.Juniper.Networks.Guide.2004.pdf - Syngress.Configuring.Juniper.Networks.Netscreen.and.SSG.Firewalls.Nov.2006.pdf - Targeting.JNCIA.Study.Guide.for.Exam.JN0.201.pdf 2. Juniper JNCIA JNCIS JNCIP JNCIE Student Guide

Collection Juniper - jncia-juniper-networks-certified-internet-associate-study-guide.chm - jncie-juniper-networks-certified-internet-expert-study-guide.pdf - jncip-juniper-networks-certified-internet-professional-study-guide.chm - Sybex JNCIP Juniper Networks Certified Internet Professional 2003.chm - Sybex Juniper JNCIA.pdf - Sybex Juniper JNCIS.pdf - Sybex Juniper JNCIP.pdf - Sybex Juniper JNCIE.pdf - Sybex.JNCIA.Juniper.Networks.Certified.Internet.Associate.Study.Guide.eBook-LiB.pdf - JNCIA_studyguide.pdf - JNCIS_studyguide.pdf - JNCIP_studyguide.pdf - JNCIE_studyguide.pdf 3. Video Solaris

-Identify the functions of the Unix system administrator. - Identify the features of the Solaris operating environment. - Identify the methods for installing Solaris.
4

- Identify the commands used to manage groups with the CLI. - Identify the features of Solaris physical disk partitions. - Identify the types of Solaris file systems. - Identify the ps command options. - Identify the features of system message logging. - Identify the function of system monitoring. - Identify the characteristics of the print service. - Identify the CLI commands used to add a network printer. - Identify the CLI commands used to manage print queues and jobs. - Identify the features of computer networks. - Identify the components that configure TCP/IP. - Identify the features of the TCP/IP-related commands. - Identify the features of the NFS service. - Identify the features of automounter. - Identify features of e-mail services. - Identify the characteristics of sendmail. - Identify the features of POP3. SO TUNGGU APA LAGIKALAU YANG MAU BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

Harga : Rp.50.000,-

DVD ini sangat berguna bagi Anda yang fokus di Dunia Database Administrator SQL Server sudah banyak menjadi Database Server di Dunia BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD FULL PACKET 1. CBT.Nuggets.Microsoft.PRO.SQL.Server.2008.Exam.Pack

* SSRS Architecture Overview * SSRS & .NET * SSRS Data Sets & Filters * SSRS Templates, RDL & Advanced Reports * SSRS Deployment & Migration (free video!) * Scaling SQL Server 2008 * SQL Server 2008 Performance * Aggregations & Partitions * Data Mining Design * SSAS Moving Packages * SSAS International Considerations 2. TrainingSpot SQL Server 2005 Reporting Services 101

- Introduction to SQL Server 2005 Reporting Services - Report Designer Introduction - Report Designer Controls - Adding Interactivity to Reports - Data Sources and Parameters - Working with Parameters 3. Implementing and Maintaining Microsoft SQL Server 2005 Reporting Service Describe SQL Server Reporting Services and its components. Create a Reporting Services report. Enhance a Reporting Services report. Create and manipulate data sets. Use report models to implement reporting for business users. Configure report publishing and execution settings. Implement subscriptions for reports. Administer Reporting Services. Implement custom Reporting Services applications. 4. VTC.Microsoft.SQL.Server.2008.Administration - Service Accounts - Creating Service Accounts - Installing SQL Server 2008 pt. 1 - Installing SQL Server 2008 pt. 2 - Installing SQL Server 2008 pt. 3 - Upgrading SQL Server 2008 - SQL Server Configuration Manager - SQL Server Authentication Modes - Changing Authentication Modes - SQL Server Management Studio Bonuuus Ebook: Addison Wesley A Developers Guide to Data Modeling for SQL Server (2008).pdf Apress Building a Data Warehouse, with Examples in SQL Server (2008).pdf Dissecting SQL Server Execution Plans (2008).pdf Sams Writing Stored Procedures for Microsoft SQL Server (2000).pdf Wrox Beginning T-SQL with Microsoft SQL Server 2005 and 2008 (2009).pdf Oracle Training Master Collection SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

Harga : Rp.50.000,DVD ini sangat berguna bagi Anda yang fokus di Dunia Database Administrator Oracle Merupakan salah satu Database Server yang sedang berkembang dan dipakai scala besar BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD FULL PACKET

