Posts
Latest Posts

[pluralsight.com] Ethical Hacking: Hacking Wireless Networks [2016, ENG]

  • · 
  • · mina
Insights into WirelessInsights into WirelessNew Terms to LearnAdvantages & DisadvantagesTypes of Wi-Fi NetworksWi-Fi StandardsWi-Fi Authentication ModesChalkingAntenna TypesSummaryEncryption in WirelessEncryption in WirelessWEP EncryptionWPA & WPA2 EncryptionBreaking EncryptionDefending Against CrackingSummaryThreats from WirelessThreats from WirelessTypes of AttacksAttack on the APAttack on the ClientSummaryThe Methodology of Hacking WirelessThe Method of Hacking WirelessWi-Fi DiscoveryGPS MappingWireless Traffic AnalysisLaunching AttacksLet's Go Look-ngCracking Wi-Fi EncryptionLet's See How Much Damage We Can Do!SummaryHacking BluetoothHacking BluetoothThe ThreatsNew TermsAll About

[ITPro TV]Computer Hacking Forensics Investigator (CHFI) v8 [2017, ENG]

  • · 
  • · mina
Contents:Computer_Forensics_in_Today's_World:0.0 - Overview (195645124)1.0 - Computer Forensics in Todays World2.0 - Computer Forensics in Todays World Part 23.0 - Computer Forensics in Todays World Part 3Computer_Forensics_Investigation_Process:20.0 - Investigative Process21.0 - Investigative Process Part 222.0 - Investigative Process Part 323.0 - Investigative Process Part 4Searching_and_Seizing_Computers:30.0 - Search and Seizure of a Computer31.0 - Search and Seizure of a Computer32.0 - Search and Seizure of a Computer Part 333.0 - Search and Seizure of a Computer Part 4Digital Evidence:40.0 - Digital Evidence41.0 - Digital Evidence Part 2First Responder Procedures:50.0 - First Responder

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

  • · 
  • · mina
[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG] Contents:01 - Course Introduction02 - Business Influences and Associated Security Risks03 - Risk Management04 - Business Model Strategies05 - Integrating Diverse Industries06 - Third Party Information Security and Providers07 - Internal and External Influences08 - Impact of De-Perimeterization09 - Risk Mitigation Planning - Strategies and Controls100 - Secure Storage Management Techniques101 - LUN Masking_Mapping and HBA Allocation102 - Replication and Encryption Methods103 - Network and Security Components-Concepts-Security Architectures104 - Remote Access Protocols105 - IPv6 and Transport Encryption106 - Network Authenticat

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

  • · 
  • · mina
[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG] Contents:01 - Course Introduction02 - Business Influences and Associated Security Risks03 - Risk Management04 - Business Model Strategies05 - Integrating Diverse Industries06 - Third Party Information Security and Providers07 - Internal and External Influences08 - Impact of De-Perimeterization09 - Risk Mitigation Planning - Strategies and Controls100 - Secure Storage Management Techniques101 - LUN Masking_Mapping and HBA Allocation102 - Replication and Encryption Methods103 - Network and Security Components-Concepts-Security Architectures104 - Remote Access Protocols105 - IPv6 and Transport Encryption106 - Network Authenticat

[Packt] CompTIA Advanced Security Practitioner (CASP) [2017, ENG]

  • · 
  • · mina
CompTIA Advanced Security Practitioner (CASP) Contents:01 - Course Introduction02 - Business Influences and Associated Security Risks03 - Risk Management04 - Business Model Strategies05 - Integrating Diverse Industries06 - Third Party Information Security and Providers07 - Internal and External Influences08 - Impact of De-Perimeterization09 - Risk Mitigation Planning - Strategies and Controls100 - Secure Storage Management Techniques101 - LUN Masking_Mapping and HBA Allocation102 - Replication and Encryption Methods103 - Network and Security Components-Concepts-Security Architectures104 - Remote Access Protocols105 - IPv6 and Transport Encryption106 - Network Authentication Methods107 - 802.

