LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

O`Reilly – Kubernetes Security: Attacking and Defending Kubernetes

26/06/2022 Learning for Life Leave a Comment

O`Reilly – Kubernetes Security Attacking and Defending Kubernetes-iLLiTERATE
English | Tutorial | Size: 809.68 MB


Like many complex systems Kubernetes has historically been insecure by default, [Read more…]

Security & Hacking Attacking, Defending, iLLiTERATE, Kubernetes, O'Reilly, Security

O`Reilly – Kubernetes Security – Attacking and Defending Kubernetes

18/06/2022 Learning for Life Leave a Comment

Kubernetes Security – Attacking and Defending Kubernetes
English | Tutorial | Size: 809.31 MB


Like many complex systems Kubernetes has historically been insecure by default, and contains a number of “footguns” that make secure deployments difficult. [Read more…]

Security & Hacking Attacking, Defending, Kubernetes, O'Reilly, Security

PentesterAcademy – (CRTP BootCamp) Attacking and Defending Active Directory Beginner’s Edition

18/03/2022 Learning for Life Leave a Comment

PentesterAcademy – (CRTP BootCamp) Attacking and Defending Active Directory: Beginner’s Edition
English | Size: 4.82 GB
Category: Tutorial

What You’ll Learn
This is a live session bootcamp with 4 chapters videos for beginner-friendly bootcamp, designed to teach security professionals how to identify and analyze threats in a modern Active Directory environment. [Read more…]

Security & Hacking Active, Attacking, Beginner, Bootcamp, CRTP, Defending, Directory, Edition, PentesterAcademy

Infosec – Attacking Web Application Access Controls

31/07/2020 Learning for Life Leave a Comment

Infosec – Attacking Web Application Access Controls
English | Size: 332.12 MB
Category: Tutorial

Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more. [Read more…]

Security & Hacking Access, Application, Attacking, Infosec, Web

Gordon Ryan – Systematically Attacking the Guard

28/12/2019 Learning for Life Leave a Comment

Gordon Ryan – Systematically Attacking the Guard
English | Size: 4.98 GB
Category: Health-Fitness


First Time Ever Revealed: The Three Part Passing System That No One Can Stop. Whether You Are Big Or Small, Old Or Young – Gordon Ryan’s Passing System Is A Cheat Code To Passing Any Style Of Guard
[Read more…]

Health / Fitness / Massage Attacking, Gordon Ryan, Guard, Systematically

Pentester Academy – Attacking and Defending Active Directory (Complete Course)

19/12/2019 Learning for Life Leave a Comment

Pentester Academy – Attacking and Defending Active Directory (Complete Course)
English | Size: 4.73 GB
Category: Tutorial


The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real world trainings on AD security and always found that there is a lack of quality material, which can take students from basics of Active Directory security, and teach them how to attack and defend it.
[Read more…]

Security & Hacking Active, Attacking, Complete, Course, Defending, Directory, Pentester Academy

Pentester Academy – Attacking and Defending Active DirectBookmark

24/05/2019 Learning for Life Leave a Comment

Pentester Academy – Attacking and Defending Active DirectBookmark
English | Size: 3.94 GB
Category: Tutorial


The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point for adversaries. Still, when it comes to AD security, there is a large gap of knowledge, which security professionals and administrators struggle to fill. Over the years, we have taught numerous professionals in real world trainings on AD security and always found that there is a lack of quality material, which can take students from basics of Active Directory security, and teach them how to attack and defend it.
[Read more…]

Internet & Networking Active Direct, Attacking, Bookmark, Defending, Pentester Academy

Attacking Network Protocols A Hacker’s Guide to Capture, Analysis, and Exploitation 1st Editi

19/01/2018 Learning for Life Leave a Comment

Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation 1st Editi
English | Size: 28.54 MB
Category: e-Books


Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities.

You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. [Read more…]

Internet & Networking A Hacker's Guide, Attacking, Capture, Network, Protocols

  • « Previous Page
  • 1
  • 2
  • 3
  • 4-in-1 bundle: MySQL, PostgreSQL, Microsoft SQL & Oracle SQL | Udemy
  • The Complete Guide to Freelancing in 2025 | ZeroToMastery
  • AI Coding with Jupyter AI | ZeroToMastery
  • BBC – The Americas (2025) Part 04: The Amazon
  • CAMP Z: THE AWAKENING-TENOKE

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in