Hacking Academy: Monitoring Transmitted Data

Hacking Academy: Monitoring Transmitted Data [repost]  eBooks & eLearning

Posted by naag at May 30, 2016
Hacking Academy: Monitoring Transmitted Data [repost]

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 1280x720 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: Monitoring Transmitted Data  eBooks & eLearning

Posted by Polik88 at Sept. 9, 2015
Hacking Academy: Monitoring Transmitted Data

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 852x480 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: Monitoring Transmitted Data We are introducing you one of the most insteresting module from IT Security Academy Beginner course. During one hour you will learn how to intercept data in your network.

Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]  eBooks & eLearning

Posted by FenixN at Aug. 15, 2016
Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
HDRips | MP4/AVC, ~414 kb/s | 1280x720 | Duration: 02:46:42 | English: AAC, 50 kb/s (2 ch) | + PDF Guides
Size: 627 Mb | Genre: Hacking, Security

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.

Hacking Academy: METASPLOIT - Penetration Tests from Scratch  eBooks & eLearning

Posted by Polik88 at Sept. 10, 2015
Hacking Academy: METASPLOIT - Penetration Tests from Scratch

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
English | MP4 | 1280x720 | AVC 642 Kbps 25.000 fps | AAC 54.0 Kbps 48.0 khz | 4 hours | 627 MB
Genre: Video Training

Learn the most popular pentesting framework: METASPLOIT. If you are thinking about IT Security seriously - you have to get to know Metasploit. Learn how to use it, conduct attacks, find vulnerabilities and patch them. Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. First complete training explained from scratch. You will see on step-by-step presentations what to do. IT Security Adacemy Expert will explain how it works and how to use Metasploit.
Dynamic Modeling, Predictive Control and Performance Monitoring: A Data-driven Subspace Approach

Biao Huang, Ramesh Kadali “Dynamic Modeling, Predictive Control and Performance Monitoring:
A Data-driven Subspace Approach"

Springer | 2008-04-10 | ISBN: 1848002327 | 242 pages | PDF | 2,6 Mb

PYTHON: 3 Manuscripts - Python Programming, Hacking Using Python and Linux, and Data Analytics

PYTHON: 3 Manuscripts - Python Programming, Hacking Using Python and Linux, and Data Analytics
2017 | English | ASIN: B06XHK1XBM | 619 pages | PDF + EPUB (conv) | 1.70 Mb

Discover Python, Hacking and The Power of Data Analytics in Only 24 Hours!

Data Security Compliance  eBooks & eLearning

Posted by FenixN at July 11, 2016
Data Security Compliance

Data Security Compliance
HDRips | MP4/AVC, ~4285 kb/s | 1920x1080 | Duration: ~2 hours | English: AAC, 318 kb/s (2 ch)
Size: 4,08 Gb | Genre: Development / Programming / Security / Hacking

This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage.

Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)  eBooks & eLearning

Posted by house23 at June 26, 2015
Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)

Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)
MP4 | AVC 553kbps | English | 1280x720 | 24fps | 15 hours | AAC stereo 40kbps | 2.42 GB
Genre: Video Training

Best Hacking Training Program you can participate. Covers CISSP and CEH program. Get Hacking Academy Certificate. v. 2.0. This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security. Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.

Gray Hat Hacking: The Ethical Hacker's Handbook - 2nd Edition [Repost]  eBooks & eLearning

Posted by metalero87 at Nov. 4, 2014
Gray Hat Hacking: The Ethical Hacker's Handbook - 2nd Edition [Repost]

"Gray Hat Hacking: The Ethical Hacker's Handbook" by Harris
2007 | ISBN: 0071495681 | Pages: 577 | English | PDF | 13 MB

Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook (repost)  eBooks & eLearning

Posted by tot167 at Aug. 4, 2010
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook (repost)

Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, "Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook"
McGraw-Hill Osborne Media | 2007 | ISBN: 0071495681 | 550 pages | PDF | 12,5 MB