[Cisco Press / Omar Santos] Cisco Firepower and Advanced Malware Protection LiveLessons [2016, ENG]

  • · 
  • · mina
Cisco Firepower and Advanced Malware Protection LiveLessons Lesson 1: Fundamentals of Cisco Next-Generation Network SecurityLesson 2: Introduction and Design of Cisco ASA with FirePOWER ServicesLesson 3: Configuring Cisco ASA with FirePOWER ServicesLesson 4: Cisco AMP for NetworksLesson 5: Cisco AMP for EndpointsLesson 6: Cisco AMP for Content SecurityLesson 7: Configuring and Troubleshooting the Cisco Next-Generation IPS AppliancesLesson 8: Firepower Management Center  

[O'Reilly Media / Infinite Skills / Brian Sletten] Understanding the Cisco ASA Firewall Training Video [2016, ENG]

  • · 
  • · mina
Understanding the Cisco ASA Firewall Training Video 01. Introduction0101Welcome To The Course0102 About The Author0103 How To Access Your Working Files02. Introduction To The Firewall0201 ASA Hardware Models0202 CLI Basics Part - 10203 CLI Basics Part - 203. Basic Configuration0301 Interface Configuration0302 5505 Switchports0303 Security Levels0304 Same Security Level0305 The Course Lab Environment0306 Implementing Access Lists Part - 10307 Implementing Access Lists Part - 20308 Introduction To NAT0309 Fixup Protocol ICMP0310 Management Access Part - 10311 Management Access Part - 20312 Firewall Local DHCP Server0313 A Basic Firewall Configuration Part - 10314 A Basic Firewall Configuration

[CBT Nuggets / Keith Barker] Cisco CCNP Security 300-207 SITCS [2016, ENG]

  • · 
  • · mina
Cisco CCNP Security 300-207 SITCS 1. SITCS Welcome (3 min)2. WSA Overview (10 min)3. Bootstrapping the WSA (12 min)4. Deploy and License a WSA VM (10 min)5. WSA Identities (6 min)6. WSA Access Policy (13 min)7. WSA User Authentication (10 min)8. Directing Traffic to the WSA (6 min)9. WCCP Router Configuration (12 min)10. WCCP ASA Configuration (12 min)11. Cisco Legacy IPS and IDS Concepts (9 min)12. IDM Interface (13 min)13. ESA Overview (9 min)14. Email Terminology (7 min)15. ESA VM Install (6 min)16. Licensing the ESA (2 min)17. ESA HATs, RATs, and Listeners (9 min)18. Verifying HATs and RATs (5 min)19. E-Mail Policies (6 min)20. ESA Message Tracking (5 min)21. ESA Trace Tool (1 min)22. Cl

[Pluralsight.com / David Davis] vSphere 6 Foundations: Availability and Resource Management [2016, ENG]

  • · 
  • · mina
Introduction3m 37sIntroduction 3m 37sCreate and Configure VMware Clusters1h 14mWhat This Module Covers 2m 35svSphere HA and DRS Overview 14m 40sDetermine How DRS and HA are Applicable to an Environment 2m 17sCreate/Delete a DRS/HA Cluster 7m 41sAdd/Remove ESXi Hosts from a DRS/HA Cluster 4m 13sAdd/Remove Virtual Machines from a DRS/HA Cluster 2m 28sConfigure Storage DRS 4m 8sConfigure Enhanced vMotion Compatibility 3m 23sMonitor a DRS/HA Cluster 13m 25sConfigure Migration Thresholds for DRS and Virtual Machines 4m 30sConfigure Automation Levels for DRS and Virtual Machines 1m 55sEnable/Configure/Disable Host Power Management and DPM 5m 33sEnable/Disable Host Monitoring 2m 2sEnable/Configure/

[CBT Nuggets / Steve Caseley] ISACA CISA 2016 [2016, ENG]

