EC-Council - Certified Network Defender (CND) Complete Course English | Size: 10.96 GB Category: E-learning | Networking | Security Certified Network Defender Certification The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc.
Digital Forensics and Cyber Crime with Kali Linux Fundamentals English | Size: 24.62 GB | MP4 Genre: eLearning Why is digital forensics so important? In today's digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond.
INE Wireshark Advanced Technologies-TUTOR English | Size: 2.27 GB Category: CBTS
Wireshark Advanced Technologies
2018-04-02: I N F O: This Wireshark Advanced Technologies course, taught by bestselling author and trainer Robert Shimonski, features nearly 11 hours of training and is designed to provide network administrators with the practical skills needed to solve problems, analyze data, view the inner workings of packets, and perform advanced configurations to solve tough issues. In this course, Rob covers more advanced troubleshooting techniques, how to use Wireshark with Cisco networking equipment, and continues to prep you for the Wireshark Certified Network Analyst (WCNA) certification. Course Duration: 10hrs 48min
Skillshare: Illustration with Draplin: Iterating with Shape, Style, and Color English | Size: 2.4GB Category: Tutorial
Minor tweaks add up to big breakthroughs in this in-depth class all about the subtle skill of iteration. Join Aaron as he dives into his personal illustration process, using shape, style, and color to push his creativity to new heights with every project. You'll illustrate a person, place, and thing to create an ode to your hometown, evolving each individual piece along the way.
LinkedIn - PHP Object-Oriented Programming with Databases English | Size: 713.58 MB Category: Tutorial
Learn how to interact with databases using object-oriented PHP code. In this intermediate course, Kevin Skoglund teaches powerful PHP techniques that streamline interactions with MySQL databases. PHP developers will benefit from the efficient, well-organized, reusable, and easy-to-understand code that object-oriented programming (OOP) offers. Kevin shows how OOP techniques can optimize database queries, help manage sessions, and simplify user logins. He provides practical examples and tips to create objects that interact seamlessly with database rows, to build a content management system with HTML forms, to authenticate users, and to break up long lists of database data into smaller pages.
Jukebox Saturday Night (April 7th 2018) English | Size: 500.05 MB Category: Music
The last 2 episodes have been repeats from January 2018.
Host Justin Coombes-Pearce introduces video clips from the 50s, 60s, 70s & 80s This weeks clips are:- James Brown - Sex Machine Cliff Richard And The Shadows - The Young Ones Leo Sayer - More Than I Can Say Barry White - My First My Last My Everything Doobie Brothers - What A Fool Believes
ITPRO TV - General Data Protection Regulation (GDPR) English | Size: 3.13 GB Category: Tutorial
In April of 2016, the European Commission published a data protection package to reform, modernize and harmonize European data protection law. The cornerstone of the package is the General Data Protection Regulation (GDPR) which will replace the 1995 Data Protection Directive and, in the UK, the Data Protection Act 1998. This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organizations understand the new legal framework in the EU. It is for those who have day-to-day responsibility for data protection.
INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas English | Size: 344.78 MB Category: CBTs
In the enumeration module you will learn how to use the discovered services and protocols running in your target network to gather more details and difficult to obtain intelligence prior to the actual System Hacking phase. This module is the last of the preliminary investigative phases in the hacking cycle and with it ends the information gathering which will now empower us to narrow down our targets and start planning our attacks against specific technologies and choose the appropriate hacking tools we will learn about in the remainder of this course.