• Regeln für den Video-Bereich:

    In den Börsenbereich gehören nur Angebote die bereits den Allgemeinen Regeln entsprechen.

    Einteilung

    - Folgende Formate gehören in die angegeben Bereiche:
    - Filme: Encodierte Filme von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format DivX, XviD und x264.
    - DVD: Filme im Format DVD5, DVD9 und HD2DVD.
    - HD: Encodierte Filme mit der Auflösung 720p oder darüber von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format x264.
    - 3D: Encodierte Filme von BluRay, die in einem 3D Format vorliegen. Dies gilt auch für Dokus, Animation usw.
    - Serien: Cartoon/Zeichentrick, Anime, Tutorials, Dokumentationen, Konzerte/Musik, Sonstiges sind demnach in die entsprechenden Bereiche einzuordnen, auch wenn sie beispielsweise im High Definition-Format oder als DVD5/DVD9/HD2DVD vorliegen. Ausnahme 3D.
    - Bereich Englisch: Englische Releases gehören immer in diesen Bereich.
    - Bereich Talk: Der Bereich, in dem über die Releases diskutiert werden kann, darf, soll und erwünscht ist.


    Angebot/Beitrag erstellen

    - Ein Beitrag darf erst dann erstellt werden, wenn der Upload bei mindestens einem OCH komplett ist. Platzhalter sind untersagt.
    - Bei einem Scenerelease hat der Threadtitel ausschließlich aus dem originalen, unveränderten Releasenamen zu bestehen. Es dürfen keine Veränderungen wie z.B. Sterne, kleine Buchstaben o.ä. vorgenommen werden. Ausnahme Serienbörse:
    - Bei einem Sammelthread für eine Staffel entfällt aus dem Releasename natürlich der Name der Folge. Beispiel: Die Simpsons S21 German DVDRip XviD - ITG
    - Dementsprechend sind also u.a. verboten: Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist.

    Aufbau des Angebots und Threadtitel

    Der Titel nach folgendem Muster erstellt zu werden. <Name> [3D] [Staffel] [German] <Jahr> <Tonspur> [DL] [Auflösung] <Quelle> <Codec> - <Group>
    Beispiel: The Dark Knight German 2008 AC3 DVDRip XviD - iND
    Beispiel: The Dark Knight 2008 DTS DL BDRip x264 - iND
    Beispiel: The Dark Knight 2008 AC3 DL BDRip XviD - iND
    Beispiel: The Dark Knight German 2008 AC3 720p BluRay x264 iND
    Beispiel: The Dark Knight 2008 DTS DL 1080p BluRay x264 iND
    Beispiel: Die Simpsons S01 German AC3 DVDRip XviD iND
    Beispiel: Die Simpsons S20 German AC3 720p BluRay x264 iND
    Beispiel: Sword Art Online II Ger Sub 2014 AAC 1080p WEBRip x264 - peppermint
    Entsprechend sind also u.a. verboten: Sonderzeichen wie Klammern, Sterne, Ausrufezeichen, Unterstriche, Anführungszeichen / Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist
    Ausnahmen hiervon können in den Bereichen geregelt sein.

    Die Beiträge sollen wie folgt aufgebaut werden:
    Überschrift entspricht dem Threadtitel
    Cover
    kurze Inhaltsbeschreibung
    Format, Größe, Dauer sind gut lesbar für Downloader außerhalb des Spoilers zu vermerken
    Nfo sind immer Anzugeben und selbige immer im Spoiler in Textform.
    Sind keine Nfo vorhanden z.B. Eigenpublikationen, sind im Spoiler folgende Dateiinformationen zusätzlich anzugeben :
    Quelle
    Video (Auflösung und Bitrate)
    Ton (Sprache, Format und Bitrate der einzelnen Spuren)
    Untertitel (sofern vorhanden)
    Hosterangabe in Textform außerhalb eines Spoiler mit allen enthaltenen Hostern.
    Bei SD kann auf diese zusätzlichen Dateiinformationen verzichtet werden.

