Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

SDN, Openflow, and Mininet Made Simple | O’Reilly

Become proficient with SDN, Openflow, and Mininet. Software defined networking (SDN) virtualizes a subset of a networking infrastructure, similar to virtualizing servers in a data center. OpenFlow is a...

View Article


Networking Series: The Definitive Guide to Software Defined Networking (SDN)...

Software defined networking (SDN) virtualizes a subset of a networking infrastructure, similar to virtualizing servers in a data center. Administrators configure network devices such as switches and...

View Article


Getting Started with Memory Forensics Using Volatility | Pluralsight

With the increasing sophistication of malware, adversaries, and insider threats, memory forensics is a critical skill that forensic examiners and incident responders should have the ability to perform....

View Article

Offensive Security – Advanced Web Attacks and Exploitation (VMs Lab) – (v2016)

VMware images From AWAE – Advanced Web Attacks and Exploitation – v2016 Advanced Web Attacks and Exploitation (AWAE) is the premier web application security and pentesting training. Through a unique...

View Article

Introducing Network Programmability & Automation | INE

This course will introduce you to the fundamental concepts and platforms that are involved with network automation and programmability, focused primarily on Cisco’s approach and solution. Starting with...

View Article


SANS SEC460 – Enterprise Threat and Vulnerability Assessment

Computer exploitation is on the rise. As advanced adversaries become more numerous, more capable, and much more destructive, organizations must become more effective at mitigating their information...

View Article

Python For Ethical Hacking: Develop Pentesting Tools | Udemy

The Python For Ethical Hacking course is designed to take you from a beginner to an expert in the development of Python tools that can be used for ethical hacking and in penetration tests The course...

View Article

Incident Response: Evidence Collection in Windows | Lynda

If your organization is the victim of a cyberattack, will you be ready to respond? An incident responder or digital forensics technician has to be prepared to properly collect digital evidence as soon...

View Article


SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your...

View Article


RedTeam Nation – RedTeam Blueprint

BEST Entry Level Courses for Offensive Security From RedTeam Nation https://nitroflare.com/view/AF3960F32720835/RedTeam-Nation-RedTeam-Blueprint.part1.rar...

View Article

Network Security Analysis Using Wireshark, Snort, and SO | Udemy

How to install and configure Virtualbox How to install and configure Security Onion on Virtualbox How to install and configure Kali Linux on Virtualbox How to install and configure Metasploitable on...

View Article

The Complete Ethical Hacking, Pen Testing : System Security | Udemy

Step by step of how to build your own virtual hacking environment & penetration testing Lab Step by Step of how to download & install the needed tools Learn How to use the immunity debugger for...

View Article

Building Streaming Data Pipelines in Microsoft Azure | Pluralsight

Do you need to process live data streams from sensors, custom apps, IoT devices, and logs? Do you need to immediately respond to anomalies and patterns in live data streams? Are you familiar with...

View Article


Offensive Security – Advanced Web Attacks and Exploitation (AWAE)

Advanced Web Attacks and Exploitation (AWAE) is the premier web application security and pentesting training. Through a unique combination of hands-on and classroom-based learning, AWAE condenses the...

View Article

Certified Kubernetes Administrator (CKA) with Practice Tests | Udemy

How to Administer a Kubernetes Cluster How to Design a Kubernetes Cluster How to Build a Kubernetes Cluster from scratch – “The Hard Way” How to Test a Kubernetes Cluster end-to-end How to Troubleshoot...

View Article


CompTIA Security+ (SY0-501) | Pearson IT Certification

More than 19 hours of deep-dive training covering every objective in the CompTIA Security+ (SY0-501) exam. CompTIA Security+ (SY0-501) Complete Video Course is an engaging self-paced video training...

View Article

PenTestMag Collection

Collection of course from pentestmag just like the hakin9 ones someone uploaded this is what is currently passed around and it is not complete by any means...

View Article


Hakin9 Courses Collection

Hakin9 Courses: – Exploit Pack Development – API Hacking (Offensive and Defensive) – Ethical Hacking Course https://nitroflare.com/view/870D06F6B390293/Hackin9.part01.rar...

View Article

eXploit Development Student – XDS – eLearnSecurity

The exploit Development Student course (XDS) is an online, self-paced training course built for anyone with little to no background in Exploit Development. XDS is the most comprehensive and practical...

View Article

Udacity – Cloud Developer v1.0.0

Cloud development is the inspiration for the model new world of software program program development. Enroll now to assemble and deploy production-ready full stack apps at scale on AWS, an vital...

View Article
Browsing all 6856 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>