  • · 
  • · mina
1. CISA Overview (7 min)2. The Process of Auditing Information Systems (11 min)3. IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics (9 min)4. Audit Risk Assessment (15 min)5. Business Processes (5 min)6. Control Objectives (8 min)7. Audit Planning and Management (9 min)8. Laws and Regulations (3 min)9. Evidence (11 min)10. Sampling Methodologies (9 min)11. Reporting and Communications (5 min)12. Audit Quality Assurance (3 min)13. Types of Audits (5 min)14. Governance and Management of IT (8 min)15. Information Systems Strategy (10 min)16. Standards, Governance and Frameworks (9 min)17. IT Organization (6 min)18. Legal Compliance (8 min)19. Enterprise Architecture (4 mi

[pluralsight.com] Ethical Hacking: Hacking Wireless Networks [2016, ENG]

  • · 
  • · mina
Insights into WirelessInsights into WirelessNew Terms to LearnAdvantages & DisadvantagesTypes of Wi-Fi NetworksWi-Fi StandardsWi-Fi Authentication ModesChalkingAntenna TypesSummaryEncryption in WirelessEncryption in WirelessWEP EncryptionWPA & WPA2 EncryptionBreaking EncryptionDefending Against CrackingSummaryThreats from WirelessThreats from WirelessTypes of AttacksAttack on the APAttack on the ClientSummaryThe Methodology of Hacking WirelessThe Method of Hacking WirelessWi-Fi DiscoveryGPS MappingWireless Traffic AnalysisLaunching AttacksLet's Go Look-ngCracking Wi-Fi EncryptionLet's See How Much Damage We Can Do!SummaryHacking BluetoothHacking BluetoothThe ThreatsNew TermsAll About

[Udemy.com / Kamlakar Kumar] Learn Networking basics : for Python Beginners [2016, ENG]

  • · 
  • · mina
Section 1: Basics practice examples Lecture 1 Introduction 09:01 Lecture 2 Necessary software 04:21 Lecture 3 APK1 # 2 08:05 Lecture 4 1 - # PART3 07:28 Lecture 5 1 - # part4 06:13 Lecture 6 2 - # part1 06:54 Lecture 7 2 - # part2 05:28 Lecture 8 2 - # part3 02:59 Lecture 9 2 - # part4 01:40 Lecture 10 3 - # part1 04:37 Lecture 11 3 - # part2 12:42 Lecture 12 3 - # part3 01:48 Lecture 13 3 - # part4 11:59 Lecture 14 4 - # part1 04:03 Lecture 15 4 - # part2 06:13 Lecture 16 4 - # part3 07:59 Lecture 17 4 - # part4 09:57 Lecture 18 4 - # part5 06:46 Lecture 19 5 - # part1 01:47 Lecture 20 5 - # part2 04:02 Lecture 21 5 - # part3 12:13 Lecture 22 5 - # part4 06:00 Lecture 23 5 - # part5 02:29 L

[Udemy Odoo 8 Installation for intermediate Server Skill s

  • · 
  • · mina
├── 01 Introduction Where to get started│ └── 001 Introduction.mp4├── 02 Optional Background Knowledge│ └── 001 Background Knowledge Vim and Editing Files on a Server.mp4├── 03 Install Odoo on the Local Server│ ├── 001 Ubuntu 14.04.2 LTS Server Download.mp4│ ├── 002 Virtual Box Installation.mp4│ ├── 003 Create a Virtual Machine.mp4│ ├── 004 Install Ubuntu 14.04.2 LTS Long Term Support.mp4│ ├── 005 Login to Ubuntu the first time - difference between OS and Server.mp4│ ├── 006 Access Ubuntu Odoo from the Host System - Port Forwarding.mp4│ └── 007 Install Odoo Version 8 with a Script.mp4├── 04 Create the first Database and install more Modules│ ├── 001 Create a new Database and recover Login De