    Alle benötigten Passwörter sind, sofern vorhanden, in Textform im Angebot anzugeben.
    Spoiler im Spoiler mit Kommentaren :"Schon Bedankt?" sind unerwünscht.


    Releases

    - Sind Retail-Release verfügbar, sind alle anderen Variationen untersagt. Ausnahmen: Alle deutschen Retail-Release sind CUT, in diesem Fall sind dubbed UNCUT-Release zulässig.
    - Im Serien-Bereich gilt speziell: Wenn ein Retail vor Abschluss einer laufenden Staffel erscheint, darf diese Staffel noch zu Ende gebracht werden.62
    - Gleiche Releases sind unbedingt zusammenzufassen. Das bedeutet, es ist zwingend erforderlich, vor dem Erstellen eines Themas per Suchfunktion zu überprüfen, ob bereits ein Beitrag mit demselben Release besteht. Ist dies der Fall, ist der bereits vorhandene Beitrag zu verwenden.
    - P2P und Scene Releases dürfen nicht verändert oder gar unter einem iND Tag eingestellt werden.


    Support, Diskussionen und Suche

    - Supportanfragen sind entweder per PN oder im Bereich Talk zu stellen.
    - Diskussionen und Bewertungen sind im Talk Bereich zu führen. Fragen an die Uploader haben ausschließlich via PN zu erfolgen, und sind in den Angeboten untersagt.
    - Anfragen zu Upload-Wünschen sind nur im Bereich Suche Video erlaubt. Antworten dürfen nur auf Angebote von MyBoerse.bz verlinkt werden.


    Verbote

    - Untersagt sind mehrere Formate in einem einzigen Angebotsthread, wie beispielsweise das gleichzeitige Anbieten von DivX/XviD, 720p und 1080p in einem Thread. Pro Format, Release und Auflösung ist ein eigener Thread zu eröffnen.
    - Grundsätzlich ebenso verboten sind Dupes. Uploader haben sich an geeigneter Stelle darüber zu informieren, ob es sich bei einem Release um ein Dupe handelt.
    - Gefakte, nur teilweise lauffähige oder unvollständige Angebote sind untersagt. Dies gilt auch für eigene Publikationen, die augenscheinlich nicht selbst von z.B. einer DVD gerippt wurden. Laufende Serien, bei denen noch nicht alle Folgen verfügbar sind, dürfen erstellt und regelmäßig geupdatet werden.
    - Untersagt sind Angebote, welche nur und ausschließlich in einer anderen Sprache als deutsch oder englisch vorliegen. Ausnahmen sind VORHER mit den Moderatoren zu klären.


    Verstoß gegen die Regeln

    - Angebote oder Beiträge, die gegen die Forenregeln verstoßen, sind über den "Melden"-Button im Beitrag zu melden.
  • Bitte registriere dich zunächst um Beiträge zu verfassen und externe Links aufzurufen.




Englische Tutorials

9d3d14cf5a7b04a29c0c71c1b84b4714.jpg

Certified Ethical Hacker Bootcamp [2016, ENG]
CyberTraining 365 | Duration : 15:54:58 | .MP4 | 5.15 GB | Video: AVC, 1280x720 (16:9), 29.970 (30000/1001) fps, ~294 Kbps avg, 0.011 bit/pixel | Audio 48.0 KHz, AAC LC, 2 ch, ~160 Kbps | English | Update June 2017
Genre: eLearning
CEH Bootcamp readies students for EC-Council's CEH certificate exam which is paramount for any IT specialist and anyone trying to enhance their network's defenses.​

With top experts and an interactive, lab-filled enviornment, students learn about key issues plaguing the information security world, incident management processes and penetration testing.

Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation.

Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system.

This course prepares students for the EC-Countil Certified Ethical Hacker v9 exam.

