Jump to content

kingers

Wariano Leyenda
  • Posts

    293,468
  • Joined

  • Days Won

    8

Everything posted by kingers

  1. 1013.25 MB | 01:50:08 | mp4 | 1280X720 | 16:9 Language:English Genres: Documentary iMDB info https://www.imdb.com/title/tt33597045/ The story of women's baseball around the world follows the lives of seven star players at the pinnacle of their game who are forging a path forward for future generations of female athletes. ScreenShoot Download link : https://turbobit.net/rxmnwwze499c/See.Her.Be.Her.2024.720p.WEBRip.YTS.MX.rar.html https://rapidgator.net/file/90a0601d156d65424d285de1e15d5126/See.Her.Be.Her.2024.720p.WEBRip.YTS.MX.rar
  2. 1.72 GB | 8min 16s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 1 Course Overview.mp4 (4.14 MB) 10 Components of Register model P2.mp4 (6.71 MB) 11 Components of Register model P3.mp4 (6.78 MB) 13 Typical Learning Path.mp4 (7.44 MB) 14 Understanding different types of registers.mp4 (5.78 MB) 15 Implementation of Register in Verification Environmnet P1.mp4 (48.5 MB) 16 Implementation of Register in Verification Environmnet P2.mp4 (53.63 MB) 17 Alternate way of adding configure function.mp4 (3.25 MB) 18 Summary Configure function.mp4 (4.56 MB) 19 Implementation of Register in Verification Environmnet P3.mp4 (20.76 MB) 2 Agenda.mp4 (6.14 MB) 22 Adding Register with two fields.mp4 (36.86 MB) 24 Adding Register with reserved bits.mp4 (19.39 MB) 26 Different Access Policy P1.mp4 (5.13 MB) 27 Different Access Policy P2.mp4 (55.58 MB) 28 Different Access Policy P3.mp4 (43.54 MB) 29 Different Access Policy P4.mp4 (50.73 MB) 3 Advantage of UVM RAL P1.mp4 (11.98 MB) 31 Adding Memory P1.mp4 (3.69 MB) 32 Adding Memory P2.mp4 (31.41 MB) 4 Advantage of UVM RAL P2.mp4 (7.67 MB) 5 Advantage of UVM RAL P3.mp4 (4.07 MB) 6 Advantage of UVM RAL P4.mp4 (4.76 MB) 7 When to use RAL in Verification environment.mp4 (22.26 MB) 9 Components of Register model P1.mp4 (27.05 MB) 1 Agenda.mp4 (622.66 KB) 2 Adding Register Block P1.mp4 (12.36 MB) 3 Adding Register Block P2.mp4 (18.16 MB) 4 Adding Register Block P3.mp4 (59.01 MB) 1 Agenda.mp4 (3.12 MB) 10 Adapter code with Protocol Specific ports P1.mp4 (23.76 MB) 11 Adapter code with Protocol Specific ports P2.mp4 (4.46 MB) 12 Summary.mp4 (8.02 MB) 2 Usage of adapter.mp4 (2.16 MB) 3 Typical flow.mp4 (2.85 MB) 4 Structure of uvm reg bus op struct.mp4 (3.17 MB) 5 Complete flow.mp4 (7.02 MB) 6 Understanding reg2bus.mp4 (35.07 MB) 7 Understanding bus2reg.mp4 (4.35 MB) 8 Adapter code with native memory ports P1.mp4 (12.6 MB) 9 Adapter code with native memory ports P2.mp4 (14.68 MB) 1 Agenda.mp4 (1.98 MB) 10 Adding Agent.mp4 (2.88 MB) 11 Adding Register Model.mp4 (44.04 MB) 12 Adding env + uvm test top + testbench top.mp4 (15.58 MB) 13 Executing Code.mp4 (13.13 MB) 15 Understanding Desired and Mirrored Values.mp4 (10.02 MB) 16 Different register methods.mp4 (3.27 MB) 17 Working with Desired Value.mp4 (50.96 MB) 19 Working with Mirrored Value.mp4 (36.56 MB) 2 Types of Predictor Implicit Predictor.mp4 (20.61 MB) 21 Understanding predict and mirror.mp4 (23.48 MB) 22 Demonstration.mp4 (53.73 MB) 24 Single Read and Write Transaction.mp4 (30.26 MB) 25 Multiple Read and Write Transaction.mp4 (12.99 MB) 27 Using randomize.mp4 (21.18 MB) 29 Understanding Reset Methods.mp4 (6.99 MB) 3 Types of Predictor Explicit Predictor.mp4 (1.81 MB) 30 Demonstration.mp4 (40.62 MB) 32 Connecting reset methods to DUT.mp4 (15.54 MB) 4 Types of Predictor Passive Predictor.mp4 (8.61 MB) 6 Driver Sequencer Communication.mp4 (37.14 MB) 8 Understanding Design.mp4 (6.15 MB) 9 Adding Driver + Sequencer.mp4 (20.44 MB) 1 Agenda.mp4 (889.74 KB) 10 Peek and Poke P1.mp4 (15.52 MB) 11 Peek and Poke P2.mp4 (4.53 MB) 2 Type of access methods p1 Frontdoor.mp4 (4.37 MB) 3 Type of access methods p2 Backdoor.mp4 (3.93 MB) 4 Frontdoor Demonstration.mp4 (17.35 MB) 6 Fundamentals of Backdoor access.mp4 (6.72 MB) 7 Demonstration.mp4 (53.27 MB) 1 Agenda.mp4 (649.18 KB) 10 Coverage analysis P1.mp4 (37.84 MB) 11 Coverage analysis P2.mp4 (8.84 MB) 12 Coverage analysis P3.mp4 (6 MB) 2 Understanding Design for Explicit Predictor.mp4 (4.75 MB) 3 Building Verification env P1.mp4 (29.52 MB) 4 Building Verification env P2.mp4 (11.97 MB) 5 Building Verification env P3.mp4 (9.35 MB) 6 Building Verification env P4.mp4 (2.23 MB) 7 Testing Code.mp4 (12.47 MB) 1 Agenda.mp4 (1.08 MB) 12 Coverage computation for memory P1.mp4 (4.06 MB) 13 Coverage computation for memory P2.mp4 (21.51 MB) 2 Understanding Design.mp4 (5.35 MB) 3 Building DRV + MON + SCO + AGENT.mp4 (23.64 MB) 4 Building Register model.mp4 (35.07 MB) 5 Adding Register sequence Single Transaction.mp4 (54.18 MB) 6 Adding Register sequence Multiple Transactions.mp4 (10.33 MB) 9 Burst Transactions.mp4 (68.24 MB) 1 Agenda.mp4 (333.31 KB) 2 Understanding Design P1.mp4 (11 MB) 3 Understand Design P2.mp4 (12.11 MB) 4 Building Verification environment P1.mp4 (14.38 MB) 5 Building Verification environment P2.mp4 (29.25 MB) 6 Building Register model P1.mp4 (20.33 MB) 7 Building Register model P2.mp4 (17.45 MB) 8 Adding testbench top.mp4 (5.33 MB) 9 Testing DUT.mp4 (12.38 MB)] Screenshot TurboBit https://turbobit.net/2slc48cd9ao8.html https://turbobit.net/jbvld27m68vm.html RapidGator https://rapidgator.net/file/a1998ec73e8959621b16c3ee946de25c/ https://rapidgator.net/file/a7bf4af31de0a3e311b0a945c6c844bc/
  3. 2.15 GB | 20min 47s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 1 Course Overview.mp4 (2.81 MB) 1 Multiplier P1.mp4 (3.49 MB) 2 Multiplier P2.mp4 (69.8 MB) 3 Multiplier P3.mp4 (52.16 MB) 1 DFF P1.mp4 (3.28 MB) 2 DFF P1.mp4 (100.87 MB) 3 DFF P3.mp4 (29.85 MB) 1 Clock Generator for different Baud.mp4 (12.11 MB) 10 System Top.mp4 (3.98 MB) 11 Typical Transaction.mp4 (14.97 MB) 13 Verification Environment P1.mp4 (116.02 MB) 14 Verification Environment P2.mp4 (44.17 MB) 2 Verification P1.mp4 (74.4 MB) 3 Verification P2.mp4 (15.07 MB) 6 Understanding UART system.mp4 (37.93 MB) 7 UART Clock Generator.mp4 (9.08 MB) 8 UART Transmitter.mp4 (30.28 MB) 9 UART Receiver.mp4 (53.65 MB) 1 Understanding SPI Controller RTL.mp4 (44.87 MB) 10 Native SPI P2.mp4 (20.02 MB) 2 Understanding SPI Memory.mp4 (15.96 MB) 3 Typical Transactions.mp4 (24.42 MB) 4 SPI controller P1.mp4 (118.98 MB) 5 SPI controller P2.mp4 (30.47 MB) 8 Understanding Native Transactions.mp4 (18.56 MB) 9 Native SPI P1.mp4 (66.14 MB) 1 Understanding I2C.mp4 (17.94 MB) 2 I2C Slave Memory.mp4 (11.32 MB) 3 I2C Master Controller.mp4 (25.96 MB) 4 Typical Transaction to DUT.mp4 (3.9 MB) 5 Verification Environment P1.mp4 (35.1 MB) 6 Verification Environment P2.mp4 (34.26 MB) 1 Fundamentals.mp4 (16.81 MB) 2 Understanding Design.mp4 (20.22 MB) 3 Understanding Transactions.mp4 (17.19 MB) 4 ABP RAM P1.mp4 (66.61 MB) 5 ABP RAM P2.mp4 (110.86 MB) 6 ABP RAM P3.mp4 (46.98 MB) 1 Understanding AXI Channels.mp4 (7 MB) 10 Implementing Write Data Channel.mp4 (17.27 MB) 11 Implementing Write Response Channel.mp4 (4.27 MB) 12 Read Channel.mp4 (29.35 MB) 13 Implementing Read Channel.mp4 (58.26 MB) 14 Verification Environment P1.mp4 (52.71 MB) 15 Verification Environment P2.mp4 (55.38 MB) 16 Verification Environment P3.mp4 (38.04 MB) 2 Write address Channel.mp4 (29.15 MB) 3 Write Data Channel.mp4 (9.85 MB) 4 Write Response Channel.mp4 (3.87 MB) 5 Single Write Transaction.mp4 (14.49 MB) 6 Implementing Write Channel P1.mp4 (36.32 MB) 7 Understanding Burst Type P1.mp4 (25.82 MB) 8 Understanding Burst Type P2.mp4 (12.62 MB) 9 Understanding Burst Type P3.mp4 (53.86 MB) 1 Sequence Library P1.mp4 (46.04 MB) 2 Sequence Library P2.mp4 (64.32 MB) 1 Understanding TLM FIFO usage.mp4 (5.92 MB) 2 Demonstration.mp4 (67.82 MB) 4 Usage of TLM Analysis FIFO P1 Design.mp4 (2.79 MB) 5 Usage of TLM Analysis FIFO P1 Verification Env P1.mp4 (1.92 MB) 6 Usage of TLM Analysis FIFO P1 Verification Env P2.mp4 (29.11 MB) 7 Usage of TLM Analysis FIFO P1 Verification Env P3.mp4 (20.71 MB) 1 Virtual Sequencer P1.mp4 (3.09 MB) 2 Virtual Sequencer P2.mp4 (14.62 MB) 3 DUT.mp4 (3.57 MB) 4 Verification Environment P1.mp4 (27.29 MB) 5 Verification Environment P2.mp4 (17.32 MB) 6 Verification Environment P3.mp4 (23.84 MB)] Screenshot TurboBit https://turbobit.net/jjsou5ggousv.html https://turbobit.net/5yl7rjd6fny7.html https://turbobit.net/lfd6slfrgnfz.html RapidGator https://rapidgator.net/file/6d9487ae1a840a9e75781230087f023d/ https://rapidgator.net/file/564f7f7f47a34f0bb0cc3616b04d96e4/ https://rapidgator.net/file/b2434fd6bfb869e479c49aa5ee7523c9/
  4. 9.76 GB | 34min 34s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 1 -Introduction.mp4 (98.85 MB) 2 -How to access the CompTIA Pentest+ lab.mp4 (16.95 MB) 1 -What is network attacks.mp4 (29.48 MB) 10 -What mac spoofing attack LAB in Linux.mp4 (106.69 MB) 11 -VLAN hopping and double Tagging attack.mp4 (100.09 MB) 12 -DNS poisoning Attack using ettercap.mp4 (149.56 MB) 13 -Password Attacks.mp4 (64.09 MB) 14 -Password attack Demonstration LAB.mp4 (93.06 MB) 15 -Pass the hash Attack and Kerboroasting Attack.mp4 (42.56 MB) 16 -Kerboroasting a Complete LAB demo.mp4 (210.38 MB) 17 -On path attack in Network.mp4 (72.63 MB) 18 -LLMNR and NBT-NS Poisoning Attack with Example and LAB.mp4 (81.49 MB) 19 -Advance password attacks and prevention techniques.mp4 (34.92 MB) 2 -Load balance or stress testing.mp4 (63.43 MB) 20 -NAC Bypass Attack in Network.mp4 (27.42 MB) 21 -Using Reverse and bind Shell LAB.mp4 (101.85 MB) 22 -Exploit Resources Exploit-DB or Chaining.mp4 (137.29 MB) 3 -Protect transmission stream.mp4 (79.49 MB) 4 -Bluetooth Attacks in Network.mp4 (52.5 MB) 5 -RFID and NFC Attacks.mp4 (47.25 MB) 6 -ARP poisoning Attack.mp4 (67.62 MB) 7 -ARP poisoning attack using ettercap to capture password.mp4 (55.51 MB) 8 -Arp Spoofing Attack with arpspoof tool.mp4 (53.21 MB) 9 -MAC table overflow Attack.mp4 (26.48 MB) 1 -Securing Wireless Communication.mp4 (103.74 MB) 10 -Evil Twins attack.mp4 (38.55 MB) 2 -Signal transmission and Exploitation.mp4 (59.3 MB) 3 -Quick demo on capture wireless data.mp4 (32.62 MB) 4 -deauthentication attack inside wireless network.mp4 (31.08 MB) 5 -LAB deauthentication attack agains wireless network.mp4 (66.16 MB) 6 -Wi-Fi Jamming Attack.mp4 (28.05 MB) 7 -Crack WPA and WPA2 key with Demo.mp4 (59.01 MB) 8 -Cracking WEP - LAB.mp4 (33.45 MB) 9 -Cracking WPS wireless security.mp4 (54.25 MB) 1 -Mobile device vulnerability and deployment methods.mp4 (70.19 MB) 2 -Controlling access.mp4 (54.52 MB) 3 -EMM Security policies and protecting data.mp4 (94.1 MB) 4 -Vulnerability and protection of Android and iOS device.mp4 (84.48 MB) 5 -Attacking on mobile platforms.mp4 (70.11 MB) 6 -Moving through attacks and spyware.mp4 (25.89 MB) 7 -Bluetooth attack and malware analysis.mp4 (45.62 MB) 1 -Identify Vulnerabilities and attacks on IoT Devices.mp4 (184.05 MB) 2 -Leveraging the Protocols.mp4 (55.69 MB) 3 -LAB Discovering IoT devices with Shodan.mp4 (58.66 MB) 4 -Recognize Other Vulnerable Systems.mp4 (156.16 MB) 1 -Exposing Sensitive Data with improper error handling.mp4 (66.49 MB) 10 -Executing Cross Site Scripting XSS attack and Web proxy.mp4 (36.77 MB) 11 -LAB SQL Injection Attack.mp4 (33.1 MB) 12 -Overview of Web Testing Tools.mp4 (24.54 MB) 13 -Exploring the Browser Exploit Framework BeEF.mp4 (32.59 MB) 2 -Missing Input Validation and Signing the Code.mp4 (46.75 MB) 3 -Causing a Race condition.mp4 (39.92 MB) 4 -Hijacking Session Credentials.mp4 (74.96 MB) 5 -Crafting Request Forgery Attacks.mp4 (59.82 MB) 6 -Privilege Escalation.mp4 (45.31 MB) 7 -Upgrading a Non-Interactive Shell.mp4 (41.75 MB) 8 -Identifying SQLi Vulnerabilities.mp4 (77.2 MB) 9 -Traversing Files Using Invalid Input.mp4 (43.6 MB) 1 -Objectives Perform System Hacking.mp4 (10.85 MB) 2 -Net framework and Powershell in Windows 10.mp4 (37.06 MB) 3 -Command and Control C2 Frameworks.mp4 (42.16 MB) 4 -LAB Using Reverse Shell and Bind Shell.mp4 (52.85 MB) 5 -Remote Access Tool - Netcat.mp4 (43.32 MB) 6 -Communicating withing a Secure Shell (SSH).mp4 (66.03 MB) 7 -Analyze Exploit code.mp4 (64.49 MB) 1 -Analyzing and automating tasks using scripting.mp4 (97.12 MB) 2 -Basic understanding about scripting languages.mp4 (97.68 MB) 3 -LAB Exploring Programming Shells.mp4 (118.32 MB) 4 -Basics of logic construct.mp4 (94.15 MB) 5 -Data structure in python.mp4 (65.47 MB) 6 -LAB Automate the penetration testing process.mp4 (31.87 MB) 7 -Automate Penetration Testing.mp4 (29.22 MB) 1 -Password cracking method online and offline.mp4 (76.67 MB) 2 -Dictionary attack and bypass lockout policy.mp4 (71.42 MB) 3 -Bruteforce and password spraying attack.mp4 (31.39 MB) 4 -Test Credential as Linux and Windows.mp4 (69.98 MB) 5 -LAB password attack.mp4 (92.27 MB) 6 -LAB post exploitation Techniques.mp4 (289.7 MB) 1 -Define and outlining the communication Path.mp4 (57.48 MB) 2 -Communicating with Client Counterparts.mp4 (16.54 MB) 3 -Defining Contacts.mp4 (33.88 MB) 4 -Triggering Communication Events and Prioritize findings.mp4 (43.07 MB) 5 -Providing Situational Awareness and Criminal Activity.mp4 (45.68 MB) 6 -Triggering and Investigating False Positives.mp4 (36.14 MB) 7 -Presenting the Findings.mp4 (44.67 MB) 8 -Sharing and Building Reports with Dardis and Nessus.mp4 (26.24 MB) 1 -Identify Report Audience.mp4 (68.2 MB) 2 -List Report Contents.mp4 (317.99 MB) 3 -Define Best Practices for Reports.mp4 (193.65 MB) 1 -Cyber Health and Risk management.mp4 (91.24 MB) 2 -Penetration Testing Processes.mp4 (84.51 MB) 3 -PCI DSS Payment Card Industry Data security standard.mp4 (92.26 MB) 4 -GDPR and other laws.mp4 (79.26 MB) 5 -Identifying Pentesting Frameworks.mp4 (47.86 MB) 6 -Different penetration testing frameworks.mp4 (56.03 MB) 7 -Investigating CVE and CWE.mp4 (69.53 MB) 1 -Hardening the System.mp4 (67.01 MB) 2 -Sanitizing User Input.mp4 (61.08 MB) 3 -Implementing Multifactor Authentication MFA.mp4 (58.89 MB) 4 -Encrypting the password.mp4 (38.33 MB) 5 -Process-Level Remediation and Patch Management.mp4 (65.13 MB) 6 -Key rotation and Certificate Management.mp4 (49.05 MB) 7 -Providing Secret Management Solution and Network Segmentation.mp4 (38.18 MB) 1 -Assess Environmental Considerations.mp4 (161.76 MB) 2 -Outline the Rules of Engagement.mp4 (93.52 MB) 3 -Prepare Legal Documents.mp4 (99.29 MB) 1 -Discover the Target.mp4 (103.18 MB) 2 -Gather information from source code repository.mp4 (47.65 MB) 3 -Google hacking and Google hacking database.mp4 (59.8 MB) 4 -Gather information from archive and image search.mp4 (56.65 MB) 5 -Retrieve Website information.mp4 (86.76 MB) 6 -Testing ssl and TLS certificate.mp4 (89.36 MB) 7 -LAB nslookup dig and whois -1.mp4 (44.55 MB) 8 -Discover Open-Source Intelligence Tools.mp4 (103.7 MB) 9 -LAB Use tool harvester for gathering emails.mp4 (27.12 MB) 1 -Social engineering motivation Techniques.mp4 (131.05 MB) 2 -Social engineering attack.mp4 (99.09 MB) 3 -Social engineering Countermeasures.mp4 (30.02 MB) 4 -Some other type of social engineering attacks.mp4 (61.69 MB) 5 -Physical attacks in the term of social engineering.mp4 (125.31 MB) 6 -LAB - Social Engineering Toolkit.mp4 (103.83 MB) 1 -Overview of Vulnerability.mp4 (42.72 MB) 2 -Life Cycle of Vulnerability.mp4 (43.3 MB) 3 -Researching Vulnerabilities - CVE.mp4 (74.49 MB) 4 -CWE - Common Weakness Enumeration.mp4 (59.79 MB) 5 -CAPEC- Common Attack Pattern Enumeration and Classification.mp4 (64.54 MB) 6 -MITRE Attack Adversarial Tactics, Techniques and Common Knowledge.mp4 (97.25 MB) 1 -Web vulnerability scanning with Nikto.mp4 (31.89 MB) 2 -Web Vulnerability Scanning with Wapiti.mp4 (25.65 MB) 3 -Vulnerability scanning with OpenVAS.mp4 (47.09 MB) 4 -OpenVAS Report Analyze.mp4 (23.77 MB) 5 -Automating Vulnerability Scanning with Nessus.mp4 (57.31 MB) 6 -Nessus Scan Analyze the scan Report.mp4 (27.08 MB) 1 -nmap basic syntax for host discovery in the netowrk.mp4 (54.07 MB) 2 -Different scanning Techniques to Bypass Firewall, IDS and IPS.mp4 (44.95 MB) 3 -LAB host discovery by using nmap.mp4 (60.47 MB) 4 -Different techniques used for scanning ports.mp4 (63.18 MB) 5 -Fingerprinting and Enumeration with nmap.mp4 (88.66 MB) 6 -nmap script engine for Vulnerability scanning.mp4 (69.22 MB) 1 -Flying under the Radar.mp4 (93.9 MB) 2 -Bypassing network Access Control NAC.mp4 (19.74 MB) 3 -LOITL and covering the Track.mp4 (34.63 MB) 4 -Tiding Logs and Entries.mp4 (71.51 MB) 5 -Using Steganography to Hide and Conceal Data.mp4 (59.26 MB) 6 -Data Exfiltration and SSH Channel.mp4 (48 MB) 7 -Netcat and winrm to manage covert channel.mp4 (37.67 MB) 8 -Using Proxy and Proxy Chaining.mp4 (23.58 MB)] Screenshot TurboBit https://turbobit.net/ncb2nquli8jl.html https://turbobit.net/b7r9a5zxjce6.html https://turbobit.net/6qc978rlvuxr.html https://turbobit.net/8qbxt7t8rpbs.html https://turbobit.net/x6lhbayc42cs.html https://turbobit.net/322luwjch7vn.html https://turbobit.net/b3q7gzanov16.html https://turbobit.net/oczsj8d2pbii.html https://turbobit.net/4hysibey8p6r.html https://turbobit.net/b5aof7u79o1v.html RapidGator https://rapidgator.net/file/2e70d55c4dcf4ff8c5af4dc24da443f4/ https://rapidgator.net/file/4dbdc46492c2dd0fbf57be895edda63d/ https://rapidgator.net/file/b7c46741531a12aa915925437c88000e/ https://rapidgator.net/file/c0b745529dc6147ae5f74d9a92833f9f/ https://rapidgator.net/file/7014ac23d99ae7a0689379e57e556ae3/ https://rapidgator.net/file/608353cf9ee352471066269b886b50ec/ https://rapidgator.net/file/d4b81565661bf238031897a45f8b2b44/ https://rapidgator.net/file/b885a6fccc8405f79d08d16886e93690/ https://rapidgator.net/file/3e2e8b7b7f01e9dc1864b76971e44f32/ https://rapidgator.net/file/09faf2d33c2ed4a9d474adf6b10f1f7b/
