Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information

Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information

English | 2hr 6m | Video: 720p

 
Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.


user Gamystyle     

Lynda - Web Security: User Authentication and Access Control

Lynda - Web Security: User Authentication and Access Control

English | 1.5 hrs | Video: 720p


User authentication plays a central role in almost everything we do online. From apps to hardware and websites, user accounts and logins are everywhere. Authentication is critical for verifying a user's identity online and for confirming permissions so individuals can perform privileged actions. In this course, instructor Kevin Skoglund teaches you how authentication works, how to implement it correctly when building web applications, walks you through some of the most common attacks, and shows you how to protect your site. He also demonstrates how to secure your own passwords and digital identity so you can work securely. This course is ideal for all developers, particularly those who are interested in authentication and security.


user Gamystyle     

The Basics of Staying Safe Online Cyber Security Awareness
 
The Basics of Staying Safe Online Cyber Security Awareness
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .VTT | Duration: 1 hour | Size: 586 MB
Learn to stay safe online, prevent cyber attack and protect your browsing experience.

user Broknote     

Lynda - Ethical Hacking: The Complete Malware Analysis Process

Lynda - Ethical Hacking: The Complete Malware Analysis Process
English | 1h 32m | Video: 720p
 

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.


user Gamystyle     

Lynda - Firewall Administration Essential Training (2019)

Lynda - Firewall Administration Essential Training (2019)
English | 2 hrs | Video: 720p

 
Security is the greatest need in the digital world right now, and it shows no sign of slowing down. And when it comes to protecting a private network, a firewall is the most fundamental security technology out there. In this course, Sean Colins covers the fundamentals of firewall functionality, configuration, and administration in short, easy-to-understand segments designed to put this complex network security technology into the reach of novice to intermediate firewall administrators. Sean goes over basic and advanced firewall configuration tasks, shares practical case studies, and offers troubleshooting tips. Upon wrapping up this course, you'll be ready to get your own firewall up and running on your network.


user Gamystyle     

Complete WordPress Security Course: Protect Your Website Now

Complete WordPress Security Course: Protect Your Website Now

English | 37 mins | Video 720p


user Solid     

Udemy - How to Hack WiFi Networks for Beginners
Udemy - How to Hack WiFi Networks for Beginners

This course is all about WiFi and the security of wireless networks. You will study the different threats, weaknesses and attack methods.


user Ahm40tnc     

Cyber Security - Python and Web Applications

Cyber Security - Python and Web Applications

MP4 | Video: AVC, 1280x720 | Audio: AAC, 48kHz, 2 Ch

Genre: eLearning | Language: English 


user Solid     

CCNA Routing and Switching 200-125 REVISION GUIDE

CCNA Routing and Switching 200-125 REVISION GUIDE 

MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 10h 56m

Genre: eLearning | Language: English | Size: 1,11 GB


user Solid     

Lynda - Offline Application Security Testing Essential Training

Lynda - Offline Application Security Testing Essential Training

English | 3hr 22m | Video: 720p


Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on offline testing activities: preparing test plans, policies, and other documentation and conducting offline source code reviews. He also explains how to conduct offline testing for the OWASP Top Ten vulnerabilities. Along the way, you can become familiar with best practices around security in the SDLC. The hands-on sections—with demos of popular tools such as Codacy and SonarQube—prepare you to apply the lessons in the real world.


user Gamystyle     

Lynda - Online Application Security Testing Essential Training

Lynda - Online Application Security Testing Essential Training

English | 3hr 20m | Video: 720p


Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on online testing, using security scanning, penetration testing, and vulnerability testing to validate code and uncover vulnerabilities. He explains the difference between positive and negative, manual and automated, and production and nonproduction testing, so you can choose the right kind for your workflow. The hands-on sections—with demos of popular tools such as Fiddler, Burp Suite, and OWASP OWTF—prepare you to apply the lessons in the real world.


user Gamystyle     

Lynda - Juniper Security Policies Fundamentals

Lynda - Juniper Security Policies Fundamentals
English | 1h 27m | Video: 720p

 
Juniper security policies allow networking professionals working with Junos OS to secure access to a network's critical resources by defining the required security level for those resources. Grasping how these security policies work—and how to troubleshoot them—is key for anyone studying for the Juniper Networks Certified Associate, Security (JNCIA-SEC) certification exam. In this course, discover how to protect your network with security policies as you learn the concepts covered in the Security Policies objectives in the JNCIA-SEC exam. Instructor Shyamraj Selvaraju covers planning and configuring security policies, as well as how you can use these policies to control traffic moving in and out of a network. Plus, discover how to schedule, monitor, and troubleshoot security policies.