Course: CEH - Introduction to Ethical Hacking 52m 47s
Course: CEH - Enumeration 16m 33s
Course: CEH - Sniffing 1h 15m 43s
Course: CEH - Denial of Service 7m 22s
Course: CEH - Session Hijacking 7m 16s
Course: CEH - Hacking Web Applications 18m 8s
Course: CEH - SQL Injection 15m 58s
Course: CEH - Hacking Wireless Networks 29m 55s
Course: CEH - Evading IDS, Firewalls, and Honeypots 21m 44s
Course: CEH - Cryptography 1h 11m 15s
Course: CEH - Trojans and Backdoors 8m 58s
Course: CEH - Viruses and Worms 46m 54s
Course: CEH - Buffer Overflow 5m 58s
Course: CEH - Payment Card Industry (PCI) 48m 21s
Course: CEH - Penetration Testing 39m 7s


965e0e9b8f3e9093b4db6e4597f1d9d1.png

8dbbef91668fe847a39aa9fd0cc3bc3c.png

e3ab6136bb9e3f9dbd06e2890d3a2308.png


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
513b0fef4bb3ab02fc83f864d60a0fe5.jpg

EC Council Certified Ethical Hacker v8.0 [2014, ENG]
CBT Nuggets | Duration : 14:29:45 | .FLV | 1.99 GB | Video: AVC, 1280x720, 16:9, 30.000 fps, ~ 1359 Kbps | Audio AAC, 48.0 KHz, ~ 96.0 Kbps, 2 channels | English | Update June 2017
Genre: eLearning

This Certified Ethical Hacker v8.0 video training course with James Conrad covers how to legally protect against hacker security breaches, including virtualization, reconnaissance, footprinting, social engineering, scanning, sniffing, cryptography, and more.

Recommended skills:
Familiarity with Windows of all versions back to Windows XP and Windows Server 2003
Familiarity with Linux is not necessary but recommended (a video early in the course provides basic Kali Linux training that is sufficient for the learner to complete the course)

Recommended equipment:
Whatever equipment is being used to view the videos (except a smartphone or tablet) is sufficient to create a basic lab environment in which the learner can mirror demonstrations in the videos. This would also require installation of any virtualization software such as Parallels, VMware, Hyper-V, or VirtualBox.
High-speed internet is recommended to download Kali Linux and some of the additional tools.

Related certifications:
None

Related job functions:
Network Administrator
Systems Administrator
Systems Engineer
Help Desk

Most IT professionals are far too busy with daily tasks and projects to commit themselves to a serious study of security. Problem is, hackers are quite serious about your security and how to exploit it. If a security breach occurs at a company, it can cost millions of dollars, the loss of a priceless reputation, private customer information, and the very jobs of the IT professionals who often get blamed for weak security practices. One of the best ways to ensure good security is to know what hackers do to circumvent it. Security concepts and facts alone do not protect your systems. However, knowledge and experience in exactly how hackers exploit weaknesses will help you to potentially avoid embarrassing security breaches in the future.

1. Course Introduction (00:04:24)
2. Introduction to Ethical Hacking (00:20:06)
3. Terms and Types of Hackers (00:27:02)
4. Virtualization (00:26:53)
5. Linux (00:36:42)
6. Reconnaissance: Overview (00:17:27)
7. Reconnaissance: Powerful Resources (00:32:04)
8. Footprinting and Countermeasures (00:28:32)
9. Social Engineering (00:37:29)
10. Scanning Overview (00:38:25)
11. Scanning Demos (00:48:55)
12. Enumeration (00:47:32)
13. Cracking Windows Passwords (00:37:26)
14. Password Principles and Cracking Linux Passwords (00:27:36)
15. System Hacking: ADS and Steganography (00:23:31)
16. System Hacking: Keyloggers and Metasploit (00:25:07)
17. Malware (00:36:22)
18. Hack-O-Rama: Armitage, RAT and Netcat (00:39:16)
19. Hack-O-Rama: Rootkits and Trojans (00:25:01)
20. Sniffing Overview (00:25:04)
21. Sniffing Demos (00:21:57)
22. Denial of Service (00:34:03)
23. Hijacking (00:29:48)
24. Hacking Web Sites and Web Apps: Overview (00:26:42)
25. Hacking Web Sites and Web Apps: Demos (00:30:20)
26. Cryptography (00:39:52)
27. IDS (00:18:04)
28. Snort and Honeypots (00:21:09)
29. Wireless Overview (00:28:29)
30. Wireless Demos (00:14:27)


