LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

SEC542: Web App Penetration Testing and Ethical Hacking

14/02/2017 Tut4DL Leave a Comment

SEC542: Web App Penetration Testing and Ethical Hacking
English | Size: 3.8 GB
Category: Video Training


SEC542.1: Web Penetration Testing and Ethical Hacking: Introduction and Information Gathering
SEC542.2: Web Penetration Testing and Ethical Hacking: Configuration, Identity, and Authentication Testing
SEC542.3: Web Penetration Testing and Ethical Hacking: Injection
SEC542.4: Web Penetration Testing and Ethical Hacking: JavaScript and XSS
SEC542.5: Web Penetration Testing and Ethical Hacking: CSRF, Logic Flaws and Advanced Tools
SEC542.6: Web Penetration Testing and Ethical Hacking: Capture the Flag
[Read more…]

Security & Hacking Ethical Hacking, Penetration Testing, SEC542

Ethical Hacking: Website and Web Application Testing

10/02/2017 Tut4DL Leave a Comment

Ethical Hacking: Website and Web Application Testing
English | Size: 262.0 MB
Category: Video Training


Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application (focusing on the most vulnerable components), and introduces the Open Web Application Security Project (OWASP), which provides documentation, tools, and forums for web developers and testers. Malcolm also provides an overview of popular testing tools, including Burp Suite, Vega, and WebScarab. Learn how to use these utilities to run basic and advanced tests, and shore up sites against common attacks, such as SQL injections and cross-site scripting exploits. The course closes with some resources for practicing your skills, including testing sites such as Trustwave CrackMe Bank and Google Gruyere.
[Read more…]

Security & Hacking Ethical Hacking, Web Application Testing

Intensive Ethical Hacking Series

31/01/2017 Learning for Life Leave a Comment

Intensive Ethical Hacking Series
English | Size: 1.69 GB
Category: CBTs


Take another step closer towards an ethical hacking career by augmenting your pentesting knowledge with key techniques. You’ll start by learning about networking concepts such as how protocols work, then master practical techniques such as using the Metasploit pentesting tool and bypassing Windows authentication schemas. By applying this theory to real-life scenarios throughout your lessons, you’re certain to become a full-fledged ethical hacker in no time.
[Read more…]

Security & Hacking Ethical Hacking, Intensive, Series

Udemy Complete Penetration Testing and Ethical hacking Bootcamp

30/01/2017 Learning for Life Leave a Comment

Udemy Complete Penetration Testing and Ethical hacking Bootcamp
English | Size: 5.22 GB
Category: Networking | Security


Section: 10 / 6
Must have basics for a Penetration Tester
Section: 20 / 9
Installation and configuration of lab for pentesting
Section: 30 / 5
UPDATE – optional linux section. Just basics yet important part of all linux
[Read more…]

Security & Hacking Bootcamp, Complete, Ethical Hacking, Penetration Testing, Udemy

Complete Penetration Testing and Ethical hacking Bootcamp

26/01/2017 Tut4DL Leave a Comment

Complete Penetration Testing and Ethical hacking Bootcamp
English | Size: 5.22 GB
Category: Video Training


Get started from scratch and become job ready penetration Tester. Be an Ethical Hacker and Hunt as a Bug Bounty Hunters
[Read more…]

Internet & Networking, OS & Server, Security & Hacking Ethical Hacking, Penetration Testing

Lynda – Ethical Hacking – Website and Web Application Testing

07/01/2017 Learning for Life Leave a Comment

Lynda – Ethical Hacking – Website and Web Application Testing
English | Size: 286.19 MB
Category: Tutorial


Websites and web applications are-by their very nature-accessible remotely, which puts them at high risk of cyber attack. Knowing how to prevent and detect web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application [Read more…]

Security & Hacking Ethical Hacking, Lynda, Testing, Web Application, Website

Lynda.com – Ethical Hacking Mobile Devices and Platforms

24/12/2016 Learning for Life Leave a Comment

Lynda.com – Ethical Hacking: Mobile Devices and Platforms
English | Size:305.45 MB
Category:CBTs


Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks. Join author Malcolm Shore, as he explores the two dominant mobile operating systems, Android and iOS, and shows ways to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws.
[Read more…]

Security & Hacking Ethical Hacking, Lynda.com, Mobile Devices, Platforms

Build an Advanced Keylogger using C++ for Ethical Hacking

18/12/2016 Learning for Life Leave a Comment

Build an Advanced Keylogger using C++ for Ethical Hacking
English | Size: 2.91 GB
Category:HACKING


If you want to learn to code at an advanced level in C++ or build your own fully functional advanced keylogger from scratch for learning ethical hacking, you might love this course! In this course you will see exactly how to create an advanced keylogger starting from nothing by literally following the steps I take as I make it! [Read more…]

Security & Hacking Advanced, Build, C++, Ethical Hacking, Keylogger

Ethical Hacking from Scratch to Advanced Technique

11/12/2016 Learning for Life Leave a Comment

Ethical Hacking from Scratch to Advanced Techniqueb
English | Size: 2.48 GB
Category:CBTs


All our information are not on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that’s why we need to be aware about hacking techniques and how easy it is to hack any system and system could be Computer, Network, Wireless, Website, Web Application, Accounts like Email or Social Media. [Read more…]

Security & Hacking Advanced, Ethical Hacking, Scratch, Technique

Ethical Hacking Session Hijacking

11/12/2016 Learning for Life Leave a Comment

Ethical Hacking Session Hijacking
English | Size:177.77 MB
Category:IT security


One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions-the valid interactions of unsuspecting users-in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. [Read more…]

Security & Hacking Ethical Hacking, Hijacking, session

  • « Previous Page
  • 1
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
  • …
  • 38
  • Next Page »
  • Complete Angular Developer: Zero to Mastery | ZeroToMastery
  • DevOps Mastery: Secure Your Internet Traffic with WireGuard VPN | ZeroToMastery
  • The Complete SAP Analytics Cloud Course 2025 | Udemy
  • Data Entry Masterclass – The Ultimate 10 Day Course | Udemy
  • PBS American Experience – Custer’s Last Stand (2012)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in