user Gamystyle     

 Hack Like a Pro - Ethical Hacking from A to Z

 Hack Like a Pro - Ethical Hacking from A to Z

English | 13 hrs | Video: 720p | Subtitles

 

This course is created to prepare the students for the certification exams to become ethical hackers. The course content is prepared and structured according to official documentation and requirements to passing successfully the certification exam. You will learn various methods and techniques required to become an ethical hacker, powerful tools to exploit vulnerabilities and penetrate network and system architectures, and of course Linux basic command line utilities.


user Gamystyle     

Lynda - Learning VPN
Lynda - Learning VPN
English | 54m | Video: 720p

 
Virtual private networks (VPNs) allow remote users to access resources on a protected network via an encrypted connection. While the technology is common, it’s helpful to understand the many protocols and platform-specific options that can be selected to best meet the needs of your organization. This course helps you understand VPN terms and technologies, so you can configure a custom VPN solution. Instructor Scott Simpson covers protocols such as PPTP, L2TP over IPSec, OpenVPN, SSTP, and WireGuard, and shows how to use SSH to secure data traveling between systems. He also shows how to set up and connect to two different VPN servers. Plus, learn about the factors to consider in your own VPN implementation, including mobile access and specialized VPN appliances.


user Gamystyle     

 

Introduction to Deep Learning with OpenCV
Lynda - Introduction to Deep Learning with OpenCV
Deep learning is a fairly recent and hugely popular branch of artificial intelligence (AI) that finds patterns and insights in data, including images and video. Its layering and abstraction give deep learning models almost human-like abilities—including advanced image recognition. Using OpenCV—a widely adopted computer vision software—you can run previously trained deep learning models on inexpensive hardware and generate powerful insights from digital images and video. In this course, instructor Jonathan Fernandes introduces you to the world of deep learning via inference, using the OpenCV Deep Neural Networks (dnn) module. You can get an overview of deep learning concepts and architecture, and then discover how to view and load images and videos using OpenCV and Python. Jonathan also shows how to provide classification for both images and videos, use blobs (the equivalent of tensors in other frameworks), and leverage YOLOv3 for custom object detection.

 


user Ahm40tnc     

 

Excel for Mac: PivotTables in Depth
Lynda - Excel for Mac: PivotTables in Depth
Learn to quickly summarize, sort, and analyze data with one of the most overlooked features in Microsoft Excel for Mac: PivotTables. Follow along with Curt Frye as he shows you how to gain more valuable insights from your data—demystifying the complexity of PivotTables while demonstrating their power. Curt shows how to build PivotTables from Excel workbooks or external data sources, add calculated fields, filter results, and format your layout to make it more readable. Plus, learn how to use conditional formatting to intelligently highlight cells, apply color scales, and format cells using data bars, as well as how to create and format PivotCharts. Note: This course was recorded in Office 365 for Mac. However, much of the content will be useful to those working with Office for Mac 2019 and 2016.

 


user Ahm40tnc     

 

Learning Cloud Computing: Monitoring and Operations
Lynda - Learning Cloud Computing: Monitoring and Operations
If you want to keep track of the health, performance, and security of your entire stack running in the cloud, you'll need a monitoring and operations solution—and there are several robust options to choose from. This course explores the features and uses of leading cloud monitoring solutions so you can compare them against the needs of your infrastructure and organization. The first chapter covers the basics of cloud monitoring, including a discussion of governance, short-term analytics, long-term analytics, and cost. Then, instructor David Linthicum previews the latest tools and provides demonstrations of a few notable solutions. He wraps up with a practical set of guidelines and steps you can use to select and plan for the implementation of a cloud monitoring and operations solution.

 


user Ahm40tnc     

 

Microsoft Exchange Server 2019: Administration
Lynda - Microsoft Exchange Server 2019: Administration
Learn the day-to-day activities required to maintain and monitor an Exchange Server environment. This course teaches the core skills related to administering an organization's email with Exchange Server 2019—the latest version of the flagship Microsoft communications platform. Microsoft Certified Trainer and Solutions Expert Robert McMillen covers creating and configuring mailboxes in the Exchange Control Panel, setting mailbox permissions and delegations, adjusting transport rules, and designing a service-level agreement (SLA) to set expectations around downtime and message delivery. Plus, learn how to back up and recover email, set up protections against malware and spam, and define client policies to guide access, retention, delivery attempts, and more.

