VTC.COM COMPTIA SECURITY PLUS

VTC COM COMPTIA SECURITY PLUS
English | Size: 401.71 MB
Category: CBTs


Course outline
Introduction
About this Course (02:29)
CIA Triad (04:40)
Security Basics (05:15)
Networking
TCP/IP Networking (05:53)
IP Addressing (09:03)
Ports (04:00)
Domain Name Service (07:20)
Network Address Translation (03:19)
Routers & Switches (04:18)
Virtual LANs (04:00)
Routing & Switching Security (03:49)
Network Access Control (04:03)
Network Security Devices
Firewalls (05:37)
[Read more…]

Udemy – The Complete Cyber Security Course: Volume 1

Udemy – The Complete Cyber Security Course: Volume 1
English | Size: 3.25 GB
Category: Tutorial


A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
What am I going to get from this course? [Read more…]

Udemy – Bug Bounty Web Hacking

Udemy – Bug Bounty Web Hacking
English | Size: 1.10 GB
Category: Tutorial


What Will I Learn?
Hack websites
Particiapate in bug bounty programs for hackers
Earn by hacking legally

Requirements
Basic computer and Internet browsing knowledge
One should have a laptop powered with windows or linux OS

Description
In this course you will learn how to hack facebook, google, paypal type of web application, you will not just learn
hacking them, you will even learn how to earn from hacking them and its all 100% legal, Earning by hacking legally is [Read more…]

UDEMY THE COMPLETE ETHICAL HACKING COURSE WITH CERTIFICATION 2017

UDEMY THE COMPLETE ETHICAL HACKING COURSE WITH CERTIFICATION 2017
English | Size: 2.03 GB
Category: CBTs


If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course: [Read more…]

Pluralsight – Security for Hackers and Developers – Reverse Engineering

Pluralsight – Security for Hackers and Developers – Reverse Engineering
English | Size: 302.47 MB
Category: Tutorial


In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it.
[Read more…]

Pluralsight – Malware Analysis Fundamentals

Pluralsight – Malware Analysis Fundamentals
English | Size: 658.94 MB
Category: Tutorial


The ability to analyze malware has become a necessary skill for anyone performing incident response. This course will teach the skills required to properly, quickly, and safely analyze malware by examining both its characteristics and behavior.
Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you’ll gain the ability to analyze malware. First, you’ll explore how to keep yourself and your systems safe when analyzing malware. Next, you’ll discover how to get information on the malware by examining its characteristics. [Read more…]

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits
English | Size: 662.34 MB
Category: Tutorial


Course Overview 1m 19s
Introduction
16m 15s
Introduction to Malware 1m 32s
Demo: Analyzing a Bromium Alert 8m 10s
Security Tool Follow-up 5m 46s
First Malware Analysis Lab 0m 45s
Recognizing the Exploit Vector
15m 19s
[Read more…]

Packt – CompTIA Advanced Security Practitioner (CASP)

Packt – CompTIA Advanced Security Practitioner (CASP)
English | Size: 4.69 GB
Category: Tutorial


CompTIA’s CASP – CompTIA Advanced Security Practitioner , is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk. 7h 57m [Read more…]

O’Reilly – Ethical Hacking

O’Reilly – Ethical Hacking
English | Size: 2.12 GB
Category: Tutorial


Ethical hacking, or security testing, is the art and science of finding the flaws in an organization’s network systems or web applications. Identifying those vulnerabilities can give the organization a fighting chance to fix them before the bad guys find them.
[Read more…]

INE- CCNA Security 210-260

INE- CCNA Security 210-260
English | Size: 3.08 GB
Category: Tutorial


There is a huge gap of Security professionals on the market, so this will be your starting point in the Security world, a complex but fun and challenging track. As being CCNA Security certified, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course will help candidates obtain a deeper understanding of the technologies from the blueprint, which will tremendously help prepare for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, this certification video series is a mix of slides, visual explanations and configuration examples to reinforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. You will also learn how to build a proper study and learning methodology. It’s highly recommended to also watch the “CCNA Security Bootcamp :: 210-260 IINS” course. [Read more…]