LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

PACKT THREAT AND VULNERABILITY ASSESSMENT FOR ENTERPRISES PROPER

23/03/2019 Learning for Life Leave a Comment

PACKT THREAT AND VULNERABILITY ASSESSMENT FOR ENTERPRISES PROPER
English | Size: 2.09 GB
Category: Tutorial


The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.

Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. [Read more…]

Security & Hacking Assessment, Enterprises, Packt, Threat, Vulnerability

Packt Cyber Threat Hunting Jan 2019

14/02/2019 Learning for Life Leave a Comment

Packt | Cyber Threat Hunting | Jan 2019
English | Size: 978.12 MB
Category: Tutorial


Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them. [Read more…]

Security & Hacking Cyber, Hunting, Jan 2019, Packt, Threat

INE – Firepower Threat Defense (FTD)

04/12/2018 Learning for Life Leave a Comment

INE – Firepower Threat Defense (FTD)
English | Size: 2.11 GB
Category: Tutorial


This course will cover an introduction through advanced understanding of Cisco Firepower and Cisco Firepower Threat Defense. All Firepower policies are covered in detail, as well as how to configure and implement Firepower Threat Defense devices. [Read more…]

Internet & Networking Defense, FirePOWER, FTD, INE, Threat

Firepower Threat Defense (FTD) – Part I.zip

03/12/2018 Learning for Life Leave a Comment

Firepower Threat Defense (FTD) – Part I.zip
English | Size: 2.11 GB
Category: Networking | Security


Course Description
This course will cover an introduction through advanced understanding of Cisco Firepower and Cisco Firepower Threat Defense. All Firepower policies are covered in detail, as well as how to configure and implement Firepower Threat Defense devices. [Read more…]

Security & Hacking Defense, FirePOWER, FTD, Part I.zip, Threat

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology

30/10/2018 Learning for Life Leave a Comment

PS – Performing Threat Modeling with the Microsoft Threat Modeling Methodology
English | Size: 238.98 MB
Category: E-learning | HACKING | Microsoft | Networking | Security | others


Finding security bugs after the software has been built can lead to two things: exploitation of the bug in the wild, or spending a fortune to fix it. In this course, Performing Threat Modeling with the Microsoft Threat Modeling Methodology, you will gain the ability to analyze your software and find threats to it before any line of code is written. First, you will learn how to diagram an application to clearly show how all of its parts work together. Next, you will discover how to use diagrams to find threats using techniques such as STRIDE. Finally, you will explore how to document and mitigate threats to your software. When you’re finished with this course, you will have the skills and knowledge of threat modeling needed to anticipate threats and deal with them before they cause damage. [Read more…]

Internet & Networking Microsoft, Modeling, Performing, PS, Threat

CySA+ Cert Prep: 1 Threat Management | Mike Chapple | LYNDA

13/05/2018 Learning for Life Leave a Comment

CySA+ Cert Prep: 1 Threat Management | Mike Chapple | LYNDA
English | Size: 540.79 MB
Category: CBTs


Earning the CompTIA Cybersecurity Analyst (CySA+) certification demonstrates to potential employers that you have a solid understanding of how to tackle cybersecurity threats using a behavioral analytics-based approach. This course-the first installment in the CySA+ Cert Prep series-can provide you with a foundational understanding of threat management practices, and prepare you to confidently approach the Threat Management domain of the CySA+ exam. Instructor Mike Chapple includes coverage of cybersecurity threats and controls, reconnaissance techniques, penetration testing, reverse engineering, and security analytics. He also covers network security and endpoint security topics. [Read more…]

Internet & Networking Cert Prep, CySA, Management, Mike Chapple, Threat

Pluralsight – Threat Modeling Fundamentals

07/09/2017 Learning for Life Leave a Comment

Pluralsight – Threat Modeling Fundamentals`
English | Size: 155.02 MB
Category: Tutorial


Security is important. You want to build more secure applications. You don’t want to bolt on security afterwards, but you want to make sure it’s there from the get-go – for each project. Threat Modeling is a growing field of interest for software developers, architects and security professionals. With good reason, as this can be a very effective way to accomplish those goals. In this course, Threat Modeling Fundamentals, you’ll dive deeper into the fundamentals of threat modeling including a short exercise to help you follow along. [Read more…]

Gracphics & Multimedia Fundamentals, Modeling, Pluralsight, Threat

Pluralsight – Threat Intelligence: The Big Picture

18/08/2017 Learning for Life Leave a Comment

Pluralsight – Threat Intelligence: The Big Picture
English | Size: 159.46 MB
Category: Tutorial


Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you’ll learn the foundational knowledge of Cyber Threat Intelligence. First, you’ll explore how to classify indicators of compromise using industry standard methodologies. Next, you’ll discover how to search for and consume existing intelligence about the threats that you’re dealing with. Finally, you’ll cover how to maintain the quality of malware detections with a solid set of best practices. When you’re finished with this course, you’ll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.
[Read more…]

Security & Hacking Intelligence, Pluralsight, The Big Picture, Threat

Pluralsight – Threat Modeling – The Big Picture

21/07/2017 Learning for Life Leave a Comment

Pluralsight – Threat Modeling – The Big Picture
English | Size: 106.65 MB
Category: CBTs


In this course, you’ll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
Whether you’re a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you’re protecting it from. In this course, Threat Modeling: The Big Picture, you’ll be provided with a high-level overview of the ins and outs of threat modeling. First, you’ll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to.
[Read more…]

Security & Hacking Modeling, Pluralsight, The Big Picture, Threat

CyberTraining365-CTIR-Cyber Security Threat Intelligence Researcher

27/06/2016 Learning for Life Leave a Comment

CyberTraining365-CTIR-Cyber Security Threat Intelligence Researcher

English | Size: 2.26 GB (2,424,902,657 Bytes)
Category: CBTs


It’s time to put in practice your detective skills! By using Virustotal Intelligence, we teach you how to hunt for malware, how to decompile VBA macros with Didier Steven tools to identify C&C Servers, how to cluster similar samples by running retrohunt, ssdeep or vthash scans, then we introduce Viper framework that help us to correlate and document the full attack flow, finally we walk you through techniques to identify the threat actors behind the attack and how to track their future movements!
And finally how to take down the domain by using a technique called Sinkholing! [Read more…]

Security & Hacking CTIR, Cyber, CyberTraining365, Security, Threat

  • « Previous Page
  • 1
  • …
  • 11
  • 12
  • 13
  • Introduction to Excel Automation: Excel Macros and VBA | ZeroToMastery
  • Create Realistic Industrial Environments with Blender 3D and Eevee
  • Udemy – Complete Road Map for Data Science & ML for Begineers – Akhil Vydyula (May 2025)
  • Udemy – Master Network Automation with Python for Network Engineers
  • New Masters Academy / NMA – Advanced Gesture Drawing with Glenn Vilppu

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in