LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

PluralSight – Performing OSINT Gathering on Employee Targets

26/01/2019 Learning for Life Leave a Comment

PluralSight – Performing OSINT Gathering on Employee Targets
English | Size: 411.46 MB
Category: Tutorial


As organizations focus their efforts on protecting their technical infrastructure, far too many leave their most vulnerable assets exposed to attack: their people. In this course, Performing OSINT Gathering on Employee Targets, you will gain the ability to gather and analyze OSINT related to an organization’s workforce members.
[Read more…]

Internet & Networking Employee, Gathering, OSINT, Performing, Pluralsight

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology

30/10/2018 Learning for Life Leave a Comment

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology
English | Size: 238.98 MB
Category: E-learning | HACKING | Microsoft | Networking | Security | others


Finding security bugs after the software has been built can lead to two things: exploitation of the bug in the wild, or spending a fortune to fix it. In this course, Performing Threat Modeling with the Microsoft Threat Modeling Methodology, you will gain the ability to analyze your software and find threats to it before any line of code is written. First, you will learn how to diagram an application to clearly show how all of its parts work together. Next, you will discover how to use diagrams to find threats using techniques such as STRIDE. Finally, you will explore how to document and mitigate threats to your software. When you’re finished with this course, you will have the skills and knowledge of threat modeling needed to anticipate threats and deal with them before they cause damage. [Read more…]

Internet & Networking Microsoft, Modeling, Performing, PS, Threat

Performing Network Vulnerability Scanning with Nexpose

14/09/2018 Learning for Life Leave a Comment

Performing Network Vulnerability Scanning with Nexpose
English | Size: 352.81 MB
Category: Tutorial


In this course, you will learn how to deploy the Nexpose tool against a variety of different targets. You will create your own custom templates and tune them to create specific policies that match the target you are assessing. [Read more…]

Internet & Networking Network, Nexpose, Performing, Scanning, Vulnerability

Performing Malware Analysis on Malicious Documents

14/09/2018 Learning for Life Leave a Comment

Performing Malware Analysis on Malicious Documents
English | Size: 460.24 MB
Category: CBTs


Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain. [Read more…]

Security & Hacking Analysis, Documents, Malicious, Malware, Performing

Lynda – Performing a Technical Security Audit and Assessment

30/04/2017 Learning for Life Leave a Comment

Lynda – Performing a Technical Security Audit and Assessment
English | Size: 632.03 MB
Category: CBTs


This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you’ll know how to determine if your network is secure.
[Read more…]

Security & Hacking Audit, Lynda, Performing, Security, Technical

Pluralsight – Performing and Analyzing Network Reconnaissance

19/03/2017 Learning for Life Leave a Comment

Pluralsight – Performing and Analyzing Network Reconnaissance
English | Size: 1.10 GB
Category: Tutorial


Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
You’ve been tasked as an “Incident Handler” and you are wondering where you start. Attackers typically start with doing a little “reconnaissance” of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it’s done, and what you can do to protect your infrastructures.
[Read more…]

Internet & Networking Analyzing, Network, Performing, Pluralsight, Reconnaissance

Pluralsight – Performing OSINT Gathering on Corporate Targets

09/02/2017 Learning for Life Leave a Comment

Pluralsight – Performing OSINT Gathering on Corporate Targets
English | Size: 804.10 MB
Category: CBTs


Open Source Intelligence (OSINT) gathering is a critical component of penetration testing. This course will teach you how to gather various forms of corporate OSINT, including physical, logical, org chart, electronic, infrastructure, and financial.
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets, you’ll learn foundational knowledge of gathering various forms of corporate OSINT as part of a penetration test. First, you’ll explore tools and techniques for collecting OSINT. [Read more…]

Security & Hacking Corporate, Gathering, OSINT, Performing, Pluralsight

  • « Previous Page
  • 1
  • 2
  • 4-in-1 bundle: MySQL, PostgreSQL, Microsoft SQL & Oracle SQL | Udemy
  • The Complete Guide to Freelancing in 2025 | ZeroToMastery
  • AI Coding with Jupyter AI | ZeroToMastery
  • BBC – The Americas (2025) Part 04: The Amazon
  • CAMP Z: THE AWAKENING-TENOKE

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in