Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...

FOR572: ADVANCED NETWORK FORENSICS: THREAT HUNTING, ANALYSIS AND INCIDENT RESPONSE was designed to cover the most critical skills needed for the increased focus on network communications and artifacts...

View Article


SANS FOR500 Windows Forensic Analysis 2017 (PDF)

FOR500: Windows Forensic Analysis focuses on building in-depth digital forensics knowledge of Microsoft Windows operating systems. You can’t protect what you don’t know about, and understanding...

View Article


SANS SEC401 Security Essentials Bootcamp Style

Includes PDFs Videos Audio USB Cheat sheet Course Syllabus SEC401.1: Network Security Essentials SEC401.2: Defense-In-Depth and Attacks SEC401.3: Threat Management SEC401.4: Cryptography, Risk...

View Article

SANS PDF Only big Collection

AUD507 – Auditing & Monitoring Networks, Perimeters & Systems FOR500 – Windows Forensic Analysis FOR508 – Advanced Digital Forensics, Incident Response, and Threat Hunting FOR518 – Mac and iOS...

View Article

SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical...

View Article


SANS SEC401 Security Essentials Bootcamp Style PDF

SEC401.1: Network Security Essentials SEC401.2: Defense-In-Depth and Attacks SEC401.3: Threat Management SEC401.4: Cryptography, Risk Management and Response SEC401.5: Windows Security SEC401.6: Linux...

View Article

SANS SEC542: Web App Penetration Testing and Ethical Hacking

Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business...

View Article

SANS SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling PDF

The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn’t!), your...

View Article


Fundamentals of Apache Flink | Packt

Build your own Flink development environment on a Linux server Monitor your stream processing in real-time using the Flink UI Organize your data comprehensively using data processing pipelines Build...

View Article


Metasploit Penetration Testing Recipes | Packt

Prepare the Metasploit framework and set up labs locally and remotely Understand Metasploit fundamentals Conduct penetration testing on different target scopes Perform client-side attacks on browsers...

View Article

Deploying and Migrating to Azure Web Apps: Optimizing Web Server Workloads |...

Learn everything you need to know to get started with Azure web apps, including deployment, key features, and benefits, to monitoring. This video introduces you to Azure App Service, and more...

View Article

The Ultimate Oracle SQL Course | Udemy

You will be able to use SQL to retrieve, filter, analyze, format and present information from Oracle databases. You will be able to use SQL to insert, modify and delete information from Oracle...

View Article

Linux Super Cert Prep: Get Certified as a Linux System Admin | Udemy

How to be able to install several “flavors” of Linux Operating System Master a clear understanding of organizational concepts on Linux Operating Systems Understand the key differences between the most...

View Article


Cyber Security Hands-on: Complete Network Security A-Z™ | Udemy

Network Fundamentals Network Design Elements and Components Network Security Threats, Vulnerabilities, and Attacks Network Security Controls, Devices and Protocols Introduction to Intrusion Detection...

View Article

zycoo ip pbx (Asterisk Base) | Udemy

zycoo hardware design & specification and cards types overview about zycoo web interface change network settings ip ,route , firewall,services,ssh ,ip tables and download soft phone & register...

View Article


Oracle Database 12c SQL Certified Associate 1Z0-071 | Udemy

The Full track of Oracle Database 12c: Introduction to SQL Ed 2. You will be prepared 100% to pass exams Oracle Database SQL 1Z0-071 And also exam Oracle Database 12c: SQL Fundamentals 1Z0-061 Very...

View Article

DEF CON® 27 Hacking Conference (2019)

This is the third year we’ve hosted the Voting Village, and this year we were able to give attendees access to over 100 machines, all of which are currently certified for use in at least one US...

View Article


Hacking Techniques for IT Professionals 2.0 Complete Course | Udemy

Become Certified IT Security Professional Application attacks and how to prevent them. Application security assessment. Global management of user software. Cryptography and cryptanalysis. Symmetric and...

View Article

SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...

FOR572 is truly an advanced course – we hit the ground running on day one. Bring your entire bag of skills: forensic techniques and methodologies, full-stake networking knowledge (from the wire all the...

View Article

SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics

The course uses a hands-on enterprise intrusion lab — modeled after a real-world targeted APT attack on an enterprise network and based on APT group tactics to target a network — to lead you to...

View Article
Browsing all 6856 articles
Browse latest View live