  5. 9.55 GB | 37min 26s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 1 Introduction.mp4 (34.56 MB) 1 11-01-App presentation.mp4 (19.38 MB) 10 11-10-Add Stocks to LocalStorage.mp4 (109.66 MB) 11 11-11-Display Stock Portfolio.mp4 (157.76 MB) 12 11-12-Edit and Delete Stocks from the Portfolio.mp4 (91.84 MB) 13 11-13-Add investment to list and dinsplay list.mp4 (139.92 MB) 14 11-14-Edit and Delete investments from the list.mp4 (109.93 MB) 15 11-15-Analyse Gain Loss Retunr.mp4 (73.67 MB) 16 11-16-Create and Show Custom Pie Chart.mp4 (128.01 MB) 17 11-17-Save Investment data to a CSV file.mp4 (65.72 MB) 2 11-02-General setup and folder structure (HTML, CSS, JS).mp4 (15.2 MB) 3 11-03-Investment Container HTML Markup.mp4 (50.15 MB) 4 11-04-Style main App and add CSS variables.mp4 (98.35 MB) 5 11-05-Style the investment container.mp4 (70.73 MB) 6 11-06-Create HTML Markup and CSS Style for Adding Stoks.mp4 (44.33 MB) 7 11-07-Create Portfolio HTML Markup and CSS Style.mp4 (86.13 MB) 8 11-08-Create and Style the Portfolio analysis section.mp4 (81.83 MB) 9 11-09-Utility functions showAlert and formatNumbers.mp4 (66.1 MB) 1 12-01-App presentation.mp4 (11.61 MB) 10 12-10-Display chart entries with colors and percentages.mp4 (94.78 MB) 11 12-11-Save load and clear all entries from the list.mp4 (44.47 MB) 12 E12-12-Display only icons on Mobile devices.mp4 (17.55 MB) 13 12-13-Export to HTML and PDF.mp4 (98.69 MB) 2 12-02-General setup and folder structure (HTML, CSS, JS).mp4 (11.36 MB) 3 12-03-HTML section structure and gerenal CSS style for the app.mp4 (47.09 MB) 4 12-04-Entries form HTML Markup and CSS Style.mp4 (78.02 MB) 5 12-05-Summary table HTML Markup and CSS Style.mp4 (63.36 MB) 6 12-06-Entries List HTML Markup and CSS Style.mp4 (82.28 MB) 7 12-07-Get DOM Elements and add event-listeners.mp4 (40.42 MB) 8 12-08-Change the input color when the user selects a type mp4.mp4 (23.97 MB) 9 12-09- Add, delete and display antries in the list.mp4 (94.21 MB) 1 ES6 Crash course with project.mp4 (677.12 MB) 1 Section overview.mp4 (44.14 MB) 10 Add event listeners to the input.mp4 (22.47 MB) 11 Add event listeners to the form.mp4 (37.76 MB) 12 Create variables and calc the discount.mp4 (36.37 MB) 13 Change the quant using the buttons.mp4 (27.71 MB) 14 Handle the form submit.mp4 (20.3 MB) 15 Calculate the final including the discount.mp4 (26.09 MB) 16 Out the result to the DOM.mp4 (38.85 MB) 17 Style the output and result.mp4 (25.76 MB) 18 Refactor the code.mp4 (55.66 MB) 2 Setup your code space.mp4 (16 MB) 3 Create index html file and add basic HTML tags.mp4 (44.05 MB) 4 Add id's classes and props to HTML Tags.mp4 (52.68 MB) 5 Create style css.mp4 (82.97 MB) 6 Create CSS variables.mp4 (18.68 MB) 7 Style the form.mp4 (28.56 MB) 8 Style Table Buttons and input.mp4 (46.19 MB) 9 Create a JavaScript file.mp4 (38.61 MB) 1 App presentation.mp4 (10.24 MB) 10 Style and add the alert component to the DOM.mp4 (40.94 MB) 11 Check validation & Show the result (html only).mp4 (27.87 MB) 12 Style the result.mp4 (61.1 MB) 13 Create the `checkCreditScore` function.mp4 (54.75 MB) 14 Remove the result and recheck the credit score.mp4 (61.1 MB) 15 Create the responsive design for mobile, tablet and desktop devices.mp4 (23.28 MB) 2 General setup and folder structure.mp4 (7.05 MB) 3 Create the HTML markup.mp4 (30.61 MB) 4 Create the CSS styles `credit-score` form.mp4 (50.82 MB) 5 DOM elements module and global variables.mp4 (43.57 MB) 6 Form submission & validation parameters.mp4 (17.66 MB) 7 Create a validation module.mp4 (14.76 MB) 8 Validate input value & type.mp4 (27.95 MB) 9 Create the alert component module.mp4 (41.03 MB) 1 Section overview.mp4 (1.94 MB) 2 Course structure.mp4 (5.19 MB) 3 Required software.mp4 (69.07 MB) 4 Folder structure & boilerplate.mp4 (113.12 MB) 4 1 E02-04-Folder structure & boilerplate.mp4 (339.21 MB) 5 Course resources and repository.mp4 (35.63 MB) 5 1 00-boileplate.zip (2.88 KB) 1 App presentation.mp4 (16.89 MB) 10 Create CSS components structure.mp4 (27.12 MB) 11 CSS App variables.mp4 (20.37 MB) 12 Style the App container.mp4 (54.07 MB) 13 Style the World Map.mp4 (27.37 MB) 14 Style the simple currency convertor.mp4 (51.37 MB) 15 Style the world currencies convertor.mp4 (55.49 MB) 2 General setup and resources.mp4 (10.98 MB) 3 HTML markup and basic styles.mp4 (90.12 MB) 4 Add the World Map SVG using JavaScript.mp4 (30.83 MB) 5 Simple currencies convertor using JavaScript & exchange rate API.mp4 (94.31 MB) 6 Get the exchange rate from using the fetch API.mp4 (76.05 MB) 7 Get all countries from the World map.mp4 (123.55 MB) 8 Display the selected country's currency and all conversion rates.mp4 (90.18 MB) 9 Add search functionality to the currency list.mp4 (53.71 MB) 1 App presentation.mp4 (11.9 MB) 10 Display standard deduction based on status.mp4 (32.49 MB) 11 Style and Add the alert component to the DOM.mp4 (34.3 MB) 12 Display standard deduction based on status.mp4 (32.45 MB) 13 Calculate the income tax based on the tax brackets.mp4 (92.55 MB) 14 Style the result component.mp4 (52.28 MB) 15 Close results and reset all values.mp4 (28.13 MB) 2 General setup and folder structure.mp4 (19.56 MB) 3 Create the HTML markup.mp4 (56.23 MB) 4 Create `style css` and import `variables css` files.mp4 (19.41 MB) 5 Create `global css` style.mp4 (76.65 MB) 6 Create and Style the `form css` file.mp4 (125.3 MB) 7 Create the main app js and get DOM elements module with global variables.mp4 (33.67 MB) 8 Add event listener to the `calculate-button` & get the input values.mp4 (21.83 MB) 9 Validate input and add alert component.mp4 (29.59 MB) 1 App presentation.mp4 (17.38 MB) 10 Handle labels error and success with`handleLabel js`.mp4 (98.32 MB) 11 Calculate and display retirement savings.mp4 (62.91 MB) 12 Get calculated values for the table.mp4 (51.63 MB) 13 Check for successful calculations of the retirement.mp4 (35.5 MB) 14 Display and style the table component.mp4 (61 MB) 15 Create and add a new row element.mp4 (73.92 MB) 16 Clear the input fields and hide the results.mp4 (37.02 MB) 17 Delete a row from the table.mp4 (52.76 MB) 2 General setup and folder structure.mp4 (13.26 MB) 3 Create the HTML markup.mp4 (51.16 MB) 4 Create `global css` and `variables css` style.mp4 (62.41 MB) 5 Style the `calculator-container css` file.mp4 (91.88 MB) 6 Style global `btn css` file.mp4 (30.42 MB) 7 Add onclick to the `calculateBtn` & get the input values.mp4 (53.69 MB) 8 Validate each individual input.mp4 (62.42 MB) 9 Create and Style the alert component in `alert css` and `showAlert js`.mp4 (85.62 MB) 1 07-01-App presentation.mp4 (80.34 MB) 2 07-02-General setup and folder structure.mp4 (29.47 MB) 3 07-03-Create the HTML markup.mp4 (38.27 MB) 4 07-04-Create short-news section.mp4 (46.99 MB) 5 07-05-Create stocks crypto and forex maps section.mp4 (97.13 MB) 6 07-06-Create detailed analytics section.mp4 (70.03 MB) 7 07-07-Style the side navigator.mp4 (85.04 MB) 8 07-08-Toggle maps and detaild chart mp4.mp4 (119.26 MB) 1 App presentation.mp4 (18.16 MB) 10 Manage the ADD button click event.mp4 (47.59 MB) 11 Calculate total the budget.mp4 (42.77 MB) 12 Calculate the total per category.mp4 (94.64 MB) 13 Create and Style the Alert components.mp4 (169.55 MB) 14 Update the budget list and add to category.mp4 (96.55 MB) 15 Remove elements form the budget list.mp4 (36.12 MB) 16 Edit elements from the budget list.mp4 (56.2 MB) 17 Save and load data from local storage.mp4 (74.45 MB) 18 Clear budget list when requested.mp4 (30.33 MB) 2 General setup and folder structure (HTML, CSS, JS).mp4 (24.23 MB) 3 Create the HTML markup for app-container, header and inputs-container.mp4 (73 MB) 4 08-04-Create `main css`, `variables css` and the `app-container css`.mp4 (44.91 MB) 5 Create and styles the `btn css` components.mp4 (45.59 MB) 6 Style the `header-container css` and `inputs-container css`.mp4 (51.95 MB) 7 Create the HTML markup for the budget list.mp4 (82.13 MB) 8 Create and style `budget-list-header css` and `budget-list-container css`.mp4 (122.43 MB) 9 Get DOM elements and create global variables.mp4 (19.24 MB) 1 App presentation.mp4 (15.1 MB) 10 Calculate and display monthly contribution.mp4 (103.34 MB) 11 Toggle interest rate input.mp4 (22.38 MB) 12 Calculate months with interest.mp4 (113.14 MB) 13 Bars style.mp4 (59.64 MB) 14 Form group validation.mp4 (25.87 MB) 2 General setup and folder structure (HTML, CSS, JS).mp4 (20.97 MB) 3 Create the HTML markup for app-container, and parameters-form.mp4 (43.25 MB) 4 Create `main css`, `variables css` and style the `app-container css`.mp4 (50.77 MB) 5 Create and styles `form css`.mp4 (60.73 MB) 6 Create the HTML markup for goal-list and style it with `goal-list css`.mp4 (35.19 MB) 7 Create the main app js file and Get DOM elements.mp4 (28.76 MB) 8 Calculate and display the goal amount.mp4 (39.92 MB) 9 Calculate and display current savings.mp4 (80.03 MB) 1 10-01-App presentation.mp4 (6.26 MB) 2 10-02-General setup and folder structure (HTML, CSS, JS).mp4 (17.05 MB) 3 10-03-Create the HTML markup for app-container, and Loan conditions.mp4 (61.38 MB) 4 10-04-Create `style css`, `variables css` and style the `app-container css`.mp4 (35.34 MB) 5 10-05-Create and styles `form css`.mp4 (40.72 MB) 6 10-06-Get DOM elements and manipulate input values.mp4 (43.25 MB) 7 10-07-Calculate loan `calculateLoan js` - create a function that calculates the.mp4 (76.88 MB) 8 10-08-Display and style `results js`.mp4 (30.94 MB) 9 10-09-Create and style Pie Chart.mp4 (74.33 MB)] Screenshot TurboBit https://turbobit.net/xj3rvf1szvlq.html https://turbobit.net/3qw52pevxfz9.html https://turbobit.net/ngzcwvw1sqmv.html https://turbobit.net/snhg5hmha15j.html https://turbobit.net/6ldhcgktnky6.html https://turbobit.net/le26z4eg6f41.html https://turbobit.net/hxv187lnt0ok.html https://turbobit.net/7xhlc0f3ofek.html https://turbobit.net/w30omx52jln1.html https://turbobit.net/vbpoaemo22h4.html RapidGator https://rapidgator.net/file/a14001272fec8a37608b4478d49ff3c1/ https://rapidgator.net/file/5217b1e0bc32d9a46ad34e0bece40316/ https://rapidgator.net/file/1dd3dc301944f8d748d0408442aa8074/ https://rapidgator.net/file/7f280775f61f3ab36ab0afb78954e095/ https://rapidgator.net/file/fa26e94331c5fa4f10ec198cf3f4bcaf/ https://rapidgator.net/file/66f5864895a154acff42777c20dc8c34/ https://rapidgator.net/file/a8e2bc44fe11a072fbf348ab17950af0/ https://rapidgator.net/file/733a536243ec03aeaf57293ad77f869d/ https://rapidgator.net/file/ae39d97b8c812db7e125a9f39cdb4d28/ https://rapidgator.net/file/9b9afc5bff42141b4dfabc4fb1f0f41e/
  6. 1.69 GB | 00:24:20 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English Files Included : 01 1 1 - The What and Why of State Management and Stores.mp4 (8.97 MB) 02 1 2 - Creating a Store from Scratch.mp4 (15.82 MB) 03 1 3 - Collecting effects with effectScope.mp4 (16.07 MB) 04 1 3 1 - Touring the Exercise Platform.mp4 (26.49 MB) 05 1 4 - Creating our own defineStore().mp4 (35.92 MB) 06 1 5 - Dependency Injection with provide and inject.mp4 (26.13 MB) 07 1 6 - Exercise - Use inject and provide to ensure our stores are app-specific.mp4 (21.28 MB) 08 1 7 - Bonus Exercise Introduction.mp4 (5.66 MB) 09 1 7 - Bonus Exercise Solution.mp4 (68.7 MB) 10 1 8 - Why use Pinia.mp4 (7.23 MB) 11 2 1 - Quick start with Pinia.mp4 (16.31 MB) 12 2 2 - The root state AKA the Pinia instance.mp4 (16.14 MB) 13 2 3 - The three pillars of Pinia- State.mp4 (26.08 MB) 14 2 3 1 - Practicing store's state.mp4 (18.7 MB) 15 2 4 - The three pillars of Pinia- Getters.mp4 (54.72 MB) 16 2 4 1 - Practicing store getters.mp4 (25.35 MB) 17 2 5 - The three pillars of Pinia- Actions.mp4 (32.23 MB) 18 2 5 1 Practicing store actions.mp4 (34.85 MB) 19 2 6 - Correctly Typing a Store.mp4 (45.81 MB) 20 2 7 - Building a gradient color generator.mp4 (90.2 MB) 21 3 1 - When should we use storeToRefs, toRef and toRefs.mp4 (23.31 MB) 22 3 2 - How does useStore work.mp4 (20.94 MB) 23 3 3 - Faster development with Hot Module Replacement (HMR).mp4 (16.85 MB) 24 3 4 fixing broken stores.mp4 (28.57 MB) 25 4 1 - What are Setup Stores and how do they compare to Option Stores.mp4 (38.69 MB) 26 4 2 - Why both Syntaxes.mp4 (10.03 MB) 27 4 3 - When to choose one syntax over the other.mp4 (38.03 MB) 28 4 4 - Setup Stores Weakness.mp4 (12.15 MB) 29 5 1 - Introduction of the Devtools.mp4 (21.54 MB) 30 6 1 - Keeping stores simple.mp4 (5.62 MB) 31 6 2 - partitioning setup stores.mp4 (37.75 MB) 32 6 3 exercise intro.mp4 (5.02 MB) 33 6 3 solution refactoring stores 2.mp4 (65.1 MB) 34 6 4 creating private state 2.mp4 (15.87 MB) 35 6 5 1 exercise introduction.mp4 (10.21 MB) 36 6 5 1 exercise solution.mp4 (7.95 MB) 37 6 5 2 exercise solution.mp4 (16.83 MB) 38 6 5 3 exercise solution.mp4 (17.03 MB) 39 6 5 4 exercise solution.mp4 (16.97 MB) 40 6 6 Using Composables in Option Stores.mp4 (23.35 MB) 41 6 7 Using Composables in Setup Stores 4.mp4 (15.64 MB) 42 6 8 (Not) Overusing stores 3.mp4 (14.5 MB) 43 6 8 ex data fetching introduction.mp4 (15.14 MB) 44 6 8 ex solution Part 1 - useQuery data fetching.mp4 (90.7 MB) 45 6 8 ex solution Part 2 - useMutation data fetching.mp4 (45.04 MB) 46 7 1 SSR-friendly state mp4.mp4 (19.02 MB) 47 7 2 Complex state serialization.mp4 (26.24 MB) 48 7 3 Complex state in Nuxt with Payload plugins.mp4 (8.3 MB) 49 7 4 State Hydration in Option Stores.mp4 (20.49 MB) 50 7 5 State Hydration in Setup Stores.mp4 (12.5 MB) 51 8 1 Introduction.mp4 (4.79 MB) 52 8 2 Unit Testing Stores.mp4 (23.4 MB) 53 8 4 ex introduction Testing Stores.mp4 (1.96 MB) 54 8 4 ex solution Testing Stores.mp4 (45.94 MB) 55 8 3 Stores with Plugins.mp4 (17.13 MB) 56 8 5 Mocking Stores.mp4 (58.22 MB) 57 8 6 ex Mocking Stores.mp4 (2.23 MB) 58 8 6 ex solution Mocking Stores.mp4 (59.69 MB) 59 9 1 What is a Pinia Plugin 2.mp4 (12.34 MB) 60 9 2 Adding new properties to the store UPDATED.mp4 (17.86 MB) 61 9 3 Adding new state to stores.mp4 (11.86 MB) 62 9 4 Subscribing to state changes UPDATED.mp4 (22.19 MB) 63 9 5 Intercepting actions.mp4 (29.3 MB) 64 9 6 defining custom options.mp4 (28.01 MB) 65 9 7 ex Retry failed actions.mp4 (18.59 MB) 66 9 7 ex solution Retry failed actions.mp4 (64.48 MB) env d.ts (282 B) ClientOnly.ts (286 B) entry-client.ts (212 B) entry-server.ts (2.5 KB) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (443 B) my-pinia.ts (65 B) store.ts (533 B) custom-defineStore spec.ts (3.41 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (160 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) dango-shop.ts (795 B) store-getters spec.ts (4.39 KB) dango-shop.ts (208 B) dango.ts (933 B) store-actions spec.ts (4.79 KB) dango.ts (370 B) gradient-generator.ts (2.07 KB) gradien-generator spec.ts (2.77 KB) gradient-generator.ts (587 B) todo-list-1 spec.ts (1.77 KB) todo-list-2 spec.ts (2.53 KB) todo-list-3 spec.ts (3.63 KB) todos.ts (1.43 KB) todos.ts (1.43 KB) template spec.ts (304 B) clickaway.ts (963 B) open-file.ts (983 B) files.ts (356 B) index.ts (665 B) logging.ts (4.58 KB) settings.ts (2.24 KB) testing.ts (11.29 KB) welcome.ts (3.14 KB) main.ts (1.43 KB) router.ts (2.56 KB) index.ts (1.7 KB) tailwind config.ts (197 B) envSetup.ts (797 B) handlers.ts (516 B) server.ts (565 B) utils.ts (2.27 KB) vitest config.ts (778 B) vite config.ts (4.64 KB) contacts.ts (1.5 KB) memes.ts (407 B) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (293 B) my-pinia.ts (65 B) store.ts (467 B) custom-defineStore spec.ts (3.44 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (190 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) template spec.ts (304 B) clickaway.ts (963 B) files.ts (324 B) index.ts (646 B) logging.ts (3.22 KB) settings.ts (2.06 KB) testing.ts (7.83 KB) welcome.ts (2.8 KB) main.ts (704 B) router.ts (2.67 KB) index.ts (307 