Ethical Hacking - Capture the Flag Walkthroughs - v2
English | 2 hrs | Video: 720p | Subtitles
https://www.udemy.com/course/ethical-hacking-capture-the-flag-walkthroughs-v2/
Video and lab Walkthroughs for capture the Flag exercises that with strengthen your ethical hacking skills


user Gamystyle     

SQL Server Integration Services (2019)

SQL Server Integration Services (2019)

English | 2h 27m | Video 720p | Project File


user Solid     

Azure Weekly Insights (Updated 8/20/2019)

Azure Weekly Insights (Updated 8/20/2019)

English | 2h 18m | Video 720p


user Solid     

Udemy - Interview On Cisco ASA Firewall
Udemy - Interview On Cisco ASA Firewall

Have you ever thought that you could have done the interview a bit better to get your dream job? Interviewing is a game that needs to be played with preparation and confidence. You have to improve your ability to answer with a reason to out stand yourself with others.


user Ahm40tnc     

Udemy - Internet das Coisas (IoT) com Bluetooth 4.0
Udemy - Internet das Coisas (IoT) com Bluetooth 4.0

Bem vindo ao curso Internet das Coisas (IoT)  com Bluetooth 4.0. Nesse curso voc? ir? conhecer os principais componentes da especifica??o Bluetooth 4.0 (Low Energy) e ir? aplicar esse conhecimento no desenvolvimento de dispositivos de hardware que poder?o atuar como sensores ou atuadores controlados por exemplo por um smartphone.  


user Ahm40tnc     

Security Outsourcing: Vendor Selection and Management

Security Outsourcing: Vendor Selection and Management

English | 1h 6m | Video 720p


user Solid     

Udemy - IC Design Process: A Beginner's Overview to VLSI Technology
Udemy - IC Design Process: A Beginner's Overview to VLSI Technology

This is a beginner level course.


user Ahm40tnc     

Ethical password hacking and protecting (8/2019)
 
Ethical password hacking and protecting (8/2019)
MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch
Genre: eLearning | Language: English + .VTT | Duration: 5 hour | Size: 1.29 GB
This Video tutorial helps you to learn different password hacks and protecting methods.

user Broknote     

Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information

Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information

English | 2hr 6m | Video: 720p

 
Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.


user Gamystyle     

Lynda - Web Security: User Authentication and Access Control

Lynda - Web Security: User Authentication and Access Control

English | 1.5 hrs | Video: 720p


User authentication plays a central role in almost everything we do online. From apps to hardware and websites, user accounts and logins are everywhere. Authentication is critical for verifying a user's identity online and for confirming permissions so individuals can perform privileged actions. In this course, instructor Kevin Skoglund teaches you how authentication works, how to implement it correctly when building web applications, walks you through some of the most common attacks, and shows you how to protect your site. He also demonstrates how to secure your own passwords and digital identity so you can work securely. This course is ideal for all developers, particularly those who are interested in authentication and security.


user Gamystyle     

The Basics of Staying Safe Online Cyber Security Awareness
 
The Basics of Staying Safe Online Cyber Security Awareness
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .VTT | Duration: 1 hour | Size: 586 MB
Learn to stay safe online, prevent cyber attack and protect your browsing experience.

user Broknote     

Lynda - Ethical Hacking: The Complete Malware Analysis Process

Lynda - Ethical Hacking: The Complete Malware Analysis Process
English | 1h 32m | Video: 720p
 

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.


user Gamystyle     

Lynda - Firewall Administration Essential Training (2019)

Lynda - Firewall Administration Essential Training (2019)
English | 2 hrs | Video: 720p

 
Security is the greatest need in the digital world right now, and it shows no sign of slowing down. And when it comes to protecting a private network, a firewall is the most fundamental security technology out there. In this course, Sean Colins covers the fundamentals of firewall functionality, configuration, and administration in short, easy-to-understand segments designed to put this complex network security technology into the reach of novice to intermediate firewall administrators. Sean goes over basic and advanced firewall configuration tasks, shares practical case studies, and offers troubleshooting tips. Upon wrapping up this course, you'll be ready to get your own firewall up and running on your network.


user Gamystyle     

Complete WordPress Security Course: Protect Your Website Now

Complete WordPress Security Course: Protect Your Website Now

English | 37 mins | Video 720p


user Solid     

Udemy - How to Hack WiFi Networks for Beginners
Udemy - How to Hack WiFi Networks for Beginners

This course is all about WiFi and the security of wireless networks. You will study the different threats, weaknesses and attack methods.


