The Art of Doing: Learn the Linux Command Line


 


The Art of Doing: Learn the Linux Command Line
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 2.62 GB
Genre: eLearning Video | Duration: 34 lectures (6h 52m) | Language: English

Master the Command Line and Fundamental Skills Needed to Begin Your Journey Into Ethical Hacking

user Broknote     


Cyber Security Incident Response


 


Cyber Security Incident Response
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 225 MB
Genre: eLearning Video | Duration: 18 lectures (1h 20m) | Language: English

Effectively respond to Cyber Security incidents


user Broknote     

 

Introduction to Quantum Cryptography
Introduction to Quantum Cryptography
The frequency and severity of hacking and other attacks on our information systems are increasing. Despite remarkable progress in cybersecurity innovation, too many vulnerabilities continue to exist, and the threats are increasingly sophisticated. Quantum cryptography may offer some optimism in the long term. By leveraging the fundamentals of quantum mechanics, this set of emerging technologies allows information to be protected in novel new ways. Consequently, it's poised to shake up the world of information security. In this course, Jonathan Reichental lays out what quantum cryptography is, as well as the journey ahead to operationally realize quantum-based encrypted communications.

 


user Gamystyle     

Udemy - Learn Ethical Hacking By Hacking Real Websites Legally 2
Udemy - Learn Ethical Hacking By Hacking Real Websites Legally 2

If you want to learn ethical hacking the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to hack and learn hacking.  These websites typically have different levels from easy to advanced. By hacking each level and gradually levelling up, you will learn hacking.  Traditionally, ethical hacking is taught by installing virtual machines on your PC and hacking the virtual machines inside your PC. This way of learning hacking can be pretty boring as there are no challenges or rewards. Also it can be quite laggy unless you have a high end machine. In addition, some people find learning Linux and installing virtual machines too troublesome.


user Gamystyle     





Bug Bounty: Android Hacking (Updated)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 632 MB
Genre: eLearning Video | Duration: 59 lectures (2h 42m) | Language: English

Earn by hacking legally


user Broknote     

Learn Wordpress Website Security

Learn Wordpress Website Security

English | 51:25 | Video 720p | Subtitles

If you rely on your wordpress website for your business - protecting your asset is crucial with site security


user Solid     

The Absolute Beginners Guide to Cyber Security and Hacking (Updated 1/2020)
 
The Absolute Beginners Guide to Cyber Security and Hacking (Updated 1/2020)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 3.69 GB
Genre: eLearning Video | Duration: 29 lectures (9h 14m) | Language: English


2020 Launch! Become a Cyber Security Specialist, Build technical capability in ethical hacking &web application security.


user Broknote     

Black Hat Approach to Hacking
 

Black Hat Approach to Hacking
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.87 GB
Genre: eLearning Video | Duration: 22 lectures (4h 7m) | Language: English

Learn how a hacker hacks into the system and learn how to secure them from getting hacked


user Broknote     

Bug Bounty : Web Hacking (Updated 1/2020)

Bug Bounty : Web Hacking

English | 06:08:46 | Video 720p | Subtitles

Earn by hacking legally


user Solid     

The Absolute Beginners Guide to Cyber Security Part 3

The Absolute Beginners Guide to Cyber Security Part 3
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 907 MB
Genre: eLearning Video | Duration: 5 lectures (2h 6m) | Language: English
Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques


user Broknote     

The Absolute Beginners Guide to Cyber Security Part 2
 

The Absolute Beginners Guide to Cyber Security Part 2
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 763 MB
Genre: eLearning Video | Duration: 6 lectures (1h 51m) | Language: English

Gain the knowledge hackers use to compromise systems and use it to protect your own!


user Broknote     

The Absolute Beginners Guide to Cyber Security Part 1
 

The Absolute Beginners Guide to Cyber Security Part 1
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 917 MB
Genre: eLearning Video | Duration: 5 lectures (2h 8m) | Language: English

An Insight into the OSI Model and Protocol Suite!

user Broknote     

Learn Ethical Hacking By Hacking Real Websites Legally (Updated)
 
Learn Ethical Hacking By Hacking Real Websites Legally
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 3.02 GB
Genre: eLearning Video | Duration: 61 lectures (6h) | Language: English


Fun way to learn ethical hacking by playing online hacking games - hacking real websites legally.


user Broknote     

 

Azure Security Technologies: Manage Identity and Access
Azure Security Technologies: Manage Identity and Access
Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security Technologies exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills, including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional and advanced auth controls, and implementing Privileged Identity Management for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security.