6ea67f98cd2abc8ca1eb037a06b131a7.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
426900c25a7220cfbc90dd7c9630e48f.jpg


SEO in 2016 for the Brave. Rank Any Site Today
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 14 | 125 MB
Genre: eLearning | Language: English
Learn how to rank sites in 2016 and beyond. Get insights into Google's New Ranking Factors so you can rank anything!​

Are you finding it hard to rank your sites in 2016?

Do you wonder how other SEOs are playing the game and still ranking high?

Did your site just vanish from Google? Was your site hit by a penalty, and you don't know what to do?

If you're struggling with SEO in 2016 - help is here!

In this course, i'll bring you up to speed so you can catch up with and understand exactly what Google is looking for when it ranks sites and pages. SEO has evolved dramatically in the past 12 months.

SEO in 2016 is nothing like it has been in the past.

Gone are the days when you could simply fire up your favorite tool or buy a bunch of backlinks from one of the many link sellers out there and watch how your rankings shot up within a matter of days.

If you're using the old tools and archaic methods you're not going to rank, period.

You need to start rethinking your entire game plan. Things have changed, and you need to change your strategy to survive.

And in this quick course, I'll show you exactly how.

You'll gain direct insights to see directly how the SEO game has changed today.

I'll keep you updated and give you a quick dive-down and introduce you to what factors matter in 2016 and beyond and how you should be doing SEO today.

Google has gotten very clever and is using Artificial Intelligence and Deep Learning Algorithms to understand pages like it couldn't have before.

You cannot build backlinks and do SEO like you did in the past. Worse, if you're not careful - your site could get flagged for spam and fall into one of Google's many penalties.

Take this course and you'll get to learn exactly what makes a difference to get your sites to rank in Google's SERPs today.

Stop wasting your time with methods that are outdated and don't work anymore.




0f730a6ab67f230a20cf197547ad84b1.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
00469493_medium.jpg


R: Powerful Data Analysis with R
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 8.5 Hours | 5.15 GB
Genre: eLearning | Language: English
There's an increasing number of data being produced every day which has led to the demand for skilled professionals who can analyze these data and make decisions. R is one of the popular tool which is widely used by data analysts for performing data analysis on real-world data.​

This Learning Path is the complete learning process to play with data. You will start with the most basic importing techniques, for downloading compressed data from the Web. You will learn advanced data analysis concepts such as cluster analysis, time-series analysis, association mining, PCA, handling missing data, sentiment analysis, spatial data analysis with R and QGIS, and advanced data visualization with R's ggDescription2 library.

By the end of this Learning Path, you will learn how to perform data analysis on real-world data.



00469494.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
004696e9_medium.jpg

Docker Containers LiveLessons, 2nd Edition
.MP4, AVC, 3400 kbps, 1280x720 | English, AAC, 192 kbps, 2 Ch | 4+ hours | 12.96 GB
Instructor: Christopher Negus

Docker Containers LiveLessons takes you through your first experiences understanding, running, building and managing Docker containers. These hands-on lessons help you explore Docker containers, registries, and run-time environments. It then extends that experience into container orchestration with Kubernetes.

With cloud computing, applications need to move around efficiently and run almost anywhere. In this video, learn how you can create containerized applications with Docker that are lightweight and portable. First, Chris shows you how to begin using Docker on Ubuntu, Red Hat Enterprise Linux, or Fedora systems (with options of Windows or (Mac OSX)). Then he shows you how to pull and push Docker container images from and to Docker registries. The next few lessons get you started running container and investigating how they work. After that, you learn how to build your own Docker images. The video then examines orchestration tools such as Kubernetes and Cockpit and development tools such as OpenShift for deploying and managing containers. Finally, it provides some tips for developing your own Docker containers.