B) tailwind config.ts (197 B) envSetup.ts (771 B) handlers.ts (1.3 KB) server.ts (565 B) utils.ts (1.32 KB) vitest config.ts (800 B) vite config.ts (2.7 KB) env d.ts (282 B) aic.ts (3.25 KB) auth.ts (2.51 KB) contacts.ts (2.06 KB) memes.ts (1.91 KB) todos.ts (3.36 KB) ClientOnly.ts (286 B) entry-client.ts (212 B) entry-server.ts (2.58 KB) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (443 B) my-pinia.ts (65 B) store.ts (533 B) custom-defineStore spec.ts (3.41 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (160 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) dango-shop.ts (795 B) store-getters spec.ts (4.39 KB) dango-shop.ts (208 B) dango.ts (933 B) store-actions spec.ts (4.79 KB) dango.ts (370 B) gradient-generator.ts (2.07 KB) gradien-generator spec.ts (2.77 KB) gradient-generator.ts (587 B) todo-list-1 spec.ts (1.77 KB) todo-list-2 spec.ts (2.53 KB) todo-list-3 spec.ts (3.63 KB) todos.ts (1.43 KB) todos.ts (1.43 KB) todo-list spec.ts (4.28 KB) tasks.ts (3.78 KB) todos.ts (1.25 KB) tasks.ts (364 B) todos.ts (4.28 KB) private-state spec.ts (1.81 KB) auth.ts (997 B) auth.ts (727 B) private-store spec.ts (1.75 KB) private-state.ts (660 B) store-private-state.ts (705 B) private-state.ts (453 B) store-private-state.ts (705 B) private-store spec.ts (2.37 KB) private-store.ts (634 B) store-private-store.ts (858 B) private-store.ts (635 B) store-private-store.ts (858 B) readonly-store spec.ts (2.06 KB) readonly-state.ts (1.14 KB) store-readonly-state.ts (687 B) readonly-state.ts (454 B) store-readonly-state.ts (687 B) data-fetching-store.ts (5.79 KB) data-fetching spec.ts (16.2 KB) use-mutation.ts (2.48 KB) use-query.ts (3.68 KB) data-fetching-store.ts (3.87 KB) use-mutation.ts (1.49 KB) use-query.ts (2.33 KB) test spec.ts (122 B) auth spec.ts (4.27 KB) auth.ts (2.42 KB) preferences.ts (355 B) auth spec.ts (2.17 KB) auth.ts (2.42 KB) preferences.ts (355 B) test spec.ts (125 B) mocking-stores spec.ts (7.03 KB) auth.ts (2.53 KB) preferences.ts (465 B) mocking-stores spec.ts (4.4 KB) auth.ts (2.53 KB) preferences.ts (465 B) index.ts (198 B) retry-plugin spec.ts (6.19 KB) retry-plugin.ts (3.54 KB) art-gallery.ts (1.71 KB) retry-plugin.ts (1.52 KB) art-gallery.ts (1.71 KB) template spec.ts (304 B) clickaway.ts (963 B) open-file.ts (983 B) router.ts (1.17 KB) files.ts (356 B) index.ts (665 B) logging.ts (4.58 KB) settings.ts (2.24 KB) testing.ts (12.21 KB) welcome.ts (3.14 KB) main.ts (1.76 KB) pinia-state.ts (846 B) router.ts (3.43 KB) index.ts (1.7 KB) tailwind config.ts (197 B) envSetup.ts (797 B) handlers.ts (1.02 KB) server.ts (634 B) utils.ts (2.27 KB) vitest config.ts (769 B) vite config.ts (4.7 KB) env d.ts (282 B) auth.ts (694 B) contacts.ts (1.5 KB) memes.ts (1.91 KB) ClientOnly.ts (286 B) entry-client.ts (212 B) entry-server.ts (2.5 KB) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (443 B) my-pinia.ts (65 B) store.ts (533 B) custom-defineStore spec.ts (3.41 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (160 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) dango-shop.ts (795 B) store-getters spec.ts (4.39 KB) dango-shop.ts (208 B) dango.ts (933 B) store-actions spec.ts (4.79 KB) dango.ts (370 B) gradient-generator.ts (2.07 KB) gradien-generator spec.ts (2.77 KB) gradient-generator.ts (587 B) todo-list-1 spec.ts (1.68 KB) todo-list-2 spec.ts (2.44 KB) todo-list-3 spec.ts (3.5 KB) todos.ts (1.43 KB) todos.ts (1.43 KB) private-state spec-d.ts (516 B) template spec.ts (304 B) clickaway.ts (963 B) files.ts (356 B) index.ts (665 B) logging.ts (4.44 KB) settings.ts (2.24 KB) testing.ts (8.53 KB) welcome.ts (2.84 KB) main.ts (1.43 KB) router.ts (2.56 KB) index.ts (307 B) tailwind config.ts (197 B) envSetup.ts (797 B) handlers.ts (242 B) server.ts (565 B) utils.ts (2.27 KB) vitest config.ts (1010 B) vite config.ts (3.8 KB) env d.ts (335 B) aic.ts (3.25 KB) auth.ts (2.51 KB) contacts.ts (2.06 KB) memes.ts (1.91 KB) todos.ts (3.36 KB) ClientOnly.ts (286 B) entry-client.ts (212 B) entry-server.ts (2.58 KB) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (443 B) my-pinia.ts (65 B) store.ts (533 B) custom-defineStore spec.ts (3.41 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (160 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) dango-shop.ts (795 B) store-getters spec.ts (4.39 KB) dango-shop.ts (208 B) dango.ts (933 B) store-actions spec.ts (4.79 KB) dango.ts (370 B) gradient-generator.ts (2.07 KB) gradien-generator spec.ts (2.84 KB) gradient-generator.ts (587 B) todo-list-1 spec.ts (1.77 KB) todo-list-2 spec.ts (2.51 KB) todo-list-3 spec.ts (3.61 KB) todos.ts (1.43 KB) todos.ts (1.43 KB) todo-list spec.ts (4.28 KB) tasks.ts (3.78 KB) todos.ts (1.25 KB) tasks.ts (364 B) todos.ts (4.28 KB) private-state spec.ts (1.81 KB) auth.ts (997 B) auth.ts (727 B) private-store spec.ts (1.75 KB) private-state.ts (703 B) store-private-state.ts (705 B) private-state.ts (453 B) store-private-state.ts (705 B) private-store spec.ts (2.37 KB) private-store.ts (634 B) store-private-store.ts (858 B) private-store.ts (635 B) store-private-store.ts (858 B) readonly-store spec.ts (2.06 KB) readonly-state.ts (1.18 KB) store-readonly-state.ts (687 B) readonly-state.ts (454 B) store-readonly-state.ts (687 B) data-fetching-store.ts (5.79 KB) data-fetching spec.ts (16.18 KB) use-mutation.ts (2.48 KB) use-query.ts (3.68 KB) data-fetching-store.ts (3.87 KB) use-mutation.ts (1.49 KB) use-query.ts (2.33 KB) test spec.ts (122 B) auth spec.ts (4.29 KB) auth.ts (2.42 KB) preferences.ts (355 B) auth spec.ts (2.17 KB) auth.ts (2.42 KB) preferences.ts (355 B) test spec.ts (125 B) mocking-stores spec.ts (6.99 KB) auth.ts (2.49 KB) preferences.ts (465 B) mocking-stores spec.ts (4.4 KB) auth.ts (2.53 KB) preferences.ts (465 B) index.ts (198 B) retry-plugin spec.ts (6.19 KB) retry-plugin.ts (3.54 KB) art-gallery.ts (1.71 KB) retry-plugin.ts (1.52 KB) art-gallery.ts (1.71 KB) template spec.ts (304 B) clickaway.ts (963 B) open-file.ts (978 B) router.ts (1.15 KB) files.ts (356 B) index.ts (660 B) logging.ts (4.58 KB) settings.ts (2.24 KB) testing.ts (12.36 KB) welcome.ts (3.14 KB) main.ts (1.76 KB) pinia-state.ts (846 B) router.ts (2.86 KB) index.ts (1.55 KB) tailwind config.ts (197 B) envSetup.ts (788 B) handlers.ts (1.02 KB) server.ts (634 B) utils.ts (2.28 KB) vitest config.ts (814 B) vite config.ts (4.57 KB) env d.ts (282 B) aic.ts (3.25 KB) auth.ts (2.51 KB) contacts.ts (2.06 KB) memes.ts (1.91 KB) todos.ts (3.36 KB) ClientOnly.ts (286 B) entry-client.ts (212 B) entry-server.ts (2.58 KB) custom-defineStore spec.ts (1.76 KB) my-pinia.ts (501 B) store.ts (443 B) my-pinia.ts (65 B) store.ts (533 B) custom-defineStore spec.ts (3.41 KB) index.ts (171 B) my-pinia.ts (1008 B) store.ts (339 B) my-pinia.ts (585 B) store.ts (339 B) injectionKey.ts (160 B) tab-manager spec.ts (2.1 KB) injectionKey.ts (118 B) mutation.ts (797 B) api.ts (10.54 KB) index.ts (2.12 KB) deck-review.ts (5.67 KB) decks.ts (2.06 KB) mutation.ts (505 B) api.ts (10.54 KB) index.ts (461 B) deck-review.ts (2.7 KB) decks.ts (399 B) dango-shop.ts (146 B) store-state spec.ts (5.12 KB) dango-shop.ts (112 B) dango-shop.ts (795 B) store-getters spec.ts (4.39 KB) dango-shop.ts (208 B) dango.ts (933 B) store-actions spec.ts (4.79 KB) dango.ts (370 B) gradient-generator.ts (2.07 KB) gradien-generator spec.ts (2.77 KB) gradient-generator.ts (587 B) todo-list-1 spec.ts (1.77 KB) todo-list-2 spec.ts (2.53 KB) todo-list-3 spec.ts (3.63 KB) todos.ts (1.43 KB) todos.ts (1.43 KB) todo-list spec.ts (4.28 KB) tasks.ts (3.78 KB) todos.ts (1.25 KB) tasks.ts (364 B) todos.ts (4.28 KB) private-state spec.ts (1.81 KB) auth.ts (997 B) auth.ts (727 B) private-store spec.ts (1.75 KB) private-state.ts (660 B) store-private-state.ts (705 B) private-state.ts (453 B) store-private-state.ts (705 B) private-store spec.ts (2.37 KB) private-store.ts (634 B) store-private-store.ts (858 B) private-store.ts (635 B) store-private-store.ts (858 B) readonly-store spec.ts (2.06 KB) readonly-state.ts (1.14 KB) store-readonly-state.ts (687 B) readonly-state.ts (454 B) store-readonly-state.ts (687 B) data-fetching-store.ts (5.79 KB) data-fetching spec.ts (16.2 KB) use-mutation.ts (2.48 KB) use-query.ts (3.68 KB) data-fetching-store.ts (3.87 KB) use-mutation.ts (1.49 KB) use-query.ts (2.33 KB) test spec.ts (122 B) auth spec.ts (4.27 KB) auth.ts (2.42 KB) preferences.ts (355 B) auth spec.ts (2.17 KB) auth.ts (2.42 KB) preferences.ts (355 B) test spec.ts (125 B) mocking-stores spec.ts (7.03 KB) auth.ts (2.53 KB) preferences.ts (465 B) mocking-stores spec.ts (4.4 KB) auth.ts (2.53 KB) preferences.ts (465 B) index.ts (198 B) retry-plugin spec.ts (6.19 KB) retry-plugin.ts (3.54 KB) art-gallery.ts (1.71 KB) retry-plugin.ts (1.52 KB) art-gallery.ts (1.71 KB) template spec.ts (304 B) clickaway.ts (963 B) open-file.ts (983 B) router.ts (1.17 KB) files.ts (356 B) index.ts (665 B) logging.ts (4.58 KB) settings.ts (2.24 KB) testing.ts (12.21 KB) welcome.ts (3.14 KB) main.ts (1.86 KB) pinia-state.ts (846 B) router.ts (3.43 KB) index.ts (1.7 KB) tailwind config.ts (197 B) envSetup.ts (797 B) handlers.ts (1.02 KB) server.ts (634 B) utils.ts (2.27 KB) vitest config.ts (769 B) vite config.ts (4.7 KB)] Screenshot TurboBit https://turbobit.net/p17b4cms2uum/MasteringPinia_The_complete_guide_to_Mastering_Pinia.part1.rar.html https://turbobit.net/cdnhdr1ka7hi/MasteringPinia_The_complete_guide_to_Mastering_Pinia.part2.rar.html RapidGator https://rapidgator.net/file/42c76f82acc9bed5c2544d27c1125515/MasteringPinia_The_complete_guide_to_Mastering_Pinia.part1.rar https://rapidgator.net/file/a1719642631e05fda40895ffd7c06f37/MasteringPinia_The_complete_guide_to_Mastering_Pinia.part2.rar FileFactory
  7. 9.48 GB | 00:11:56 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English Files Included : 001 Course Introduction.mp4 (69.33 MB) 002 Adopting a Well-Architected Framework.mp4 (102.64 MB) 003 Introducing the AWS Well-Architected Framework.mp4 (153.4 MB) 001 Security 101.mp4 (259.47 MB) 002 Exploring Foundations and Identity.mp4 (165.73 MB) 003 Applying Detection.mp4 (129.15 MB) 004 Understanding Protection.mp4 (216.65 MB) 006 Reviewing Incident Response.mp4 (169.2 MB) 007 Diving into Application Security.mp4 (140.02 MB) 008 Section Review.mp4 (161.65 MB) 001 Cost Optimization 101.mp4 (201.52 MB) 002 Understanding Financial Awareness.mp4 (118.8 MB) 003 Exploring Expenditure and Usage.mp4 (55.82 MB) 004 Selecting Cost-Effective Resources.mp4 (208.88 MB) 006 Managing Demand and Supply Resources.mp4 (78.53 MB) 007 Applying Continuous Optimization.mp4 (162.96 MB) 008 Section Review.mp4 (120.18 MB) 001 Operational Excellence 101.mp4 (168.56 MB) 002 Understanding Organization in the Cloud.mp4 (118.37 MB) 003 Preparing for Operational Excellence in the Cloud.mp4 (204.85 MB) 004 Operating According to Best Practices.mp4 (170.8 MB) 005 Evolving According to Best Practices.mp4 (56.42 MB) 007 Section Review.mp4 (108.42 MB) 001 Performance Efficiency 101.mp4 (140.94 MB) 002 Understanding Selection and Review Part 1.mp4 (144.77 MB) 003 Understanding Selection and Review Part 2.mp4 (167.39 MB) 004 Monitoring and Trade-Offs.mp4 (71.09 MB) 006 Section Review.mp4 (94.97 MB) 001 Reliability 101.mp4 (165.68 MB) 002 Applying Foundations.mp4 (178.11 MB) 003 Reviewing Workload Architecture.mp4 (118.58 MB) 004 Managing Change.mp4 (124.7 MB) 005 Managing Failure Part 1.mp4 (133.2 MB) 006 Managing Failure Part 2.mp4 (229.13 MB) 008 Section Review.mp4 (135.83 MB) 001 Sustainability 101.mp4 (192.06 MB) 002 Diving into the Improvement Process.mp4 (137.8 MB) 003 Exploring Region Selection and Demand Alignment.mp4 (145.17 MB) 004 Reviewing Software and Architecture.mp4 (156.37 MB) 005 Understanding Data and Hardware.mp4 (111.39 MB) 006 Applying Process and Culture.mp4 (127.33 MB) 008 Section Review.mp4 (103.43 MB) 001 AWS Lenses and Guidance.mp4 (108.36 MB) 002 Reviewing Container Build and High-Performance Computing Lenses.mp4 (202.29 MB) 003 Understanding SAP and Financial Services Industry Lenses.mp4 (250.73 MB) 004 Introducing Serverless Applications and Software as a Service Lenses.mp4 (243.16 MB) 005 Applying Hybrid Networking and Game Industry Lenses Part 1.mp4 (171.51 MB) 006 Applying Hybrid Networking and Game Industry Lenses Part 2.mp4 (278.6 MB) 007 Exploring Machine Learning and Internet of Things (IoT) Lenses.mp4 (275.1 MB) 008 Diving into Streaming Media and Data Analytics Lenses.mp4 (243.64 MB) 009 Understanding Operational Readiness Reviews.mp4 (204.57 MB) 010 Reviewing Disaster Recovery of Workloads on AWS.mp4 (294.88 MB) 012 Exploring the Management and Governance Cloud Environment Guide.mp4 (304.1 MB) 013 Section Wrap-Up.mp4 (160.5 MB) 001 Applying the Framework.mp4 (58.25 MB) 002 The AWS Well-Architected Tool 101.mp4 (67.81 MB) 003 Walking through the AWS Well-Architected Tool.mp4 (138.25 MB) 004 Case Study 1 Replatforming Over Time.mp4 (162.11 MB) 005 Case Study 2 Evolving While Meeting Changing Requirements.mp4 (176.72 MB) 001 Course Review and Summary.mp4 (110 MB) 002 Continuous Learning and Whats Next.mp4 (63.27 MB)] Screenshot https://turbobit.net/h5wezbwyljbb/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part01.rar.html https://turbobit.net/hy3cuy4f624f/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part02.rar.html https://turbobit.net/gmwk41gmkv4x/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part03.rar.html https://turbobit.net/s8r005wl3xzb/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part04.rar.html https://turbobit.net/0ghgzf7ybdiv/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part05.rar.html https://turbobit.net/4w69a9xncwd4/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part06.rar.html https://turbobit.net/0bv8y4nllzw8/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part07.rar.html https://turbobit.net/gusngdqwz969/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part08.rar.html https://turbobit.net/pnaxfde80su9/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part09.rar.html https://turbobit.net/8vej2drebzn7/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part10.rar.html RapidGator https://rapidgator.net/file/7ae7ce08475b549401f8b29f7c9e9c32/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part01.rar https://rapidgator.net/file/32c94e39d9570889c6373540fdddf5a4/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part02.rar https://rapidgator.net/file/5c5faac60dca402c01efae3a362a0ced/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part03.rar https://rapidgator.net/file/8504aeb00ce6eb486e604d2132eb1752/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part04.rar https://rapidgator.net/file/8187489d4edce537c7cbc90e147ccc4f/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part05.rar https://rapidgator.net/file/b47c19fd6a8c19b6c6b51af5964e1eb1/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part06.rar https://rapidgator.net/file/2e5505e9288c75d9c4ae56f8572f4a64/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part07.rar https://rapidgator.net/file/e878fc9d3e05c4c5c96b6e81717060f9/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part08.rar https://rapidgator.net/file/b999f4f7fca99c287596c7de01205365/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part09.rar https://rapidgator.net/file/ac3ce40801b633b4ab4d46c8696e3453/Acloud_Guru_-_AWS_Well-Architected_Framework_Deep_Dive.part10.rar FileFactory
