Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 7184 articles
Browse latest View live

SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling PDF

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your...

View Article


Metasploit Penetration Testing Recipes | Packt

Prepare the Metasploit framework and set up labs locally and remotely Understand Metasploit fundamentals Conduct penetration testing on different target scopes Perform client-side attacks on browsers...

View Article


Anatomy of a Cyber Attack – Beginner Hacking with Metasploit

Anatomy of a Cyber Attack – Beginner Hacking with MetasploitEnglish | Size: 1.54 GB Category: HACKING | Networking | Security Updated with the EternalBlue & WannaCry Ransomware Exploit Labs against...

View Article

PluralSight – Getting Started with Memory Forensics Using Volatility

PluralSight – Getting Started with Memory Forensics Using VolatilityEnglish | Size: 242.35 MB Category: Tutorial Getting Started with Memory Forensics Using VolatilityBy Collin MontenegroWith the...

View Article

Splunk Hands-on – The Complete Data Analytics using Splunk | Udemy

Learn all the skills needed to analyze machine-generated data using Splunk. Upon completion of this course you will be able to easily implement Splunk in your workplace. Through this Splunk Training,...

View Article


Linux Super Cert Prep: Get Certified as a Linux System Admin | Udemy

How to be able to install several “flavors” of Linux Operating System Master a clear understanding of organizational concepts on Linux Operating Systems Understand the key differences between the most...

View Article

Cyber Security Hands-on: Complete Network Security A-Z™ | Udemy

Network Fundamentals Network Design Elements and Components Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Devices and Protocols Introduction to Intrusion Detection...

View Article

zycoo ip pbx (Asterisk Base) | Udemy

zycoo hardware design & specification and cards types overview about zycoo web interface change network settings ip ,route , firewall,services,ssh ,ip tables and download soft phone & register...

View Article


DEF CON® 27 Hacking Conference (2019)

This is the third year we’ve hosted the Voting Village, and this year we were able to give attendees access to over 100 machines, all of which are currently certified for use in at least one US...

View Article


Hacking Techniques for IT Professionals 2.0 Complete Course | Udemy

Become Certified IT Security Professional Application attacks and how to prevent them. Application security assessment. Global management of user software. Cryptography and cryptanalysis. Symmetric and...

View Article

SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...

FOR572 is truly an advanced course – we hit the ground running on day one. Bring your entire bag of skills: forensic techniques and methodologies, full-stake networking knowledge (from the wire all the...

View Article

Exploit Development and Execution with the Metasploit Framework

Exploit Development and Execution with the Metasploit FrameworkEnglish | Size: 675.16 MBCategory: HACKING | Security As a security professional learning the ins and outs of exploitation can be...

View Article

eLearnSecurity – exploit Development Student (XDS)

eLearnSecurity – exploit Development Student (XDS)English | Size: 1.99 GB Category: Programming | E-learning | HACKING | Security | others The exploit Development Student course (XDS) is an online,...

View Article


MGT 517, Managing, Security, Operations, Detection, Response, Intelligence, 2018

MGT 517 – Managing Security Operations – Detection, Response, and Intelligence (2018)English | Size: 175.24 MB Category: Security Security Operations is responsible for protecting an organization’s...

View Article

Azure Networking Fundamentals: A Baseline for Understanding Networking in the...

This video provides you with a baseline understanding of Azure Networking. It begins with an introduction to the high-level architecture of Azure Virtual Networks so that you can become familiar with...

View Article


Metasploit Penetration Testing Recipes | Packt

Prepare the Metasploit framework and set up labs locally and remotely Understand Metasploit fundamentals Conduct penetration testing on different target scopes Perform client-side attacks on browsers...

View Article

Systems Security Certified Practitioner (2019) – ITProTV

Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP...

View Article


Kubernetes Certified Administrator by School of Devops® | Udemy

Understand the need for a Container Orchestration System and Key Features of Kubernetes Install and configure a Kubernetes Cluster Create deployments with replicasets and setup highly available self...

View Article

Creating a Security Awareness Program – Lynda

By implementing a security awareness program, you can turn people into assets—not fragile targets. A truly robust and mature security program makes educating employees a top priority in a company’s...

View Article

Introduction to Vyatta (vRouter) | Udemy

Install configure and troubleshoot Vyatta This course will introduce the students to the virtual routing technology by using Brocade’s Vyatta routers. Course will take students from very basics like...

View Article
Browsing all 7184 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>