Unconfigured Ad Widget

Collapse

Anúncio

Collapse
No announcement yet.

Pluralsight - Coleção dos Cursos Cyber Security 61GB

Collapse
X
 
  • Filter
  • Tempo
  • Show
Clear All
new posts

  • Font Size
    #1

    Curso Pluralsight - Coleção dos Cursos Cyber Security 61GB

    Olá todo mundo, blz?

    Conhecimento é poder e hoje eu trago muuuuuuuuuuuito conhecimento. hehehe

    Segue 2 links com com ao todo 61 GB de cursos Cyber Security. Os cursos estão no MEGA, logo corram antes que fique OFF. Bora estudar!

    -- LINK CURSOS 1 --
    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    -- SCAN DA URL NO VIRUS TOTAL --
    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    -- LINK CURSOS 2 --
    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    -- SCAN DA URL NO VIRUS TOTAL --
    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    Lista dos cursos:

    Advanced Malware Analysis - Combating Exploit Kits
    Advanced Persistent Threats - The Big Picture
    Advanced Web Application Penetration Testing with Burp Suite
    ASP.NET Security Secrets Revealed
    Assessing and Mitigating Security Risks
    Auditing AWS Environments for Security and Best Practices
    Check Point Certified Security Administrator - Backup and Updating
    Check Point Certified Security Administrator - Install & Deploy
    CISSP - Asset Security
    CISSP - Communications and Network Security
    CISSP - Identity and Access Management
    CISSP - Security and Risk Management
    CISSP - Security Assessment and Testing
    CISSP - Security Engineering
    CISSP - Security Operations
    CISSP - Software Development Security
    Claims-based Identity for Windows - The Big Picture
    CompTIA Security+ (SY0-401) Access Control and Identity Management
    CompTIA Security+ (SY0-401) Application, Data, and Host Security
    CompTIA Security+ (SY0-401) Compliance and Operational Security
    CompTIA Security+ (SY0-401) Cryptography
    CompTIA Security+ (SY0-401) Network Security
    CompTIA Security+ (SY0-401) Threats and Vulnerabilities
    Computing, Communication, and Business Integration for CASP (CAS-002)
    Conducting Network Vulnerability Analysis
    Cryptography - The Big Picture
    Cryptography Fundamentals for Developers and Security Professionals
    CSSLPr - Secure Software Concepts
    CSSLPr - Secure Software Requirements
    Cybersecurity Threats - Ransomware
    Designing and Implementing Security Policies
    Digital Forensics - Getting Started with File Systems
    Digital Forensics Tools in Kali Linux - Imaging and Hashing
    Enterprise Security - Policies, Practices, and Procedures
    Enterprise Security for CASP (CAS-002)
    Enterprise Strength Mobile Device Security
    Ethical Hacking - Buffer Overflow
    Ethical Hacking - Cloud Computing
    Ethical Hacking - Cryptography
    Ethical Hacking - Denial of Service
    Ethical Hacking - Enumeration
    Ethical Hacking - Evading IDS, Firewalls, and Honeypots
    Ethical Hacking - Hacking Mobile Platforms
    Ethical Hacking - Hacking Web Applications
    Ethical Hacking - Hacking Web Servers
    Ethical Hacking - Hacking Wireless Networks
    Ethical Hacking - Malware Threats
    Ethical Hacking - Penetration Testing
    Ethical Hacking - Reconnaissance_Footprint ing
    Ethical Hacking - Scanning Networks
    Ethical Hacking - Session Hijacking
    Ethical Hacking - Sniffing
    Ethical Hacking - Social Engineering
    Ethical Hacking - SQL Injection
    Ethical Hacking - System Hacking
    Ethical Hacking - Understanding Ethical Hacking
    Exploit Development and Execution with the Metasploit Framework
    Exploitation - Evading Detection and Bypassing Countermeasures
    External Footprinting - Reconnaissance and Mapping
    Getting Started Analyzing Malware Infections
    Getting Started with CloudFlareT Security
    Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
    Hack Your API First
    Hack Yourself First - How to go on the Cyber-Offense
    Hands-On Incident Response Fundamentals
    How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps
    Implementing a Security Assessment and Authorization Process
    Implementing Physical Security
    Information Security Manager - Information Security Governance
    Information Systems Auditing - The Big Picture
    Information Systems Auditor - Acquisition and Development
    Information Systems Auditor - Governance and Management
    Information Systems Auditor - Operations, Maintenance, and Service
    Information Systems Auditor - Protection of Information Assets
    Information Systems Auditor - The Process of Auditing
    Introduction to Browser Security Headers
    Introduction to Penetration Testing Using Metasploit
    ISO_IEC 27001 Information Security - The Big Picture
    Malware Analysis - The Big Picture
    Malware Analysis Fundamentals
    Managing Information Security Incidents (ISO_IEC 27002)
    Managing Information Security Threats & Risks (ISO_IEC 27002)
    Metasploit Basics for Protecting SharePoint
    Network Fundamentals and Protocols
    Network Penetration Testing Using Python and Kali Linux
    Network Security Testing With NMAP
    Network Vulnerability Scanning with OpenVAS
    OPSEC for Penetration Testers
    OWASP Top 10 Web Application Security Risks for ASP.NET
    Payment Card Security, Processing, and the PCI Standards
    PCI DSS - The Big Picture
    Penetration Testing - Setting the Scope and Rules of Engagement
    Penetration Testing and Ethical Hacking with Kali Linux
    Penetration Testing Automation Using Python and Kali Linux
    Penetration Testing Life Cycle Explained
    Penetration Testing OSINT Gathering with Recon-ng
    Penetration Testing SharePoint
    Performing and Analyzing Network Reconnaissance
    Performing OSINT Gathering on Corporate Targets
    Play by Play - Ethical Hacking - Deconstructing the Hack
    Play by Play - Ethical Hacking with Troy Hunt
    Play by Play - Exploring the Internet of Vulnerabilities
    Play by Play - Social Engineering with Troy Hunt and Lars Klint
    Play by Play - Website Security Review with Troy Hunt and Lars Klint
    Pluralsight - Cybersecurity Threats Insider Threats
    Pluralsight - Information Systems Auditor Path
    Pluralsight - Troubleshooting Processes and Registry with Sysinternals Process Monitor
    Post Exploitation - Performing Infrastructure Analysis
    Research and Analysis for CASP (CAS-002)
    Risk Management
    Risk Management and Incident Response for CASP (CAS-002)
    Risk Management and Information Systems Control - Introduction to Risk
    Risk Management and Information Systems Control - IT Risk Assessment
    Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting
    Risk Management and Information Systems Control - Risk Identification
    Risk Management and Information Systems Control - Risk Response and Mitigation
    Risks, Vulnerabilities, and Threats
    Secure Account Management Fundamentals
    Securing Your Node.js Web App
    Security for Hackers and Developers - Code Auditing
    Security for Hackers and Developers - Fuzzing
    Security for Hackers and Developers - Overview
    Security for Hackers and Developers - Reverse Engineering
    Security Management - The Big Picture
    SSCP - Access Controls
    SSCP - Cryptography
    SSCP - Incident Response and Recovery
    SSCP - Introduction and the Exam Requirements
    SSCP - Network and Communications Security
    SSCP - Risk Identification, Monitoring, and Analysis
    SSCP - Security Operations and Administration
    SSCP - Systems and Application Security
    Technical Integration of Enterprise Components for CASP (CAS-002)
    The Information Security Big Picture
    The Issues of Identity and Access Management (IAM)
    Threat Intelligence - The Big Picture
    Threat Modeling - The Big Picture
    Threat Modeling Fundamentals
    Understanding the Java Virtual Machine - Security
    Understanding the Shellshock Bash Bug
    USB Forensics - Duplication
    USB Forensics - Fundamentals
    USB Forensics - Writeblocking and Impersonation
    Web App Hacking - Caching Problems
    Web App Hacking - Cookie Attacks
    Web App Hacking - Hacking Authentication
    Web App Hacking - Hacking Password Reset Functionality
    Web App Hacking - Sensitive Data Exposure
    Web Application Penetration Testing Fundamentals
    Web Application Penetration Testing with Burp Suite
    Web Security and the OWASP Top 10 - The Big Picture
    What’s New in the OWASP Top 10 for 2013
    Windows - How It’s Hacked, How to Protect It
    Wireless Network Penetration Testing
    Wireless Network Penetration Testing Advanced Technique

