English

Network Security Analysis Using Wireshark

Network Security Analysis Using Wireshark, Snort, and SO

The labs in this course are 100% hands-on and highly technical. Please be prepared to install and configure the necessary software to follow along. This will help you receive the maximum benefit of taking this course. The tools we will be using during this course are Wireshark, Tcpdump, Snort, Burpsuite, Nmap, Tcpreplay, Virtualbox and more. Operating Systems used […]

Network Security Analysis Using Wireshark, Snort, and SO Read More »

SAP ASE 16 / Sybase ASE - Installation and Configuration

SAP ASE 16 / Sybase ASE – Installation and Configuration

SAP Adaptive Server Enterprise (formerly known as Sybase ASE) is a relational database management system used by companies where high performance and stability counts.  There is not many good educational materials available teaching how to administer this database type, specially on Linux environment. That is why this course has been created. Specially difficult is the installation

SAP ASE 16 / Sybase ASE – Installation and Configuration Read More »

Digital Forensics and Electronic Evidence

Digital Forensics and Electronic Evidence

With the extremely fast pace of technology development, electronic evidence has become a potential part of nearly all court cases. For this reason, many more people are now faced with the need to understand electronic evidence. This could be a legal representative, the person involved in a case or simply someone who would like to

Digital Forensics and Electronic Evidence Read More »

JNCIS PART 1C - OSPF

JNCIS PART 1C – OSPF

-> Describe ospf implementation in Juniper Routers-> Describe Area0 and ‘B’ bit and ABR description-> Explain Virtual-Links and how they are implemented-> Explain various BITS in OSPF Header-> Explain OSPF Authentication-> Explain OSPF Path Selection process-> Explain STUB,T-STUB and NSSA Areas-> Explain OSPF Summarisation-> Explain Overload bit in OSPF This is purely done keeping one

JNCIS PART 1C – OSPF Read More »

"Google "Search Let Me Google That For You

“Google “Search Let Me Google That For You

In this course, you will discover how to use Google in exciting ways, including searching for weather forecasts, time zones, and word definitions, and finding movie theaters and restaurants using Google Maps. You will also learn how to use Google’s powerful tools such as the calculator, currency converter, and unit converter to make your life

“Google “Search Let Me Google That For You Read More »

Bash Shell scripting and automation

Bash Shell scripting and automation

Learn the complete set of linux and bash commands.Learn how to automate things in LinuxLearn how to program in Bash Shell and writing professional water tight scripts.Learn an exhaustive details about grep, fgrep, egrep etc and its various use case.Learn and understand exec and shell redirection and various use case. Learn how to leverage pipes and

Bash Shell scripting and automation Read More »

Python 9000: Review Concepts (K1 thru K10)

Python 9000: Review Concepts (K1 thru K10)

The concepts reviewed in this introductory set of questions (Lessons #K0001 – K0010) spans 7 “beginner,” as well as 3 “intermediate” Python programmer concepts. No “advanced” questions are included. This educational opportunity has been updated to include three “must know” bonus questions. Basic Training – Review! Also available on Udemy, students should note that all

Python 9000: Review Concepts (K1 thru K10) Read More »

Sensors and Sensor Fundamentals

Sensors and Sensor Fundamentals

A sensor is an electronic component or subsystem utilized for detecting modifications or events within its environment. A computer processor is one good example of sensor technology, also touch-sensitive elevator buttons known as tactile sensor. This innovation made a huge impact in the world of information and technology and almost every field or industry is using it

Sensors and Sensor Fundamentals Read More »

Mastering the Mac

Mastering the Mac

“A lot of the information wasn’t new to me. I had most of the pieces of the puzzle there but the course helped me put them in the right place. Thanks. – L. Grey “Clear, concise and informative. More informed user than before. – C. Philly “I learn so many useful things. Thank you so

Mastering the Mac Read More »

Cyber Security Course from Beginner to Advance 2018/2019 *

Cyber Security Course from Beginner to Advance 2018/2019 *

Brand New and Comprehensive Course to Learn Ethical Hacking and Penetration Testing Techniques and Concepts. Do you want to ramp up your career in Cyber Security Industry? Do you want to secure your websites or mobile apps? If you have answered YES to above questions, then you are at the right place. Learn Ethical Hacking,

Cyber Security Course from Beginner to Advance 2018/2019 * Read More »

Kali linux Bug Bounty Program : Web penetration / Hacking

Kali linux Bug Bounty Program : Web penetration / Hacking

Brand New and Comprehensive Course to Learn Bug Bounty Techniques and Concepts. – Do you want to ramp up your career in Cyber Security Industry? – Do you want to secure your websites or mobile apps? – If you have answered YES to above questions, then you are at the right place. Learn Ethical Hacking,

Kali linux Bug Bounty Program : Web penetration / Hacking Read More »

Scroll to Top