Linkedin Learning – Ethical Hacking-Scanning Networks (2023)
English | Tutorial | Size: 261.04 MB
After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. [Read more…]
Get Yourself a Better Life! Free eLearning Download
Linkedin Learning – Ethical Hacking-Scanning Networks (2023)
English | Tutorial | Size: 261.04 MB
Udemy – Crafting Nmap Scripts Advanced Network Scanning
English | Tutorial | Size: 1.98 GB
Udemy – Real NMAP Elite Network Scanning Reconin 10 Hours CNMP
English | Tutorial | Size: 5.45 GB
Linkedin Learning – CompTIA PenTest PT0-002 Cert Prep 2 Information Gathering and Vulnerability Scanning-XQZT
English | Tutorial | Size: 3.02 GB
Yiihuu – Film and Game Model 3D Scanning Modeling Technology Learning Manual-FACS Portrait
English | Size: 2.5GB
Category: Tutorial
This is a set of 3D facial expression capture and binding teaching. [Read more…]
PluralSight – Information Gathering And Vulnerability Scanning For Comptia Pentest Plus Bookware-KNiSO
English | Size: 345.88 MB
Category: Tutorial
Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification [Read more…]
Packt – Hands-On Network Scanning with Nmap for Network Security
English | Size: 692.15 MB
Category: Tutorial
Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. [Read more…]
Packt – Hands-on Network Scanning With NMAP for Network Security-iLLiTERATE
English | Size: 692.57 MB
Category: Tutorial
Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. [Read more…]
Linkedin Learning – 3D Scanning: From Mesh to Model Online Class-ZH
English | Size: 1.71 GB
Category: Tutorial
Interested in learning the basics of reverse engineering? In this course, instructor Nick Kloski helps you get up to speed covering the fundamentals of reverse engineering using 3D scan data as a basis. As he details key concepts, Nick steps through how to go from a 3D scan to an optimized model that fits into nearly any product design workflow. He reviews the technologies available for 3D scanning, including photogrammetry and structured light. Using Artec structured light scanners as an example of capture technology, Nick goes into a workflow using inexpensive or free software to perform a complete reverse engineering workflow. See how to convert the scan (a mesh) into an optimized form, and bring it through Fusion 360 to create a solid model that can be flexibly incorporated into product design workflows. [Read more…]
Udemy – The Art of Doing Master Networks and Network Scanning
English | Size: 3.94 GB
Category: Tutorial