Packtpub – Learning Selenium Testing Tools [Video]

Packtpub – Learning Selenium Testing Tools [Video]
English | Size: 270.17 MB
Category: E-learning | others

There is often a need to test your web applications against a vast number of browsers and platforms due to their increasing complexity. For this, you need to build highly reliable and maintainable test automation cases. Here’s where Selenium comes in – it is one of the most easy-to-implement and efficient solutions for this.
[Read more…]

Certified Ethical Hacker v10 Tools

Certified Ethical Hacker v10 Tools
English | Size: 4.80 GB
Category: Tutorual

Lab Tools for CEH v10:
CEHv10 – Lab Prerequisites
CEHv10 Module – Footprinting and Reconnaissance
CEHv10 Module – Scanning Networks
CEHv10 Module – Enumeration
CEHv10 Module – Vulnerability Analysis
CEHv10 Module – System Hacking
CEHv10 Module – Malware Threats
CEHv10 Module – Sniffing [Read more…]

CySA Cert Prep 6 Security Tools and Practices

CySA Cert Prep_ 6 Security Tools and Practices
English | Size: 278.7 MB
Category: Tutorial

Prepare to take and pass the CompTIA Cybersecurity Analyst (CySA+) exam. This course covers essential concepts that can prepare you for the final portion of domain four, Security Architecture and Tool Sets. [Read more…]

SANS 504 2017 Hacker Tools, Techniques, Exploits, and Incident Handling Videos

SANS 504 2017 Hacker Tools, Techniques, Exploits, and Incident Handling Videos
English | Size: 2.31 GB
Category: Tutorual

SEC504: Hacker Tools, Techniques, Exploits and Incident Handling

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. [Read more…]

Pluralsight | Troubleshooting and Tools | Ross Bagurdes

Pluralsight | Troubleshooting and Tools | Ross Bagurdes
English | Size: 537.52 MB
Category: Tutorial

Data networks are full of moving parts, interacting in complex ways. This course will teach you the tools and techniques required to troubleshoot a data network. Skills that are necessary for a network engineer.

There are what feels like a near infinite number of moving parts in a data network, which means that when things go wrong, they often have cascading consequences that can prevent users from accessing the resources required to do their jobs. In this course, Network Troubleshooting and Tools, you will learn techniques and tools for troubleshooting broken network components. First, you will learn how to use command line utilities like ipconfig, ping, nslookup, Nmap, and netstat. Next, you will learn how to use Wireshark to capture and examine an unencrypted website. Finally, you will learn to use iperf to measure the bandwidth of an internal network and use Nmap to run a port scan on a remote server. By the end of this course, you will know-how to troubleshoot and track down network problems, which are critical skills you must have as an engineer. [Read more…]

The Ultimate Hiker’s Gear Guide Tools and Techniques to Hit the Trail (2nd Edition)

The Ultimate Hiker’s Gear Guide: Tools and Techniques to Hit the Trail (2nd Edition)
English | Size: 200.49 MB
Category: Tutorial

Whether you’re a first-time backpacker, an occasional weekend warrior, or a seasoned long-distance trekker, this guide is a must for any backpacking, hiking, or camping trip. Supreme long-distance hiker Andrew Skurka-accomplished adventure athlete, speaker, guide, and writer-shares his knowledge in this essential guide to backpacking gear and skills. Skurka recounts what he’s learned from more than 30,000 miles of long-distance hikes, including the Appalachian, Pacific Crest, and Continental Divide Trails, and the 4,700-mile Alaska-Yukon Expedition. [Read more…]

Robert Dilts Tools For Dreamers

Robert Dilts Tools For Dreamers
English | Size: 232.45 MB
Category: Tutorial

Thomas Edison said that the process of invention is 1% inspiration and 99% perspiration. The implication of this statement is that most creative activity is in fact an incremental process that has a structure and requires organization and constant effort to maintain. In many ways, however, creativity has remained elusive-a seemingly mysterious gift that you either have or you don’t have-rather than a set of skills that can be transferred and managed systematically and explicitly.
[Read more…]

Professional Digital Compositing Essential Tools and Techniques

Professional Digital Compositing Essential Tools and Techniques
English | Size: 2.97 GB
Category: Tutorial

After filming is done, digital compositors move in to manipulate color, retouch, and perform other behind-the-scenes tricks that are necessary to improve or finalize movies, games, and commercials. Now you can learn their secrets with this one-of-a-kind guide to digital compositing.
Professional animator and author Lee Lanier not only draws upon his own experience, he has also combed some of Hollywood’s most active post-production houses in search of the best solutions. Learn valuable techniques, tricks, and more.
[Read more…]

Mastering Chrome Developer Tools

Mastering Chrome Developer Tools
English | Size: 1.39 GB
Category: Tutorial

Most people are aware that Dev Tools exist. Maybe you use them for tweaking CSS or the interactive console. But there is so much more! Let’s look at everything the tools have to offer and how they can make your job a lot easier! Learn how to edit, debug and profile web applications with Chrome Developer Tools. [Read more…]

SANS 504 Hacker Tools, Techniques, Exploits and Incident Handling PDFs (2016) & MP3 (2017)

SANS 504: Hacker Tools, Techniques, Exploits and Incident Handling PDFs (2016) & MP3 (2017)
English | Size: 868.01 MB
Category: CBTs

SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. [Read more…]