LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

Udemy – The Complete Ethical Hacking Course Beginner to Advanced!

08/03/2016 Learning for Life Leave a Comment

Udemy – The Complete Ethical Hacking Course: Beginner to Advanced!

English | Size: 6.63 GB (7,114,184,009 Bytes)
Category: CBTs


The Complete Ethical Hacking Course: Beginner to Advanced!
Learn how to do ethical hacking, penetration testing, web testing, and wifi hacking using kali linux!

Course Description

Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics that are added every month! [Read more…]

Security & Hacking Beginner, Course, Ethical Hacking, The Complete, Udemy

Pluralsight – Ethical Hacking – Hacking Mobile Platforms

21/02/2016 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking – Hacking Mobile Platforms

English | Size: 668.08 MB (700,537,233 Bytes)
Category: CBTs


Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. Some Apple based, some Android based, some Windows based, and guess who gets to make sure everything stays secure?!

Duration: 4h 41m | Video: AVC (.mp4) 1280×720 15fps | Audio: AAC 44.1KHz 2ch | Size: 668 MB
[Read more…]

Security & Hacking Ethical Hacking, Hacking, Mobile Platforms, Pluralsight

Ethical Hacking Malware Threats [Pluralsight]

20/12/2015 Learning for Life Leave a Comment

Ethical Hacking: Malware Threats [Pluralsight]

English | Size: 422.97 MB (443,513,470 Bytes)
Category: CBTs


The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid – an operating system? I’m about 99.999% sure you’ve already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We’ll talk about the various malware types, including viruses, Trojans, and worms. Now, we won’t leave you in despair, we’ll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking. [Read more…]

Security & Hacking Ethical Hacking, Malware, Pluralsight, Threats

Pluralsight – Ethical Hacking – Malware Threats [1 ISO]

16/12/2015 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking – Malware Threats [1 ISO]
English | Size: 423.07 MB
Category: Tutorial


The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid – an operating system? I’m about 99.999% sure you’ve already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We’ll talk about the various malware types, including viruses, Trojans, and worms. Now, we won’t leave you in despair, we’ll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking [Read more…]

Security & Hacking Ethical Hacking, ISO, Malware Threats, Pluralsight

Pluralsight – Ethical Hacking – Hacking Web Servers [1 ISO]

28/11/2015 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking – Hacking Web Servers [1 ISO]
English | Size: 381.79 MB (400,340,992 bytes )
Category: Tutorial


Vulnerabilities in web server implementations are frequently the vector by which online attackers compromise systems.

The impact can range from short periods of outage, to the total disclosure of sensitive internal information. There are many different levels an attacker may focus their efforts on, including the application, the host operating system, and of course the web server itself. Each has their own weaknesses and each must have the appropriate defenses in place to ensure resiliency from online attacks. In this course, we’ll look at various attack vectors in web servers. These include exploiting misconfigured servers, leveraging weaknesses in unpatched environments, compromising weak SSL implementations and much, much more. This course is part of the Ethical Hacking Series. [Read more…]

Security & Hacking Ethical Hacking, Hacking, ISO, Pluralsight, Web Servers

PluralSight – Ethical Hacking Hacking Web Servers

28/11/2015 Learning for Life Leave a Comment

PluralSight – Ethical Hacking: Hacking Web Servers

English | Size: 389.68 MB (408,608,864 Bytes)
Category: Tutorial


Web servers are often the vector through which hackers mount successful online attacks. Understanding the nature of exploitable risks at this level is essential to properly protecting applications from malicious actors. This course looks at a broad range of risks in web server implementations and more importantly, how you can defend against these being compromised by hackers. This course is part of the Ethical Hacking Series.
[Read more…]

Security & Hacking Ethical Hacking, Hacking, Pluralsight, Web Servers

Pluralsight – Ethical Hacking Enumeration

23/09/2015 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking Enumeration

English | Size: 611.38 MB (641,080,233 Bytes)
Category: CBTs


Now that we’ve found out “live” systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more.
[Read more…]

Security & Hacking Enumeration, Ethical Hacking, Pluralsight

Pluralsight – Ethical Hacking – Session Hijacking

23/09/2015 Learning for Life Leave a Comment

Pluralsight – Ethical Hacking – Session Hijacking

English | Size: 406.46 MB (426,206,627 Bytes)
Category: CBTs


This course is part of the 20 course Ethical Hacking Series. Session persistence is a fundamental concept in information systems. On the web, for example, which is dependent on the stateless HTTP protocol, session persistence is a key component of features ranging from shopping carts to the ability to logon. At a lower level on the network tier, the TCP protocol relies on sessions for communication between machines such as a client and a server. The confidentiality and integrity of this communication can be seriously impacted by a session hijacking attack. Learning how to identify these risks is an essential capability for the ethical hacker. Systems are frequently built insecurely and readily expose these flaws. Conversely, the risks are often easy to defend against by implementing simple patterns within the application. This course walks through both the risks and the defenses. [Read more…]

Security & Hacking Ethical Hacking, Pluralsight, Session Hijacking

Ethical Hacking Understanding Ethical Hacking

03/09/2015 Learning for Life Leave a Comment

Ethical Hacking: Understanding Ethical Hacking
English | Size: 748.74 MB (785,109,980 Bytes)
Category: CBTs


This course is part of the 20 course Ethical Hacking Series. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a “Security Profiler.” You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. [Read more…]

Security & Hacking Ethical Hacking, Understanding

Udemy – IT Security and Ethical Hacking [2015, ENG]

02/09/2015 Learning for Life 3 Comments

Udemy – IT Security and Ethical Hacking [2015, ENG]
English | Size: 17.51 GB (18,801,880,271 Bytes)
Category: Tutorial


Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.
[Read more…]

Security & Hacking 2015, ENG, Ethical Hacking, IT Security, Udemy

  • « Previous Page
  • 1
  • …
  • 35
  • 36
  • 37
  • 38
  • Next Page »
  • Integration Testing with Testcontainers: Java & Spring Boot | Udemy
  • ZorinOS – The Linux alternative to Windows and macOS | Udemy
  • Automate Your Most Annoying Excel Tasks With Simple Code | Udemy
  • The Ultimate Google Analytics Course For Beginners 2025 | Udemy
  • Cloud Architecture: Advanced Concepts (2025) | LinkedIn

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in