Skill Level: Beginner to Intermediate

What You Will Learn

What Docker is and why you need it, including the basics of running, stopping, and restarting Docker containers
Installing Docker on standard Linux or specialized container operating systems
Setting up a private Docker Registry
Creating, running, and investigating Docker images and containers
How to pull and push containers between local systems and Docker Registries
Integrating Docker containers with host networking and storage
Orchestrating multiple containers into complex applications with Kubernetes
How to build a Docker container to simplify application deployment
Employing best practices when developing containerized applications
How others are creating their own interesting and powerful containers
The latest Docker supporting technology that is on the horizon

Who Should Take This Course

System administrators who need to create, deploy, and manage Docker containers
Application developers who want to understand what applications are most appropriate for containerization and what are best practices for adapting their applications to containers

Course Requirements

A basic understanding of running commands in Linux
Familiarity with Linux concepts such as networking, software repos, and storage
Familiarity with concepts related to deploying applications



004696ea.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
013259128f1e81dea0135e36858a3921.jpg


Breakthrough Insights using Microsoft SQL Server 2012 - Scalable data warehouse
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 10 GB
Genre: eLearning | Language: English

Data Analysis is meant to provide your company with Breakthrough Insights that empower you to act and react in a competitive environment. This Microsoft SQL Server 2012 course shows you how you can take advantage of the newest features and introduces you to a wide range of concepts and practices, such as:- Developing and Managing a Business Intelligent Semantic Model - Enriching your BI Semantic Models with Data Analysis Expressions (DAX) - Leveraging Master Data Services (MDS) in your Data Warehouse You'll get a chance to see what's new for MDS and learn tips and tricks to using Data Quality Services (DQS). When you have completed this course you'll have learned how Microsoft SQL Server 2012 can help you create secure, reliable, Business Intelligence Semantic Models using SQL Server Analysis Services and how to improve the quality, credibility and consistency of your business data


c9ee6d24e83443bd7a1f9f4e76189678.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
b3c44f50f88895e3ca81ab8232d87f55.jpg


Anatomy of a Cyber Attack A beginner's course on hacking
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4 Hours | Lec: 37 | 3.36 GB
Genre: eLearning | Language: English
Learn the attacker's methodology and how to start your career in the cyber security industry and penetration testing!​

Your networks are facing a constant barrage of attacks by malicious actors: hackers, hacktivists, script kiddies, advanced persistent threats, and even nation states are all searching for footholds into networks around the globe. System administrators have always been the first line of defense in system security, and in this global cyber war your role has become increasingly important to the security our networks. As the lynchpin to network defense, it is imperative that system administrators understand the vulnerabilities and methodology employed by malicious cyber actors in order to assist in stopping cyber attacks.

In "The Anatomy of a Cyber Attack", you will learn to dissect the techniques used by hackers in their exploitation of a network. From open-source research and reconnaissance to the exploitation and covering of their tracks, you will learn hands-on techniques to probe your network for vulnerabilities and understand how they are exploited. Taught by an expert in cybersecurity, you will learn to think like a hacker in order to thwart their future attacks on your networks.

A truly eye-opening experience into the world of cybersecurity, "The Anatomy of a Cyber Attack" is essential to understanding the landscape of today's cyber threats.

