Free Seminars

Keep an eye here, or register to be informed of OUR FREE events ...

Read more

Documentation

Step by Step guide’s or How to documentations can be found here...

Read more

Our Sponsors

Better Together User Group,info & sponsors

Read more

About Erdal Ozkaya

Who is Erdal Ozkaya?
To learn more about him, click here...

Read more

Video Tutorial

Watch and learn the easy way...

Read more

If you want to really protect your Windows environment then you should know what is used by the cyber criminals. This session shows you the hacking tools of today, the damage they can inflict, and how you can be aware of those tools before they hit your network. Also, learn how Windows Clients are ready to mitigate some of these attacks, and how you can utilize your security skills.

To learn all about the Hacker Tools and technique’s all what you have to do is watch this session from Tech Ed North America ,which was held in Houston (May 2014)

Raymond and Me have demonstrated how Hackers fool you and what you can do to protect your self against them

Read more ...

 

One of other popular sessions from Microsoft Tech Ed is available for you now totally for FREE :) You can watch the session or download it for later view , which will also give you access to the Power Point’s, The details about the session:

 

Learn to halt hackers in their tracks. This session demonstrates the best tools and techniques to harden your devices—from your laptop, to your cell phone, to your servers and your services. Gain key insights that, for years, have been reserved only for the top IT staff of the NSA and others in the Federal government. Learn how you can make your network secure and stay one step ahead of the next wave of malware, malicious insiders, and cyber criminals. Still not convinced? What you learn in this session will change your way of thinking, and be your first step toward building a highly secure network. At the end of the presentation, you will rush to double check your "systems" security

Read more ...

 

You can watch , download the session from Microsoft Tech Ed North America, which was held in Houston in May 2014 tottaly for FREE. The details of the session is as below:

Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.

To Download the session viodes or Power Points please click in the below links :

Read more ...

Interested in security? Want to protect your data in the real world? See how Windows 8.1 addresses security as a whole system, one layer at a time. Explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures from pass-the-hash and other advanced attacks.

Join Certified Ethical Hacker and MVP Erdal Ozkaya and Microsoft Global Business Support Premier Field Engineer Milad Aslaner as they share entertaining demos on building an advanced defense strategy to fortify your Windows experience. Don't miss this lively and informative look at how to stop hackers and malware engineers.

Read more ...

The FREE CEH v8 class has been rescheduled to MAY 28 due my work commitments. I am really sorry for any inconvenience

New dates are as below:

Read more ...

Did you ever wanted to become an Ethical Hacker?

You never had the chance to get an official training by authorized training vendor ?

You wanted always to do a University course but you could not find time?

Would you like to get trained by the award winning Certified Ethical Instructor ?

The wait is over, read this post to and enrol yourself to the CEH v8 Free Short course run by Charles Sturt University with partnership of EC Council and IT Masters

 

Read more ...

In this demo Erdal Ozkaya is going throgh the basic's of Google Hacking.

Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications.

Read more ...
Template Settings
Select color sample for all parameters
Red Green Blue Gray
Background Color
Text Color
Google Font
Body Font-size
Body Font-family
Scroll to top