QR Code
Copy to Clipboard
Open with BT Client
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
CEH-v6 Instructor slides/CEHv6 Module 61 Threats and Countermeasures.pdf
24.85MB
CEH-v6 Instructor slides/CEHv6 Module 05 Scanning.pdf
16.64MB
CEH-v6 Instructor slides/CEHv6 Module 07 System Hacking.pdf
15.1MB
CEH-v6 Instructor slides/CEHv6 Module 20 Hacking Wireless Networks.pdf
12.95MB
CEH-v6 Instructor slides/CEHv6 Module 03 Footprinting.pdf
9.99MB
CEH-v6 Instructor slides/CEHv6 Module 10 Sniffers.pdf
9.97MB
CEH-v6 Instructor slides/CEHv6 Module 08 Trojans and Backdoors.pdf
9.08MB
CEH-v6 Instructor slides/CEHv6 Module 65 Patch Management.pdf
7.02MB
CEH-v6 Instructor slides/CEHv6 Module 22 Linux Hacking.pdf
6.12MB
CEH-v6 Instructor slides/CEHv6 Module 26 Penetration Testing.pdf
5.63MB
CEH-v6 Instructor slides/CEHv6 Module 09 Viruses and Worms.pdf
5.58MB
CEH-v6 Instructor slides/CEHv6 Module 45 Privacy on the Internet.pdf
5.4MB
CEH-v6 Instructor slides/CEHv6 Module 18 Web based Password Cracking Techniques.pdf
5.4MB
CEH-v6 Instructor slides/CEHv6 Module 11 Social Engineering.pdf
5.02MB
CEH-v6 Instructor slides/CEHv6 Module 16 Hacking Webservers.pdf
4.88MB
CEH-v6 Instructor slides/CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
4.74MB
CEH-v6 Instructor slides/CEHv6 Module 17 Web Application Vulnerabilities.pdf
4.6MB
CEH-v6 Instructor slides/CEHv6 Module 47 Spying Technologies.pdf
4.26MB
CEH-v6 Instructor slides/CEHv6 Module 04 Google Hacking.pdf
4.17MB
CEH-v6 Instructor slides/CEHv6 Module 25 Cryptography.pdf
4.13MB
CEH-v6 Instructor slides/CEHv6 Module 06 Enumeration.pdf
4.04MB
CEH-v6 Instructor slides/CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
4.02MB
CEH-v6 Instructor slides/CEHv6 Module 38 VoIP Hacking.pdf
3.91MB
CEH-v6 Instructor slides/CEHv6 Module 55 Preventing Data Loss.pdf
3.72MB
CEH-v6 Instructor slides/CEHv6 Module 02 Hacking Laws.pdf
3.63MB
CEH-v6 Instructor slides/CEHv6 Module 14 Denial of Service.pdf
3.56MB
CEH-v6 Instructor slides/CEHv6 Module 19 SQL Injection.pdf
3.25MB
CEH-v6 Instructor slides/CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
3.21MB
CEH-v6 Instructor slides/CEHv6 Module 21 Physical Security.pdf
3.07MB
CEH-v6 Instructor slides/CEHv6 Module 01 Introduction to Ethical Hacking.pdf
3.05MB
CEH-v6 Instructor slides/CEHv6 Module 60 Firewall Technologies.pdf
2.82MB
CEH-v6 Instructor slides/CEHv6 Module 33 Reverse Engineering Techniques.pdf
2.78MB
CEH-v6 Instructor slides/CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
2.7MB
CEH-v6 Instructor slides/CEHv6 Module 40 Spamming.pdf
2.68MB
CEH-v6 Instructor slides/CEHv6 Module 12 Phishing.pdf
2.6MB
CEH-v6 Instructor slides/CEHv6 Module 37 Bluetooth Hacking.pdf