  8. 8.18 GB | 00:52:09 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English Files Included : ConnectingToTheLab-Linux.mp4 (23.26 MB) ConnectingToTheLab-WebBrowser.mp4 (17.02 MB) ConnectingToTheLab-Windows.mp4 (15.63 MB) 01-Introduction.mp4 (28.08 MB) 02-Introduction to Active Directory.mp4 (21.46 MB) 03-PowerShell.mp4 (76.15 MB) 04-Methodology.mp4 (19.26 MB) 05-Access The Lab.mp4 (55.4 MB) 06-Domain Enumeration.mp4 (169.34 MB) 07-Domain Enumeration - ACLs.mp4 (87.79 MB) 08-Domain Enumeration - Trusts.mp4 (71.96 MB) 09-Domain Enumeration - User Hunting.mp4 (52.16 MB) 10-Privilege Escalation.mp4 (58.35 MB) 11-Feature Abuse.mp4 (28 MB) 12-Learning Objective 5.mp4 (60.81 MB) 13-Domain Enumeration - BloodHound.mp4 (33.57 MB) 14-Lateral Movement - PowerShell Remoting.mp4 (49.02 MB) 15-Lateral Movement.mp4 (69.72 MB) 16-Offensive NET.mp4 (58.16 MB) 17-Learning Objective 7.mp4 (170.06 MB) 18-Kerberos.mp4 (32.79 MB) 19-About Kerberos.mp4 (16.9 MB) 20-Golden Ticket.mp4 (123.51 MB) 21-Silver Ticket.mp4 (29.57 MB) 22-Diamond Ticket.mp4 (44.98 MB) 23-Skeleton Key.mp4 (12.53 MB) 24-DSRM.mp4 (25.93 MB) 25-Custom SSP.mp4 (17.79 MB) 26-AdminSDHolder.mp4 (33.02 MB) 27-Rights Abuse.mp4 (17.01 MB) 28-Security Descriptors.mp4 (76.38 MB) 29-Kerberoast.mp4 (146.82 MB) 30-Kerberos Delegation.mp4 (40.11 MB) 31-Unconstrained Delegation.mp4 (41.44 MB) 32-Constrained Delegation & Learning Objective 16.mp4 (126.41 MB) 33-RBCD & Learning Objective 17.mp4 (89.23 MB) 34-Across Trusts & Learning Objective 18.mp4 (62.89 MB) 35-Learning Objective 19.mp4 (19.52 MB) 36-Cross Forest & Learning Objective 20.mp4 (62.39 MB) 37-ADCS & Learning Objective 21.mp4 (119.12 MB) 38-Trust Abuse - MSSQL Servers & Learning Objective 22.mp4 (94.3 MB) 39-EDR - MDE.mp4 (80.51 MB) 40-Learning Objective 23.mp4 (35.85 MB) 41-DetectionAndDefense Part-1.mp4 (72.26 MB) 42-DetectionAndDefense Part-2.mp4 (30.56 MB) 43-DetectionAndDefense Part-3.mp4 (13.97 MB) 00-CourseIntroduction.mp4 (139.93 MB) 01-DomainEnumeration-Part1.mp4 (218.1 MB) 02-DomainEnumeration-part2.mp4 (178.72 MB) 03-DomainEnumeration-Part3.mp4 (145.43 MB) 04-DomainEnumeration-part4.mp4 (209.44 MB) 05-LocalPrivilegeEscalation-Part1.mp4 (172.92 MB) 06-LocalPrivilegeEscalation-Part2.mp4 (106.36 MB) 07-DomainEnumeration-BloodHound.mp4 (135.4 MB) 08-LateralMovement.mp4 (185.13 MB) 09-DomainPersistence-Part1.mp4 (170.62 MB) 10-DomainPersistence-Part2.mp4 (163.37 MB) 11-DomainPersistence-Part3.mp4 (100.34 MB) 12-DomainPersistence-Part4.mp4 (165.9 MB) 13-DomainPersistence-Part5.mp4 (143.58 MB) 14-DomainPrivEsc-Kerberoast.mp4 (170.21 MB) 15-DomainPrivEsc-UnconstrainedDelegation.mp4 (153.1 MB) 16-DomainPrivEsc-ConstrainedDelegation.mp4 (151.99 MB) 17-DomainPrivEsc-DNSAdmins.mp4 (84.43 MB) 18-DomainPrivEsc-EnterpriseAdmins.mp4 (156.61 MB) 19-CrossForestAttacks.mp4 (119.71 MB) 20-ForestPersistence-DCShadow.mp4 (173.04 MB) 21-DetectionAndDefense-Part1.mp4 (180.26 MB) 22-DetectionAndDefense-Part2.mp4 (129.45 MB) 23-DetectionAndDefense-Part3.mp4 (114.9 MB) 24-DetectionAndDefense-Part4.mp4 (297.62 MB) 25-DetectionAndDefense-Part5.mp4 (230.3 MB) 26-Walkthrough-Objective1to4.mp4 (102.24 MB) 27-Walkthrough-Objective5.mp4 (92.55 MB) 28-Walkthrough-Objective6.mp4 (28.6 MB) 29-Walkthrough-Objective7.mp4 (120.89 MB) 30-Walkthrough-Objective8to11.mp4 (95.83 MB) 31-Walkthrough-Objective12to13.mp4 (78.59 MB) 32-Walkthrough-Objective14to16.mp4 (70.49 MB) 33-Walkthrough-Objective17to18.mp4 (55.09 MB) 34-Walkthrough-Objective19to20.mp4 (47.51 MB) 35-Walkthrough-Objective21to22.mp4 (53.54 MB) 36-Walkthrough-Objective23.mp4 (71.24 MB) LearningObjective-1.mp4 (60.95 MB) LearningObjective-10.mp4 (3.98 MB) LearningObjective-11.mp4 (16.34 MB) LearningObjective-12.mp4 (15.35 MB) LearningObjective-13.mp4 (21.22 MB) LearningObjective-15.mp4 (64.78 MB) LearningObjective-16.mp4 (20.53 MB) LearningObjective-17.mp4 (12.86 MB) LearningObjective-18.mp4 (16.55 MB) LearningObjective-19.mp4 (2.6 MB) LearningObjective-2.mp4 (6.49 MB) LearningObjective-20.mp4 (13.55 MB) LearningObjective-21.mp4 (46.29 MB) LearningObjective-3.mp4 (5.64 MB) LearningObjective-5.mp4 (80.2 MB) LearningObjective-6.mp4 (25.4 MB) LearningObjective-7 Derivative.mp4 (49.37 MB) LearningObjective-7 Jenkins.mp4 (25.37 MB) LearningObjective-8.mp4 (31.79 MB) LearningObjective-9.mp4 (14.63 MB) LearningObjective14.mp4 (13.61 MB) LearningObjective22.mkv (80.13 MB) LearningObjective23.mp4 (38.19 MB) LearningObjective4.mkv (21.91 MB)] Screenshot TurboBit https://turbobit.net/9hqzpey11mn4/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part01.rar.html https://turbobit.net/oo6zf83hhr3p/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part02.rar.html https://turbobit.net/aad8t6z6gxl4/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part03.rar.html https://turbobit.net/4ai5myo3dute/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part04.rar.html https://turbobit.net/6j3bdgpdhsjc/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part05.rar.html https://turbobit.net/h07yael7eqwb/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part06.rar.html https://turbobit.net/87d0m2o6q5d0/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part07.rar.html https://turbobit.net/6nruo9ruces5/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part08.rar.html https://turbobit.net/lfyudadxjk4p/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part09.rar.html RapidGator https://rapidgator.net/file/af3dc85fbcb7f7b0a62b0dfe0d06f7bf/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part01.rar https://rapidgator.net/file/e4a6334cbcfda62b1b69d75a5096871d/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part02.rar https://rapidgator.net/file/2f227170f519a5b3bf3e1b406017821b/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part03.rar https://rapidgator.net/file/0c4416eb9133d06e10ebe7e7ad2be8f0/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part04.rar https://rapidgator.net/file/d6642314bceee7202c51722c437a551c/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part05.rar https://rapidgator.net/file/945909924a2c8e3f3b47b678001a8a3b/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part06.rar https://rapidgator.net/file/81d8fcf765060b9794a91df5174956e9/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part07.rar https://rapidgator.net/file/3904ed061c4c8f8a5670e57ef390f0bf/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part08.rar https://rapidgator.net/file/0bdcee67e1684aa5d7821b14140c978f/Altered.Security.-.Certified.Red.Team.Professional.CRTP.part09.rar FileFactory
  9. 10.61 GB | 00:05:44 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English Files Included : 001 Course Introduction.mp4 (49.6 MB) 002 About the Exam.mp4 (47.53 MB) 001 Getting Your Head in the Cloud.mp4 (101.39 MB) 002 Introducing Cloud Computing and Deployment Models.mp4 (74.95 MB) 003 Exploring Regions and Availability Zones.mp4 (86 MB) 004 Reviewing Edge Locations and Local Zones.mp4 (58.02 MB) 005 Introducing the Frameworks.mp4 (146.91 MB) 006 Meeting the AWS Management Console and Accessing AWS.mp4 (89.39 MB) 007 Demo Exploring Your Amazon Web Services (AWS) Account.mp4 (81.4 MB) 008 Foundations of Cloud Computing Exam Tips.mp4 (87.85 MB) 001 Compute The Bigger Picture.mp4 (155.62 MB) 002 Reviewing EC2 Features.mp4 (64.48 MB) 003 Demo Exploring Compute Services - EC2 in Action.mp4 (107.38 MB) 004 Containers The Bigger Picture.mp4 (103.7 MB) 005 Serverless Services The Bigger Picture.mp4 (96.73 MB) 006 Understanding Serverless Services Pricing and Features.mp4 (32.51 MB) 007 Demo Exploring Compute Services - Lambda in Action.mp4 (51.88 MB) 009 Introducing Additional Compute Services.mp4 (81.25 MB) 010 Compute Technology and Services Exam Tips.mp4 (63.09 MB) 001 Exploring Amazon EC2 Storage.mp4 (150.13 MB) 002 Amazon Simple Storage Service (S3) The Bigger Picture.mp4 (83.78 MB) 003 Exploring S3 Storage Classes.mp4 (141.15 MB) 004 Demo Exploring Storage Services - S3 in Action.mp4 (84.47 MB) 006 Introducing Additional Storage Services.mp4 (43.26 MB) 007 Amazon Elastic Block Store (EBS).mp4 (192.06 MB) 008 AWS Storage Gateway.mp4 (100.17 MB) 009 Overview of AWS Backup.mp4 (125.34 MB) 010 Storage Exam Tips.mp4 (138.8 MB) 001 Content Delivery The Bigger Picture.mp4 (103.46 MB) 002 AWS Global Accelerator.mp4 (99.28 MB) 003 Networking The Bigger Picture.mp4 (146.42 MB) 004 Demo Exploring Networking Services - VPC in Action.mp4 (85.16 MB) 006 DNS The Bigger Picture.mp4 (113.79 MB) 007 Applying Hybrid Models with Networking Services.mp4 (118.16 MB) 008 Content Delivery and Networking Exam Tips.mp4 (165.61 MB) 001 Databases The Bigger Picture.mp4 (127.51 MB) 002 Understanding AWS Database Migration Services.mp4 (99.66 MB) 003 Amazon DynamoDB.mp4 (82.71 MB) 004 Overview of Memory-Based Databases in AWS.mp4 (80.25 MB) 005 Database Exam Tips.mp4 (109.19 MB) 001 What Is CICD.mp4 (59.08 MB) 002 AWS Development Tools.mp4 (94.87 MB) 003 Demo Working with AWS CloudShell and the AWS Command Line Interface (AWS CLI).mp4 (60.87 MB) 004 Demo Using AWS Cloud9.mp4 (117.54 MB) 005 Understanding AWS CodeArtifact.mp4 (77.59 MB) 006 Decoupling Application Components.mp4 (62.37 MB) 007 Introducing Amazon Simple Notification Service (SNS).mp4 (35.6 MB) 009 Introducing Amazon Simple Queue Service (SQS).mp4 (50.11 MB) 010 Standard And FIFO Queues.mp4 (53.09 MB) 011 Short Polling vs Long Polling.mp4 (53.03 MB) 012 What Is Amazon Simple Email Service (SES).mp4 (23.6 MB) 013 Introducing Amazon EventBridge.mp4 (53.26 MB) 014 Understanding Step Functions.mp4 (58.18 MB) 015 Deploying Infrastructure as Code with AWS CloudFormation.mp4 (76.42 MB) 017 What Is AWS Elastic Beanstalk.mp4 (58.2 MB) 018 Demo Deploying an Application Using Elastic Beanstalk.mp4 (138.73 MB) 019 Demo Using AWS X-Ray to Identify Performance Issues.mp4 (166.64 MB) 020 Development Messaging and Deployment Exam Tips - Part 1.mp4 (75.6 MB) 021 Development Messaging and Deployment Exam Tips - Part 2.mp4 (120.46 MB) 001 Introducing the AWS Snow Family.mp4 (127.69 MB) 002 Identifying Database Migration Tools.mp4 (59.67 MB) 003 Exploring the AWS Transfer Family.mp4 (72.71 MB) 004 AWS DataSync.mp4 (75.41 MB) 005 Understanding AWS Application Discovery Service.mp4 (68.64 MB) 006 Introducing AWS Application Migration Service.mp4 (53.71 MB) 007 Discovering AWS Migration Hub.mp4 (32.73 MB) 008 Migration and Transfer Exam Tips.mp4 (124.53 MB) 001 Amazon Redshift and Redshift Serverless.mp4 (68.23 MB) 002 What Is Amazon Kinesis.mp4 (86.38 MB) 003 Exploring Kinesis Data Firehose.mp4 (55.56 MB) 004 What Is Amazon Athena.mp4 (38.88 MB) 005 Demo Using Athena to Query Data.mp4 (178.32 MB) 006 Introducing AWS Glue.mp4 (37.21 MB) 007 Exploring AWS Data Exchange.mp4 (40.72 MB) 008 Understanding Amazon Elastic Map Reduce (EMR).mp4 (51.21 MB) 009 What is Amazon OpenSearch.mp4 (55.8 MB) 010 Exploring Managed Streaming for Apache Kafka (Amazon MSK).mp4 (57.28 MB) 011 Understanding Amazon QuickSight.mp4 (52.36 MB) 012 Machine Learning With Amazon SageMaker.mp4 (51.93 MB) 013 What Is Amazon Kendra.mp4 (53.45 MB) 014 Understanding Amazon Lex.mp4 (49.79 MB) 015 Demo Using Amazon Polly.mp4 (51.15 MB) 016 Introducing Amazon Comprehend.mp4 (39.55 MB) 017 Amazon Textract Amazon Transcribe and Amazon Translate.mp4 (64.38 MB) 018 Demo Using Amazon Transcribe.mp4 (29.7 MB) 019 Demo Amazon Rekognition in Action.mp4 (168.64 MB) 020 Artificial Intelligence Machine Learning and Analytics Exam Tips - Part 1.mp4 (111.05 MB) 021 Artificial Intelligence Machine Learning and Analytics Exam Tips - Part 2.mp4 (102.18 MB) 001 Introducing Monitoring and Logging on AWS.mp4 (105.4 MB) 002 Exploring Amazon CloudWatch and AWS CloudTrail.mp4 (121.95 MB) 003 Demo Getting to Know CloudWatch Dashboards.mp4 (117.03 MB) 004 Managing Many Resources on AWS.mp4 (57.73 MB) 006 Monitoring Service Health and Best Practices.mp4 (43.29 MB) 007 Understanding Auditing on AWS.mp4 (117.2 MB) 008 Identifying Business and End User Services.mp4 (37.91 MB) 009 Auditing Monitoring and Logging Exam Tips.mp4 (86.54 MB) 001 Security The Bigger Picture.mp4 (104.8 MB) 002 What Do We Need To Secure on AWS.mp4 (149.38 MB) 003 Illustrating the Principle of Least Privilege.mp4 (118.05 MB) 004 What Is IAM.mp4 (118.32 MB) 006 Leveraging Existing Identity Providers.mp4 (65.92 MB) 007 Keeping Secrets Safe.mp4 (125.54 MB) 008 Exploring Network Security Services.mp4 (107.52 MB) 009 What Is Security Hub.mp4 (64.42 MB) 010 Demo Exploring Security Hub.mp4 (166.99 MB) 011 Responding to Security Events.mp4 (91.91 MB) 012 Growing Your Security Muscles.mp4 (74.76 MB) 013 Governing Multiple Accounts on AWS.mp4 (95.24 MB) 014 Understanding Compliance on AWS.mp4 (81.75 MB) 015 Security Compliance and Governance Exam Tips.mp4 (185.85 MB) 001 Cloud Costs The Bigger Picture.mp4 (80.4 MB) 002 Optimizing the Cost of Compute.mp4 (76.08 MB) 003 Understanding Data Storage Costs.mp4 (90.93 MB) 005 Understanding Data Transfer Costs.mp4 (70.91 MB) 006 Monitoring and Predicting Costs on AWS.mp4 (81.2 MB) 007 Demo Setting a Budget Alert in Your AWS Account.mp4 (104.12 MB) 008 Managing Costs in a Multi-Account Environment.mp4 (56.74 MB) 009 Monitoring The Cost of Resource Groups.mp4 (32.04 MB) 010 Seeking Support From AWS.mp4 (68.36 MB) 011 Exploring Other Sources of Support.mp4 (13.93 MB) 012 Pricing Billing and Support Exam Tips.mp4 (78.97 MB) 001 Preparing for the Exam.mp4 (56.23 MB) 002 Question Breakdown Cloud Concepts.mp4 (79.24 MB) 003 Question Breakdown Security and Compliance.mp4 (65.66 MB) 004 Question Breakdown Cloud Technology and Services.mp4 (56.2 MB) 005 Question Breakdown Billing Pricing and Support.mp4 (55.93 MB) 009 Conclusion and Whats Next.mp4 (70.73 MB)] Screenshot https://turbobit.net/snucow0f5cp7/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part01.rar.html https://turbobit.net/xs5rzxhw11q1/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part02.rar.html https://turbobit.net/bfxoh7vg5xt8/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part03.rar.html https://turbobit.net/wcfql2lp7gpi/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part04.rar.html https://turbobit.net/yfqdw47kzoec/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part05.rar.html https://turbobit.net/0emr5yeva1ov/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part06.rar.html https://turbobit.net/fzyxhbcb3f9m/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part07.rar.html https://turbobit.net/lgb0netuu9pr/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part08.rar.html https://turbobit.net/94iz1ofc35fi/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part09.rar.html https://turbobit.net/eglhrveijost/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part10.rar.html https://turbobit.net/e9ssmjvbx23w/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part11.rar.html RapidGator https://rapidgator.net/file/e28b80ae7e8a3bd60ff540c3f5e78956/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part01.rar https://rapidgator.net/file/63c3f718f4a7d088ad469202356ee595/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part02.rar https://rapidgator.net/file/7740889d95a25113327ae32d2c843828/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part03.rar https://rapidgator.net/file/55afab1c3323c2f0f55b0e4d8a0f1a03/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part04.rar https://rapidgator.net/file/9951fa612ce293ee55636f85288ade94/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part05.rar https://rapidgator.net/file/67a837d799a0073581c0d85210991049/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part06.rar https://rapidgator.net/file/a928e28972fb06e10d0dd11146613d9a/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part07.rar https://rapidgator.net/file/b0c51ca4300feb70a2ae160bf2cc7d11/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part08.rar https://rapidgator.net/file/0ce30a3d1213e5fd4f75a275fac87e30/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part09.rar https://rapidgator.net/file/40510b326d8ea1e37190dbc2fcca7b61/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part10.rar https://rapidgator.net/file/36ec4befd8c6a2728d27f95fde722d2c/Acloud_Guru_-_AWS_Certified_Cloud_Practitioner_CLF-C02.part11.rar
