LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

Udemy – A to Z Ethical Hacking Course (2016)

06/12/2016 Learning for Life Leave a Comment

Udemy – A to Z Ethical Hacking Course (2016)
English | Size: 6.73 GB
Category:E-learning


As name says course covers A to Z content of ethical hacking, Course is divided into 4 sections basics, web hacking, miscellaneous and wireless hacking. [Read more…]

Security & Hacking 2016, A to Z, Course, Ethical Hacking, Udemy

Lynda.com Ethical Hacking Penetration Testing Tutorial

01/12/2016 Learning for Life Leave a Comment

Ethical Hacking Penetration Testing Tutorial
English | Size:177.09 MB
Category:Tutorial


You’ve done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of “pen” tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider’s perspective to your IT security efforts. [Read more…]

Security & Hacking Ethical Hacking, Lynda.com, Penetration, Testing, Tutorial

Udemy – Ethical Hacking For Beginners-Learn Facebook & Phone hacking

10/11/2016 Learning for Life Leave a Comment

Udemy – Ethical Hacking For Beginners-Learn Facebook & Phone hacking
English | Size: 1.86 GB
Category: HACKING


Learn how to hack systems, phones and Facebook users with Kali Linux online using client side exploitation techniques.

You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!
[Read more…]

Security & Hacking Beginners, Ethical Hacking, Facebook, Learn, Udemy

Play by Play: Ethical Hacking – Deconstructing the Hack | Pluralsight

28/10/2016 Learning for Life Leave a Comment

Play by Play: Ethical Hacking – Deconstructing the Hack | Pluralsight
English | Size: 820.45 MB
Category: CBT


In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don’t just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited. [Read more…]

Security & Hacking Deconstructing the Hack, Ethical Hacking, Play by Play, Pluralsight

Pluralsight – Ethical Hacking (Entire Series)

06/10/2016 Learning for Life 4 Comments

Pluralsight – Ethical Hacking (Entire Series)

English | Size: 10.71 GB (11,498,070,558 Bytes)
Category: CBTs


Compilation of all courses from the Pluralsight Ethical Hacking series. See this page for links to all the individual courses. Also includes 2 Pluralsight “Play-by-Play” courses related to Ethical Hacking.
[Read more…]

Security & Hacking Entire Series, Ethical Hacking, Pluralsight

Pluralsight – Play by Play – Ethical Hacking with Troy Hunt

22/09/2016 Learning for Life Leave a Comment

Pluralsight – Play by Play – Ethical Hacking with Troy Hunt
English | Size:
Category:

s
Delve into some of today’s most common attacks and vulnerabilities with web security expert Troy Hunt.

In this Play by Play, Troy Hunt will show how easy it is for a victim to fall prey to an attack. When all is said and done, you should understand how important it is to be prepared for these attacks and know the right steps to mitigate them in the first place.
[Read more…]

Security & Hacking Ethical Hacking, Play by Play, Pluralsight, Troy Hunt

Ethical Hacking Scanning Networks [Video]

12/09/2016 Learning for Life Leave a Comment

Ethical Hacking Scanning Networks [Video]
English | Size: 268.31 MB
Category: HACKING | Networking | Security


After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization’s infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03 Scanning Networks domain. [Read more…]

Internet & Networking Ethical Hacking, Networks, Scanning, Video

Pluralsight – Ethical Hacking Cloud Computing

09/09/2016 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking: Cloud Computing

English | Size: 414.02 MB (434,129,913 Bytes)
Category: CBTs


“The Cloud” is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn’t more secure or less secure, rather it’s differently secure; it strengthens security profiles in many areas whilst presenting new risks in others. Then again, many of the traditional risks in software don’t change at all. In this course, we’ll look at the ways the cloud can enable us to build more secure software than ever, whilst also identifying where it can leave us more vulnerable. We’ll also look at “hardening” the cloud” how can we take this new computing paradigm and use it to strengthen our security profiles? This course is part of the Ethical Hacking Series.
[Read more…]

Internet & Networking Cloud, Computing, Ethical Hacking, Pluralsight

Ethical Hacking: Buffer Overflow | Pluralsight

04/09/2016 Learning for Life 1 Comment

Ethical Hacking: Buffer Overflow | Pluralsight

English | Size: 481.07 MB (504,437,089 Bytes)
Category: CBTs


Understanding buffer overflows can be very difficult for non-programmers and IT professionals unless someone takes the time to really explain the basics. This course does that by not assuming you are a programmer or computer scientist.
[Read more…]

Security & Hacking Buffer, Ethical Hacking, Overflow, Pluralsight

Ethical Hacking Enumeration

04/09/2016 Learning for Life Leave a Comment

Ethical Hacking: Enumeration

English | Size: 298.67 MB (313,182,708 Bytes)
Category: Tutorial


Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration-identifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer. [Read more…]

Security & Hacking Enumeration, Ethical Hacking

  • « Previous Page
  • 1
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • Next Page »
  • Udemy – Introduction to Landscapes in Unreal Engine 5
  • Udemy – 50 days of LeetCode in python Algorithms coding interview
  • Udemy – TOTAL: CompTIA Security+ Certification Course + Exam SY0-701
  • Udemy – A Deep Dive into LLM Red Teaming
  • PBS American Experience – Abraham and Mary Lincoln: A House Divided (2001) Part 2: We Are Elected

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in