2.5MB
CEH-v6 Instructor slides/CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
2.48MB
CEH-v6 Instructor slides/CEHv6 Module 54 Proxy Server Technologies.pdf
2.31MB
CEH-v6 Instructor slides/CEHv6 Module 48 Corporate Espionage by Insiders.pdf
2.18MB
CEH-v6 Instructor slides/CEHv6 Module 39 RFID Hacking.pdf
2.16MB
CEH-v6 Instructor slides/CEHv6 Module 56 Hacking Global Positioning System.pdf
2.14MB
CEH-v6 Instructor slides/CEHv6 Module 58 Credit Card Frauds.pdf
2.12MB
CEH-v6 Instructor slides/CEHv6 Module 50 Software Piracy and Warez.pdf
2.08MB
CEH-v6 Instructor slides/CEHv6 Module 49 Creating Security Policies.pdf
2.08MB
CEH-v6 Instructor slides/CEHv6 Module 30 Exploit Writing.pdf
2.03MB
CEH-v6 Instructor slides/CEHv6 Module 51 Hacking and Cheating Online Games.pdf
1.97MB
CEH-v6 Instructor slides/CEHv6 Module 44 Internet Content Filtering Techniques.pdf
1.95MB
CEH-v6 Instructor slides/CEHv6 Module 46 Securing Laptop Computers.pdf
1.95MB
CEH-v6 Instructor slides/CEHv6 Module 15 Session Hijacking.pdf
1.91MB
CEH-v6 Instructor slides/CEHv6 Module 53 Hacking Web Browsers.pdf
1.88MB
CEH-v6 Instructor slides/CEHv6 Module 41 Hacking USB Devices.pdf
1.81MB
CEH-v6 Instructor slides/CEHv6 Module 13 Hacking Email Accounts.pdf
1.79MB
CEH-v6 Instructor slides/CEHv6 Module 67 Identifying the Terrorists.pdf
1.76MB
CEH-v6 Instructor slides/CEHv6 Module 52 Hacking RSS and Atom.pdf
1.66MB
CEH-v6 Instructor slides/CEHv6 Module 42 Hacking Database Servers.pdf
1.58MB
CEH-v6 Instructor slides/CEHv6 Module 59 How to Steal Passwords.pdf
1.54MB
CEH-v6 Instructor slides/CEH-Classroom-Lab-Setup-v6.pdf
1.48MB
CEH-v6 Instructor slides/CEHv6 Module 24 Buffer Overflows.pdf
1.38MB
CEH-v6 Instructor slides/CEHv6 Module 34 MAC OS X Hacking.pdf
1.26MB
CEH-v6 Instructor slides/CEHv6 Module 63 Botnets.pdf
1.11MB
CEH-v6 Instructor slides/CEHv6 Module 29 Assembly Language Tutorial.pdf
1007.86KB
CEH-v6 Instructor slides/CEHv6 Module 62 Case Studies.pdf
713.89KB
CEH-v6 Instructor slides/CEHv6 Module 64 Economic Espionage.pdf
653.27KB
CEH-v6 Instructor slides/CEHv6 Module 32 Exploit Writing.pdf
640.84KB
CEH-v6 Instructor slides/CEHv6 Module 66 Security Convergence.pdf
630.57KB
CEH-v6 Instructor slides/CEHv6 Module 28 Writing Virus Codes.pdf
598.98KB
CEH-v6 Instructor slides/CEHv6 Module 00 Student Introduction.pdf
590.71KB
CEH-v6 Instructor slides/CEHv6 Module 31 Exploit Writing.pdf
238.96KB
CEH-v6 Instructor slides/FILES.TXT
2.9KB
CEH6/CEHv6-Labs-Volume-3.iso
4GB
CEH6/CEHv6-Labs-Volume-2.iso
3.96GB
CEH6/CEHv6-Labs-Volume-1.iso
3.94GB
CEH6/CEHv6-Labs-Volume-4.iso
1.34GB
CEH6/updatesofts.com.html
71B
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