1. Oracle Training Master Collection 1Z0-001 Introduction to Oracle: SQL and PL/SQL 1Z0-007 Introduction to Oracle9i: SQL 1Z0-020 Oracle8i: New Features for Administrators 1Z0-023 Architecture and Administration 1Z0-024 Performance Tuning 1Z0-025 Backup and Recovery 1Z0-026 Network Administration 1Z0-030 Oracle9i: New Features for Administrators 1Z0-031 Oracle9i: Database Fundamentals I 1Z0-032 Oracle9i: Database Fundamentals II

1Z0-033 Oracle9i: Performance Tunning 1Z0-035 Oracle 7.3 & 8 to Oracle9i DBA OCP Upgrade .. 2. Oracle_Training_Certification_Complete_Collection

Welcome (01:27) Prerequisites for this Course (02:20) About this Course (04:52) Technet Database Administration Manuals (05:54) Database Administration Oracle Database Administration? pt. 1 (04:46) Oracle Database Administration? pt. 2 (05:34) The Basic Architecture of Oracle (07:29) Oracle Database Administration Tools What are the Tools? (05:33) SQL*Plus (03:30) SQL*Plus Worksheet (02:01) iSQL*Plus (02:27) All the Other Oracle Tools (01:42) Database Configuration Assistant pt. 1 (07:59) Database Configuration Assistant pt. 2 (06:43) Oracle Enterprise Manager Console pt. 1 (06:22) Oracle Enterprise Manager Console pt. 2 (04:55) The Management Server and the Agent (03:03) Net Configuration Assistant and Net Manager (05:39) Oracle Enterprise Manager Console pt. 3 (04:23) Oracle Enterprise Manager Console pt. 4 (04:41) The Architecture of Oracle Oracle Database Architecture (03:20) Memory Structures (06:54) Processes (07:17) Datafiles/Tablespaces/Objects (07:59) Control Files/Logging/Archiving/Recovery (06:48) COMMIT vs ROLLBACK (06:22) Rollback and Undo (05:11)

Temporary Sort Space (05:39) How it all Fits Together (07:03) 3. Oracle-dba-the-complete

Covers all key aspects of day-to-day Oracle database administration, including: Creating new databases Managing physical database layouts Administering users, privileges, and resource groups Tuning Oracle and SQL code for maximum performance Security, auditing, and data integrity Backup, recovery, and much more! Bonuuus Ebook: 084931139x-Oracle.Internals-Tips.Tricks.And.Techniques.For.Dbas-Fly.chm Addison.Wesley.Guerrilla.Oracle.eBook-LiB.chm Apress Expert Oracle 9i Database Administration.chm Apress.Cost.Based.Oracle.Fundamentals.Nov.2005.pdf Apress.Oracle.Applications.DBA.Field.Guide.Mar.2006.pdf SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

10

Harga : Rp.100.000,-

DVD ini sangat berguna bagi yang sedang mendalami Mikrotik Academy BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD FULL PACKET 1. MATERI MUM INDONESIA 2009 - MUM_Indonesia_2009__Best_Network_Practice_with_Dua l_Nstreme.mp4 - MUM_Indonesia_2009__MPLS_Workshop.mp4 - MUM_Indonesia_2009__Municipal_Wisp_Network.mp4 - MUM_Indonesia_2009__OSPF_Routing_Workshop_.mp4 - MUM_Indonesia_2009__RouterOS_Centralized_Backup.mp 4 - MUM_Indonesia_2009__Advanced_QoS_in_HotSpot_system s.mp4 - MUM_Indonesia_2009__Seamless_Wireless_Roaming_with _Tunnel.mp4

2. Materi PDF Mikrotik


11

- 1_Nico_MUM2009ID.pdf - 2_Christian_MUM2009ID.pdf - 3_Antonius_MUM2009ID.pdf - 4_Mat_MUM2009ID.pdf - donny_ufoakses.ppt - MUM-Bali-2008-Valens-Riyadi.pdf - nicholaus_ufoakses.pdf - portknock.pdf ..

