Pluralsight – Putting PowerShell to Work


Pluralsight – Putting PowerShell to Work[/b]
English | Size: 818.4 MB
Genre: eLearning

[Read more…]

Packt Publishing – The Complete Ethical Hacking Series – Honeypots, IDS and FW’s

Packt Publishing – The Complete Ethical Hacking Series – Honeypots, IDS and FW’s
English | Size: 535.23 MB
Category: Tutorial

A real-world scenario based video course that takes a gradual learning curve, building up your knowledge about security, right from scratch.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. [Read more…]

Packt Publishing – Fundamentals of IoT Security

Packt Publishing – Fundamentals of IoT Security
English | Size: 502.64 MB
Category: Tutorial

The Internet of things is the network of physical objects or things embedded with electronics, software, sensors and network connectivity which enables these objects to collect and exchange data.

In this volume, Fundamentals of IOT Security, we will cover fundamental aspects of the Internet of Things, to include a review of use cases across various industries, we will discuss common IoT components and technologies to provide a baseline understanding of the systems and devices that you need to protect.We will also review common security architectures that can be applied to IoT systems, and discusses regulations and standards that apply to securing IoT systems.We will study of IOT components such as the IoT (hardware, real-time operating systems (RTOS), Application Programming Interfaces (APIs), messaging and communication protocols and backend services. We will discuss threats to IoT systems, attack vectors, current security regulations and standards and common security architectures. We will examine Privacy by Design (PbD) principles and walk through an example Privacy Impact Assessment (PIA).
[Read more…]

Packt Publishing – Complete Ethical Hacking Series – Pen Testing the Right Way

Packt Publishing – Complete Ethical Hacking Series – Pen Testing the Right Way
English | Size: 337.94 MB
Category: Tutorial

A real-world scenario based video course that takes a gradual learning curve, building up your knowledge about security, right from scratch.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. [Read more…]

Packt Publishing – PowerShell 5 Recipes


Packt Publishing – PowerShell 5 Recipes[/b]
English | Size: 1.56 GB
Genre: eLearning

[Read more…]

Packt Publishing – Learning Path: Windows Administration using PowerShell 5 and Hyper-V 2016


Packt Publishing – Learning Path: Windows Administration using PowerShell 5 and Hyper-V 2016[/b]
English | Size: 1.75 GB
Genre: eLearning

[Read more…]

O’Reilly – Developing SQL Databases – Exam 70-762 Certification


O’Reilly – Developing SQL Databases – Exam 70-762 Certification[/b]
English | Size: 1.76 GB
Genre: eLearning

[Read more…]

Offensive Security – AWE 1.1,2 – CTP – ASWP – PWB – PWK

Offensive Security – AWE 1.1,2 – CTP – ASWP – PWB – PWK
English | Size: 2.95 GB
Category: Linux | Security

Offensive-Security – 101
Offensive-Security – AWE – Advanced Windows Exploitation 1.1
Offensive-Security – AWE – Advanced Windows Exploitation 2.0
Offensive-Security – CTP – Cracking the Perimeter 1.0
[Read more…]

O’Reilly – The Browser Hacker’s Guide to Instantly Loading Everything

O’Reilly – The Browser Hacker’s Guide to Instantly Loading Everything
English | Size: 394.63 MB
Category: CBTs

Venture deep into the belly of the browser to uncover the secret to instantly loading anything-backed by data. Addy Osmani explains how to use preload, prefetch, preconnect, HTTP/2 server push, service workers, and more and how to ship JavaScript bundles on mobile that don’t break the bank as he shares data-driven techniques and performance patterns for efficiently loading content instantly. [Read more…]

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA
English | Size: 201.63 MB
Category: Tutorial

Ransomware is a growing threat, and it’s imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomware- the devastating WannaCry malware-using this case study to help you better understand how malware functions.
[Read more…]