Protecting Your Network with Open Source Software


Protecting Your Network with Open Source Software


https://www.lynda.com/Nessus-tutorials/Protecting-Your-Network-Open-Source-Software-2021-Revision/2871211-2.html
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network


user Gamystyle     

Ethical Hacking: Introduction to Ethical Hacking (Updated)


Ethical Hacking: Introduction to Ethical Hacking (Updated)


https://www.linkedin.com/learning/ethical-hacking-introduction-to-ethical-hacking/
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.


user Gamystyle     

Network Address Translation Operation and Configuration


Network Address Translation Operation and Configuration

https://www.pluralsight.com/courses/network-address-translation-operation-configuration

Network address translation is used to allow devices on a private network and access resources on the global Internet. This course introduces you to NAT, examines different types of NAT, and teaches you how to implement and troubleshoot them.


user Gamystyle     

Foundational TCP Analysis with Wireshark


Foundational TCP Analysis with Wireshark

https://www.pluralsight.com/courses/foundational-tcp-analysis-wireshark

TCP is a core protocol driving business applications, but is often a blind spot in IT organizations. A thorough understanding of TCP can speed up network and application troubleshooting, empowering engineers to quickly resolve problems.


user Gamystyle     

Networking Foundations: IP Addressing


Networking Foundations: IP Addressing
https://www.linkedin.com/learning/networking-foundations-ip-addressing-2020

The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the IP address does and why it is critical in a successful network. He goes into the structure of IPv4 and IPv6 addresses. Anthony shows you how to work with the classful addressing system for IP addresses, then goes over subnet masks and subnet addressing. He covers how variable length subnet masking (VLSM) permits the creation of optimal "right-sized" network segments. Anthony walks you through CIDR and IP address aggregation. He explains special use addresses, then concludes with how IP services such as DHCP, DNS, and NAT can benefit your network.


user Gamystyle     

Ethical Hacking: Footprinting and Reconnaissance


Ethical Hacking: Footprinting and Reconnaissance

https://www.lynda.com/Linux-tutorials/Ethical-Hacking-Footprinting-Reconnaissance/455717-2.html

If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.


user Gamystyle     

Networking Foundations: Servers


Networking Foundations: Servers

https://www.lynda.com/Windows-Server-tutorials/Networking-Foundations-Servers-REVISION-2020/2876331-2.html

Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It's designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.


user Gamystyle     

Lynda - Ethical Hacking: Evading IDS, Firewalls, and Honeypots (2021)


Lynda - Ethical Hacking: Evading IDS, Firewalls, and Honeypots


https://www.lynda.com/IT-tutorials/Ethical-Hacking-Evading-IDS-Firewalls-Honeypots/5043084-2.html
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, detailing how firewalls work in both Windows and Linux, as well as how to set up a firewall simulation in a GNS3 network. Next, he goes over web application firewalls, API gateway threat mitigation solutions, and how to use honeypots to detect intruders. Finally, he covers the main ways to manage a suspected intrusion, including how to use the Security Onion intrusion detection system (IDS).


user Gamystyle     

Lynda - Wireshark: Malware and Forensics


Lynda - Wireshark: Malware and Forensics


https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.


user Gamystyle     


Lynda - Ethical Hacking: The Complete Malware Analysis Process


Lynda - Ethical Hacking: The Complete Malware Analysis Process
https://www.lynda.com/IT-tutorials/Ethical-Hacking-2019-Complete-Malware-Analysis-Process/5043083-2.html

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.



user Gamystyle     

Lynda - CISSP Cert Prep: 2 Asset Security


Lynda - CISSP Cert Prep: 2 Asset Security


https://www.lynda.com/course-tutorials/CISSP-Cert-Prep-2021-2-Asset-Security/2871212-2.html
CISSP is the industry's gold standard certification, necessary for many mid- and senior-level information security positions. Learn about best practices needed to complete the second domain of the 2021 Certified Information Systems Security Professional (CISSP) exam: Asset Security. Instructor Mike Chapple explains the importance of data governance policies and roles, and how you can develop security baselines that leverage industry standards. Learn how to avoid liability by limiting data collection, and control your exposure with file encryption, and cloud storage security options. Plus, find out how to properly retain and dispose of sensitive information.Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.


user Gamystyle     

Scrum Master Certification Training & PSM1 Sample Exams

Scrum Master Certification Training & PSM1 Sample Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 57 lectures (4h 12m) | Size: 3.33 GB

user nomaher     

 