3. Simple Practice Mikrotik - Adding MAC Exclusion to Hotspot.swf - Creating an IPSEC LAN to LAN Tunnel.swf - Mikrotik VPN Client Connections PPTP.swf - mtkreset.swf - upgradeMtk.swf 4. Ebook dan Referensi Mikrotik dan Squid

5. Ebook untuk Pemula Mikrotik (Newbies) Tunggu Dulu dapatkan bonus Movie Mikrotik - EoIP_tunnel_setup.avi - Making_transparent_proxy_in_Winbox.avi - PPPoE_server_and_NAT.avi - PPPoE_Server_Setup.avi - Webproxy_setup_Winbox.avi - Winbox_Firewall_conf1.avi - Winbox_Firewall_conf.avi Dapatkan juga Mikrotik 3.20 SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

12

Harga : Rp.50.000,-

DVD ini cocok untuk yang mao serius di Bidang Security dan ingin memperdalam Ilmu Penyerangan BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD Penetration Testing Security

Ethical Hacking and Penetration Testing Security 101 Hacking Hall of Fame What are Todays hackers Like? Todays Hackers Risk Management Evolution of Threats Typical Vulnerability Life Cycle What is Ethical Hacking? Rise of the Ethical Hacker Types of Security Test Penetration Test (Pen-test) Red Teams Testing Methodology
13

VMWare Workstation Windows and Linux Running VMWare Linux Is a Must Linux Survival Skills Useful vi Editor Commands

Footprinting and Reconnaissance Desired Information Find Information by the Target (Edgar) terraserver.microsoft.com Network Reconnaissance & DNS Search Query Whois Databases Command-Line Whois Searches ARIN whois: Search IP Address Blocks SamSpade Tool and Website Internet Presence Look Through Source Code Mirror Website Find Specific Types of Systems Big Brother AltaVista Specific Data Being Available? Anonymizers Countermeasures to Information Leakage Social Engineering DNS Zone Transfer Nslookup command-line utility Zone Transfer from Linux Automated Zone Transfers Zone Transfer Countermeasures www.CheckDNS.net Tracing Out a Network Path tracert Output Free Tools Paratrace War Dialing for Hanging Modems Manual and Automated War Dialing Case Study www.guidedogs.com Footprinting Countermeasures
14

Demo Footprinting & Info Gathering TCP/IP Basics and Scanning The OSI Model TCP/IP Protocol Suite Layers Encapsulation Data-Link Protocols IP Internet Protocol, Datagram (Packet) ICMP Packets UDP User Datagram Protocol UDP Datagram TCP Transmission Control Protocol TCP Segment TCP/IP 3-Way Handshake and Flags TCP and UDP Ports Ping Sweeps Good Old Ping, Nmap, TCP Ping Sweep TCP Sweep Traffic Captured Unix Pinging Utilities Default TTLs Pinging Countermeasures Port Scanning Nmap Advanced Probing Techniques Scanrand Port Probing Countermeasures Watch Your Own Ports Demo Scanning Tools

Enumeration and Verification Operating System Identification Differences Between OS TCP/IP Stack Nmap -O Active vs Passive Fingerprinting Xprobe/Xprobe2 Countermeasures SNMP Overview SNMP Enumeration SMTP, Finger, and E-mail Aliases Gleaning Information from SMTP SMTP E-mail Alias Enumeration SMTP Enumeration Countermeasures CIFS/SMB
15

Attack Methodology Find Domains and Computers NetBIOS Data NBTscan NULL Session Local and Domain Users Find Shares with net view enum: the All-in-one Winfo and NTInfoScan (ntis.exe) Digging in the Registry NetBIOS Attack Summary NetBIOS Countermeasures Whats this SID Thing Anyway? Common SIDs and RIDs whoami RestrictAnonymous USER2SID/SID2USER psgetsid.exe and UserDump Tool LDAP and Active Directory GUI Tools to Perform the Same Actions Demo Enumeration Hacking & Defending Wireless/Modems Phone Numbers & Modem Background Phone Reconnaissance Modem Attacks Wireless Reconnaissance Wireless Background Wireless Reconnaissance Continued Wireless Sniffing Cracking WEP Keys Defending Wireless BONUS Lagiii.

