Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z


Learn Ethical Hacking / Pen testing & Bug Bounty Hunting A:Z (updated 8/2021)

https://www.udemy.com/course/complete-ethical-hacking-course-2021-beginner-to-advanced/
Complete Practical Course on Ethical Hacking && master System Hacking, Website Hacking, Wi-Fi Hacking and many more.

user Gamystyle     

Wireless Networking: Advanced Troubleshooting Online Class


Wireless Networking: Advanced Troubleshooting Online Class

https://www.linkedin.com/learning/wireless-networking-advanced-troubleshooting
For all the amazing things that Wi-Fi lets you do, when it doesn’t work, it can lead to frustrations, productivity losses, and other serious problems. It can be slow and almost unusable. It can lack proper security. So how do you solve these problems? In this course, Robert McMillen helps you address your wireless connectivity issues, sharing his knowledge from over 20 years of experience in the information technology field. Robert discusses common troubleshooting tools and shows how to solve many client connectivity problems. He shows how to properly secure your Wi-Fi network, how to track down causes of wireless network interference, and covers hardware problems, security issues, and misconfigurations. If you’re looking for Wi-Fi fixes beyond “turning it off and turning it back on again,” connect with Robert in this course.


user Gamystyle     

Wireless Networking: Advanced Troubleshooting
Wireless Networking: Advanced Troubleshooting


https://www.linkedin.com/learning/wireless-networking-advanced-troubleshooting



For all the amazing things that Wi-Fi lets you do, when it doesn’t work, it can lead to frustrations, productivity losses, and other serious problems. It can be slow and almost unusable. It can lack proper security. So how do you solve these problems? In this course, Robert McMillen helps you address your wireless connectivity issues, sharing his knowledge from over 20 years of experience in the information technology field. Robert discusses common troubleshooting tools and shows how to solve many client connectivity problems. He shows how to properly secure your Wi-Fi network, how to track down causes of wireless network interference, and covers hardware problems, security issues, and misconfigurations. If you’re looking for Wi-Fi fixes beyond “turning it off and turning it back on again,” connect with Robert in this course.



 


user Gamystyle     

Create Your Own Penetration & Hacking Lab - NOOB to PRO

Create Your Own Penetration & Hacking Lab - NOOB to PRO

https://www.udemy.com/course/create_your_own_hacking_lab/
Build A Cybersecurity & Ethical Hacking Home Lab || Go One More Step In The World Of Hacking || Red Team & Blue Team VM

user Gamystyle     

Extending and Optimizing a Wi-Fi Network


Extending and Optimizing a Wi-Fi Network


https://www.linkedin.com/learning/extending-and-optimizing-a-wi-fi-network/
Are you a homeowner or a small business owner with a wireless network problem to solve? In this course, instructor Jess Stratton walks you through identifying and solving a variety of problems. Jess shows you how to take inventory with a network map, so that you know every computer and device connected to your network. She explains how different devices connect and how to set devices to the correct Wi-Fi channel frequencies. Jess describes how one old Wi-Fi device can slow down your network and presents some options for dealing with them. She steps through how to conduct an active site survey and optimize your router connections, including how to identify dead spots in your home or office. After going over some options for extending your network’s signal, Jess concludes with a discussion of how you can identify if your network problems have been solved.


user Gamystyle     

AWS: Networking Online Class


AWS: Networking Online Class

https://www.linkedin.com/learning/aws-networking-14125632
Adopting a cloud infrastructure strategy includes configuring a network that meets the needs of your organization. Amazon Web Services (AWS) is a cost-reducing solution that provides tools so you can build a data center with secure cloud networking technology. This course offers advice for technical managers and step-by-step instructions for system administrators and full-stack engineers. Learn how to establish private connections, set up a virtual private cloud, implement and configure Transit Gateway, create security groups, work with access control lists, and more. Plus, get troubleshooting tips and learn how to leverage AWS services such as CloudFront to securely deliver content to customers globally with low latency. Join IT architect Sharif Nijim as he takes you through foundational networking concepts and beyond so you can gain a broader and deeper sense of effective strategies and tools you can use.


user Gamystyle     

Introduction to Network Routing


Introduction to Network Routing

https://www.linkedin.com/learning/introduction-to-network-routing

If you have any interest in IT—either as a prospective career or just want to extend your knowledge base—one of the most important areas you need to understand is computer networking. Networking brings computers and devices together, allowing access to shared data and programs to anyone on the network regardless of physical location, and when it doesn't work correctly the entire organization suffers. In this course, Robert McMillen gives an introduction to networking, starting with the basics of what makes up a network, before going into the key foundational aspects you need to know about networking, including the structure of an IP address and how data packets are used to drive data from one computer to another using the IP protocol. Robert shows how to count in binary, understand static and dynamic routing, use network tools, and why you need to know these things to have a career in the IT field.


user Gamystyle     


Introduction To Cybersecurity


 


