Language Hacking German

ITPro.tv - Kali Linux  eBooks & eLearning

Posted by FenixN at July 5, 2016
ITPro.tv - Kali Linux

ITPro.tv - Kali Linux
HDRips | MP4/AVC, ~4987 kb/s | 1280x720 | Duration: 14:19:49 | English: AAC, 317 kb/s (2 ch) | 31.5 GB
Genre: Development / Programming / Security / Hacking

Kali Linux is a powerful Linux based operating system specifically built for penetration testing. Viewers will hear a brief overview of the operating system and what kinds of things it can be useful for.

Cisco 640-554: CCNA Security - Implementing Cisco IOS Network Security - IINS  eBooks & eLearning

Posted by FenixN at July 5, 2016
Cisco 640-554: CCNA Security - Implementing Cisco IOS Network Security - IINS

Cisco 640-554: CCNA Security - Implementing Cisco IOS Network Security - IINS
HDRips | MP4/AVC, ~1572 kb/s | 1280x720 | Duration: N/A | English: AAC, 318 kb/s (2 ch) | 10,0 GB
Genre: Development / Programming / Security / Hacking

Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies; the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

ITPro.tv - VMware Certified Professional 6 VCP6-DCV  eBooks & eLearning

Posted by FenixN at July 5, 2016
ITPro.tv - VMware Certified Professional 6 VCP6-DCV

ITPro.tv - VMware Certified Professional 6 VCP6-DCV
HDRips | MP4/AVC, ~552 kb/s | 1280x718 | Duration: 17:39:49 | English: AAC, 112 kb/s (2 ch) | 4.7 GB
Genre: Development / Programming / Security / Hacking

In this episode Wes and Don introduces the viewers to the VMware vSphere suite. They explain difference between Type 1, Type 2 hypervisors and the pros and cons of each. They discusses the multiple editions of vSphere.

CBT Nuggets - Database Fundamentals  eBooks & eLearning

Posted by FenixN at July 5, 2016
CBT Nuggets - Database Fundamentals

CBT Nuggets - Database Fundamentals
HDRips | MP4/AVC, ~500 kb/s | 1280x720 | Duration: 06:52:53 | English: AAC, 64 kb/s (1 ch) | 1,64 GB
Genre: Development / Programming / Security / Hacking

Databases and the data they contain are crucial to every business and application out there today, which is why IT professionals with data-oriented skills are in constant demand! Whether you're looking to pick up basic SQL skills for data analysis or begin your journey to becoming a full-blown database engineer, this course is the starting line as it assumes no prior database or query experience, and will prepare you to delve deeper into the world of database platforms and certifications.

CBT Nuggets - JNCIS-ENT (JN0-343) - OSPF  eBooks & eLearning

Posted by FenixN at July 5, 2016
CBT Nuggets - JNCIS-ENT (JN0-343) - OSPF

CBT Nuggets - JNCIS-ENT (JN0-343) - OSPF
HDRips | MP4/AVC, ~500 kb/s | 1280x720 | Duration: 02:02:10 | English: AAC, 64 kb/s (1 ch) | 496 MB
Genre: Development / Programming / Security / Hacking

This course is the third of seven courses designed to fully prepare you for the JNCIS-ENT(JN0-343) exam.

Hacked Again  eBooks & eLearning

Posted by FenixN at Aug. 13, 2016
Hacked Again

Hacked Again
Audio CDs in MP3 / English: MP3, 32 kb/s (1 ch) | Duration: 03:38:48 | 2016 | ISBN-10: N/A | ASIN: B01BU5YHIY | 60 MB
Genre: Hacking

Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.

Anti-Hacker Security for WordPress 2016  eBooks & eLearning

Posted by naag at Sept. 18, 2016
Anti-Hacker Security for WordPress 2016

Anti-Hacker Security for WordPress 2016
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | Lec: 24 | 1.53 GB
Genre: eLearning | Language: English

The Ultimate Step-By-Step Guide to WordPress Security (includes Lifetime Updates!)

Hack-proofing Your ASP.NET Web Applications  eBooks & eLearning

Posted by FenixN at Sept. 5, 2013
Hack-proofing Your ASP.NET Web Applications

Hack-proofing Your ASP.NET Web Applications
Flash Video | MP4 / AVC, ~335 kb/s | 1024x768 | Duration: 5 hours | English: AAC, 128 kb/s (2 ch) | 1.18 GB
Genre: Development / Programming, Security

Developers are notoriously lax in security. Part of the problem is not understanding how our applications are attacked. To protect your applications you need to BE a hacker. You need to understand how your applications are hacked, and therefore, how to protect them. This course goes over the most common hacking techniques using an array of current attacks to show how a web application is exploited. This course covers exploits and protections for both Web Forms and MVC. Covered are such topics as sql injection, parameter tampering, information leakage, cross-site scripting (xss), cross-site request forgery, encryption, hashing, and denial of service all with applicable demos.

Hacking Online Dating  eBooks & eLearning

Posted by FenixN at May 16, 2016
Hacking Online Dating

Hacking Online Dating
HDRips | MP4/AVC, ~5174 kb/s | 1920x1080 | Duration: 05:11:18 | English: AAC, 102 kb/s (2 ch) | + PDF Guide | 11.3 GB
Genre: Dating, Relationships, Sex

Find a great woman in 60 days using your brain instead of your gonads.

Cyber Security Threat Intelligence Researcher  eBooks & eLearning

Posted by FenixN at June 14, 2016
Cyber Security Threat Intelligence Researcher

Cyber Security Threat Intelligence Researcher
HDRips | MP4/AVC, ~1387 kb/s | 1280x720 | Duration: 6 hours | English: AAC, 160 kb/s (2 ch) | 2.25 GB
Genre: Development / Programming / Security / Hacking

It’s time to put in practice your detective skills! By using Virustotal Intelligence, we teach you how to hunt for malware, how to decompile VBA macros with Didier Steven tools to identify C&C Servers, how to cluster similar samples by running retrohunt, ssdeep or vthash scans, then we introduce Viper framework that help us to correlate and document the full attack flow, finally we walk you through techniques to identify the threat actors behind the attack and how to track their future movements! And finally how to take down the domain by using a technique called Sinkholing!