Introduction Course Overview (04:54) Ethical Hacking & Penetration Testing What is Ethical Hacking? (04:58) Types of Ethical Hacking (05:31) Responsibilities of the Ethical Hacker (03:12) Customer Expectations (04:04) Skills of the Hacker (04:16) Relevant Laws (04:54)
16

Preparation (04:46) Types of Attacks (02:12) Methodology Overview Your Goals (02:34) Reconnaissance [passive, active] (05:11) Scanning (03:42) Service Enumeration (03:05) Vulnerability Assessment (03:35) Vulnerability Exploitation (02:52) Penetration & Access (03:24) Privilege Escalation & Owning the Box (02:40) Evading Defenses & Erasing Tracks (04:01) Maintaining & Expanding Access (03:22) Reconnaissance (Footprinting) Passive Reconnaissance (05:03) Using WHOIS & Other Tools (03:03) Active Reconnaissance (04:10) Active Reconnaissance Tools & Methods (04:55) Putting It All Together (03:09) Reconnaissance Demo (07:04) Scanning Scanning For Hosts (02:20) TCP Connection Basics (04:14) TCP Scan Types (07:18) UDP & ICMP Scanning (03:44) Scanning Demonstration using NMAP (05:19) Port & Service Enumeration Identifying Ports & Services (03:06) OS Fingerprinting (02:57) Popular Scanners (01:54) Demonstration (05:15) Data Enumeration Data Enumeration (05:12) SNMP Enumeration (07:14) DNS Zone Transfers (06:36) Windows Null Sessions (05:03) NetBIOS Enumeration (06:44) Active Directory Extraction (03:02) Vulnerability Assessment Vulnerabilities & Exploits (06:07) OS Vulnerabilities (05:59) Web Server Vulnerabilities (06:54) Database Vulnerabilities (05:25) TCP Stack Vulnerabilities (04:13) Application Vulnerabilities (03:05) Vulnerability Assesment (07:21) Penetration/Access/Compromise Pt.1 Penetrating the System Pt.1 (05:28) Penetrating the System Pt.2 (03:11) Bypassing Access Controls (06:34) Password Cracking Pt.1 (04:58) Password Cracking Pt.2 (03:52) Social Engineering (06:28) Penetration/Access/Compromise Pt.2 Session Hijacking Pt.1 (05:46) Session Hijacking Pt.2 (04:01) Privilege Escalation (04:45) Maintaining & Expanding Access (07:01) System Compromise (04:40) Evading Defenses & Erasing Tracks Where Your Actions Recorded Pt.1 (02:04) Where Your Actions Recorded Pt.2 (06:50) Deleting Log Files & Other Evidence Pt.1 (03:16) Deleting Log Files & Other Evidence Pt.2 (04:26) Rootkits (05:21) Steganography (06:58) Evading IDS & Firewalls (04:29) Introduction to Hacking Techniques Pt.1 Encryption (06:07) Sniffers (04:15) Wireless hacking (06:29) SQL Injection (04:18) Introduction to Hacking Techniques Pt.2 Buffer Overflows (05:19) Rootkits (03:52) Spoofing (04:33) Denial of Service Attacks (03:59) Web Hacking (07:00) Popular Tools nmap Pt.1 (06:38) nmap Pt.2 (02:14) SuperScan (04:30) Nessus (06:27) Penetration Test Demo Penetration Test Demo Pt.1 (01:41) Penetration Test Demo Pt.2 (00:59) Penetration Test Demo Pt.3 (01:05) Credits About the Authors (01:37) SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

17

Harga : Rp.50.000,DVD ini sangat berguna bagi Anda yang mencintai dunia Jaringan dan ingin mengambil sertifikasi CCNA. Banyak pertanyaan yang muncul Apa Gunanya membeli DVD ini Bedanya apa dengan Training JAWABANYA : ANDA akan mendapatkan semua Modul Terupdate untuk latihan dirumah dan Waktu akan menjadi Sangat Fleksibel. Yang Membedakan Dari DVD CCNA yang Lain nya..DVD ini berisi FULL PACKET CCNA.Banyakkk.. BAGI ANDA YANG MASIH AWAM JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI

Berikut ini isi dari DVD FULL PACKET 1. CCNA 4.0 Discovery & Exploration - Discovery 1: Networking for Home and Small and Business - Discovery 2: Working at a Small to Medium Business or ISP - Discovery 3: Introcduction Routing and Switching Computer Networks
18

- Discovery 4: Designing and Supporting Computer Networks - Exploration 1: Network Fundamentals - Exploration 3: LAN Switching and Wireless - Exploration 4: Accessing the WAN 2. CCNA 4.0 Discovery & Exploration 3. Cisco Press 640-802, ICND1 & ICND2 (PDF)