  10. 30+ React Projects, Learn React JS by Building 30+ Web Apps Duration: 13:02:51 | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 6 GB Genre: eLearning | Language: English Learn React.js and its most powerful and commonly used React Hooks like, useState, useEffect, useRef, useContext. What you'll learn Learn how to work with the React JavaScript Framework and create awesem web applications Learn all the React Hooks like (useState, useEffect, useContext, useMemo, useRef) and use them in simple to more complex projects Create powerful React Components witch you can use in later projects Learn how to install and use React Icons and use them in a multitude of projects Learn how to install and use React Styled Components and use them in a multitude of projects Learn to create simple-to-grasp workflows using using React powerful libraries Learn JSX syntax for extended HTML Requirements Basic HTML Basic CSS Basic JavaScript PC or Mac Description About This Course This React Course is a project based Course that focuses on sharpening your skills as a Web Developer by creating modern Web Applications using the React JavaScript Framework and its large library of npm packages. This course will also teach you the most powerful and commonly used React Hooks like, useState, useEffect, useRef, useContext and together with them you will be able to build powerful reusable components for future projects. This course will use only functional components and NOT class based components. Who is this course for? This course if for beginner and intermediate React developers who want to create a solid react projects portfolio with modern web applications ranging form simple to more complex ones, while also learning: Structure Use of React Hooks Creation of reusable React components What will you learn in this course? By taking this course you will learn multiple use cases for the most powerful and commonly used React Hooks like, useState, useEffect, useRef, useContext. You will also learn: How to process data using local db's and server based db using mock servers. How to use React Icons How to use React styled components. How to use React routing system How to install and use third party npm packages and more much much more. . Why you should learn ReactJS? React saves you time and money on development because it's component-based. You can break down an interface into reusable components that allow you to build dynamic user interfaces. This taps into the current thinking behind 'Design Systems'. What is React ? React is a free and open-source front-end JavaScript library for building user interfaces based on UI components. It is maintained by Meta and a community of individual developers and companies Here are even more reasons why you should learn React. 1. React is declarative 2. React makes app development easier 3. The React community is amazing 4. React is all about Reusable Components 5. React is used by huge organizations 6. React is SEO-friendly 7. React fully embraces JavaScript and TypeScript 8. React has a fast learning curve At the end of the course, you will be able to build 30 Web Apps Here are all of the projects we are going to build in this course: E-signature-app Randomize-colors Like my photo Testimonials Alerts in web apps Temperature-controller Dark-mode Unlock slider Slider App Hidden-search-bar Magic Popup. My name is Norbert Who this course is for: Beginner React developers who are looking to learn React js. Beginner Front End developers who want to learn a front end JavaScript Framework. Beginner developers who want to create simple-to-grasp dev workflows and have Ultimate flexibility and compatibility. Developers who seek High performance reinforced by Virtual DOM and Hassle-free reusability. of components Beginner or intermediate web developers who want to understand Reacts unique hooks. More Info TurboBit https://turbobit.net/eai06xxgzgma/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part1.rar.html https://turbobit.net/453z0cw2tf6p/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part2.rar.html https://turbobit.net/0i81ck8kvey4/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part3.rar.html https://turbobit.net/haaspvd7yab2/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part4.rar.html https://turbobit.net/4fww18yp3ksn/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part5.rar.html https://turbobit.net/a6xqt58zjlb5/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part6.rar.html https://turbobit.net/um9uzlzjiury/30%2B.React.Projects.Learn.React.JS.by.Building.30%2B.Web.Apps.part7.rar.html RapidGator https://rapidgator.net/file/7c368f1d23142fb0ad8af102704738a2/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part1.rar https://rapidgator.net/file/083ccab6145d5258cb40e48c7e57e1b0/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part2.rar https://rapidgator.net/file/71945ae293122d8e49ff5e4e54652cec/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part3.rar https://rapidgator.net/file/c54f35e105060c9448cfbb5860dbf6a7/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part4.rar https://rapidgator.net/file/a7b5e6058a2508f3849d569ec4d29033/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part5.rar https://rapidgator.net/file/e2e6aba3bf518102f857c827fbf890cb/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part6.rar https://rapidgator.net/file/1b10d1460fe0f4e92b524559cf3d3519/30_.React.Projects.Learn.React.JS.by.Building.30_.Web.Apps.part7.rar FileFactory
  11. 263.61 MB | 00:05:59 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English Files Included : 1 How to design a cloud career pathway.mp4 (2.05 MB) 1 Why do I need a cloud career guide.mp4 (5.13 MB) 2 What are infrastructure roles.mp4 (7.48 MB) 3 What are developer roles.mp4 (6.5 MB) 4 What are data science roles.mp4 (4.85 MB) 5 What are architect roles.mp4 (6.85 MB) 1 What are networking and monitoring tasks.mp4 (5.71 MB) 2 What are security and observability tasks.mp4 (6.84 MB) 3 What are scripting and automation tasks.mp4 (4.87 MB) 1 What are application development tasks.mp4 (5.21 MB) 2 What are unstructured and structured data tasks.mp4 (2.22 MB) 3 What are programming languages and patterns skills.mp4 (7.16 MB) 1 What are AWS certifications.mp4 (29.88 MB) 2 What are Azure certifications.mp4 (13.53 MB) 3 What are GCP certifications.mp4 (16.24 MB) 4 What are NVIDIA or Databricks certifications.mp4 (16.48 MB) 1 Which skills for network admin to cloud infrastructure.mp4 (5.84 MB) 2 Which skills for developer to cloud developer.mp4 (6.63 MB) 3 Which skills for data scientist to cloud data scientist.mp4 (4.46 MB) 4 Which skills for architect to cloud architect.mp4 (5.2 MB) 1 Use GenAI for cloud developers.mp4 (21.01 MB) 2 Use GenAI for cloud DevOps.mp4 (13.84 MB) 3 Use GenAI for cloud SecOps.mp4 (22.38 MB) 4 Use GenAI for cloud DataOps.mp4 (12.74 MB) 5 Use GenAI for cloud architecture.mp4 (24.88 MB) 1 How can I learn more about a career in the cloud.mp4 (5.63 MB)] Screenshot https://turbobit.net/qy28tgnmw6qw/Linkedin.Learning.Cloud.Computing.Careers.And.Certifications.rar.html https://rapidgator.net/file/9512dc150fb94d76abd9663b8d7048a9/Linkedin.Learning.Cloud.Computing.Careers.And.Certifications.rar
  12. 192.23 MB | 00:07:44 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 01 - Welcome.mp4 (4.85 MB) 02 - What you should know.mp4 (2.35 MB) 03 - Using the exercise files.mp4 (3.02 MB) 01 - What is automated testing.mp4 (6.08 MB) 02 - Python-Selenium bindings.mp4 (9.37 MB) 03 - A simple code example.mp4 (3.31 MB) 04 - Cross-browser support.mp4 (7.97 MB) 05 - Cross-browser support.mp4 (11.14 MB) 01 - What is the HTML DOM structure.mp4 (2.52 MB) 02 - Locating elements by ID.mp4 (8.69 MB) 03 - Locating elements by name.mp4 (4.02 MB) 04 - Locating elements by XPath.mp4 (11.03 MB) 05 - Locating elements by class.mp4 (5.96 MB) 06 - Challenge.mp4 (3.34 MB) 07 - Solution.mp4 (15.43 MB) 08 - Challenge.mp4 (3.38 MB) 09 - Solution.mp4 (15.75 MB) 10 - Challenge.mp4 (2.28 MB) 11 - Solution.mp4 (9.01 MB) 01 - Page interaction.mp4 (5.83 MB) 02 - Filling forms.mp4 (11.89 MB) 03 - Drag and drop elements.mp4 (7.25 MB) 04 - Challenge.mp4 (3.44 MB) 05 - Solution.mp4 (14.68 MB) 01 - What are waits and why do we need them.mp4 (3.91 MB) 02 - Explicit waits.mp4 (7.85 MB) 03 - Implicit waits.mp4 (5.03 MB) 01 - Next steps.mp4 (2.64 MB)] Screenshot https://turbobit.net/7aplafvramum/LinkedIn.-.Python.Automation.and.Testing.rar.html https://rapidgator.net/file/b6429d7ec810070291277a3d8bc99e29/LinkedIn.-.Python.Automation.and.Testing.rar
  13. 4.19 GB | 00:02:18 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : 01 introduction-to-course-5.mp4 (16.06 MB) 04 da-queshia-my-path-to-cybersecurity.mp4 (13.9 MB) 01 welcome-to-module-1.mp4 (10.16 MB) 02 the-what-why-and-how-of-asset-security.mp4 (20.75 MB) 04 tri-life-in-asset-security.mp4 (16.96 MB) 05 security-starts-with-asset-classification.mp4 (16.89 MB) 01 assets-in-a-digital-world.mp4 (17.96 MB) 01 elements-of-a-security-plan.mp4 (20.22 MB) 02 the-nist-cybersecurity-framework.mp4 (20.35 MB) 01 wrap-up.mp4 (6.83 MB) 01 welcome-to-module-2.mp4 (9.84 MB) 02 security-controls.mp4 (19.6 MB) 06 heather-the-importance-of-protecting-pii.mp4 (14.55 MB) 01 fundamentals-of-cryptography.mp4 (22.57 MB) 02 public-key-infrastructure.mp4 (21.15 MB) 07 non-repudiation-and-hashing.mp4 (13.51 MB) 01 access-controls-and-authentication-systems.mp4 (18.28 MB) 03 the-mechanisms-of-authorization.mp4 (25.17 MB) 04 why-we-audit-user-activity.mp4 (16.24 MB) 05 tim-finding-purpose-in-protecting-assets.mp4 (6.95 MB) 01 wrap-up.mp4 (8.23 MB) 01 welcome-to-module-3.mp4 (9.15 MB) 02 vulnerability-management.mp4 (21.96 MB) 03 defense-in-depth-strategy.mp4 (19.92 MB) 04 common-vulnerabilities-and-exposures.mp4 (27.86 MB) 01 vulnerability-assessments.mp4 (19.46 MB) 04 omad-my-learning-journey-into-cybersecurity.mp4 (9.89 MB) 01 protect-all-entry-points.mp4 (22.54 MB) 04 niru-adopt-an-attacker-mindset.mp4 (18.08 MB) 05 pathways-through-defenses.mp4 (22.4 MB) 01 wrap-up.mp4 (11.83 MB) 01 welcome-to-module-4.mp4 (8.59 MB) 02 the-criminal-art-of-persuasion.mp4 (21.7 MB) 04 phishing-for-information.mp4 (24.02 MB) 01 malicious-software.mp4 (24.52 MB) 03 the-rise-of-cryptojacking.mp4 (23.67 MB) 01 cross-site-scripting-xss.mp4 (21.5 MB) 02 exploitable-gaps-in-databases.mp4 (17.44 MB) 01 a-proactive-approach-to-security.mp4 (17.07 MB) 02 chantelle-the-value-of-diversity-in-cybersecurity.mp4 (13.42 MB) 03 pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 (17.8 MB) 01 wrap-up.mp4 (8.07 MB) 02 course-wrap-up.mp4 (17.66 MB) 01 introduction-to-course-7.mp4 (18.04 MB) 03 angel-my-personal-career-journey.mp4 (16.51 MB) 01 welcome-to-module-1.mp4 (7.8 MB) 02 python-and-cybersecurity.mp4 (20.08 MB) 04 create-a-basic-python-script.mp4 (8.44 MB) 07 akash-python-and-the-cybersecurity-professional.mp4 (5.72 MB) 01 data-types-in-python.mp4 (19.4 MB) 03 work-with-variables-in-python.mp4 (21.69 MB) 01 conditional-statements-in-python.mp4 (17.68 MB) 03 for-loops.mp4 (12.2 MB) 04 while-loops.mp4 (10.19 MB) 01 wrap-up.mp4 (3.43 MB) 01 welcome-to-module-2.mp4 (5.01 MB) 02 introduction-to-functions.mp4 (13.82 MB) 03 create-a-basic-function.mp4 (7.14 MB) 01 use-parameters-in-functions.mp4 (10.62 MB) 02 return-statements.mp4 (13.7 MB) 04 explore-built-in-functions.mp4 (21 MB) 01 modules-and-libraries.mp4 (11.35 MB) 03 code-readability.mp4 (19.2 MB) 05 dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 (11.39 MB) 01 wrap-up.mp4 (3.75 MB) 01 welcome-to-module-3.mp4 (4.89 MB) 02 string-operations.mp4 (21.28 MB) 03 string-indices-and-slices.mp4 (20.29 MB) 01 list-operations-in-python.mp4 (19.31 MB) 02 write-a-simple-algorithm.mp4 (16.32 MB) 01 regular-expressions-in-python.mp4 (21.86 MB) 01 wrap-up.mp4 (3.67 MB) 01 welcome-to-module-4.mp4 (5.14 MB) 02 automate-cybersecurity-tasks-with-python.mp4 (19.07 MB) 04 clancy-continual-learning-and-python.mp4 (11.33 MB) 01 access-a-text-file-in-python.mp4 (10.51 MB) 03 parse-a-text-file-in-python.mp4 (10.01 MB) 05 develop-a-parsing-algorithm-in-python.mp4 (15.23 MB) 01 debugging-strategies.mp4 (23.1 MB) 02 matt-learning-from-mistakes.mp4 (28.17 MB) 03 apply-debugging-strategies.mp4 (13.56 MB) 01 wrap-up.mp4 (2.89 MB) 02 course-wrap-up.mp4 (11.84 MB) 01 introduction-to-course-6.mp4 (7.17 MB) 04 dave-grow-your-cybersecurity-career-with-mentors.mp4 (13.9 MB) 01 welcome-to-module-1.mp4 (5.79 MB) 02 introduction-to-the-incident-response-lifecycle.mp4 (16.65 MB) 01 incident-response-teams.mp4 (12.64 MB) 02 fatima-the-importance-of-communication-during-incident-response.mp4 (15.18 MB) 04 incident-response-plans.mp4 (9.73 MB) 01 incident-response-tools.mp4 (5.66 MB) 02 the-value-of-documentation.mp4 (10.94 MB) 03 intrusion-detection-systems.mp4 (5.61 MB) 05 alert-and-event-management-with-siem-and-soar-tools.mp4 (14.97 MB) 01 wrap-up.mp4 (2.42 MB) 01 welcome-to-module-2.mp4 (3.79 MB) 02 casey-apply-soft-skills-in-cybersecurity.mp4 (13.89 MB) 03 the-importance-of-network-traffic-flows.mp4 (13.01 MB) 05 data-exfiltration-attacks.mp4 (16.15 MB) 01 packets-and-packet-captures.mp4 (10.78 MB) 03 interpret-network-communications-with-packets.mp4 (8.03 MB) 04 reexamine-the-fields-of-a-packet-header.mp4 (14.08 MB) 01 packet-captures-with-tcpdump.mp4 (9.44 MB) 01 wrap-up.mp4 (3.29 MB) 01 welcome-to-module-3.mp4 (3.54 MB) 02 the-detection-and-analysis-phase-of-the-lifecycle.mp4 (8.88 MB) 04 mk-changes-in-the-cybersecurity-industry.mp4 (13.39 MB) 01 the-benefits-of-documentation.mp4 (9.28 MB) 02 document-evidence-with-chain-of-custody-forms.mp4 (13.04 MB) 04 the-value-of-cybersecurity-playbooks.mp4 (13.57 MB) 01 the-role-of-triage-in-incident-response.mp4 (12.2 MB) 02 robin-foster-cross-team-collaboration.mp4 (14.14 MB) 04 the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 (10.08 MB) 01 the-post-incident-activity-phase-of-the-lifecycle.mp4 (8.73 MB) 01 wrap-up.mp4 (2.85 MB) 01 welcome-to-module-4.mp4 (5.03 MB) 02 the-importance-of-logs.mp4 (13.59 MB) 04 rebecca-learn-new-tools-and-technologies.mp4 (9.32 MB) 05 variations-of-logs.mp4 (12.09 MB) 01 security-monitoring-with-detection-tools.mp4 (12.87 MB) 03 grace-security-mindset-in-detection-and-response.mp4 (13.85 MB) 04 components-of-a-detection-signature.mp4 (12.93 MB) 05 examine-signatures-with-suricata.mp4 (8.49 MB) 06 examine-suricata-logs.mp4 (7.5 MB) 01 reexamine-siem-tools.mp4 (9.55 MB) 03 query-for-events-with-splunk.mp4 (9.51 MB) 04 query-for-events-with-chronicle.mp4 (8.66 MB) 01 wrap-up.mp4 (3.47 MB) 02 course-wrap-up.mp4 (5.75 MB) 01 welcome-to-the-google-cybersecurity-certificate.mp4 (47.29 MB) 04 welcome-to-week-1.mp4 (4.67 MB) 01 introduction-to-cybersecurity.mp4 (23.11 MB) 02 toni-my-path-to-cybersecurity.mp4 (20 MB) 03 responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 (14.5 MB) 04 nikki-a-day-in-the-life-of-a-security-engineer.mp4 (16.05 MB) 01 core-skills-for-cybersecurity-professionals.mp4 (19.65 MB) 02 veronica-my-path-to-working-in-cybersecurity.mp4 (11.01 MB) 04 the-importance-of-cybersecurity.mp4 (17.84 MB) 01 wrap-up.mp4 (3.99 MB) 01 welcome-to-module-2.mp4 (6.71 MB) 02 past-cybersecurity-attacks.mp4 (22.5 MB) 03 attacks-in-the-digital-age.mp4 (25.52 MB) 05 sean-keep-your-cool-during-a-data-breach.mp4 (13.88 MB) 01 introduction-to-the-eight-cissp-security-domains-part-1.mp4 (18.32 MB) 02 introduction-to-the-eight-cissp-security-domains-part-2.mp4 (17.31 MB) 01 wrap-up.mp4 (7.36 MB) 01 welcome-to-module-3.mp4 (14.48 MB) 02 introduction-to-security-frameworks-and-controls.mp4 (23.41 MB) 03 secure-design.mp4 (18.58 MB) 05 heather-protect-sensitive-data-and-information.mp4 (16.82 MB) 01 ethics-in-cybersecurity.mp4 (22.54 MB) 03 holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 (14.62 MB) 01 wrap-up.mp4 (4.7 MB) 01 welcome-to-module-4.mp4 (7.04 MB) 02 common-cybersecurity-tools.mp4 (20.23 MB) 01 introduction-to-linux-sql-and-python.mp4 (14.49 MB) 01 wrap-up.mp4 (2.06 MB) 02 course-wrap-up.mp4 (7.71 MB) 01 introduction-to-course-4.mp4 (8.66 MB) 01 welcome-to-module-1.mp4 (2.94 MB) 02 kim-my-journey-into-computing.mp4 (10.92 MB) 03 introduction-to-operating-systems.mp4 (11.51 MB) 01 inside-the-operating-system.mp4 (10.46 MB) 03 resource-allocation-via-the-os.mp4 (9.58 MB) 01 gui-versus-cli.mp4 (14.08 MB) 03 ellen-my-path-into-cybersecurity.mp4 (12.42 MB) 01 wrap-up.mp4 (3.16 MB) 01 welcome-to-module-2.mp4 (3.23 MB) 02 introduction-to-linux.mp4 (12.6 MB) 03 phil-learn-and-grow-in-the-cybersecurity-field.mp4 (12.59 MB) 04 linux-architecture.mp4 (11.81 MB) 01 linux-distributions.mp4 (10.3 MB) 02 kali-linux-tm.mp4 (7.17 MB) 01 introduction-to-the-shell.mp4 (5.98 MB) 03 input-and-output-in-the-shell.mp4 (8.58 MB) 01 wrap-up.mp4 (2.83 MB) 01 welcome-to-module-3.mp4 (5.11 MB) 02 linux-commands-via-the-bash-shell.mp4 (10.2 MB) 03 core-commands-for-navigation-and-reading-files.mp4 (11.26 MB) 01 find-what-you-need-with-linux.mp4 (10.87 MB) 04 create-and-modify-directories-and-files.mp4 (17.8 MB) 01 file-permissions-and-ownership.mp4 (16.73 MB) 02 change-permissions.mp4 (9.4 MB) 05 add-and-delete-users.mp4 (14.68 MB) 01 damar-my-journey-into-linux-commands.mp4 (63.38 MB) 02 the-linux-community.mp4 (5.99 MB) 03 man-pages-within-the-shell.mp4 (6.58 MB) 01 wrap-up.mp4 (3.36 MB) 01 welcome-to-module-4.mp4 (5.29 MB) 02 introduction-to-databases.mp4 (10.43 MB) 03 query-databases-with-sql.mp4 (8.5 MB) 05 adedayo-sql-in-cybersecurity.mp4 (13.7 MB) 01 basic-queries.mp4 (8.95 MB) 04 basic-filters-on-sql-queries.mp4 (14.77 MB) 01 filter-dates-and-numbers.mp4 (10.99 MB) 03 filters-with-and-or-and-not.mp4 (16.09 MB) 01 join-tables-in-sql.mp4 (12.29 MB) 02 types-of-joins.mp4 (7.97 MB) 01 wrap-up.mp4 (3.38 MB) 02 course-wrap-up.mp4 (3.76 MB) 01 introduction-to-course-2.mp4 (7.91 MB) 01 welcome-to-module-1.mp4 (4.46 MB) 02 explore-the-cissp-security-domains-part-1.mp4 (19.14 MB) 03 explore-the-cissp-security-domains-part-2.mp4 (18.52 MB) 05 ashley-my-path-to-cybersecurity.mp4 (19.83 MB) 01 threats-risks-and-vulnerabilities.mp4 (17.04 MB) 02 key-impacts-of-threats-risks-and-vulnerabilities.mp4 (17.7 MB) 03 herbert-manage-threats-risks-and-vulnerabilities.mp4 (9.61 MB) 04 nist-s-risk-management-framework.mp4 (16.35 MB) 01 wrap-up.mp4 (3.95 MB) 01 welcome-to-module-2.mp4 (5.42 MB) 02 frameworks.mp4 (10.33 MB) 03 controls.mp4 (14.11 MB) 01 explore-the-cia-triad.mp4 (14.74 MB) 01 