LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

Pluralsight – Web App Hacking – Sensitive Data Exposure

05/04/2017 Learning for Life 1 Comment

Pluralsight – Web App Hacking – Sensitive Data Exposure
English | Size: 129.76 MB
Category: Tutorial


This course helps to understand various types of sensitive data exposure in modern web applications. You’ll learn about testing for sensitive data exposure, common problems, and countermeasures.
Sensitive data exposure can lead to very severe consequences (user impersonation, account takeover, disclosure of credentials – to name a few). In this course, Web App Hacking: Sensitive Data Exposure, you’ll learn about various types of sensitive data exposure in modern web applications. First, you’ll see how the attacker can learn the credentials to the database as a result of insecure error handling. Next, you’ll learn how the attacker can read the content of sensitive files, when the files are insecurely processed. [Read more…]

Security & Hacking Data, Hacking, Pluralsight, Sensitive, Web App

Udemy – IT Security Beginner 2.0- Certified Hacking Training

21/03/2017 Learning for Life Leave a Comment

Udemy – IT Security Beginner 2.0- Certified Hacking Training
English | Size: 2.74 GB
Category: Tutorial


Until July 3rd you will get free voucher worth $49 for CISS (Certified IT Security Academy) EXAM!
Network and IT security is no joke. In a matter of seconds, hackers can access closed networks and view files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
[Read more…]

Security & Hacking Beginner 2.0, Certified, Hacking, IT Security, Udemy

Ethical Hacking Ebooks Collection

14/02/2017 Learning for Life Leave a Comment

Ethical Hacking Ebooks Collection
English | Size: 198.57 MB
Category: Programming | HACKING


Black Belt Hacking & Complete Hacking Book
Hackers High School 13 Complete Hacking E-books
Penentration Testing With Backtrack 5
A Beginners Guide To Hacking Computer Systems
Black Book of Viruses and Hacking
[Read more…]

Security & Hacking collection, eBooks, ETHICAL, Hacking

Udemy – Career Hacking: Resume/CV, LinkedIn®, Interviewing, +More

10/02/2017 Learning for Life Leave a Comment

Udemy – Career Hacking: Resume/CV, LinkedIn®, Interviewing, +More
English | Size: 2.29 GB
Category: CBTs


You know how competitive the job market is and also that a great job is key to living a happy life, but you weren’t taught how to job hunt in school. After investing two or three afternoons or evenings learning to master the labor market and your professional presentation skills, you’ll be able to qualify yourself for positions that pay more (one participant qualified themselves for a position paying $20,000/yr. more within 3 weeks), to source opportunities so that you don’t waste your valuable time, and to present yourself articulately, with confidence, and with purpose.
[Read more…]

Self Improvement | MP Career, Hacking, LinkedIn, Resume/CV, Udemy

Pluralsight-Web App Hacking-Cookie Attacks

11/01/2017 Learning for Life Leave a Comment

Pluralsight-Web.App.Hacking-Cookie.Attacks
English | Size: 112.2 MB
Category: HACKING | Security


In this course, you will learn how severe consequences can happen as a result of insecure cookie processing. You will see how cookie attacks work in practice and how to test web applications for various cookie processing flaws. [Read more…]

Security & Hacking Attacks, Cookie, Hacking, Pluralsight, Web App

Pluralsight – Web App Hacking Hacking – Password Reset Functionality

16/12/2016 Learning for Life Leave a Comment

Pluralsight – Web App Hacking Hacking – Password Reset Functionality
English | Size:87.63 MB
Category:Tutorial


This course helps you understand different types of vulnerabilities in password reset functionality. You will learn how to test web applications for various flaws in password reset functionality and how to provide countermeasures for these problems. [Read more…]

Security & Hacking Hacking, Password, Pluralsight, Reset, Web App Hacking

Web App Hacking: Cookie Attacks | Pluralsight

10/11/2016 Learning for Life Leave a Comment

Web App Hacking: Cookie Attacks | Pluralsight
English | Size:
Category:


In this course, you will learn how severe consequences can happen as a result of insecure cookie processing. You will see how cookie attacks work in practice and how to test web applications for various cookie processing flaws.
[Read more…]

Security & Hacking Cookie Attacks, Hacking, Pluralsight, Web App

Udemy – Ethical password hacking and protecting

09/11/2016 Learning for Life Leave a Comment

Udemy – Ethical password hacking and protecting

English | Size: 283.69 MB (297,469,571 Bytes)
Category: Tutorial


“Course is great, in the guessing section, you almost knew my password, immediately changed it to 23 letters, I am very careful now with it, thanks!” – Ziad Ahmed Amer

“I have taken this course twice because there is so much valuable information. I was not aware that hacking software is available by Googling it. I found this to be very disturbing, however, I am grateful that this course is available to educate us on the software that is available to anyone. My gratefulness is extended due to the counter measures that are provided. Numerous scams are exposed for unsuspecting victims of phishing and hacking. Take advantage of this course so that you can be better prepared and secure. The content is informative, and the quality of the production met my expectations.” – Matt Hayes [Read more…]

Security & Hacking Ethical password, Hacking, Protecting, Udemy

The Complete Ethical Hacking Course for 2016/2017!

04/10/2016 Learning for Life Leave a Comment

The Complete Ethical Hacking Course for 2016/2017!
English | Size: 2.49 GB
Category: Security


If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 50 lectures & 9.5 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course: [Read more…]

Security & Hacking 2016/2017, Course, ETHICAL, Hacking, The Complete

Ec-Council Computer Hacking and Forensic Investigator v4

04/10/2016 Learning for Life Leave a Comment

Ec-Council Computer Hacking and Forensic Investigator v4
English | Size: 12.17 GB
Category: Security


Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crimes or misuse, including but not limited to; theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw from an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
[Read more…]

Security & Hacking Computer, EC Council, Forensic, Hacking, Investigator

  • « Previous Page
  • 1
  • …
  • 58
  • 59
  • 60
  • 61
  • 62
  • …
  • 64
  • Next Page »
  • Blair Richards – Get the Girlies Richer
  • Nordic Scott – Creator Classroom
  • Taylor Welch – The Consulting Digest Vault
  • Eve Longfield – Birthday Bundle
  • Jeff Su – Build Your Command Center in Notion

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in