SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling PDF
The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your...
View ArticleMetasploit Penetration Testing Recipes | Packt
Prepare the Metasploit framework and set up labs locally and remotely Understand Metasploit fundamentals Conduct penetration testing on different target scopes Perform client-side attacks on browsers...
View ArticleAnatomy of a Cyber Attack – Beginner Hacking with Metasploit
Anatomy of a Cyber Attack – Beginner Hacking with MetasploitEnglish | Size: 1.54 GB Category: HACKING | Networking | Security Updated with the EternalBlue & WannaCry Ransomware Exploit Labs against...
View ArticlePluralSight – Getting Started with Memory Forensics Using Volatility
PluralSight – Getting Started with Memory Forensics Using VolatilityEnglish | Size: 242.35 MB Category: Tutorial Getting Started with Memory Forensics Using VolatilityBy Collin MontenegroWith the...
View ArticleSplunk Hands-on – The Complete Data Analytics using Splunk | Udemy
Learn all the skills needed to analyze machine-generated data using Splunk. Upon completion of this course you will be able to easily implement Splunk in your workplace. Through this Splunk Training,...
View ArticleLinux Super Cert Prep: Get Certified as a Linux System Admin | Udemy
How to be able to install several “flavors” of Linux Operating System Master a clear understanding of organizational concepts on Linux Operating Systems Understand the key differences between the most...
View ArticleCyber Security Hands-on: Complete Network Security A-Z™ | Udemy
Network Fundamentals Network Design Elements and Components Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Devices and Protocols Introduction to Intrusion Detection...
View Articlezycoo ip pbx (Asterisk Base) | Udemy
zycoo hardware design & specification and cards types overview about zycoo web interface change network settings ip ,route , firewall,services,ssh ,ip tables and download soft phone & register...
View ArticleDEF CON® 27 Hacking Conference (2019)
This is the third year we’ve hosted the Voting Village, and this year we were able to give attendees access to over 100 machines, all of which are currently certified for use in at least one US...
View ArticleHacking Techniques for IT Professionals 2.0 Complete Course | Udemy
Become Certified IT Security Professional Application attacks and how to prevent them. Application security assessment. Global management of user software. Cryptography and cryptanalysis. Symmetric and...
View ArticleSANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...
FOR572 is truly an advanced course – we hit the ground running on day one. Bring your entire bag of skills: forensic techniques and methodologies, full-stake networking knowledge (from the wire all the...
View ArticleExploit Development and Execution with the Metasploit Framework
Exploit Development and Execution with the Metasploit FrameworkEnglish | Size: 675.16 MBCategory: HACKING | Security As a security professional learning the ins and outs of exploitation can be...
View ArticleeLearnSecurity – exploit Development Student (XDS)
eLearnSecurity – exploit Development Student (XDS)English | Size: 1.99 GB Category: Programming | E-learning | HACKING | Security | others The exploit Development Student course (XDS) is an online,...
View ArticleMGT 517, Managing, Security, Operations, Detection, Response, Intelligence, 2018
MGT 517 – Managing Security Operations – Detection, Response, and Intelligence (2018)English | Size: 175.24 MB Category: Security Security Operations is responsible for protecting an organization’s...
View ArticleAzure Networking Fundamentals: A Baseline for Understanding Networking in the...
This video provides you with a baseline understanding of Azure Networking. It begins with an introduction to the high-level architecture of Azure Virtual Networks so that you can become familiar with...
View ArticleMetasploit Penetration Testing Recipes | Packt
Prepare the Metasploit framework and set up labs locally and remotely Understand Metasploit fundamentals Conduct penetration testing on different target scopes Perform client-side attacks on browsers...
View ArticleSystems Security Certified Practitioner (2019) – ITProTV
Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP...
View ArticleKubernetes Certified Administrator by School of Devops® | Udemy
Understand the need for a Container Orchestration System and Key Features of Kubernetes Install and configure a Kubernetes Cluster Create deployments with replicasets and setup highly available self...
View ArticleCreating a Security Awareness Program – Lynda
By implementing a security awareness program, you can turn people into assets—not fragile targets. A truly robust and mature security program makes educating employees a top priority in a company’s...
View ArticleIntroduction to Vyatta (vRouter) | Udemy
Install configure and troubleshoot Vyatta This course will introduce the students to the virtual routing technology by using Brocade’s Vyatta routers. Course will take students from very basics like...
View Article