4. Cisco Official SlideICND 1 & ICND 2 5. Packet Tracer 5.0 + Activities

6. GNS3-0.5-WIN32-ALL-IN-ONE 7. PASS4SURE CCNA 640-802 v3.20 Simulation Explanation - NAT Simulation.doc - RIP v2.doc - Discovery 3: Introcduction Routing and Switching Computer Networks - Topology Based Lab.doc

8. PASS4SURE UPDATE 2010-2011 - P4S_640-802_v758_PDF.rar - P4S_640-802_v763-New_Questions.rar - P4S_640-802_v773_PDF_Q464-473.rar

19

9. CCNA VIDEO MENTOR 2ND EDITION - Basic TCP/IP: Addressing Fundamentals - Basic TCP/IP: Addressing Fundamentals - LANs: Welcome to Ethernet - Wireless: Wireless Security and Implementation - Wireless: Understanding Wireless Networking - Advanced TCP/IP: IP Subnetting - Routing: Initial Router Configuration . 10. CBT NUGGETS CCNA 640-802 - Routing Protocols: OSPF Concepts - Routing Protocols: OSPF Configuration and Troubleshooting - Access-Lists: The Rules of the ACL - WAN Connections: Concepts of VPN Technology - IPv6: Understanding Basic Concepts and Addressing - Advanced TCP/IP: IP Subnetting .. 11. Router eSim 1.1

MASIH KURANG.. Siap-siap bonus TERBARU akan menanti antara lain: - CCNAW - Train.Signal.Cisco.Ccna.Training.Videos.1001275 - Ebook CWNA - Testking_640-802_V17.pdf - RouterSimNetworkVisualizer_v6.0 SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

20

Harga : Rp.50.000,-

DVD ini cocok untuk yang mau serius di Bidang Security. BAGI ANDA YANG MASIH AWAM JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI

Berikut ini isi dari DVD CEH

1. Career Academy : Modul CEH - Module 1: Ethical Hacking and Penetration Testing - Module 2: Footprinting and Reconnaissance - Module 3: TCP/IP Basics and Scanning - Module 4: Enumeration and Verification - Module 5: Hacking & Defending Wireless/Modem - Module 6: Hacking & Defending Web Servers - Module 7: Hacking & Defending Web Applications - Module 8: Sniffers and Session Hijacking - Module 9: Hacking & Defending Windows Systems - Module 10: Hacking & Defending Unix Systems
21

- Module 11: Rootkits, Backdoors, Trojans & Tunnels - Module 12: Denial of Service and Botnets - Module 13: Automated Pen Testing Tools - Module 14: Intrusion Detection Systems - Module 15: Firewalls - Module 16: Honeypots and Honeynets - Module 17: Ethics and Legal Issues 2. Certified Ethical Hacker VIDEO

3. Operating System CEH-BACKTRACK 3 BACKTRACK adalah Salah Satu Operating System Favorit yang digunakan oleh Para Hacker Ternama untuk melakukan Penetrasi Pada Jaringan dan OSHebatnya Lagi di dalam Tool ini sudah lebih 150 TOOL HAACK..Jadi Anda tidak perlu mencarinya LagiDalam DVD ini Anda Tinggal melakukan BURN ISO Ke CD Kemudian BootTABLE.OS yang digunakan adalah LINUX