nist-frameworks.mp4 (18 MB) 02 explore-the-six-functions-of-the-nist-cybersecurity-framework.mp4 (15.63 MB) 01 owasp-security-principles.mp4 (19.01 MB) 03 wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 (9.96 MB) 04 plan-a-security-audit.mp4 (16.69 MB) 05 complete-a-security-audit.mp4 (16.98 MB) 01 wrap-up.mp4 (7.07 MB) 01 welcome-to-module-3.mp4 (4.27 MB) 02 logs-and-siem-tools.mp4 (8.88 MB) 03 siem-dashboards.mp4 (10.76 MB) 05 parisa-the-parallels-of-accessibility-and-security.mp4 (16.41 MB) 01 explore-common-siem-tools.mp4 (14.71 MB) 03 talya-myths-about-the-cybersecurity-field.mp4 (9.58 MB) 01 wrap-up.mp4 (2.62 MB) 01 welcome-to-module-4.mp4 (2.97 MB) 02 phases-of-an-incident-response-playbook.mp4 (24.3 MB) 04 zack-incident-response-and-the-value-of-playbooks.mp4 (13.81 MB) 01 use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 (19.05 MB) 02 erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 (19.88 MB) 01 wrap-up.mp4 (4.37 MB) 02 course-wrap-up.mp4 (5.22 MB) 01 introduction-to-course-3.mp4 (3.6 MB) 01 welcome-to-module-1.mp4 (2.3 MB) 02 chris-my-path-to-cybersecurity.mp4 (18.89 MB) 03 what-are-networks.mp4 (6.22 MB) 04 tina-working-in-network-security.mp4 (11.31 MB) 05 emmanuel-useful-skills-for-network-security.mp4 (13.33 MB) 06 network-tools.mp4 (7.03 MB) 08 cloud-networks.mp4 (8.77 MB) 01 introduction-to-network-communication.mp4 (7.25 MB) 02 the-tcp-ip-model.mp4 (8.96 MB) 03 the-four-layers-of-the-tcp-ip-model.mp4 (6.47 MB) 01 ip-addresses-and-network-communication.mp4 (7.31 MB) 01 wrap-up.mp4 (1.71 MB) 01 welcome-to-module-2.mp4 (4.6 MB) 02 network-protocols.mp4 (11.29 MB) 05 antara-working-in-network-security.mp4 (16.1 MB) 06 wireless-protocols.mp4 (5.11 MB) 01 firewalls-and-network-security-measures.mp4 (16.81 MB) 02 virtual-private-networks-vpns.mp4 (8.06 MB) 03 security-zones.mp4 (12 MB) 05 proxy-servers.mp4 (11.21 MB) 01 wrap-up.mp4 (2.77 MB) 01 welcome-to-module-3.mp4 (1.32 MB) 02 the-case-for-securing-networks.mp4 (5.52 MB) 04 matt-a-professional-on-dealing-with-attacks.mp4 (16.81 MB) 01 denial-of-service-dos-attacks.mp4 (18.55 MB) 01 malicious-packet-sniffing.mp4 (19.32 MB) 02 ip-spoofing.mp4 (11.52 MB) 01 wrap-up.mp4 (2.93 MB) 01 welcome-to-module-4.mp4 (3.84 MB) 02 security-hardening.mp4 (12.25 MB) 01 os-hardening-practices.mp4 (18.03 MB) 01 network-hardening-practices.mp4 (16.9 MB) 01 network-security-in-the-cloud.mp4 (9.73 MB) 02 kelsey-cloud-security-explained.mp4 (21.94 MB) 01 wrap-up.mp4 (3.14 MB) 02 course-wrap-up.mp4 (6.64 MB) 01 introduction-to-course-8.mp4 (13.12 MB) 03 dion-my-personal-career-journey.mp4 (16.87 MB) 01 welcome-to-module-1.mp4 (1.79 MB) 02 security-as-a-mindset.mp4 (16.95 MB) 01 detect-and-protect-without-neglect.mp4 (18.6 MB) 01 wrap-up.mp4 (4.09 MB) 01 welcome-to-module-2.mp4 (6.07 MB) 02 the-importance-of-escalation.mp4 (18.97 MB) 01 prepare-to-escalate-through-security-recognition.mp4 (17.27 MB) 01 from-simple-activity-to-major-data-breach.mp4 (18.28 MB) 02 when-and-how-to-escalate-a-security-incident.mp4 (12.83 MB) 01 wrap-up.mp4 (4.5 MB) 01 welcome-to-module-3.mp4 (3.69 MB) 02 stakeholders-in-cybersecurity.mp4 (15.13 MB) 01 clear-and-coNCISe-communication.mp4 (12.14 MB) 02 building-blocks-of-cybersecurity-communications.mp4 (17 MB) 01 visual-storytelling-in-cybersecurity.mp4 (16.07 MB) 03 how-to-create-a-visual-dashboard.mp4 (18.13 MB) 01 wrap-up.mp4 (9.05 MB) 01 welcome-to-module-4.mp4 (6.84 MB) 02 helpful-cybersecurity-resources.mp4 (15.26 MB) 04 victoria-continue-your-learning-journey.mp4 (15.43 MB) 01 engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 (14.69 MB) 03 sarah-network-in-the-cybersecurity-community.mp4 (10.28 MB) 01 wrap-up.mp4 (3.85 MB) 01 welcome-to-module-5.mp4 (7.55 MB) 02 find-cybersecurity-jobs.mp4 (16.32 MB) 03 what-is-your-career-identity.mp4 (61.8 MB) 04 create-a-resume.mp4 (11.92 MB) 07 garvey-cover-letter-tips.mp4 (11.61 MB) 01 explore-the-interview-process.mp4 (14 MB) 03 garvey-technical-interview-tips.mp4 (11.21 MB) 05 conduct-pre-interview-research.mp4 (12.58 MB) 06 build-rapport-with-interviewers.mp4 (13.6 MB) 01 use-strategies-to-answer-interview-questions.mp4 (12.02 MB) 05 ask-the-interviewer-questions.mp4 (7.91 MB) 06 karan-interview-tips-from-a-hiring-manager.mp4 (18.5 MB) 01 develop-an-elevator-pitch.mp4 (13 MB) 05 emily-overcome-imposter-syndrome.mp4 (13.95 MB) 01 wrap-up.mp4 (1.96 MB) 03 course-wrap-up.mp4 (2.75 MB) 02 luis-driving-impact-with-ai-in-the-workplace.mp4 (36.56 MB) 04 boost-your-cybersecurity-skills-with-ai.mp4 (59.17 MB) 05 decode-complex-security-frameworks-with-ai.mp4 (49.35 MB) 06 use-ai-to-help-identify-bugs.mp4 (34.67 MB) 07 refine-code-with-help-from-ai.mp4 (25.73 MB) 08 understand-system-vulnerabilities-with-ai.mp4 (53.24 MB) 09 prioritize-alerts-with-ai.mp4 (30.66 MB) 11 introducing-google-ai-essentials.mp4 (5.91 MB) 01 recap-of-the-google-cybersecurity-certificate-program.mp4 (8.85 MB) 02 congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 (9.41 MB)] Screenshot https://rapidgator.net/file/5cecc1b875a0051aed2e8b4f6241bb9d/Coursera.-.Google.Cybersecurity.Professional.Certificate.part1.rar https://rapidgator.net/file/ca116037c71cdbf80b410d655fbb15f5/Coursera.-.Google.Cybersecurity.Professional.Certificate.part2.rar https://rapidgator.net/file/26a0fa53c9d2e076ef876d4b4640857c/Coursera.-.Google.Cybersecurity.Professional.Certificate.part3.rar https://rapidgator.net/file/52ca0dace7775effcafec2b83e36256b/Coursera.-.Google.Cybersecurity.Professional.Certificate.part4.rar https://rapidgator.net/file/d921e206040a7ba7a1fd55abf009eed1/Coursera.-.Google.Cybersecurity.Professional.Certificate.part5.rar
  14. 4.66 GB | 00:00:15 | mp4 | 3840X2160 | 16:9 Genre:eLearning |Language:English Files Included : 02 course-introduction.mp4 (13.11 MB) 04 speech-recognition-technology.mp4 (17.67 MB) 05 computer-vision-application.mp4 (21.26 MB) 07 ai-responsibility-pyramid.mp4 (18.98 MB) 09 evolution-of-speech-analysis.mp4 (15.26 MB) 10 what-is-opencv.mp4 (17.82 MB) 01 installing-opencv-on-windows.mp4 (11.09 MB) 01 operations-on-opencv.mp4 (8.79 MB) 04 demonstration-gaussian-blur.mp4 (21.56 MB) 05 demonstration-edge-detection-and-conversion.mp4 (21.36 MB) 06 demonstration-image-thresholding-binary-image.mp4 (17.13 MB) 07 demonstration-different-methods-of-thresholding.mp4 (24.79 MB) 08 demonstration-practical-use-cases.mp4 (10.48 MB) 09 what-is-adaptive-thresholding.mp4 (12.3 MB) 10 demonstration-of-global-adaptive-threshold.mp4 (14.6 MB) 01 morphological-operations.mp4 (15.41 MB) 02 morphological-operations-in-opencv.mp4 (11.78 MB) 03 demonstration-opening-dilation-and-erosion.mp4 (23.22 MB) 05 blackhat-and-whitehat-transformations.mp4 (15.11 MB) 06 demonstration-whitehat-tophat.mp4 (13.87 MB) 07 demonstration-blackhat.mp4 (18.22 MB) 01 summary-of-computer-vision-with-opencv.mp4 (23.1 MB) 01 video-processing.mp4 (8.46 MB) 05 demonstration-saving-the-frames.mp4 (32.23 MB) 06 demonstration-loading-the-data.mp4 (20.23 MB) 08 demonstration-histogram-matching.mp4 (27.07 MB) 11 demonstration-differences-in-images.mp4 (15.59 MB) 01 introduction-to-speech-audio-data.mp4 (11.02 MB) 03 processing-speech.mp4 (18.26 MB) 04 speech-production.mp4 (20.63 MB) 05 difficulties-in-analyzing-speech.mp4 (17.91 MB) 06 working-of-sound-waves.mp4 (14.68 MB) 07 adc-and-sample-rate-bit-rate.mp4 (12.01 MB) 09 demonstration-generating-sound.mp4 (33.68 MB) 10 demonstration-spectrogram.mp4 (27.63 MB) 12 summary-of-audio-file-analysis.mp4 (7.38 MB) 01 human-speech.mp4 (18.91 MB) 02 speech-waveform.mp4 (18.02 MB) 03 digital-signal-processing.mp4 (18.18 MB) 11 tremor-detection.mp4 (6.51 MB) 01 Traffic.mp4 (185.81 MB) 01 highway.mp4 (4.98 MB) 02 course-introduction.mp4 (14.8 MB) 03 machine-learning-in-industry.mp4 (15.59 MB) 04 how-companies-use-machine-learning.mp4 (18.89 MB) 01 machine-learning-process.mp4 (14.84 MB) 02 steps-in-machine-learning.mp4 (13.79 MB) 03 types-of-machine-learning.mp4 (21.81 MB) 01 introduction-to-linear-regression.mp4 (18.61 MB) 02 real-life-examples.mp4 (22.05 MB) 03 calculating-ols.mp4 (40.38 MB) 04 equation-of-ols.mp4 (16.29 MB) 05 assumptions-in-linear-regression.mp4 (22.41 MB) 06 demonstration-setting-up-the-model.mp4 (23.13 MB) 07 calculating-r-square-and-rmse.mp4 (28.36 MB) 08 residual-plot-and-q-q-plot.mp4 (9.96 MB) 09 cooks-distance.mp4 (22.59 MB) 10 real-life-examples-of-logistic-regression.mp4 (21.03 MB) 11 what-is-logistic-regression.mp4 (26.84 MB) 12 cost-function.mp4 (13.93 MB) 13 assumptions-in-logistic-regression.mp4 (19.09 MB) 14 demonstration-of-logistic-regression-transforming-data.mp4 (29.9 MB) 15 demonstration-of-logistic-regression-developing-the-model.mp4 (18.35 MB) 01 confusion-matrix.mp4 (12.22 MB) 02 example-for-calculating-confusion-matrix.mp4 (32.97 MB) 03 conditions-for-over-fitting-and-under-fitting.mp4 (14.45 MB) 04 overfitting-and-underfitting.mp4 (30.5 MB) 05 performance-metrics-mse-rmse-mae-mape.mp4 (26.41 MB) 06 r-square-rmsle-and-adjusted-r-square.mp4 (19.11 MB) 07 working-of-r-square.mp4 (23.97 MB) 08 significance-of-r-square.mp4 (29.25 MB) 01 summary-for-inception-of-machine-learning.mp4 (9.74 MB) 01 classification-in-machine-learning.mp4 (19.62 MB) 02 what-is-decision-tree.mp4 (32.56 MB) 03 decision-tree-entropy-and-information-gain.mp4 (29.62 MB) 04 step-by-step-building-of-decision-tree.mp4 (38.71 MB) 05 pruning-in-decision-tree.mp4 (26.68 MB) 06 demonstration-importing-data.mp4 (26.8 MB) 08 demonstration-importance-of-features.mp4 (14.1 MB) 09 demonstration-production-ready-random-forest.mp4 (10.99 MB) 10 demonstration-hyperparameter-tuning.mp4 (17.72 MB) 01 what-is-svm.mp4 (20.1 MB) 02 terminologies-in-svm.mp4 (42.91 MB) 03 hinge-loss-function-and-other-parameters.mp4 (43.01 MB) 04 demonstration-of-svm-exploring-the-data.mp4 (17.08 MB) 06 what-is-naive-bayes.mp4 (11.9 MB) 07 working-of-naive-bayes-bayes-theorem.mp4 (23.17 MB) 08 example-of-naive-bayes-algorithm.mp4 (37.67 MB) 09 demonstration-of-naive-bayes-code.mp4 (21.04 MB) 10 working-of-knn.mp4 (17.86 MB) 11 example-of-knn-algorithm.mp4 (23.3 MB) 12 demonstration-of-knn-setting-up-the-model.mp4 (28.2 MB) 14 demonstration-of-knn-creating-classifier.mp4 (15.24 MB) 01 dimensionality-reduction.mp4 (31.58 MB) 02 introduction-to-pca.mp4 (27.97 MB) 03 applying-pca.mp4 (23.87 MB) 04 eigen-values-and-eigen-vectors.mp4 (29.48 MB) 05 demonstration-initializing-pca.mp4 (13.78 MB) 07 demonstration-implementing-optimal-pca.mp4 (25.04 MB) 08 working-of-lda.mp4 (29.56 MB) 09 demonstration-of-lda.mp4 (32.12 MB) 01 summary-for-machine-learning-algorithms.mp4 (10.05 MB) 01 what-are-association-rules.mp4 (27.58 MB) 02 apriori-algorithm.mp4 (20.99 MB) 03 demonstrating-apriori-algorithm.mp4 (48.01 MB) 01 what-are-recommendation-engine.mp4 (22.26 MB) 02 cbf.mp4 (21.73 MB) 04 demonstration-testing-the-model.mp4 (27.23 MB) 01 course-summary-for-applied-machine-learning-with-python.mp4 (11.91 MB) 02 course-introduction.mp4 (16.72 MB) 03 environment-configuration.mp4 (11.19 MB) 01 machine-learning-vs-deep-learning.mp4 (20.38 MB) 02 what-is-deep-learning.mp4 (11.82 MB) 03 neural-networks.mp4 (24.43 MB) 04 artificial-neural-network-ann.mp4 (16.15 MB) 05 ann-types-and-applications.mp4 (11.34 MB) 06 forward-propagation.mp4 (13.19 MB) 07 perceptron.mp4 (20.54 MB) 08 learning-rate.mp4 (19.98 MB) 09 what-is-activation-function.mp4 (11.81 MB) 10 activation-function-and-its-types.mp4 (14.65 MB) 11 importance-of-epoch.mp4 (15.95 MB) 12 single-layer-perceptron-define-sigmoid-function.mp4 (25.28 MB) 13 single-layer-perceptron-decision-boundary.mp4 (42.76 MB) 01 limitations-of-single-layered-perceptron.mp4 (6.86 MB) 02 multi-layered-perceptron.mp4 (7.72 MB) 03 what-is-backpropagation.mp4 (6.49 MB) 04 backpropagation.mp4 (10.45 MB) 05 demonstration-building-a-simple-neural-network.mp4 (20.81 MB) 01 summary-of-deep-learning-components.mp4 (21.66 MB) 01 limitations-of-mlp.mp4 (16.37 MB) 03 visual-cortex-and-cnn.mp4 (20.59 MB) 04 convolutional-layer.mp4 (20.38 MB) 05 working-of-convolutional-layer.mp4 (20.38 MB) 07 demonstration-designing-the-model.mp4 (29.4 MB) 08 demonstration-building-the-cnn-model.mp4 (22.04 MB) 09 demonstration-model-accuracy.mp4 (12.09 MB) 10 demonstration-adding-more-layers.mp4 (34.12 MB) 12 demonstration-pre-trained-model.mp4 (21.2 MB) 03 tensorflow-hub.mp4 (12.52 MB) 01 summary-of-cnn-in-deep-learning.mp4 (8.47 MB) 02 summary-of-faster-rcnn.mp4 (13.77 MB) 01 rnn-fundamentals.mp4 (13.83 MB) 02 rnn-architecture.mp4 (13.94 MB) 04 implementing-rnn.mp4 (19.15 MB) 01 basics-of-lstm.mp4 (18.39 MB) 02 lstm-structure.mp4 (16.28 MB) 03 forget-gate-and-input-gate.mp4 (14.39 MB) 04 output-gate.mp4 (8.74 MB) 05 importance-of-lstm-architecture.mp4 (14.33 MB) 06 types-of-lstm.mp4 (12.05 MB) 08 demonstration-next-word-prediction-layers.mp4 (32.79 MB) 01 improving-a-model.mp4 (20.63 MB) 02 model-optimization.mp4 (13.69 MB) 03 using-adam-optimizer.mp4 (20.41 MB) 04 model-compilation.mp4 (9.68 MB) 01 course-summary-for-practical-deep-learning-with-python.mp4 (14.05 MB) 01 specialization-introduction.mp4 (16.16 MB) 03 course-introduction.mp4 (11.76 MB) 06 programming-language-and-myths.mp4 (20.15 MB) 07 python-for-ai-ml-code-simpliCity.mp4 (15.97 MB) 08 python-for-ai-ml-ease-of-learning.mp4 (15.14 MB) 09 python-tokens-types.mp4 (12.4 MB) 10 literals.mp4 (26.16 MB) 11 operators-basic-operators.mp4 (46.16 MB) 12 operators-membership-and-identity-operators.mp4 (22.48 MB) 01 explaining-data-types-in-python.mp4 (8.07 MB) 02 demonstration-of-data-types-numeric-sequence-and-mapping.mp4 (35.73 MB) 01 executing-conditional-statement.mp4 (22.98 MB) 02 demonstration-of-if-else-statement.mp4 (15.72 MB) 03 executing-while-loop.mp4 (15.38 MB) 04 demonstration-of-for-loop.mp4 (21.9 MB) 05 looping-multiple-conditions.mp4 (16.23 MB) 01 file-handling.mp4 (18.88 MB) 03 manipulating-files.mp4 (32.13 MB) 04 user-defined-functions.mp4 (30.87 MB) 05 variable-argument-and-variable-keyword-argument.mp4 (18.04 MB) 06 lambda-functions.mp4 (25.16 MB) 07 more-on-functions-and-arguments.mp4 (21.04 MB) 08 modules-in-python.mp4 (13.07 MB) 09 demonstration-of-modules.mp4 (19.7 MB) 01 summary-of-python-essentials.mp4 (7.49 MB) 02 exploring-numpy.mp4 (16.26 MB) 03 numpy-operation.mp4 (32.46 MB) 04 working-with-numpy.mp4 (35.89 MB) 02 pandas-framework.mp4 (20.7 MB) 03 pandas-dataframe-operation.mp4 (33.03 MB) 04 working-with-dataframes-in-pandas.mp4 (26.83 MB) 05 dataframes-with-pandas-operations-and-insights.mp4 (31.97 MB) 06 creating-a-series-in-pandas.mp4 (31.02 MB) 07 working-with-pandas-series.mp4 (22.04 MB) 01 dataframe-data-maniplulation.mp4 (25.83 MB) 02 dataframe-joining.mp4 (33.06 MB) 03 dataframe-grouping-the-data.mp4 (23.43 MB) 04 dataframe-data-cleaning.mp4 (22.07 MB) 05 dataframe-data-adjusting.mp4 (23.95 MB) 03 matplotlib-library.mp4 (21.62 MB) 04 plotting-charts-with-matplotlib.mp4 (19.97 MB) 05 plotting-histogram-and-box-plot.mp4 (11.14 MB) 06 plotting-multiple-charts.mp4 (29.4 MB) 07 introduction-to-seaborn-scatter-plot.mp4 (27.49 MB) 08 basic-charts-in-seaborn.mp4 (24.06 MB) 09 seaborn-heatmap-manipulation.mp4 (9.41 MB) 10 seaborn-flights-dataset.mp4 (18.83 MB) 11 seaborn-gaining-insights-in-flight-data.mp4 (23.94 MB) 12 visualizing-charts-with-plotly.mp4 (19.43 MB) 13 customizing-different-charts-in-plotly.mp4 (25.08 MB) 01 summary-exploring-numpy-and-pandas-in-python.mp4 (6.5 MB) 02 what-is-statistics.mp4 (19.13 MB) 03 measures-of-central-tendency.mp4 (22.62 MB) 04 managing-statistical-data.mp4 (22.04 MB) 05 exploring-and-analyzing-data.mp4 (14.78 MB) 01 measures-of-dispersion.mp4 (20.74 MB) 02 dispersion-demonstration.mp4 (25.14 MB) 03 application-of-dispersion-in-large-data.mp4 (8.37 MB) 02 probability-sample-space-and-events.mp4 (17.41 MB) 03 need-for-probability.mp4 (10.87 MB) 04 types-of-probability.mp4 (15.45 MB) 05 marginal-and-joint-probability-demonstration.mp4 (17.61 MB) 06 conditional-probability-demonstration.mp4 (18.8 MB) 02 what-is-hypothesis-testing.mp4 (20.23 MB) 03 steps-for-hypothesis-testing.mp4 (12.71 MB) 04 null-and-alternate-hypothesis.mp4 (20.5 MB) 05 statistical-test-interpretation.mp4 (22.22 MB) 06 one-tailed-and-two-tailed-test.mp4 (18.67 MB) 07 hypothesis-testing-demonstration.mp4 (23.02 MB) 08 margin-of-error-and-confidence-interval-demonstration.mp4 (35.07 MB) 01 summary-statistical-analysis-with-python.mp4 (7.98 MB) 01 course-summary-python-and-statistics-foundations.mp4 (10.54 MB)] Screenshot https://rapidgator.net/file/59d74d1a7eadb4420f927d8c497c1a36/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part1.rar https://rapidgator.net/file/01652ccbfa5b4f7d2d188a0543f3e706/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part2.rar https://rapidgator.net/file/bdc04324288feb1a06dd7485cb336d01/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part3.rar https://rapidgator.net/file/d30b9e15e2f7d31e766e180efb402e28/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part4.rar https://rapidgator.net/file/d79b3172402d59869af696da0bc7c29e/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part5.rar https://rapidgator.net/file/0afc8408c31f45ec7491dc5c606db832/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part6.rar https://rapidgator.net/file/6948feb779c65a7aa98e8527491eede3/Coursera.-.Mastering.AI.Neural.Nets.Vision.System.Speech.Recognition.Specialization.part7.rar
