Itpro TV Kali Linux Penetration

ITPro.tv - Kali Linux  eBooks & eLearning

Posted by FenixN at July 5, 2016
ITPro.tv - Kali Linux

ITPro.tv - Kali Linux
HDRips | MP4/AVC, ~4987 kb/s | 1280x720 | Duration: 14:19:49 | English: AAC, 317 kb/s (2 ch) | 31.5 GB
Genre: Development / Programming / Security / Hacking

Kali Linux is a powerful Linux based operating system specifically built for penetration testing. Viewers will hear a brief overview of the operating system and what kinds of things it can be useful for.

ITPro.TV - Certified Ethical Hacker CEH v9  eBooks & eLearning

Posted by FenixN at Jan. 18, 2017
ITPro.TV - Certified Ethical Hacker CEH v9

ITPro.TV - Certified Ethical Hacker CEH v9
HDRips | MP4/AVC, ~3409 kb/s | 1920x1076 | Duration: 33:37:36 | English: AAC, 256 kb/s (2 ch) | 42.9 GB
Genre: Development / Programming / Security

EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.

Learning Path: Kali Linux  eBooks & eLearning

Posted by FenixN at Nov. 5, 2016
Learning Path: Kali Linux

Learning Path: Kali Linux
HDRips | MP4/AVC, ~368 kb/s | 1280x720 | Duration: 08:39:45 | English: AAC, 128 kb/s (2 ch) | 1,91 GB
Genre: Development / Programming

The phrase ‘the best offense is a good defense’ couldn’t be more applicable to the realm of enterprise penetration testing and security. This Learning Path specifically focuses on the broader Kali Linux toolkit, and will provide you with the expertise and exposure you need to fully test and explore your local networks with confidence. Please test responsibly.

ITPro.tv - VMware Certified Professional 6 VCP6-DCV  eBooks & eLearning

Posted by FenixN at July 5, 2016
ITPro.tv - VMware Certified Professional 6 VCP6-DCV

ITPro.tv - VMware Certified Professional 6 VCP6-DCV
HDRips | MP4/AVC, ~552 kb/s | 1280x718 | Duration: 17:39:49 | English: AAC, 112 kb/s (2 ch) | 4.7 GB
Genre: Development / Programming / Security / Hacking

In this episode Wes and Don introduces the viewers to the VMware vSphere suite. They explain difference between Type 1, Type 2 hypervisors and the pros and cons of each. They discusses the multiple editions of vSphere.

Learning Python Web Penetration Testing  eBooks & eLearning

Posted by FenixN at Jan. 11, 2017
Learning Python Web Penetration Testing

Learning Python Web Penetration Testing
HDRips | MP4/AVC, ~436 kb/s | 1280x720 | Duration: 02:50:42 | English: AAC, 128 kb/s (2 ch) | 509 MB
Genre: Development / Programming

Make your applications attack-proof by penetration testing with Python

Learning Path: Python Web Penetration Testing  eBooks & eLearning

Posted by FenixN at Nov. 30, 2016
Learning Path: Python Web Penetration Testing

Learning Path: Python Web Penetration Testing
HDRips | MP4/AVC, ~122 kb/s | 1280x720 | Duration: 4:30:51 | English: AAC, 128 kb/s (2 ch) | 786 MB
Genre: Development / Programming

Build secure web applications with Python.

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]  eBooks & eLearning

Posted by FenixN at Aug. 15, 2016
Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
HDRips | MP4/AVC, ~414 kb/s | 1280x720 | Duration: 02:46:42 | English: AAC, 50 kb/s (2 ch) | + PDF Guides
Size: 627 Mb | Genre: Hacking, Security

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.

Learning Path: Deploying Cassandra  eBooks & eLearning

Posted by FenixN at Jan. 22, 2017
Learning Path: Deploying Cassandra

Learning Path: Deploying Cassandra
HDRips | MP4/AVC, ~461 kb/s | 1280x720 | Duration: 07:11:20 | English: AAC, 128 kb/s (2 ch) | 1,52 GB
Genre: Development / Programming

Get up and running with your own Cassandra database

Natural Language Text Processing with Python  eBooks & eLearning

Posted by FenixN at Jan. 21, 2017
Natural Language Text Processing with Python

Natural Language Text Processing with Python
HDRips | MP4/AVC, ~588 kb/s | 1280x720 | Duration: 01:54:16 | English: AAC, 128 kb/s (2 ch) | 521 MB
Genre: Development / Programming

Even though computers can't read, they're very effective at extracting information from natural language text. They can determine the main themes in the text, figure out if the writers of the text have positive or negative feelings about what they've written, decide if two documents are similar, add labels to documents, and more.