BONUS yang Akan di Dapatkan

22

- FULL MODUL PRESENTATIONS CEH version 6 - CEH-Classroom-Lab-Setup-v6.pdf 1.5 MB - CEHv6 Module 00 Student Introduction.pdf 590.7 KB - CEHv6 Module 01 Introduction to Ethical Hacking.pdf 3.1 MB - CEHv6 Module 02 Hacking Laws.pdf 3.6 MB - CEHv6 Module 03 Footprinting.pdf 10 MB - CEHv6 Module 04 Google Hacking.pdf 4.2 MB - CEHv6 Module 05 Scanning.pdf 16.6 MB - CEHv6 Module 06 Enumeration.pdf 4 MB - CEHv6 Module 07 System Hacking.pdf 15.1 MB - CEHv6 Module 08 Trojans and Backdoors.pdf 9.1 MB - CEHv6 Module 09 Viruses and Worms.pdf 5.6 MB - CEHv6 Module 10 Sniffers.pdf 10 MB - CEHv6 Module 11 Social Engineering.pdf 5 MB - CEHv6 Module 12 Phishing.pdf 2.6 MB - CEHv6 Module 13 Hacking Email Accounts.pdf 1.8 MB - CEHv6 Module 14 Denial of Service.pdf 3.6 MB - CEHv6 Module 15 Session Hijacking.pdf 1.9 MB - CEHv6 Module 16 Hacking Webservers.pdf 4.9 MB - CEHv6 Module 17 Web Application Vulnerabilities.pdf 4.6 MB - CEHv6 Module 18 Web based Password kracking Techniques.pdf 5.4 MB - CEHv6 Module 19 SQL Injection.pdf 3.2 MB - CEHv6 Module 20 Hacking Wireless Networks.pdf 12.9 MB - CEHv6 Module 21 Physical Security.pdf 3.1 MB - CEHv6 Module 22 Linux Hacking.pdf 6.1 MB - CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf 4.7 MB - CEHv6 Module 24 Buffer Overflows.pdf 1.4 MB - CEHv6 Module 25 Cryptography.pdf 0 Bytes - CEHv6 Module 26 Penetration Testing.pdf 5.6 MB - CEHv6 Module 28 Writing Virus Codes.pdf 599 KB - CEHv6 Module 29 Assembly Language Tutorial.pdf 1007.9 KB - CEHv6 Module 30 Exploit Writing.pdf 2 MB - CEHv6 Module 31 Exploit Writing.pdf 239 KB - CEHv6 Module 32 Exploit Writing.pdf 640.8 KB - CEHv6 Module 33 Reverse Engineering Techniques.pdf 2.8 MB
23

- CEHv6 Module 34 MAC OS X Hacking.pdf 1.3 MB - CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf 3.2 MB - CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf 4 MB - CEHv6 Module 37 Bluetooth Hacking.pdf 2.5 MB - CEHv6 Module 38 VoIP Hacking.pdf 3.9 MB - CEHv6 Module 39 RFID Hacking.pdf 2.2 MB - CEHv6 Module 40 Spamming.pdf 2.7 MB - CEHv6 Module 41 Hacking USB Devices.pdf 1.8 MB - CEHv6 Module 42 Hacking Database Servers.pdf 1.6 MB - CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf 2.7 MB - CEHv6 Module 44 Internet Content Filtering Techniques.pdf 2 MB - CEHv6 Module 45 Privacy on the Internet.pdf 5.4 MB - CEHv6 Module 46 Securing Laptop Computers.pdf 1.9 MB - CEHv6 Module 47 Spying Technologies.pdf 4.3 MB - CEHv6 Module 48 Corporate Espionage by Insiders.pdf 2.2 MB - CEHv6 Module 49 Creating Security Policies.pdf 2.1 MB - CEHv6 Module 50 Software Piracy and Warez.pdf 2.1 MB - CEHv6 Module 51 Hacking and Cheating Online Games.pdf 2 MB - CEHv6 Module 52 Hacking RSS and Atom.pdf 1.7 MB - CEHv6 Module 53 Hacking Web Browsers.pdf 1.9 MB - CEHv6 Module 54 Proxy Server Technologies.pdf 2.3 MB - CEHv6 Module 55 Preventing Data Loss.pdf 3.7 MB - CEHv6 Module 56 Hacking Global Positioning System.pdf 2.1 MB - CEHv6 Module 57 Computer Forensics and Incident Handling.pdf 2.5 MB - CEHv6 Module 58 Credit Card Frauds.pdf 2.1 MB - CEHv6 Module 59 How to Steal Passwords.pdf 1.5 MB - CEHv6 Module 60 Firewall Technologies.pdf 2.8 MB - CEHv6 Module 61 Threats and Countermeasures.pdf 24.9 MB - CEHv6 Module 62 Case Studies.pdf 713.9 KB - CEHv6 Module 63 Botnets.pdf 1.1 MB - CEHv6 Module 64 Economic Espionage.pdf 653.3 KB - CEHv6 Module 65 Patch Management.pdf 7 MB - CEHv6 Module 66 Security Convergence.pdf 630.6 KB - CEHv6 Module 67 Identifying the Terrorists.pdf 1.8 MB VTC.Ethical.Hacking_Penetration