  15. Ccna 200-301 Version 1.1 With Generative Ai And Ml Published 9/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 15.14 GB | Duration: 19h 10m Cisco Certified Network Associate Version 1.1 What you'll learn Implementing and Administering the Network Knowledge and skills related to network fundamentals, network access IP connectivity, IP services, security fundamentals Network automation and programmability. Quality of Service and Wireless LAN Connectivity Requirements No Programming Skills Required, You learn all here Description The CCNA certified professionals can work in different sectors as all sectors require skilled network engineers to supervise their networking infrastructure. CCNA certifications provide the knowledge and skills to install, manage and troubleshoot cutting edge networks. The certifications specialize in the domains like CCDA, cloud, routing and switching, service provider, security, wireless, collaboration, data centre, Industrial, and Cyber Ops.CCNA gives the accreditation towards the Network Job Scenario,Since they are heavy shortages of the Network Engineers in the Market. Once You cleared the CCNA 200-301 Version 1.1 Latest Exam,it gives you the boost to you confidence and assurance to obtain the Level 1 Job in the bigger MNCs as well. Networking fundamentalsShowcase your knowledge of networking equipment and configuration. Be able to troubleshoot connectivity issues and effectively manage networks.IP ServicesDemonstrate your ability to configure routing for different IP versions and describe the purpose of redundancy protocols. Be able to interpret the components of a routing table.Security fundamentalsUnderstand threats and ways to prevent them. Identify key elements of a security program, like user awareness and training. Demonstrate practical skills like setting up secure access to devices and networks.AutomationUnderstand how automation affects network management, and compare traditional networks with controller-based networking. Leverage APIs, and understand configuration management tools. Overview Section 1: Introduction to CCNA 200-301 Version 1.1 Lecture 1 Introduction to 200-301 CCNA Version 1.1 Section 2: Cisco Packet Tracer and Simple Config Lecture 2 Packet Tracer Download Section 3: Network Devices Config Lecture 3 Network Devices Routers and Switches Config Lecture 4 Memories on Devices and Configs Section 4: Introduction to TCP IP Protocol Lecture 5 TCP IP Protocol Section 5: IPv4 Addressing and Subneting Lecture 6 IPv4 Addressing and Subneting Section 6: Routing Theory Lecture 7 Routing Theory Static Default and Dynamic Section 7: Routing Configuration in Packet Tracer Lecture 8 Static Routing Config Lecture 9 Default Routing Config Lecture 10 Dynamic Routing Theory Lecture 11 Configuring OSPF Single Area Lecture 12 Configuring OSPF Multi Area Section 8: IGP EGP and Administrative Distance and Autonomous System Theory Lecture 13 IGP EGP and Administrative Distance Section 9: Switching Theory Lecture 14 Switching Basics Lecture 15 Switching Console Telnet and SSH Access Lecture 16 Collision Domain and Broadcast Domain and VLANs Section 10: Intevlan Routing With Layer 2 Switch Lecture 17 Intevlan Routing With Layer 2 Switch Router On A Stick Section 11: InterVLAN Routing with Layer 3 Switch Lecture 18 InterVLAN Routing with Layer 3 Switch Section 12: EtherChannel and PortChannel Lecture 19 Layer 2 Eherchannel with PAgP and LACP Lecture 20 Layer 3 EtherChannel with LACP Config Section 13: CDP and LLDP on Cisco Devices Lecture 21 CDP and LLDP on Cisco Devices Section 14: Spanning Tree Protocol Lecture 22 Common Spanning Tree Protocol Lecture 23 RSTP Spanning Tree Protocol Section 15: Wireless Networking Concepts Lecture 24 Wireless LAN and Wireless Controller Lecture 25 Wireless LAN Controller 2504 Lab Section 16: Quality of Serice QOS Lecture 26 Quality of Serice QOS Section 17: Access Control Lists ACL Lecture 27 Introduction to ACL and Standard ACL Config Lecture 28 Extended ACL Config Lecture 29 Named ACL Config Section 18: Network Address Translation NAT Lecture 30 Introduction to NAT and Standard NAT Config Lecture 31 Dynamic NAT Config Lecture 32 Port Address Translation NAT Config Section 19: Frist Hop Redundancy Protocol Lecture 33 HSRP VRRP and GLBP Section 20: IOS Backup and Upgrades Lecture 34 IOS Backup and Upgrades Section 21: SNMP Agents and MIB Lecture 35 SNMP Agents and MIB Section 22: Syslog and NTP Server Lecture 36 Syslog and NTP Server Section 23: DHCP Server DHCP Snooping and DAI Lecture 37 DHCP Server and Configs Lecture 38 DHCP Snooping Config Lecture 39 Dynamic ARP Inspection Config Section 24: Cloud Architecture Lecture 40 Cloud Architecture Section 25: Automation and Programmability Lecture 41 Ansible Puppet and Chef Lecture 42 REST API and JSON and XML Lecture 43 Cisco SDN Lecture 44 Cisco SDA Section 26: WAN Architecture Lecture 45 WAN Architecture Section 27: IPv6 Routing Lecture 46 IPv6 Addresses and Routing Section 28: Generative Artificial Intelligence Gen AI and Machine Learning ML Lecture 47 Artificial Intelligence AI and Machine Learning ML Section 29: Thanks.! Lecture 48 Thanks..! Beginners to IT Infrastructure, Network Administration TurboBit https://turbobit.net/9tmhzepzgdtw/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part01.rar.html https://turbobit.net/5pahb1rqfg5h/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part02.rar.html https://turbobit.net/vbsqce8k5stx/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part03.rar.html https://turbobit.net/wjwsn7y6c35o/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part04.rar.html https://turbobit.net/gi24g7engdan/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part05.rar.html https://turbobit.net/75zv8bzsnry5/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part06.rar.html https://turbobit.net/qdsna1sweiu0/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part07.rar.html https://turbobit.net/eeuuzsfpyywk/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part08.rar.html https://turbobit.net/voy7t6m05oel/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part09.rar.html https://turbobit.net/1q2l0e65jh39/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part10.rar.html https://turbobit.net/y61v7hi0rxo9/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part11.rar.html RapidGator https://rapidgator.net/file/e9dfdf5fec6c19186b41e098b389c923/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part01.rar https://rapidgator.net/file/75ad173c79a8ac46d723cb2ceeea9863/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part02.rar https://rapidgator.net/file/55deadd9fc65ae7a3176e2415c14456d/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part03.rar https://rapidgator.net/file/3b3b944488fe8263d70b57fa1b27c9f5/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part04.rar https://rapidgator.net/file/126e6817ca6b90a94cf2046d9be0a6c8/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part05.rar https://rapidgator.net/file/69edf19290cac4bf9c74ccbfe3b9d1e6/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part06.rar https://rapidgator.net/file/8915f260f042e8641fe0585972ebf38a/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part07.rar https://rapidgator.net/file/b59275774255c42a9a3bc84f5772863b/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part08.rar https://rapidgator.net/file/aa2b86dbf578d4bc6fe02db742a1d6e1/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part09.rar https://rapidgator.net/file/8caf57baa54b3f6b4f989cefb347dbf6/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part10.rar https://rapidgator.net/file/dcb1c8ea137fd18db54350be43aca498/.-.CCNA.200-301.Version.1.1.With.Generative.Ai.and.ML.-.Ramnath.Kesav.2024.09.part11.rar
  16. Learn Servicenow From Scratch Admin Plus Development Published 2/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 9.70 GB | Duration: 17h 11m Admin plus Developement with practical recorded sessions What you'll learn Complete Learning Path: Learn both ServiceNow admin and development, covering core features and advanced skills to boost your career in IT service management. Hands-On Practice: Gain real-world experience with interactive exercises and projects to apply your knowledge and solve actual ServiceNow challenges. Expert Instruction: Learn from experienced instructors with up-to-date, easy-to-understand content, suitable for both beginners and experienced learners. Career Growth: Acquire in-demand skills in ServiceNow, opening doors to high-paying jobs in IT service management, automation, and development. Requirements No Programming Experience Needed Description ServiceNow ITSM Admin + Development Full Course Description:This in-depth course is designed to give you a comprehensive understanding of ServiceNow IT Service Management (ITSM), covering both Administration and Development. Whether you're a beginner or an experienced professional, this course will guide you step-by-step through the essential concepts and advanced features of ServiceNow.What you'll learn:ServiceNow Admin FundamentalsConfigure and manage core ITSM modules like Incident, Problem, Change, and Request Management.Set up users, roles, and security features to ensure smooth operations.Learn to manage ServiceNow environments and apply best practices for system configuration.ServiceNow DevelopmentMaster building custom applications and interfaces using ServiceNow's powerful development tools.Gain expertise in scripting, automation, and integrations to optimize processes with server and client side scripting.Learn how to create custom flows, forms, and reports tailored to business needs.Advanced ITSM ConceptsDeep dive into Service Catalog, Record Producers & Order GuidesAutomate and streamline business processes using Flow DesignerPractical Exercises & Real-World ScenariosHands-on experience with exercises, real-life examples, and use cases to sharpen your skills.By the end of this course, you'll be ready to take on high-demand roles in IT Service Management, armed with the knowledge to effectively administer and develop ServiceNow environments. Freshers or experienced professionals who wants to switch their career into ServiceNow TurboBit https://turbobit.net/qdp9bvyo6cu5/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part01.rar.html https://turbobit.net/su9r3ryjkf2n/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part02.rar.html https://turbobit.net/rkchhn425574/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part03.rar.html https://turbobit.net/8gvbiv3hb600/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part04.rar.html https://turbobit.net/hrgnt39uymei/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part05.rar.html https://turbobit.net/0xeqfefugi3g/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part06.rar.html https://turbobit.net/lcif5d9gcymb/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part07.rar.html https://turbobit.net/hrj7iqil0qx6/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part08.rar.html https://turbobit.net/pybw768f3dvi/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part09.rar.html https://turbobit.net/3p84hiyw7rs0/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part10.rar.html RapidGator https://rapidgator.net/file/55ded2df5b46e869aa01a3f8fd2bcc44/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part01.rar https://rapidgator.net/file/6898f4373552292aa27b34b8964f6d62/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part02.rar https://rapidgator.net/file/ef909a23ec775b2171d4ddcf439f4f1c/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part03.rar https://rapidgator.net/file/8c49d21da98e6262983a0cebc9458471/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part04.rar https://rapidgator.net/file/c09fbbda9649db37f681408de009b0c9/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part05.rar https://rapidgator.net/file/12d088f3330da2d154c2c5d77724aa90/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part06.rar https://rapidgator.net/file/a2c69bc7187e11f8829610ea1a1e3e04/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part07.rar https://rapidgator.net/file/56a85b471a949f3fd4a3985fedd0cddc/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part08.rar https://rapidgator.net/file/c8feeb5fff74c2cdea962f28f8a25c16/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part09.rar https://rapidgator.net/file/a74b0cfaefa08f9a403785a7c1246ddd/.Learn.ServiceNow.From.Scratch.Admin.Plus.Development.-.Bray.Jones.2025.02.part10.rar FileFactory
  17. The Complete Python Course (2022) Duration: 5h 5m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.89 GB Genre: eLearning | Language: English Learn Python Programming with 350+ live coding examples. A Practical Approach to learn Python. Become a Python Expert. What you'll learn: Be able to program in Python professionally Get hands-on experience and solve 300+ coding exercises. Become proficient in Python Get all the skills to demonstrate expertise in Python programming Gain an in-depth understanding of basic & advanced Python Set firm foundation in Python for the rest of your career Requirements: No paid software required Basic knowledge of Computer usage Description: Welcome to Python Course by Studyopedia !!! In this Video Course, learn Python and its concept. We have covered Python Basics and Advanced concepts in this course. It consists of 25 sections, 83 lessons, and 378 live running source codes (downloadable), including Functions, Classes & Objects, Dictionary, Lists, Sets, Tuples, etc, We have also covered Modules, including Maths, Statistics, Random, etc. Python is a powerful, interpreted, object-oriented programming language. It is used in many areas for development and is considered a perfect language for scripting. A high-level programming language developed by Guido van Rossum and first released in 1991. More than 75% of programmers considered Python as a must-have skill for Data Science. ***Python Features*** Open Source High-level programming language Multiple Programming-paradigms(object-oriented, functional programming, imperative, etc.) Interpreted language Dynamically Typed Cross-Platform Lesser LOC (Line of codes) ***Lesson Covered *** 1. Python - Introduction 2. Install Python on Windows 3. Python - Variables 4. Python - Scope of Variables 5. Python - Tokens 6. Python - Operators 7. Python - Comments 8. Python - Type Conversion 9. Python - Get User Input 10. Python - Decision-Making Statements 11. Python - break and continue statements 12. Python - Loops 13. Python - Numbers 14. Python - Strings 15. Python - Functions 16. Python - Lambda Functions 17. Python - Classes and Objects 18. Python - Tuples 19. Python - Dictionary 20. Python - Lists 21. Python - Sets 22. Python - Modules 23. Python - math module 24. Python - statistics module 25. Python - Random Module *** Coding Examples Covered *** 378 Source Codes and demonstrated with live running and also provided for downloading. ***Python Version*** We have covered Python 3 and all the examples are being implemented on PyCharm, which is a free and open-source Python IDE. Let's start the journey! Hit the Enroll button! Who this course is for: Beginners Programmers - Those who want to Master Python Programming Skills Python Programmers - Those who want to enhance their Python Programming Skills. Students and Engineers - Those who are enrolling in Python as an academic course. Professional Programmers - Those who want to switch to Python Programming. More Info TurboBit https://turbobit.net/j2tjge14lfnb/_The_Complete_Python_Course_2025.part01.rar.html https://turbobit.net/7gnx71q5pu46/_The_Complete_Python_Course_2025.part02.rar.html https://turbobit.net/01cobs341bm9/_The_Complete_Python_Course_2025.part03.rar.html https://turbobit.net/354p7upaabmd/_The_Complete_Python_Course_2025.part04.rar.html https://turbobit.net/iexrupwbmy41/_The_Complete_Python_Course_2025.part05.rar.html https://turbobit.net/javod2dctwb2/_The_Complete_Python_Course_2025.part06.rar.html