 


user Gamystyle     

 

Ethical Hacking: System Hacking
Ethical Hacking: System Hacking
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.

 


user Gamystyle     

Basics of Networking
 
Basics of Networking
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 119 MB
Genre: eLearning Video | Duration: 14 Lessons (33m) | Language: English


Learn the fundamentals of computer networks with Basics of Networking course and build a solid base of computer networks.


user Broknote     

Lynda - Security for the SMB: Implementing the NIST Framework

Security for the SMB: Implementing the NIST Framework

English | 1h 23m | Video 720p | Subtitles

Cybersecurity incidents impact organizations of all sizes, in all sectors.  Small and medium businesses (SMBs) may not have the same infrastructure or resources for security, but face the same risks. In this course, Ron Woerner explains how to secure SMB assets, systems, and networks, leveraging the five functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework—identify, protect, detect, respond, and recover—as a scaffold for creating a robust cybersecurity program. Learn how to identify your assets and necessary levels of access, set up defenses such as firewalls and encryption, monitor your systems, create an effective incident response plan, and use backups and cloud services to ensure you can recover and resume operations as quickly as possible.


user Solid     

The Absolute Beginners Guide to Cyber Security and Hacking (12/2019)
 
The Absolute Beginners Guide to Cyber Security and Hacking (12/2019)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 2.85 GB
Genre: eLearning Video | Duration: 20 Lessons (7h 7m) | Language: English


2020 Launch! Become a Cyber Security Specialist, Build technical capability in ethical hacking &web application security.


user Broknote     

Complete Hacking Tools in Kali Linux (Updated 12/2019)
 

Complete Hacking Tools in Kali Linux (Updated 12/2019)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 4.28 GB
Genre: eLearning Video | Duration: 183 Lessons (9h 31m) | Language: English

This video tutorial will help you to learn different types of most advanced Ethical Hacking tools


user Broknote     

Advanced Hacking with Metasploit
 
Advanced Hacking with Metasploit
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 887 MB
Genre: eLearning Video | Duration: 25 Lessons (1h 40m) | Language: English


Study the advance level Metasploit and develop practical ethical hacking skills through post-exploitation techniques.


user Broknote     

Introduction to Cyber Security
 
Introduction to Cyber Security
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 362 MB
Genre: eLearning Video | Duration: 39 Lessons (1h 15m) | Language: English


In this course, you will learn the fundamentals of Cyber Security by getting an introduction to all the related modules.


user Broknote     

install oracle Linux 7.3 on Vmware workstation for beginners

install oracle Linux 7.3 on Vmware workstation for beginners

English | 01:05:48 | Video 720p

you will learn to install vmware tool and also learn as how to install Oracle enterprise linux


user Solid     


PRTG Network Monitoring Course


PRTG Network Monitoring Course
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.77 GB
Genre: eLearning Video | Duration: 34 Lessons (4h 24m) | Language: English


Stay ahead of IT infrastructure issues, Monitor every devices in Network, Build Diagram and Maps in PRTG Monitoring Tool.


user Broknote     

Udemy - Wi-Fi Hacking: A Step by Step Guide to Wireless Hacking
Udemy - Wi-Fi Hacking: A Step by Step Guide to Wireless Hacking

Since the introduction of Wireless Networks, the number of people switching to a Wireless Network have increased at a rapid rate! It is believed that these Wireless Networks are designed as a secure solution but that is not the case. These networks are as vulnerable as any other network are!


user Gamystyle     


Udemy - Turkce Gorsel Ogrenme Setleri
Videohive Wow Pack Series


rss