- Best_Hacking_Tools_85in1.rar - HOTMAIL HACKING - YAHOO HACKING


24

- MSN FUN TOOLS - FAKE SCREENS/PAGES - OTHER HACKING TOOLS - FUN TOOLS SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

25

Harga : Rp.50.000,DVD ini sangat berguna bagi Anda yang mencintai dunia Jaringan dan ingin mengambil sertifikasi CCNP. CCNP ini merupakan Lanjutan dari CCNA Sertifikasi CCNP sudah melakukan perubahan untuk sertifikasi yang di beri nama SWITCH, ROUTE, AND TSHOOT BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI

Berikut ini isi dari DVD FULL PACKET 1. Cisco.Press.CCNP.SWITCH.642-813.Cert.Kit


26

2. Cisco.Press.CCNP.ROUTE.642-902.Cert.Kit

3. Cisco.Network.Troubleshooting.Video.Mentor 4. Full Ebook SWITCH, ROUTE, AND TSHOOT

27

CCNP_SWITCH_642-813_Official_Certification_Guide.pdf SWITCH10_LabGuide.pdf SWITCH10_StudentGuide.pdf SWITCH10S08L04.pdf TSHOOT LG.pdf TShoot SG Vol 1.pdf SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

28

Harga : Rp.50.000,DVD ini sangat berguna bagi yang sedang mendalami Security dan Hacking terutama Tool Backtrack BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD FULL PACKET

1. Video Tutorial Khusus Backtrack Full Edition -Installing Backtrack 3 -Network Hacking Arp Poisoning -Wireless Hacking kracking WEP -Wireless Hacking DeAuth -Lock Picking Bump Key -Phone Phreaking Beige Box -Phone Phreaking/Network Hacking Sniffing VOIP -Lock Picking DIY Padlock Shims -Lock Picking Mult-Disc Combo Locks -Hacking Basics MD5 -Website Hacking Sql Injection -Hacking Basics Backtrack -Website Hacking XSS -Staying Secure SSH Tunnel -Modding Xbox Softmod -Wireless Hacking kracking WPA -Triple Boot Windows, Backtrack, & Ubuntu -Local Password kracking -Lock Picking Basics -Ettercap -XSS Tunnel -Playstation 2 Softmod -kracking WEP Update -Bypass Hotspots Access Controls -Underground Install Backtrack 3 on USB -Underground CSRF(Cross Site Request Forgery) -Underground Alternate Data Streams -Underground Local File Inclusion
29

-Underground Windows Privilege Escalation -Underground Bluetooth Hacking -Underground VMWare -Underground Fix Google Mail Enumerator -Underground Home Made Lock Picks -Underground Downfalls of Anti-Virus Software Part 2 -Underground Downfalls of Anti-Virus Software -Underground Evilgrade -Underground Trojan Basics -Underground Manipulating Windows User Accounts -Underground Combine Files -Underground Password Phishing -Underground Email Spoofing -Underground Introduction -Extracting Database Information from Information_Schema -FPGA MD5 kracker -Email Injection -Ping of Death -DNS Spoofing with Virtual Hosts -Bypass Cisco Clean Access & Cisco NAC Appliance -Dual Boot Windows & Backtrack -Sql Injection Challenge How-to -How to use Intel Pro/Wireless 3945ABG in Backtrack 2 -Local Privilege Escalation Vulnerability in Cisco VPN Client 2. Backtrack 4 final.iso

3.BackTrack Dual boot Install dual-boot-backtrack-vista.swf -Backtrack-security-training-1INSTALLING.swf -Backtrack-security-training-2-1.swf -Backtrack-security-training-2.swf -Backtrack-security-training-5.swf -Backtrack-security-training-6.swf -Backtrack-security-training-7.swf -Backtrack-wifu-video-demo.swf -Cisco DTP Hacking Layer 2 having-fun-with-layers.swf -Cracking-the-perimeter-demo.swf -Cursed Animations Wild W3st windows-ani-exploit.swf -Customizing Backtrack 4 customizing-bactrack.swf -HP NNM 0day defcon-presentation-2008 -I Piss on Your AV shmoocon-presentation-2008 -Install BackTrack to Hard disk install-backtrack-hard-disk.swf -Installing Backtrack to USB bactrack-usb-install.swf
30