Introduction To Cybersecurity
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.05 GB
Genre: eLearning Video | Duration: 25 lectures (1 hour, 42 mins) | Language: English

Cybersecurity for Beginners


user Broknote     

Ethical Hacking: Vulnerability Analysis (Updated)


Ethical Hacking: Vulnerability Analysis
https://www.lynda.com/IT-tutorials/Ethical-Hacking-Vulnerability-Analysis/5026555-2.html

In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Lisa also includes challenge chapters to test your knowledge of each section, along with solutions videos for each challenge.


user Gamystyle     

Learning Google Cloud Security


Learning Google Cloud Security
https://www.lynda.com/Google-Cloud-tutorials/Learning-Google-Cloud-Security/2875060-2.html

If you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and manage data and assets in the cloud, join Dominique West in this course as she teaches the basics of properly securing your Google Cloud environment. Dominique starts with the basics of cloud computing and general security


user Gamystyle     


Active Directory Pentesting With Kali Linux - Read Team


 


Active Directory Pentesting With Kali Linux - Read Team
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 7.66 GB
Genre: eLearning Video | Duration: 105 lectures (17 hour, 23 mins) | Language: English

Attacking and Hacking Active Directory With Kali Linux Full Course - Read Team Hacking Pentesting


user Broknote     

Ethical Hacking: System Hacking (Updated 04.2021)


Ethical Hacking: System Hacking (Updated 04.2021)
https://www.lynda.com/IT-Infrastructure-tutorials/Ethical-Hacking-System-Hacking/476620-2.html

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.


user Gamystyle     

Protecting Your Network with Open Source Software


Protecting Your Network with Open Source Software


https://www.lynda.com/Nessus-tutorials/Protecting-Your-Network-Open-Source-Software-2021-Revision/2871211-2.html
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network


user Gamystyle     

Ethical Hacking: Introduction to Ethical Hacking (Updated)


Ethical Hacking: Introduction to Ethical Hacking (Updated)


https://www.linkedin.com/learning/ethical-hacking-introduction-to-ethical-hacking/
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.


user Gamystyle     

Network Address Translation Operation and Configuration


Network Address Translation Operation and Configuration

https://www.pluralsight.com/courses/network-address-translation-operation-configuration

Network address translation is used to allow devices on a private network and access resources on the global Internet. This course introduces you to NAT, examines different types of NAT, and teaches you how to implement and troubleshoot them.


user Gamystyle     

Foundational TCP Analysis with Wireshark


Foundational TCP Analysis with Wireshark

https://www.pluralsight.com/courses/foundational-tcp-analysis-wireshark

TCP is a core protocol driving business applications, but is often a blind spot in IT organizations. A thorough understanding of TCP can speed up network and application troubleshooting, empowering engineers to quickly resolve problems.


user Gamystyle     

Networking Foundations: IP Addressing


Networking Foundations: IP Addressing
https://www.linkedin.com/learning/networking-foundations-ip-addressing-2020

The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the IP address does and why it is critical in a successful network. He goes into the structure of IPv4 and IPv6 addresses. Anthony shows you how to work with the classful addressing system for IP addresses, then goes over subnet masks and subnet addressing. He covers how variable length subnet masking (VLSM) permits the creation of optimal "right-sized" network segments. Anthony walks you through CIDR and IP address aggregation. He explains special use addresses, then concludes with how IP services such as DHCP, DNS, and NAT can benefit your network.


user Gamystyle     

Networking Foundations: Servers


Networking Foundations: Servers

https://www.lynda.com/Windows-Server-tutorials/Networking-Foundations-Servers-REVISION-2020/2876331-2.html

Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It's designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.


user Gamystyle     

Lynda - Wireshark: Malware and Forensics


Lynda - Wireshark: Malware and Forensics


https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.


user Gamystyle     


Lynda - Ethical Hacking: The Complete Malware Analysis Process


Lynda - Ethical Hacking: The Complete Malware Analysis Process
https://www.lynda.com/IT-tutorials/Ethical-Hacking-2019-Complete-Malware-Analysis-Process/5043083-2.html

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.



user Gamystyle     

Scrum Master Certification Training & PSM1 Sample Exams

Scrum Master Certification Training & PSM1 Sample Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 57 lectures (4h 12m) | Size: 3.33 GB

user nomaher     

 

Scrum Product Owner Certification Training & Two PSPO1 Exams
Scrum Product Owner Certification Training & Two PSPO1 Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 71 lectures (5h 25m) | Size: 3.14 GB

 

 


user nomaher     

Temel Network(Ağ) Eğitimi-1
Temel Network(Ağ) Eğitimi-1
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: Turkish | Duration: 1hr 36min | Size: 539 MB

user nomaher     

IT Networking Fundamentals with Lab Practicals

IT Networking Fundamentals with Lab Practicals
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English + .srt | Duration: 6 lectures (6h 35m) | Size: 2.8 GB

user nomaher     


Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Udemy - Turkce Gorsel Ogrenme Setleri
Videohive Wow Pack Series


rss