Scrum Product Owner Certification Training & Two PSPO1 Exams
Scrum Product Owner Certification Training & Two PSPO1 Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 71 lectures (5h 25m) | Size: 3.14 GB

 

 


user nomaher     

Temel Network(Ağ) Eğitimi-1
Temel Network(Ağ) Eğitimi-1
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: Turkish | Duration: 1hr 36min | Size: 539 MB

user nomaher     

IT Networking Fundamentals with Lab Practicals

IT Networking Fundamentals with Lab Practicals
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English + .srt | Duration: 6 lectures (6h 35m) | Size: 2.8 GB

user nomaher     

Windows Command Line Complete Course(CMD, Batch Script) 2021

Windows Command Line Complete Course(CMD, Batch Script) 2021

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch |  English | Duration: 24 lectures (2h 41m) | Size: 2 GB


user nomaher     

Sistema de control de Asistencias en Visual basic.Net (2020)

Sistema de control de Asistencias en Visual basic.Net (2020)

 Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz | Language: Spanish | VTT | Size: 3.60 GB | Duration: 4h 41m


user nomaher     

 Learn the right way to hack wifi - Beginner to Advanced(2020)


Learn the right way to hack wifi - Beginner to Advanced(2020)
https://www.udemy.com/course/wifihacking2018/
Learn the easy way to hack WiFi from the latest WiFi hacking course.


 


user Gamystyle     

WiFi Hacking: Wireless Penetration and Security MasterClass

WiFi Hacking: Wireless Penetration and Security MasterClass
https://www.udemy.com/course/wireless-security-masterclass/
Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.




user Gamystyle     

Ethical Hacking: Advance MITM Attacks Using Raspberry PI

Ethical Hacking: Advance MITM Attacks Using Raspberry PI
https://www.udemy.com/course/ethical-hacking-advance-mitm-attacks-using-raspberry-pi/
In this course we are going to look real world hacking scenarios and how to deal with it we will be doing Scenario based MitM attacks using Raspberry PI as our Attacking device. We will start this course by installing Kali Linux on Raspberry PI then we will look how we can create Remote Based Connection on Raspberry PI without using any keyboard mouse or monitor.

user Gamystyle     


Kali Linux hacker tools, tricks and techniques for beginners

Kali Linux hacker tools, tricks and techniques for beginners
https://www.udemy.com/course/kali-linux-hacker-tools-tricks-and-techniques/
Kali Linux for new comer in cyber security field, is the most important course for you if you are going to make your career in cybersecurity. Because, Kali Linux is most advanced and foremost used platform for the Penetration testers, ethical hackers, security analysts, bug bounty hunters, security administrators and so on.


user Gamystyle     

Lynda - Networking Foundations: Networking Basics (Rev 2020)


Lynda - Networking Foundations: Networking Basics


https://www.lynda.com/IT-tutorials/Networking-Foundations-Networking-Basics-Revision/2822680-2.html
When someone begins to study networking, they’re challenged with knowing where to start. This is due to the wide spectrum of technologies falling under the umbrella of networking. This course provides an overview of the foundational topics any networking professional should know, as well as an introduction to emerging technologies. Instructor Kevin Wallace delves into the purpose of networks, as well as how networking technologies benefit us in both our personal and business lives. He covers network addresses, including the structures of Internet Protocol (IP) version 4 and version 6 addresses. Plus, learn about switches, routers, fiber-optic cabling, and other essential pieces and parts that make networks work; the OSI model; common network services; wireless networks; and more.


user Gamystyle     


Ethical Hacking + Website Hacking + Mobile Hacking: CyberSec

Ethical Hacking + Website Hacking + Mobile Hacking: CyberSec
https://www.udemy.com/course/ethical-hacking-website-hacking-mobile-hacking-cybersecurity-ceh/
Learn the Art of System Hacking, Website Hacking, Mobile Hacking and Forensics with Linux Course as Bonus,Cyber Security


user Gamystyle     

Lynda - Cisco Network Security: Core Security Concepts


Lynda - Cisco Network Security: Core Security Concepts


https://www.lynda.com/Cisco-tutorials/CCNA-Security-210-260-Cert-Prep-1-Security-Concepts/612193-2.html


Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers.This course corresponds to the security fundaments portion of the 200-301 CCNA exam.


user Gamystyle     


Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Udemy - Turkce Gorsel Ogrenme Setleri
Videohive Wow Pack Series


rss