-Offensive Security Webcast II apple-sploit.swf -Offsec-webcast-01-0.swf -Offsec-webcast-01-1.swf -Offsec-webcast-01-10.swf -Offsec-webcast-01-11.swf -Offsec-webcast-01-12.swf -Offsec-webcast-01-13.swf -Offsec-webcast-01-14.swf -Offsec-webcast-01-15.swf -Offsec-webcast-01-2.swf -Offsec-webcast-01-3.swf -Offsec-webcast-01-4.swf -Offsec-webcast-01-6.swf -Offsec-webcast-01-7.swf -Offsec-webcast-01-8.swf -Offsec-webcast-01-9.swf -Online-training-pwb-demo-0.swf -Online-training-pwb-demo-1.swf -Online-training-pwb-demo-2.swf -Online-training-pwb-demo-4.swf -Online-training-pwb-demo-6.swf -Online-training-pwb-demo-7.swf -Owning Vista with BackTrack owning-windows-vista.swf -Running Nessus on BackTrack 4 installing-nessus-backtrack.swf -VMware Server on BackTrack 4 installing-vmware-server.swf -Who is Leo leo-basic-usage.swf 4. Best Tools Security 2010 5. Video Training Microsoft 6. Wireless Hacking Live FBI version SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

Harga : Rp.50.000,31

DVD ini cocok untuk yang mao serius di Network/System Administrator Comptia Sekarang ini menjadi standard dari berbagai Merek Perangkat Networking BAGI ANDA YANG MASIH AWAN JANGAN TAKUT KARENA VIDEO INI MUDAH UNTUK DI PAHAMI Berikut ini isi dari DVD Comptia Full Security, Networking, and A+

1. TrainSignal CompTIA Network Plus 2009 Video 1 Intro to CompTIA Network+ 2009 Video 2 Basic Networking Fundamentals Video 3 Network Media Video 4 Network Topologies Video 5 OSI Model Video 6 TCP/IP Video 7 TCP/IP Protocols Video 8 Network Devices Video 9 Routing Video 10 Wireless Networking Video 11 Networking Command Line Tools Video 12 Network Performance Optimization Video 13 Network Tools Video 14 Network Monitoring Video 15 Documentation Video 16 Troubleshooting Video 17 Network Security

32

2. TrainSignal CompTIA Security+ 2010 Lesson 1 Getting Started With CompTIA Security+ Training Lesson 2 The Course Scenario Lesson 3 Security Overview Lesson 4 Redundancy and Fault Tolerance Lesson 5 Implementing Disaster Recovery Lesson 6 Incident Response Lesson 7 Social Engineering Lesson 8 Organizational Policies Lesson 9 System Scanning and Monitoring Lesson 10 Logging and Auditing Lesson 11 Network Design Components Lesson 12 Networking Components Lesson 13 Networking Protocols and Exploitations Lesson 14 Remote Access Security Lesson 15 Wireless Networks Lesson 16 System Security Lesson 17 System Security Threats Lesson 18 Security Applications Lesson 19 E-Mail Security Lesson 20 Web Security Lesson 21 Web Based Vulnerabilities Lesson 22 FTP Security Lesson 23 Access Control Models Lesson 24 Logical and Physical Access Controls Lesson 25 Authentication Models Lesson 26 Cryptographic Algorithms Lesson 27 Using Cryptography Lesson 28 Public Key Infrastructure (PKI) Lesson 29 Preparing for Your CompTIA Security+ SY0-201 Certification Exam Lesson 30 Next Steps 3. CompTia Network+ Certification Exam Tutorial

33

BONUS yang Akan di Dapatkan Exam COmptia Comptia A+

* Work with CPUs, RAM, motherboards, power supplies, and other PC components * Install, partition, and format hard drives * Install, upgrade, and troubleshoot WIndows 2000, Windows XP, and Windows Vista * Troubleshoot PCs and implement security measures * Install video and multimedia cards * Work with portable PCs, PDAs, smartphones, and wireless technologies * Manage printers and connect to networks and the Internet * Understand safety and environmental issues * Establish good communication skills and adhere to privacy policies SO TUNGGU APA LAGIKALAU YANG MAO BELAJAR SANGAT COCOK UNTUK PEMULA MAUPUN YANG SUDAH ADVANCED

34

You might also like