What You Will Receive In The Course:

Video lectures that are fun, entertaining, and enlightening
Walkthrough of building your own penetration testing lab for use in the course
Labs for every step of the hacker methodology
You can watch the instructor to better understand the threat, or learn to conduct the attack yourself!
Practice questions to ensure mastery of each section of the course
A thorough foundation upon which to conduct further study or certification preparation
This course provides a great foundation upon which to begin your Certified Ethical Hacker (CEH) or penetration testing studies!
What This Course Is NOT:

Certified Ethical Hacker preparation course
IT Certification preparation course
Designed to provide a mastery of penetration testing techniques (but will give you a great introduction)
NOTE: This course is designed for all IT personnel and provides a great overview of the need for cyber security through hands-on examples of network and system exploitation. Beginners will be able to understand the concepts and enjoy the course, but may have some difficult in conducting the attacks themselves. A basic understanding of computers and computer networks is required to understand this course.





2c5e48eac3fdf05ddfc5fd9f2041c2a3.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
2fad9c9efe56c80f27ed197d16b5a4c0.jpg


Write and Self-Publish a Bestselling Kindle Book on Amazon
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4 Hours | Lec: 31 | 1.43 GB
Genre: eLearning | Language: English
Complete Kindle, paperback, audiobook publishing & marketing course. Guarantee bestseller status for your first book.​

Every year it gets harder to be seen on Amazon's crowded platform. For this reason, if you haven't started writing yet, 2017 is the year you MUST write a book. I can show you how to make sure it's an Amazon bestseller.

Being the author of a book this affords you great kudos. People will look to you as an expert on a subject that you've written a book on.

Get customers' email addresses from Amazon! Get your interested readers to sign up for extra content. They've already paid to read your book, so they will happily give you their email address for an extra free resource.

Make passive income. I have made over $13,000 in Kindle royalties alone - it's not the main reason for writing a book, but it's a nice bit of pocket money.

I have published 8 books and most of them have been bestsellers on Amazon. They all also have paperback versions that sell well as well as audiobook versions.

This course includes everything I've learned from 3 years as a self published author including:

how to come up with the ideas for the titles of a book
how to write the book
how to format the book for Kindle, paperback and how to create an audiobook
how to ensure the book is properly edited and is as good as it possibly can be
how to successfully launch the book so it is an Amazon Bestseller and gain the maximum amount of sales in the first two weeks to ensure it keeps selling for months afterwards
how to make money from self-publishing
how to get the emails of the people who read your books so that you can upsell higher value products to them



fd3c4d87063a64c84e5f06d41e3fdf8f.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
e61c1b38c65290d10cb6b65d74c24a7b.jpg


Lynda - Cert Prep: Unity Fundamentals
Size: 2.65 GB | Duration: 1h 51m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English
Demonstrate your proficiency at using Unity for game development by becoming a Unity Certified Developer.​

Demonstrate your proficiency at using Unity for game development by becoming a Unity Certified Developer. In this comprehensive course, learn how to get started with game design using Unity, and prepare for the Unity Certified Developer exam by exploring essential Unity concepts. Alan Thorn covers an array of topics, including how to work with the Unity interface, navigate viewports, create game content, and export and import assets. Plus, he shares some usability advice that can help you increase your productivity when using Unity.


* Unity project creation
* Viewport navigation
* Object manipulation
* Creating game content
* Exporting and importing mesh assets
* Using Unity for game development
* Game Mode vs. Play Mode
* Moving objects
* Materials and textures






x Lynda - Cert Prep: Unity Fundamentals


97c29dc6eb7da5b446a68ea3e11f0ded.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
00469495_medium.jpg


Computational Thinking In Python
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5 Hours | Lec: 49 | 720 MB
Genre: eLearning | Language: English
Tackling open ended problems with guile and creativity​

What is Python and why is it important?

Python is an interpreted text based general purpose programming language, which has a wonderfully simplified syntax, dynamic typing and an awesome open source community constanly creating more and more amazing libraries and modules. This makes python an awesome tool for someone just getting into proramming as well as someone with serious ambitions in fields like data analysis web development or the Internet of Things.

What is special about this course?

Quite simply this is the ultimate second programming course for the everyman!. The approach taken demonstrates some theoretical concepts and then asks the student to solve an open ended problem. Much like lifting heavy weights tends to make your muscles bigger, solving hard problems improves your thinking!! Perhaps more importantly these types of problems prompt creativity and create original solutions. Completing this course with an understanding of multiple solutions for each problem will endow the student with a conceptual mastery of Python and thus prepare them to use Python and a professional setting and create real world applications!!


