PluralSight – Internet of Things IoT Executive Briefing

PluralSight – Internet of Things IoT Executive Briefing Bookware-KNiSO
English | Size: 308.63 MB
Category: Tutorial


Internet of Things (IoT) has been an increasing popular term over the last few years, whereas it seemed a sci-fi nerdy dream and great plot for a movie at first, it’s now everywhere around us and still growing. Chances are that it’s the best next step for your organization at this point to implement more IoT. In this course, Internet of Things (IoT): Executive Briefing, you ll learn to talk about IoT, and you ll know what the best steps are to implement IoT in your organization to keep up with or even get ahead of the competition. First you ll delve into what IoT is. Next, you ll explore the trends and characteristics in this field. Finally, you ll discover what to take into account when you have to deal with the IoT within your organization or personal life. When you re finished with this course, you ll have the skills and knowledge of IoT needed to understand its implications and the adoption processes of IoT applications

PluralSight – Metasploit Getting Started

PluralSight – Metasploit Getting Started Bookware-KNiSO
English | Size: 201.05 MB
Category: Tutorial


The Metasploit Framework is a very capable exploitation toolkit It is not an easy tool to quickly understand and utilize effectively. In this course, Metasploit: Getting Started you ll learn to use the Metasploit Framework to configure and launch exploits with payloads to compromise vulnerable target systems in a red team and penetration testing context. First you ll explore the Metasploit Framework architecture, which is key to understanding the framework s capabilities and inner workings. Next, you ll discover how to configure the Metasploit Framework for launching an attack. Finally, you ll learn how to use the Metasploit Framework s tools for post-exploitation activities once a system has been compromised. When you re finished with this course, you ll have the skills and knowledge of configuring and launching penetration tests needed to effectively use the Metasploit Framework

Udemy – SUBNETTING for CCNA students

Udemy – SUBNETTING for CCNA students
English | Size: 158.57 MB
Category: Networking


What you’ll learn
understand the structure of IP addresses in relation to subnet masks
calculate usable subnet given size requirements
Answer certification-type questions regarding subnetting

PluralSight – Managing Security in Google Cloud Platform

PluralSight – Managing Security in Google Cloud Platform Bookware-KNiSO
English | Size: 568.77 MB
Category: Tutorial


This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.