Complete Wi-Fi Hacking Encyclopedia

Complete Wi-Fi Hacking Encyclopedia
English | Size: 603.83 MB
Category: Tutorial

This tutorial on Wi-Fi hacking elaborates the various techniques by which you can hack the WEP, WPA/WPA2 and WPS Wi-Fi routers. This course will walk you through the processes and steps right from scratch. At the end of the course, you will become a pro-Wi-Fi penetrator. The course teaches caffe-latte attack, ChopChop attack, WPS pixie attack, fragment attack, arp replay attack, de-authentication attack, Fluxion, Wi-Fi Phisher, Linset and a lot more. [Read more…]

572 – Advanced Network Forensics and Analysis

572 – Advanced Network Forensics and Analysis
English | Size: 12.79 GB
Category: CBTs

\572 – Advanced Network Forensics and Analysis\
capstone_data\
exercise_data\
sample_pcaps\
utilities\
vmware_images\
readme.txt
VERSION-FOR572-16-2.txt

\572 – Advanced Network Forensics and Analysis\capstone_data\
for572_capstone_netflow_2016-04.zip
for572_capstone_netflow_for_sof-elk-2016-08-17.zip
for572_capstone_traffic_2016-04.zip
[Read more…]

Cisco ASA image-Latest(EVE,UNL,GNS3)

Cisco ASA image-Latest(EVE,UNL,GNS3)
English | Size: 182.12 MB
Category: Tutorial

Latest Cisco ASA image. Supported on EVE, UNL and GNS3 [Read more…]

Pluralsight Rapid Angular Training

Pluralsight Rapid Angular Training
English | Size: 349.51 MB
Category: Tutorial

This course is aimed at professional developers who are getting into Angular need a quick way to learn its features. Instead of long explanations, this course, Rapid Angular Training, cuts to the chase by quickly exposing you to the Angular features you need to know. You can expect to understand how to use Angular Components to create the visual aspect of your applications, learn about the various services built into Angular, such as routing and HTTP services, and learn how to structure your application into Angular Modules to best organize your code. Newer developers can also use this course to review features learned in the beginner Angular courses here on Pluralsight. By the end of this course, you’ll have a better grasp on Angular, plus this course acts as a great reference course for when you need help in a specific aspect of Angular. [Read more…]

Pluralsight – Building Unsupervised Learning Models with TensorFlow

Pluralsight – Building Unsupervised Learning Models with TensorFlow
English | Size: 340.58 MB
Category: Tutorial;

Unsupervised learning techniques are powerful, but under utilized and often not well understood. In this course, Building Unsupervised Learning Models with TensorFlow, you’ll learn the various characteristics and features of clustering models such as K-means clustering and hierarchical clustering. First, you’ll dive into building a k-means clustering model in TensorFlow. Next, you’ll discover autoencoders in detail, which are a type of artificial neural network used for unsupervised learning. Finally, you’ll explore encodings or representation of data for dimensionality reduction of problems. By the end of this course, you’ll have a better understanding of how you can work with unlabeled data using unsupervised learning techniques. [Read more…]

Windows Server 2016 Active Directory Certificate Services

Windows Server 2016: Active Directory Certificate Services
English | Size:
Category: windowserver

Don’t go to third-party certificate authorities. Active Directory Certificate Services (AD CS) allows organizations to build their own public key infrastructures (PKI) to provide certificate-based authentication, digital signatures, email encryption, and more. With AD CS, you can leverage your existing Active Directory and Group Policy settings, and set up certificates more efficiently and nimbly. Join Scott Burrell in this course, which covers planning, installing, and troubleshooting AD CS in Windows Server 2016. Learn how to create a hierarchy of certificate authorities; issue, manage, and revoke certificates; automate certificate generation and renewal; and improve login security by using certificates in combination with smart cards. These topics map to the Certificate Services domain of the Microsoft exam 70-742, so you’ll also be able to use this course to prepare for MCSA certification. [Read more…]

Packt Publishing – Fundamentals of Continuous Delivery Pipeline

Packt Publishing – Fundamentals of Continuous Delivery Pipeline
English | Size: 610.99 MB
Category: Tutorial

This course follows a step-by-step approach beginning with basics of continuous delivery to automated testing of the delivery pipeline.

The combination of Docker and Jenkins improves your Continuous Delivery pipeline using fewer resources. It also helps you scale up your builds, automate tasks, and speed up Jenkins’ performance with the benefits of Docker containerization. [Read more…]

Packt Publishing – Docker Swarm Advanced – Centralized Logging and Monitoring

Packt Publishing – Docker Swarm Advanced – Centralized Logging and Monitoring
English | Size: 473.24 MB
Category: Tutorial

A hands-on course that will help you use the Docker Swarm Remote API, parse and send logs to a centralized logging, and collect metrics and monitor containers.

This course will guide you through real-world scenarios and by the end, you will be able to use the Docker Swarm Remove API, parse and send logs to a centralized place, and collect metrics and monitor your Docker Swarm cluster. [Read more…]

Packt Publishing – Building Effective Microservices

Packt Publishing – Building Effective Microservices
English | Size: 845.18 MB
Category: Tutorial

A practical course packed with step-by-step instructions, working examples, and helpful advice on getting started with microservices. This comprehensive course is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you.
[Read more…]

O’Reilly Security Conference 2017 – New York, New York

O’Reilly Security Conference 2017 – New York, New York
English | Size: 2.3 GB
Category: Tutorial

The O’Reilly Security Conference provides pragmatic advice on defensive security practices, arming today’s infosec practitioners with real-world tools and techniques.

Looking for new ways to fend off a targeted attack or eject persistent intruders from your environment or recover quickly and effectively from a breach? Want to integrate new technology into your environment, securely and successfully? Need to figure out how to keep your access controls (to data, network, or cloud) effective at scale-without losing your mind? Want to help your management team and BOD understand how your work is crucial to the bottom line? All of the above? There’s no better place than Security. [Read more…]