    Have fun!
    --
    Hack The Planet
    Similar Threads

  • Font Size
    #2
    Links down

    Olá,

    Desde já agradecer a partilha de tanta informação.

    Sendo eu, um individuo com pouca informação nesta área e os links já não estão disponíveis para download, alguém pode disponibilizar os seguintes cursos:

    Information Security Manager - Information Security Governance
    Information Systems Auditing - The Big Picture
    Information Systems Auditor - Acquisition and Development
    Information Systems Auditor - Governance and Management
    Information Systems Auditor - Operations, Maintenance, and Service
    Information Systems Auditor - Protection of Information Assets
    Information Systems Auditor - The Process of Auditing
    Introduction to Browser Security Headers
    Introduction to Penetration Testing Using Metasploit
    ISO_IEC 27001 Information Security - The Big Picture

    Como vou fazer a certificação em segurança de informação em Portugal, agradecia a vossa generosidade.

    Muito obrigado

    Comment


    • Font Size
      #3
      links do curso

      alguem tem o ainda tem link do curso?

      Comment


      • Font Size
        #4
        Shahtaj Qaiser introducing the latest edition of their Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar..., With elegant design and high-quality fabrics. Our dress is design to make you feel confident and beautiful. Shop now and experience the ultimate in Pakistani fashion!

        Comment


        • Font Size
          #5
          Don't miss out on this Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...! Jazmin, one of the top women's clothing brands in Pakistan, is delighted to offer an exclusive sale on its latest collection. Our sale includes a vast range of ready to wear, lawn dresses, chiffon dresses, and unstitched dresses, all designed to cater to every woman's fashion needs.

          Comment


          • Font Size
            #6
            ECS offers the best Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... Online in Pakistan. Discover a wide range of women's shoes online at ECS. Get your favorite ladies' shoes online at affordable prices.

            Comment


            • Font Size
              #7
              Men's slippers are a popular footwear option in Pakistan and are widely available in a variety of styles and designs at Servis Shoes. Get your favorite Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... with fast delivery.

              Comment


              • Font Size
                #8
                Borjan offers the best collection of Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... online in Pakistan. Explore the best quality handbags for women and girls online. Order your favorite bags online all over Pakistan.
                 

                Comment


                • Font Size
                  #9
                  Mohagni presents the latest and greatest Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar..., with an extensive range of designs available online throughout Pakistan. Find your desired trousers with great prices and high-quality materials. Buy your favorite trouser online from mohagni. Shop now!

                  Comment


                  • Font Size
                    #10
                    Metroshoes offers Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar..., with a soft and flexible sole that gives your foot a comfortable fit, in warm weather and cold weather.

                    Comment

                    X
                    Working...
                    X