VMware vSphere and Virtual Infrastructure Security Securing the Virtual Environment


VMware vSphere and Virtual Infrastructure Security Securing the Virtual Environment

VMware vSphere and Virtual Infrastructure Security: Securing the Virtual Environment by Edward Haletky
English | 22 Jun. 2009 | ISBN: 0137158009 | 552 Pages | EPUB/MOBI | 26.09 MB

Download Now

The United Nations and Collective Security


The United Nations and Collective Security

Gary Wilson, "The United Nations and Collective Security"
2014 | pages: 264 | ISBN: 0415505895 | PDF | 1,1 mb

Download Now

INE Network Security CISSP Video Bundle Domains 1-8 Esteban Herrera


INE  Network Security CISSP Video Bundle Domains 1-8  Esteban Herrera
INE | Network Security: CISSP Video Bundle: Domains 1-8 | Esteban Herrera
English | Size: 1.47 GB
Category: Tutorial

This bundle includes over 11 hours of Network Security training designed to prepare you for the CISSP exam. Our downloadable video training delivers instant access to hours upon hours of quality lectures and in-depth hands-on examples. These courses are viewable on your computer or any MP4-compatible mobile device.

Download Now

INE - OSCP Security Technology Course

INE - OSCP Security Technology Course
INE - OSCP Security Technology Course
English | Size: 2.26 GB
Category: E-learning | HACKING | Linux | Security


This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security.
Download Now

Climate Change and Global Energy Security Technology and Policy Options


Climate Change and Global Energy Security Technology and Policy Options

Climate Change and Global Energy Security: Technology and Policy Options by Marilyn A. Brown and Benjamin K. Sovacool
English | ISBN: 0262016257 | 2011 | PDF | 432 pages | 10,4 MB

Download Now

Security Testing


Security Testing

Security Testing
MP4 | Video: 720p | Duration: 1:35:29 | English | Subtitles: VTT | 198.4 MB

Download Now

Personal Digital Security: Protecting Yourself from Online Crime

Personal Digital Security: Protecting Yourself from Online Crime

Personal Digital Security: Protecting Yourself from Online Crime by Michael Bazzell
English | 2013 | ISBN: 149108197X | 236 Pages | EPUB | 5.3 MB
Your complete resource to protect you,your family, and your community from digital crime
Download Now

CISSP Cert Prep 6 Security Assessment and Testing


CISSP Cert Prep 6 Security Assessment and Testing

CISSP Cert Prep: 6 Security Assessment and Testing
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 243 MB
Genre: eLearning | Language: English

Download Now

Network Security Fundamentals

Network Security Fundamentals
Network Security Fundamentals
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours 16M | 285 MB
Genre: eLearning | Language: English
Data network security is more important than ever. This course will examine critical network attacks as well as tools, techniques, and policies that can help mitigate network attacks and data breaches.


Download Now

O'Reilly - Security Testing and Ethical Hacking with Kali Linux

O'Reilly - Security Testing and Ethical Hacking with Kali Linux
O'Reilly - Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.03 GB
Category: Linux | Security

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you'll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you'll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you'll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you'll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course.
Download Now