Hacking Academy: Monitoring Transmitted Data

Hacking Academy: Monitoring Transmitted Data [repost]  eBooks & eLearning

Posted by naag at May 30, 2016
Hacking Academy: Monitoring Transmitted Data [repost]

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 1280x720 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: Monitoring Transmitted Data  

Posted by Polik88 at Sept. 9, 2015
Hacking Academy: Monitoring Transmitted Data

Hacking Academy: Monitoring Transmitted Data
English | MP4 | 852x480 | AVC 3503 Kbps 25.000 fps | AAC 50.3 Kbps 48.0 khz | 1h 7mn | 340 MB
Genre: Video Training

Hacking Academy: Monitoring Transmitted Data We are introducing you one of the most insteresting module from IT Security Academy Beginner course. During one hour you will learn how to intercept data in your network.

Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]  eBooks & eLearning

Posted by FenixN at Aug. 15, 2016
Hacking Academy: METASPLOIT - Penetration Tests from Scratch [repost]

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
HDRips | MP4/AVC, ~414 kb/s | 1280x720 | Duration: 02:46:42 | English: AAC, 50 kb/s (2 ch) | + PDF Guides
Size: 627 Mb | Genre: Hacking, Security

Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases.
Hacking Academy: METASPLOIT - Penetration Tests from Scratch

Hacking Academy: METASPLOIT - Penetration Tests from Scratch
English | MP4 | 1280x720 | AVC 642 Kbps 25.000 fps | AAC 54.0 Kbps 48.0 khz | 4 hours | 627 MB
Genre: Video Training

Learn the most popular pentesting framework: METASPLOIT. If you are thinking about IT Security seriously - you have to get to know Metasploit. Learn how to use it, conduct attacks, find vulnerabilities and patch them. Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. First complete training explained from scratch. You will see on step-by-step presentations what to do. IT Security Adacemy Expert will explain how it works and how to use Metasploit.
Dynamic Modeling, Predictive Control and Performance Monitoring: A Data-driven Subspace Approach

Biao Huang, Ramesh Kadali “Dynamic Modeling, Predictive Control and Performance Monitoring:
A Data-driven Subspace Approach"

Springer | 2008-04-10 | ISBN: 1848002327 | 242 pages | PDF | 2,6 Mb

Data Security Compliance  eBooks & eLearning

Posted by FenixN at July 11, 2016
Data Security Compliance

Data Security Compliance
HDRips | MP4/AVC, ~4285 kb/s | 1920x1080 | Duration: ~2 hours | English: AAC, 318 kb/s (2 ch)
Size: 4,08 Gb | Genre: Development / Programming / Security / Hacking

This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage.
Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)

Udemy - IT Security: Hacking Techniques for IT Professionals 2.0 (2015)
MP4 | AVC 553kbps | English | 1280x720 | 24fps | 15 hours | AAC stereo 40kbps | 2.42 GB
Genre: Video Training

Best Hacking Training Program you can participate. Covers CISSP and CEH program. Get Hacking Academy Certificate. v. 2.0. This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security. Training is starting with IT Security current threat and trends. Afterwards we are discussing popular security myths. Great part of the training relates to Network security.

Warp Academy - Music Hacking for Electronic Musicians (2016)  eBooks & eLearning

Posted by ParRus at Nov. 1, 2016
Warp Academy - Music Hacking for Electronic Musicians (2016)

Warp Academy - Music Hacking for Electronic Musicians
WEBRip | English | MP4 | 1280 x 720 | AVC ~749 kbps | 30 fps
AAC | 235 Kbps | 48.0 KHz | 2 channels | 13:47:06 | 6.05 GB
Genre: Video Tutorial / Sound Processing, Music Production, Sound Engineering

As an educator and musician I’m always working on developing and honing my own skills. This has me on a search for better and better teachers as I learn and grow. I’m excited to share that I’m bringing one of my very own teachers to the table to share his wisdom and expertise with you. I’m thrilled to introduce Ray Harmony, who’ll be teaching our newest course, Music Hacking for Electronic Musicians!

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle  eBooks & eLearning

Posted by AlenMiler at Oct. 29, 2016
Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking … Android) (Hacking Freedom and Data Driven) by Isaac D. Cody
English | 23 Oct. 2016 | ISBN: 1539713830 | 95 Pages | PDF | 585.49 KB

This is a 2 book bundle related to hacking computers and hacking mobile devices, apps, and game consoles.
Environmental Monitoring with Arduino: Building Simple Devices to Collect Data About the World Around Us (Repost)

Emily Gertz, Patrick Di Justo, "Environmental Monitoring with Arduino: Building Simple Devices to Collect Data About the World Around Us"
English | ISBN: 1449310567 | 2012 | EPUB | 96 pages | 4 MB