user Ahm40tnc     

Cyber Security - Python and Web Applications

Cyber Security - Python and Web Applications

MP4 | Video: AVC, 1280x720 | Audio: AAC, 48kHz, 2 Ch

Genre: eLearning | Language: English 


user Solid     

CCNA Routing and Switching 200-125 REVISION GUIDE

CCNA Routing and Switching 200-125 REVISION GUIDE 

MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 10h 56m

Genre: eLearning | Language: English | Size: 1,11 GB


user Solid     

Lynda - Offline Application Security Testing Essential Training

Lynda - Offline Application Security Testing Essential Training

English | 3hr 22m | Video: 720p


Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on offline testing activities: preparing test plans, policies, and other documentation and conducting offline source code reviews. He also explains how to conduct offline testing for the OWASP Top Ten vulnerabilities. Along the way, you can become familiar with best practices around security in the SDLC. The hands-on sections—with demos of popular tools such as Codacy and SonarQube—prepare you to apply the lessons in the real world.


user Gamystyle     

Lynda - Online Application Security Testing Essential Training

Lynda - Online Application Security Testing Essential Training

English | 3hr 20m | Video: 720p


Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on online testing, using security scanning, penetration testing, and vulnerability testing to validate code and uncover vulnerabilities. He explains the difference between positive and negative, manual and automated, and production and nonproduction testing, so you can choose the right kind for your workflow. The hands-on sections—with demos of popular tools such as Fiddler, Burp Suite, and OWASP OWTF—prepare you to apply the lessons in the real world.


user Gamystyle     

Lynda - Juniper Security Policies Fundamentals

Lynda - Juniper Security Policies Fundamentals
English | 1h 27m | Video: 720p

 
Juniper security policies allow networking professionals working with Junos OS to secure access to a network's critical resources by defining the required security level for those resources. Grasping how these security policies work—and how to troubleshoot them—is key for anyone studying for the Juniper Networks Certified Associate, Security (JNCIA-SEC) certification exam. In this course, discover how to protect your network with security policies as you learn the concepts covered in the Security Policies objectives in the JNCIA-SEC exam. Instructor Shyamraj Selvaraju covers planning and configuring security policies, as well as how you can use these policies to control traffic moving in and out of a network. Plus, discover how to schedule, monitor, and troubleshoot security policies.


user Gamystyle     

 Hack Like a Pro - Ethical Hacking from A to Z

 Hack Like a Pro - Ethical Hacking from A to Z

English | 13 hrs | Video: 720p | Subtitles

 

This course is created to prepare the students for the certification exams to become ethical hackers. The course content is prepared and structured according to official documentation and requirements to passing successfully the certification exam. You will learn various methods and techniques required to become an ethical hacker, powerful tools to exploit vulnerabilities and penetrate network and system architectures, and of course Linux basic command line utilities.


user Gamystyle     

Lynda - Learning VPN
Lynda - Learning VPN
English | 54m | Video: 720p

 
Virtual private networks (VPNs) allow remote users to access resources on a protected network via an encrypted connection. While the technology is common, it’s helpful to understand the many protocols and platform-specific options that can be selected to best meet the needs of your organization. This course helps you understand VPN terms and technologies, so you can configure a custom VPN solution. Instructor Scott Simpson covers protocols such as PPTP, L2TP over IPSec, OpenVPN, SSTP, and WireGuard, and shows how to use SSH to secure data traveling between systems. He also shows how to set up and connect to two different VPN servers. Plus, learn about the factors to consider in your own VPN implementation, including mobile access and specialized VPN appliances.


user Gamystyle     

 

Introduction to Deep Learning with OpenCV
Lynda - Introduction to Deep Learning with OpenCV
Deep learning is a fairly recent and hugely popular branch of artificial intelligence (AI) that finds patterns and insights in data, including images and video. Its layering and abstraction give deep learning models almost human-like abilities—including advanced image recognition. Using OpenCV—a widely adopted computer vision software—you can run previously trained deep learning models on inexpensive hardware and generate powerful insights from digital images and video. In this course, instructor Jonathan Fernandes introduces you to the world of deep learning via inference, using the OpenCV Deep Neural Networks (dnn) module. You can get an overview of deep learning concepts and architecture, and then discover how to view and load images and videos using OpenCV and Python. Jonathan also shows how to provide classification for both images and videos, use blobs (the equivalent of tensors in other frameworks), and leverage YOLOv3 for custom object detection.

 


user Ahm40tnc     

 

Excel for Mac: PivotTables in Depth
Lynda - Excel for Mac: PivotTables in Depth
Learn to quickly summarize, sort, and analyze data with one of the most overlooked features in Microsoft Excel for Mac: PivotTables. Follow along with Curt Frye as he shows you how to gain more valuable insights from your data—demystifying the complexity of PivotTables while demonstrating their power. Curt shows how to build PivotTables from Excel workbooks or external data sources, add calculated fields, filter results, and format your layout to make it more readable. Plus, learn how to use conditional formatting to intelligently highlight cells, apply color scales, and format cells using data bars, as well as how to create and format PivotCharts. Note: This course was recorded in Office 365 for Mac. However, much of the content will be useful to those working with Office for Mac 2019 and 2016.

 


user Ahm40tnc     


Videohive Wow Pack Series
Videohive Wow Pack Series
Venom 2018


rss