Showing posts with label Video Tutorials. Show all posts
Showing posts with label Video Tutorials. Show all posts

Sunday, 3 July 2011

0

Certified Information Systems Security Professional Physical Security(CISSP)

  • Sunday, 3 July 2011
  • saurav garg

  • Certified Information Systems Security Professional Physical Security
    Total size: 154.17 MB | 1 Session | 3 Hours of Interactive Training
    The Certification That Inspires Utmost Confidence
    If you plan to build a career in information security – one of today’s most visible professions – and if you have at least five full years of experience in information security, then the CISSP® credential should be your next career goal. It’s the credential for professionals who develop policies and procedures in information security.
    The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement.
    Physical Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK).
    In this CISSP certification prep course, expert instructor Michael Solomon reviews common threats, security controls, facility requirements and environmental issues. At the conclusion of this course, you will be familiar with the issues and concepts of the Physical Security domain required to pass the CISSP exam.
    Global Information Security Workforce Study:
    Section A: Physical Security Threats
    Section B: Facility Requirements
    Section C: Physical Security Controls
    Section D: Environmental Issues

    Download Link:
    Read more...
    0

    Make Your Mobile Number As Not Reachable

  • saurav garg

  •  Make Your Mobile Number As Not Reachable!*** No need remove sim or battery***

    Make Your Mobile Number As Not Reachable!We sometimes don't
    want to receive calls at a particular time. But the caller understands that we are not receiveing call.
    So make your phone as unreachable and the caller will
    thought that its a network
    problem. No need of removing sim card!
    Lets start the game!

    Just Download the file and follow the simple instructions....
    Download Link (Clickable)
    Mediafire Link:-
    http://adf.ly/1zOOf
    Read more...

    Wednesday, 29 June 2011

    0

    Remove Memory Card Password video tutorial Mediafire

  • Wednesday, 29 June 2011
  • saurav garg
  • REMOVE MEMORY CARD PASSWORD

    Now a days many peoples are using the Mobile Phones.But most of them are using External Memory Chip (Memory card like MMC,microsd,e.t.c) since phone memory is not enough for them.Most of the Mobile Phones have a option to set a Password in memory chip for peoples Security and Privacy purpose.But the common mistake happening among them are forgetting their password for at least one time.If you would like to set password on your memory card,i would recommend please don't do it because if you forgotten your password you may encounter many strange problems.But don't worry if you forgotten your password since Mistakes are a part of being Human.Here i will give you the tutorial to Recover Memory Card password using simple method,just follow the steps in this file & Follow simple instructions.
     Download Link (Clickable):-
                                                                              x-plore:-
                                         http://www.mediafire.com/?skwlop51du9gu8r

    Subscribe us via E-mail and Add us on Facebook for daily updates and Plz also do click once on the ads displaying below or above the post for us.. :)

    Read more...
    2

    Network Security & Ethical Hacking Mediafire

  • saurav garg

  • Network Security & Ethical Hacking  [NRG]
    English | NRG | 478 MB
    1. Introduction to Information Security & Ethical Hacking
    2. Basics of Networking (Tutorial for beginners)
    3. Introduction
    4. Hacker Vs Cracker
    5. Ethical Hacking
    6. Precautions
    7. Current Cyber Threats
    8. Desktop and Server Security
    9. Windows Security
    10. Hacking into Windows XP, NT
    11. SAM (Security Accounts Manager)
    12. Registries
    13. Counter Measures
    14. Linux Security
    15. Hacking into Linux
    16. Keyloggers – Hardware & Software
    17. Anti Keyloggers
    18. Trojans or Remote Administration Tools
    19. Spywares
    20. Viruses and Worms Introduction
    21. Classification of Viruses and Worms
    22. Examples of Viruses and Worms
    23. Countermeasures
    24. Anti Virus
    25. LAN Security
    26. Threats to LAN
    27. Countermeasures
    28. Network and File Sharing
    29. Firewalls
    30. Anti Virus
    31. Anti Spywares
    32. Network Scanners
    33. Introduction to Firewalls
    34. Working of a Firewall
    35. Types of Firewalls
    36. Packet Filters
    37. Proxy Gateways
    38. Network Address Translation
    39. Intrusion Detection
    40. Logging
    41. Network Tools and Commands (Tutorial)
    42. TCP/IP Commands
    43. ARP Command
    44. Trace route Command
    45. Netstat Command
    46. Finger Command
    47. Ping Command
    48. Nbtstat Command
    49. Ipconfig Command
    50. Telnet Command
     
    Download Links:-
     
    http://www.mediafire.com/?ff4cw14w19az1bz
    http://www.mediafire.com/?29o9zd2iyo77d4v
    http://www.mediafire.com/?2wf5vv3s3ps4alq
    http://www.mediafire.com/?7494hsp6fsggc2m
    http://www.mediafire.com/?ursqlq7w8d89f08

                                                                         Password:-
    moviesnhacks
    Read more...