PluralSight – Information Gathering And Vulnerability Scanning For Comptia Pentest Plus

PluralSight – Information Gathering And Vulnerability Scanning For Comptia Pentest Plus Bookware-KNiSO
English | Size: 345.88 MB
Category: Tutorial


Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification [Read more…]

Packt – Hands-On Network Scanning with Nmap for Network Security

Packt – Hands-On Network Scanning with Nmap for Network Security
English | Size: 692.15 MB
Category: Tutorial


Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. [Read more…]

Packt – Hands-on Network Scanning With NMAP for Network Security

Packt – Hands-on Network Scanning With NMAP for Network Security-iLLiTERATE
English | Size: 692.57 MB
Category: Tutorial


Do you want to enhance your organization’s network security? Are you worried about what could happen if an intruder were to move laterally throughout your network? Internal network security testing is a critical aspect of any security program, while not knowing if an attacker has successfully identified a flaw that has led to a breach could be disastrous. [Read more…]

Linkedin Learning – 3D Scanning: From Mesh to Model Online Class

Linkedin Learning – 3D Scanning: From Mesh to Model Online Class-ZH
English | Size: 1.71 GB
Category: Tutorial


Interested in learning the basics of reverse engineering? In this course, instructor Nick Kloski helps you get up to speed covering the fundamentals of reverse engineering using 3D scan data as a basis. As he details key concepts, Nick steps through how to go from a 3D scan to an optimized model that fits into nearly any product design workflow. He reviews the technologies available for 3D scanning, including photogrammetry and structured light. Using Artec structured light scanners as an example of capture technology, Nick goes into a workflow using inexpensive or free software to perform a complete reverse engineering workflow. See how to convert the scan (a mesh) into an optimized form, and bring it through Fusion 360 to create a solid model that can be flexibly incorporated into product design workflows. [Read more…]

PluralSight – Network Vulnerability Scanning with OpenVAS

PluralSight – Network Vulnerability Scanning with OpenVAS-iNKiSO
English | Size: 205.25 MB
Category: Tutorial


All the penetration testing in the world won’t amount to much if the software and routing configurations used in your infrastructure are buggy. But scanning systems for the tens of thousands of known vulnerabilities – and the dozens more that surface each week – would be simply impossible…without help [Read more…]

Udemy – The Art of Doing Master Networks and Network Scanning

Udemy – The Art of Doing Master Networks and Network Scanning
English | Size: 3.94 GB
Category: Tutorial

The Art of Doing Master Networks and Network Scanning
[Read more…]