 


user Ahm40tnc     

 

Introduction to SuccessFactors Foundation Module
Lynda - Introduction to SuccessFactors Foundation Module
SAP SuccessFactors Foundation—a key module in the SAP suite of HR enterprise software—boasts features that help organizations find and retain the best people. In this course, get a system-focused look at the module's most notable capabilities, as well as practical use cases for each feature. See examples of how individuals in different roles—from managers to system administrators—experience SAP SuccessFactors Foundation functionality on both desktop and mobile. Learn the most essential concepts surrounding each feature and discover what to consider when implementing them.

 


user Ahm40tnc     

 

Material Requirements Planning (MRP) Strategies in SAP
Lynda - Material Requirements Planning (MRP) Strategies in SAP
Discover how to calculate the materials required for product manufacturing with greater accuracy and speed within SAP. The SAP ERP tool has many different material requirements planning (MRP) strategies that are preconfigured and ready to implement; you just need to learn how to choose the right one. This course guides you through the configuration options and business processes behind the make-to-stock (MTS), make-to-order (MTO), and component-level MRP strategies. You can also explore a hybrid strategy for multi-use materials, for use with components in production and spare parts. Once you have completed this course, you should be able to pair the right material requirements planning strategy for every possible business scenario.

 


user Ahm40tnc     

 

Text Analytics and Predictions with Python Essential Training
Lynda - Text Analytics and Predictions with Python Essential Training
Text is a rich source of insights for businesses. Websites, social media, emails, and chats all contain valuable customer data. But to reap the rewards, you need to be able to analyze large amounts of unstructured text. Text mining is an essential skill for anyone working in big data and data science. This course teaches text-mining techniques to extract, cleanse, and process text using Python and the scikit-learn and nltk libraries. Kumaran Ponnambalam explains how to perform text analytics using popular techniques like word cloud and sentiment analysis. He then shows how to make predictions with text data using clustering, classification, and recommendations—otherwise known as predictive text. Along the way, he introduces important text analytics concepts such as lemmatization and n-grams.

 


user Ahm40tnc     

 

Processing Text with Python Essential Training
Lynda - Processing Text with Python Essential Training
In the world of big data, more and more information is consumed and analyzed in text form. Websites, social media, emails, and chats have become the key sources for data and insights. If you work with data, then understanding how to deal with unstructured text data is essential. In this course, instructor Kumaran Ponnambalam helps you build your text mining skill set, covering key techniques for extracting, cleansing, and processing text in Python. Kumaran reviews key text processing concepts like tokenization and stemming. He also looks at techniques for converting text into analytics-ready form, including n-grams and TF-IDF. Along the way, he provides examples of these techniques using Python and the NLTK library.

 


user Ahm40tnc     

 

IT Security Careers and Certifications: First Steps
Lynda - IT Security Careers and Certifications: First Steps
Demand for information security professionals has never been higher—and it's only projected to grow. Interested in finding a job in this exciting new field? Or simply advancing to the next level? IT security expert Marc Menninger explains how to launch and develop a successful career in information security. Learn about the nine most common security jobs and the duties and qualifications for each role. Learn which security certifications appear in job listings and which ones will help you get the job you want. Follow example career paths to learn how others have progressed: from IT hobbyist to help-desk technician to analyst, systems architect, and more. Marc closes with career advice specific to information security, which will help you succeed in this dynamic and high-demand industry.

 


user Ahm40tnc     

Docker for Data Scientists

Lynda - Docker for Data Scientists
In a field where reproducible results are essential, Docker is rapidly emerging as one of the top tools for bringing efficiency to the work that data science teams—particularly those working in machine learning (ML)—are doing. Creating and developing ML models is often messy. Seasoned data scientists know that different versions of the same software can produce different results. With Docker, you can include the right versions of each needed dependency and library, so no one ever has to do any configuration. After the Dockerfile is built, you'll have exactly what you need. In this course, Jonathan Fernandes helps data scientists get up and running with Docker, demonstrating how to build a Dockerized ML application that can easily be shared. Along the way, he shares common use cases for the tool. Upon wrapping up this course, you'll be prepared to leverage the power of containers in your other ML projects.

user Ahm40tnc     


Videohive Wow Pack Series
Videohive Wow Pack Series
Venom 2018


rss