00469496.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
3028c540bb2f317af6a57d34fc938142.jpg


Lynda - Wacom Essential Training (updated Jun , 2017)
Size: 3.76 GB | Duration: 3h 20m | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Appropriate for all | Language: English
Wacom tablets are a popular alternative to the mouse for expressive painting, drawing, and navigating your computer with a pressure-sensitive pen.​

Wacom tablets are a popular alternative to the mouse for expressive painting, drawing, and navigating your computer with a pressure-sensitive pen. In this course, artist and teacher John Derry shows how to get you up and running with a Wacom tablet, from setting it up and getting accustomed to using the pen, to using the tablet with popular creativity and productivity applications. He also helps to familiarize you with the changes to the Wacom tablet over the past few years, including touch capability, and reviews the MobileStudio Pro pen computer, which offers a high-performance platform in a small package. Plus, learn about tablet ergonomics-which makes your Wacom even more compatible with your working conditions-and follow a few exercises to warm up your drawing arm.


* Why use a tablet?
* Determining which tablet is right for you
* Explaining the six axes of motion
* Working with control surfaces
* Drawing freehand
* Tracing existing images
* Illustrating vectors
* Expressing yourself through painting
* Selecting the right stylus
* Working with tablet calisthenics
* Working with the Cintiq 22HD and MobileStudio Pro








21db7b8826ffa22f3b55f70971ab21a1.jpg


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
513b0fef4bb3ab02fc83f864d60a0fe5.jpg

EC Council Certified Ethical Hacker v9.0 [2016, ENG]
CBT Nuggets | Duration : 19:34:42 | .MP4 | English | Video: 1280x720 | Audio: 22.05 KHz, AAC LC, 2 ch, ~64.0 Kbps | Update June 2017 | 4.67 GB
Genre: eLearning

This Certified Ethical Hacker (CEH) v9.0 video training course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. CBT Nuggets trainer Keith Barker walks you through building your own practice lab, including using evaluation software, and encourages you to not only watch and enjoy the videos, but practice everything hands-on in your own lab environment.

Recommended Experience
Networking fundamentals (CompTIA Network+ level of knowledge or better)
Familiarity with multiple versions of Windows
Familiarity with Linux is not necessary but recommended
Familiarity with VMware Workstation
Knowledge of Networking and Security at the CompTIA Network+ and Security+ levels, or better
Recommended Equipment
Host running VMware Workstation, that can support 64bit VMs.
Related Certifications
Certified Ethical Hacker v9 (#312-50)
Related Job Functions
Network/System Administrators/Engineers
Security officers
Auditors
Security professionals
Site administrators
Those concerned about the security of the network infrastructure
Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith holds several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more.

EC-COUNCIL® and C|EH® are registered trademarks International Council of E-Commerce Consultants.

1. Welcome (4 min)
2. Building a LAB: Concepts (6 min)
3. Building a LAB: Networking (9 min)
4. Deploy a Kali Linux VM (14 min)
5. Adding Metasploitable to Your Lab (11 min)
6. Adding Windows to Your Lab (14 min)
7. Configure a Static IP on Kali (5 min)
8. Windows Evaluations (7 min)
9. Deploy Windows 8.1 (15 min)
10. Deploy Windows 2012 (11 min)
11. Deploy Windows 10 (7 min)
12. Deploy Windows 2016 (7 min)
13. Ethics and Hacking (10 min)
14. Hacking Vocabulary (6 min)
15. InfoSec Concepts (5 min)
16. Attack Categories, Types, and Vectors (5 min)
17. Five Phases of Hacking (5 min)
18. Footprinting and Reconnaissance Concepts (11 min)
19. Search Engine Tools (8 min)
20. Hacking using Google (12 min)

