Jump to content

kennydoell

Members
  • Content Count

    0
  • Joined

  • Last visited

Community Reputation

37 Excellent

About kennydoell

  • Rank
    Newbie
  1. Udemy - SOFTWARE TESTING : Principles, Models, Levels, Types + Quiz English | Size: 2.12 GB Genre: eLearning <!--more--> After providing 2 best selling course in udemy now its time for next course to go viral.......... Just watch 2 Preview video and you will be clear that you want to go only with this Testing Course --> Testing concepts never explained this way ----------------------------------------------------------------------------------------------------------------------------------------------------- Do you want to become a certified tester? Want to enhance your testing skill ? Are you looking for JOB? Do you want to switch testing job? Preparing for testing interview ? Are you a student / professional who what to make career in Multinational company ? you want to understand testing concept from in-n-out ? Then this is the end for your search!! ALL-IN-ONE Software testing certification course --> Real time Examples and in-depth explanation to each topic . --> HD videos - HD Audio (no power point style reading) : Watch the preview lectures to get the feel. --> Quiz to evaluate your progress [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
  2. Udemy - Website Automation Testing for Beginners with Protractor English | Size: 3.44 GB Genre: eLearning <!--more--> Learn Website Automation This course will teach you everything you will need to know to get started automating website testing. You do not need any prior knowledge to be successful in this course. Web Foundations To be successful in web automation, you first must understand the basics of how a website works. We will teach you how to build a website from the ground up. You will be building a website using HTML, CSS, and Javascript. Protractor We will be using Protractor as out automation framework for writing our test scripts. Protractor was built for Angular applications but it is not limited to only Angular. We are going to demonstrate that by testing the HTML website what we created. Protractor is fully featured and easy to use once you learn all the fundamental concepts from this course. You may ask, "Why are we not using Selenium?". Protractor is built with Selenium at its core. What that means is that when you use Protractor, you are using Selenium. Industry Famous Tools You will learn how to use some of the most common tools in the web development and testing industry. These tools include: Protractor Visual Studio Code Node.js Bootstrap Who this course is for: QA Engineers Web Developers Anyone who wants to learn how to automate website testing Anyone who wants to automate website tasks [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
  3. Udemy - Unreal Engine C++ Developer: Learn C++ and Make Video Games English | Size: 23.7 GB Genre: eLearning <!--more--> Testing Grounds First Person Shooter shipped, including... Much more C++ and Blueprint. AI Blackboards & Behaviour Trees. Environmental Query System (EQS). Humanoid Animation Blending. Never-ending Level Design. [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
  4. Udemy - Ethical Hacking - Capture the Flag Walkthroughs - 01 English | Size: 2.36 GB Genre: eLearning <!--more--> You've taken enough ethical hacking courses. You know about the different pentesting tools but you're just not quite sure how to use them in a real-world pentest. Congratulations! You came to the right course! Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack as you've always wanted to. Using the hacking methodology, this course will teach you how to use those pentesting tools to enumerate and gain root access. Over the span of the course, you will learn the different attack vectors used to exploit a target. You'll learn Python, PHP scripting and tricks of the trade that will astound you! This is not a course for beginners, bug hunters or wanna-be script kiddies. Anyone enrolling should have a good command of the Linux terminal and be able to follow written step-by-step instructions. Each step of every capture the flag exercise is covered in a video tutorial. You've taken the ethical hacking courses, you've been introduced to the tools and the methodology. This course brings it all together showing students how to perform an actual pentest and gain root access. Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonstrates the advanced techniques and different attack vectors used by professional pentesters and hackers. Students having completed the Syberoffense Ethical Hacking course can now put to use what they have learned. You've seen the tools, heard all the war stories, now learn to hack like you've been wanting to. Don't cheat yourself! Check out the free preview of the first module of the course. Students have a lifetime a access and more CTF exercises will be added over time. Who this course is for: Those wanting to see the pentesting tools and hacking methodology being used. Those wanting to be learn advance pentesting/hacking techniques. This course is not for those new to ethical hacking. [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
  5. Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking English | Size: 5.56 GB Genre: eLearning <!--more--> This course provides learners with a basic level of competency using a hands-on approach to gaining practical experience as a penetration tester or an ethical hacker (white, grey or black). This course provides a fundamental look at offensive security concepts and techniques using a virtual install of Kali Linux and three different target victims, Windows XP, Server 2008 and Linux (Metesploitable2). This course provides a 100% hands-on on approach to learning to be an ethical hacker or a pentester. Sunday Cleaning : PREMIUM-ONLY LINKS REMOVED
  6. Pluralsight - Getting Started Analyzing Malware Infections English | Size: 248.81 MB Genre: eLearning <!--more--> Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise. Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you'll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you're finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company. [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
  7. Cisco Configuracion NETCONF - NETWORK FACULTY English | Size: 42.46 GB Genre: eLearning <!--more--> Cisco Configuracion NETCONF - NETWORK FACULTY PREMIUM-ONLY LINKS REMOVED
  8. Udemy - Master in Hacking with XSS Cross Site Scripting English | Size: 807.53 MB Genre: eLearning <!--more--> Learn the most common flaws in web applications In this course, you will learn A Cross Site Scripting (XSS) vulnerability may allow hackers to inject malicious coded scripts in web pages of a web application. When users of that web application will click on injected malicious link, hackers could steal all the browser history, cookies and other sensitive information of victim which is stored in web browser. Bug bounty company HackerOne in 2017 reported that XSS is still a major threat vector. Did You Know? Cross-site scripting at present 65% as per Cenzic vulnerability survey. What will You learn in this course? * what is XSS? * Real world examples * Different types of XSS * Creating XSS payloads * Why it is dangerous * primary and advanced XSS defense techniques. * how server and client interact with each other and how to intercept conversation of Client and Server. * How you can run script, in client browser? * will also learn about the alternative methods, if both Javascript and HTML payloads are not working. * Protecting against these attacks [Hidden Content] [Hidden Content] If any links die or problem unrar, send request to [hide][Hidden Content]]
×
×
  • Create New...