Learning Computer Forensics | Lynda.com

Learning Computer Forensics | Lynda.com
English | Size: 8.16 GB
Category: Computer forensics

Computer forensics is used to find legal evidence in computers or storage devices. Although this course won’t teach you how to become a digital forensics detective, it will cover the basics of this growing (and exciting) technical field. Author Jungwoo Ryoo reviews the basics: the goals of computer forensics, the types of investigations it’s used for, a forensic investigator’s typical toolset, and the legal implications of this type of work. Then he’ll show how to prepare for an investigation; acquire data "live" while the system is running, statically from a hard drive, or from a remote machine; make sure data is kept in its original state with software and hardware write blockers; analyze the data; and create a report of your findings. Jungwoo uses a combination of open-source and commercial software, so you’ll be able to uncover the information you need with the tools that are in your budget. [Read more…]

Cybersecurity Awareness The Internet of Things

Cybersecurity Awareness The Internet of Things
English | Size: 95.96 MB
Category: CBTs

The Internet of Things (IoT) will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the internet, ranging from doorbells and thermostats, to cars and washing machines. These devices can make our lives easier and more efficient, but the technology may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important. [Read more…]

Pluralsight – Dial Plan for Cisco Collaboration (300-070) CIPTV1

Pluralsight – Dial Plan for Cisco Collaboration (300-070) CIPTV1
English | Size: 476.33 MB
Category: CBTs

In today’s fast-paced world, the ability to communicate using real-time IP voice and video technology is a business necessity. Cisco is leading this technological revolution. In this course, Dial Plan for Cisco Collaboration (300-070) CIPTV1, you’ll prepare to pass the Implementing Cisco IP Telephony and Video Part 1 exam. First, you’ll learn what elements make up the dial plan and be able to describe those functions. Next, you’ll explore how to configure these main dial plan components. Finally, you’ll discover how to implement and optimize your dial plan so that it works for your collaboration solution. When you’re finished with this course, you’ll have the skills and knowledge needed to configure the Cisco Unified Communications Manager dial plan to govern how collaboration users reach any destination. [Read more…]

Packt – Fundamentals of Statistical Modeling and Machine Learning Techniques


Packt – Fundamentals of Statistical Modeling and Machine Learning Techniques[/b]
English | Size: 386.6 MB
Genre: eLearning

[Read more…]

Packt – IBM Cognos Framework Manager


Packt – IBM Cognos Framework Manager [/b]
English | Size: 394.3 MB
Genre: eLearning

[Read more…]

Pluralsight – AWS Developer Designing and Developing

Pluralsight – AWS Developer: Designing and Developing
English | Size: 691.71 MB
Category: CBTs

Developing high-performance web applications in the real world requires the use of a cloud provider, and Amazon Web Services is widely recognized as the leader in cloud technology. In this course, AWS Developer: Designing and Developing, you will learn how to design and develop applications that utilize many of the services in AWS. This course focuses on using the AWS SDK to programmatically work with AWS, such as creating EC2 instances, querying DynamoDB tables, and sending messages to SQS queues. When you’re finished with this course, you will be well versed in how to design and develop applications with AWS. [Read more…]

Computer Networking A Top Down Approach 5th Edition

Computer Networking A Top Down Approach 5th Edition
English | Size: 129.26 MB
Category: Comp: Network/Hardware

Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies.
[Read more…]

Cloud Foundry LiveLessons Video Training

Cloud Foundry LiveLessons Video Training
English | Size: 3.30 GB
Category: Tutorial

Note: This is a pre-release version and may not be complete, edited, or finalized, including video post-production editing.

4+ Hours of Video Instruction

Learn now to develop, deploy, and manage applications on Cloud Foundry.

Cloud Foundry LiveLessons provides an introduction to the Cloud Foundry platform. The 11 lessons introduce fundamentals concepts, principles and best practices in Cloud Foundry and cloud-native architecture. You use Cloud Foundry to develop on a public-cloud, deploy and manage applications, integrate with back-services, interact with the Cloud Foundry API, extend the platform with service-brokers, and extend the platform with route-services. [Read more…]

Packt Publishing – CompTIA IT Fundamentals – FC0-U51 – The Total Course

Packt Publishing – CompTIA IT Fundamentals – FC0-U51 – The Total Course
English | Size: 5.15 GB
Category: CBTs

What every user needs to know about basic setup, configuration, and troubleshooting PCs, networks, and mobile devices.

This 5 hour course covers everything you need to know to pass the CompTIA IT Fundamentals Certification FC0-U51 exam.
[Read more…]

Pluralsight – Penetration Testing in Action

Pluralsight – Penetration Testing in Action
English | Size: 177.87 MB
Category: CBTs

This course models real world attacks, allowing you to have a broader and organic understanding of real-world attacks, measuring real business risks. In this course, Penetration Testing in Action, you’ll learn about penetration testing in action. First, you’ll begin with a reconnaissance and search for vulnerabilities on the target web site. This will set up a real-world model. Next, you’ll explore how to exploit an SQL injection vulnerability, download and crack the website password hashes, upload a web shell, backdoor the login page, escalate our privileges, install a rootkit, and get persistent access to the system. [Read more…]