22. Metagoofil Metadata Tool (3 min)
23. Email Headers for Footprinting (5 min)
24. Using WHOIS for Recon (4 min)
25. DNS Tools (12 min)
26. Network Scanning Overview (3 min)
27. Network Scanning Methodology (9 min)
28. Port Discovery (11 min)
29. Network Scanning Tools (3 min)
30. Stealth Idle Scanning (10 min)
31. OS and Application Fingerprinting (10 min)
32. Vulnerability Scanning (8 min)
33. Network Mapping Tools (5 min)
34. Proxy Servers (8 min)
35. Using Public Proxy Services (6 min)
36. Enumeration Concepts (5 min)
37. NetBIOS Enumeration (11 min)
38. SNMP Enumeration Concepts (10 min)
39. SNMP Enumeration Tools (10 min)
40. LDAP Enumeration Concepts (5 min)
41. LDAP Enumeration Example (7 min)
42. NTP Enumeration (7 min)
43. SMTP Enumeration (8 min)
44. System Hacking Overview (9 min)
45. Password Cracking Concepts (10 min)
46. Password Attack Example: MITM and Sniffing (13 min)
47. Rainbow Crack Lab Setup (8 min)
48. Rainbow Crack Demonstration (8 min)
49. Password Reset Hacking (8 min)
50. DHCP Starvation (10 min)
51. Remote Access (15 min)
52. Spyware (9 min)
53. NTFS Alternate Data Streams Exploit (9 min)
54. Steganography with OpenPuff (7 min)
55. Steganography with SNOW (5 min)
56. Covering Tracks (7 min)
57. Malware Overview (10 min)
58. Trojan Overview (10 min)
59. Creating a Trojan (11 min)
60. Virus Overview (13 min)
61. Virus Creation (8 min)
62. Detecting Malware (17 min)
63. Malware Analysis (10 min)
64. Hash File Verification (8 min)
65. Sniffing Overview (12 min)
66. CAM Table Attack and Port Security (10 min)
67. DHCP Snooping (14 min)
68. Dynamic ARP Inspection (DAI) (14 min)
69. Social Engineering (15 min)
70. Denial of Service (DoS) Attacks (19 min)
71. Session Hijacking (18 min)
72. Hacking Web Servers (10 min)
73. Buffer Overflow (13 min)
74. OWASP Broken Web Application Project (13 min)
75. Shellshock (6 min)
76. SQL Introduction (9 min)
77. SQL Injection (16 min)
78. Web App Vulnerabilities: WordPress (10 min)
79. Wireless Hacking (18 min)
80. Using an Android VM (4 min)
81. Malware for Mobile (11 min)
82. Mobile Device Risks and Best Practices (13 min)
83. Firewall Evasion (19 min)
84. Firewall ACL Example (15 min)
85. NAT and PAT fundamentals (11 min)
86. IDS/IPS Evasion (17 min)
87. Honeypots (12 min)
88. Cloud Computing (23 min)
89. CIA: Confidentiality, Integrity, and Availability (3 min)
90. Policies (9 min)
91. Quantifying Risk (6 min)
92. Separation of Duties (13 min)
93. Symmetrical Encryption Concepts (14 min)
94. Asymmetrical Encryption Concepts (16 min)
95. Control Types (11 min)
96. Multifactor Authentication (12 min)
97. Centralized Identity Management (13 min)
98. Kerberos and Single Sign On (SSO) (17 min)
99. Backups and Media Management (9 min)
100. Operations Security Controls (14 min)
101. Physical Security Controls (11 min)
102. Incident Response (12 min)
103. VPNs (21 min)
104. Disaster Recovery Planning (13 min)
105. Pen Testing Tips (10 min)
106. Useful Tools (11 min)
107. Case Study (21 min)
108. Additional Resources and Exam Prep (8 min)

More Info

25b197a03f2cd8db2004fdbde2fb0380.png

e6054f4c34695ba58b6821756b71f667.png


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
Zurück
Oben Unten