https://turbobit.net/pv7o7veabbt3/_The_Complete_Python_Course_2025.part07.rar.html https://turbobit.net/e9mgih9r11p9/_The_Complete_Python_Course_2025.part08.rar.html https://turbobit.net/7mgm6sh5kyfv/_The_Complete_Python_Course_2025.part09.rar.html https://turbobit.net/sq2tnd5rr46i/_The_Complete_Python_Course_2025.part10.rar.html https://turbobit.net/3prliye39s6h/_The_Complete_Python_Course_2025.part11.rar.html https://turbobit.net/15m38vqm40sf/_The_Complete_Python_Course_2025.part12.rar.html https://turbobit.net/kl8ly7q0yz63/_The_Complete_Python_Course_2025.part13.rar.html https://turbobit.net/gplqrjqlnid7/_The_Complete_Python_Course_2025.part14.rar.html https://turbobit.net/xik0my3gtqcq/_The_Complete_Python_Course_2025.part15.rar.html https://turbobit.net/u48v0qc56gvt/_The_Complete_Python_Course_2025.part16.rar.html https://turbobit.net/vuv5nsrv8j3m/_The_Complete_Python_Course_2025.part17.rar.html RapidGator https://rapidgator.net/file/998c413e58cbf5182fefc897437c0404/_The_Complete_Python_Course_2025.part01.rar https://rapidgator.net/file/80880ed7e205ae148461faff2ef80626/_The_Complete_Python_Course_2025.part02.rar https://rapidgator.net/file/b3f27e442bd064bb5b51f230dd4fbc35/_The_Complete_Python_Course_2025.part03.rar https://rapidgator.net/file/229ae2fd356a9f0a5a9c5ee8cb3e4889/_The_Complete_Python_Course_2025.part04.rar https://rapidgator.net/file/2818e0f7da0216f3ac1179150d0c560b/_The_Complete_Python_Course_2025.part05.rar https://rapidgator.net/file/d5f6dda8c7b690d95caae513937eac96/_The_Complete_Python_Course_2025.part06.rar https://rapidgator.net/file/fde598e026a911418b44f3b87c54b6f9/_The_Complete_Python_Course_2025.part07.rar https://rapidgator.net/file/472c5065ae094b34740ea968b9f2357f/_The_Complete_Python_Course_2025.part08.rar https://rapidgator.net/file/f01b9d9657020c8d0ef7517543f67a80/_The_Complete_Python_Course_2025.part09.rar https://rapidgator.net/file/2d989c0cdf0c619ce66a978d86a94928/_The_Complete_Python_Course_2025.part10.rar https://rapidgator.net/file/d3081b0204ca433e5a22c381f466ff17/_The_Complete_Python_Course_2025.part11.rar https://rapidgator.net/file/41a34c2019696b88fbab8ad7c97f26ec/_The_Complete_Python_Course_2025.part12.rar https://rapidgator.net/file/e348b32c3b7078a73e6f7c9ec2ebd9b1/_The_Complete_Python_Course_2025.part13.rar https://rapidgator.net/file/e830b4ad456624bc208819227e668add/_The_Complete_Python_Course_2025.part14.rar https://rapidgator.net/file/8ec3c3fcdf0ba6a340686037e2d6be69/_The_Complete_Python_Course_2025.part15.rar https://rapidgator.net/file/496f21f5c014ced23790ac07eef25e34/_The_Complete_Python_Course_2025.part16.rar https://rapidgator.net/file/0260082f657b62cf1e1dec8859868288/_The_Complete_Python_Course_2025.part17.rar FileFactory
  18. Comptia Pentest+ Pt0-002 ( Ethical Hacking & Pentest+ ) Lab Last updated 8/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 14.33 GB | Duration: 32h 31m Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hacker What you'll learn CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing (pentesting) and vulnerability management. CompTIA PenTest+ is the most comprehensive exam covering all penetration testing stages. Unlike other penetration testing exams, PenTest+ uses both performance-based and knowledge PenTest+ is the most current penetration testing exam covering the latest techniques against expanded attack surfaces. CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment. The CompTIA PenTest+ certification is a vendor-neutral, internationally targeted validation of intermediate-level penetration testing (or pentesting) knowledge What is the CompTIA Pentest+ exam? Why is the CompTIA Pentest+ course important? All information on CompTIA Pentest+ exam topics. What are Attacks, Threats and Vulnerabilities? What are network topologies and network attacks? What Are Social Engineering Attacks? What is the threat, what are the types of threats, and how is the threat analysis done? What are the programs used for the attack? What should be the architecture and design under CompTIA Pentest+? What is Vulnerability scanning? What is Nmap and how can we use it? What is IoT & Mobile? What is Metasploit Framework? What is enumeration? You will learn to troubleshoot hardware, network and software You will learn about Wi-Fi hacking You will learn Top 10 Web Application Security Risks - 2023 You will learn Web Application Pentesting You will learn Authentication and Authorization Testing You will learn Post exploitation You will learn What is scripting and how can we analyze a script You will learn writing a pentest report Requirements Desire to get CompTIA Pentest+ certification Desire to learn about pentest+, pentesting, ethical hacking Desire to be certified ethical hacker Watching the lecture videos completely, to the end and in order. Internet Connection Any device you can watch the course, such as a mobile phone, computer or tablet. Determination and patience to learn. Any device that can be built a lab Description Hello there,Welcome to "CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab" course.Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hackerCompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing (pentesting) and vulnerability management. CompTIA PenTest+ is the most comprehensive exam covering all penetration testing stages. Unlike other penetration testing exams that only cover a portion of stages with essay questions and hands-on, PenTest+ uses both performance-based and knowledge-based questions to ensure all stages are addressed. Pentest, ethical hacking, pentest+, comptia pentest, certified ethical hacker, hacking, pentesting, comptia pentest+, comptia, comptia pentest pt0-002, comptia, ceh, comptia pentest+ pt0-002PenTest+ is the only exam on the market to include all aspects of vulnerability management. It not only covers hands-on vulnerability assessment, scanning, and analysis, but also includes planning, scoping, and managing weaknesses, not just exploiting them.PenTest+ is the most current penetration testing exam covering the latest techniques against expanded attack surfaces. It is a unique exam that requires a candidate to demonstrate the most relevant pen testing skills for the cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises.CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment. Cybersecurity professionals with CompTIA PenTest+ know how plan, scope, and manage weaknesses, not just exploit them.IT certifications show employers that candidates have the knowledge and skills they need to do the job, and they help IT pros advance in their careers. As cybersecurity has become a critical function, cybersecurity certifications are among the most popular IT certifications globally.The CompTIA PenTest+ certification is a vendor-neutral, internationally targeted validation of intermediate-level penetration testing (or pen testing) knowledge and skills. It focuses on the latest pen testing techniques, attack surfaces, vulnerability management, post-delivery and compliance tasks.This course walks you through all the things you need to pass the CompTIA Pentest+ PT0-001 & PT0-002 exam, step by step.You can pass the CompTIA Pentest+ exam by studying the topics covered throughout the course.By the way, you don't need to know anything for this course.We will tell you all the things you need to pass the CompTIA Pentest+ PT0-001 & PT0-002 exam.Our course points too much topics.However, in order to better understand the topics, these basic topics are divided into parts and explained in 21 small chapters.Each of the sections is important on its own. It also relates to other departments.As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.For example, the subject of encryption is mentioned in many places.Although the basic meaning is the same, usage types can gain different meanings on different platforms.The narration of the topics is brief and for the exam.We will make sample applications for some of the topics covered in our course.We will create a virtual Lab for the application.If you wish, you can improve yourself by using the topics covered in the lessons.Because at the end of the course, you will see all the topics used in the field of Security.All you have to do is search the subject on the internet and continue learning.This course is for CompTIA Pentest+ PT0-002 Certification PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. The CompTIA PenTest+ certification exam will verify successful candidates have the knowledge and skills required to:Plan and scope a penetration testing engagementUnderstand legal and compliance requirementsPerform vulnerability scanning and penetration testing using appropriate tools and techniques, and then analyze the resultsProduce a written report containing proposed remediation techniques, effectively communicate results to the management team, and provide practical recommendationsQuestions are asked from the fields. Throughout the course, topics related to these areas are explained.In this course you will learn;Passing the CompTIA Pentest+ certification exam with confidenceUnderstand computer security, its functions, and its componentsPerforming penetration testsNetwork topologies and Network attacksThreat analysisScript analyzingWriting a pentest reportUsing Metasploit FrameworkFrequently asked questionsWhat Is CompTIA PenTest+ Certification?CompTIA PenTest+ is a certification for cybersecurity professionals tasked with penetration testing and vulnerability assessment and management. CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment.What Job Roles Should Take the Exam?CompTIA PenTest+ is for IT cybersecurity professionals with three to four years of hands-on information security or related experience, or equivalent training, looking to start or advance a career in pen testing. CompTIA PenTest+ prepares candidates for the following job roles:Penetration testerVulnerability testerSecurity analyst (II)Vulnerability assessment analystNetwork security operationsApplication security vulnerabilityWhat Is on the CompTIA PenTest+ Exam?CompTIA PenTest+ is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment.Successful candidates will have the following skills to:Plan and scope penetration testsConduct passive reconnaissancePerform non-technical tests to gather informationConduct active reconnaissanceAnalyze vulnerabilitiesPenetrate networksExploit host-based vulnerabilitiesTest applicationsComplete post-exploit tasksAnalyze and report penetration test resultsThe CompTIA PenTest+ exam covers the following domains and topics:Planning and Scoping: Explain the importance of planning for an engagementInformation Gathering and Vulnerability Identification: Conduct information gathering using appropriate techniques and perform and analyze a vulnerability scanAttacks and Exploits: Compare and contrast social engineering attacksPenetration Testing Tools: Use NMAP to conduct information gathering exercisesReporting and Communication: Recommend mitigation strategies for discovered vulnerabilitiesWho Is CompTIA?CompTIA (the Computing Technology Industry Association) is the leading provider of vendor-neutral IT certifications in the world. With more than 2 million IT certifications issued worldwide, CompTIA is dedicated to helping IT professionals lead the charge in our digitally connected world.For more than 20 years, CompTIA has developed training and certification exams for computing support, networking, security, open-source (Linux) development, cloud and mobility. Our regular review and updates of exams ensure that CompTIA certifications continue to address the needs of today's technology challenges.What is penetration testing?Penetration testing, or pen testing, is the process of attacking an enterprise's network to find any vulnerabilities that could be present to be patched. Ethical hackers and security experts carry out these tests to find any weak spots in a system's security before hackers with malicious intent find them and exploit them. Someone who has no previous knowledge of the system's security usually performs these tests, making it easier to find vulnerabilities that the development team may have overlooked. You can perform penetration testing using manual or automated technologies to compromise servers, web applications, wireless networks, network devices, mobile devices, and other exposure points.What are the different types of penetration testing?There are many types of penetration testing. Internal penetration testing tests an enterprise's internal network. This test can determine how much damage can be caused by an employee. An external penetration test targets a company's externally facing technology like their website or their network. Companies use these tests to determine how an anonymous hacker can attack a system. In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring, including any security professional. This type of test will test not only systems but a company's response to an active attack. With a closed-box penetration test, a hacker may know nothing about the enterprise under attack other than its name. In an open-box test, the hacker will receive some information about a company's security to aid them in the attack.What are the different stages of penetration testing?Penetration tests have five different stages. The first stage defines the goals and scope of the test and the testing methods that will be used. Security experts will also gather intelligence on the company's system to better understand the target. The second stage of a pen test is scanning the target application or network to determine how they will respond to an attack. You can do this through a static analysis of application code and dynamic scans of running applications and networks. The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. The fifth and final stage of a pen test is the reporting phase, when testers compile the test results.What is Ethical Hacking and what is it used for?Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities. An ethical hacker is also sometimes referred to as a white hat hacker. Many depend on ethical hackers to identify weaknesses in their networks, endpoints, devices, or applications. The hacker informs their client as to when they will be attacking the system, as well as the scope of the attack. An ethical hacker operates within the confines of their agreement with their client. They cannot work to discover vulnerabilities and then demand payment to fix them. This is what gray hat hackers do. Ethical hackers are also different from black hat hackers, who hack to harm others or benefit themselves without permission.No prior knowledge is needed!Why would you want to take this course?Our answer is simple: The quality of teaching.When you enroll, you will feel our seasoned instructors' expertise.Video and Audio Production QualityAll our videos are created/produced as high-quality video and audio to provide you the best learning experience.You will be,Seeing clearlyHearing clearlyMoving through the course without distractionsYou'll also get:Lifetime Access to The CourseFast & Friendly Support in the Q&A sectionUdemy Certificate of Completion Ready for DownloadDive in now "CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab" course.Develop your Ethical Hacking & Pentesting skills, get CompTIA Pentest+ certification and be a certified ethical hackerWe offer full support, answering any questions.See you in the course! Overview Section 1: Setting Up Virtual Lab Environment for CompTIA Pentest+ PT0-002- Ethical Hacking Lecture 1 Requirements and Overview of Lab Lecture 2 FAQ about CompTIA Pentest+, Penetration Testing, Ethical Hacking Lecture 3 Download and Install VirtualBOX Lecture 4 Download and Install Kali Linux -VirtualBox Lecture 5 Download and Install Kali Linux Image File Lecture 6 Download and add Metasploitable Image File Lecture 7 OWASP Image File-2 Download and Add VirtualBOX Lecture 8 Windows 7 Add VirtualBox Lecture 9 BeeBox Download and Add VirtualBox Lecture 10 Create Nat Network and Connections Test with VirtualBox Section 2: Create Lab VmWare Lecture 11 VmWare Download and Install Lecture 12 Kali Linux Install VMWare Lecture 13 Kali Image File Add VmWare Lecture 14 Metasploitable Add VmWare Lecture 15 Owasp Add VmWare Lecture 16 Win7 add VmWare Lecture 17 BeeBox Download and Add VmWare Lecture 18 Create Nat Network and Connections Test with VmWare Section 3: Introduction to Penetration Testing (Pentest+) Lecture 19 Content of the Penetration Testing Lecture 20 Definition of "Penetration Test" Lecture 21 Penetration Test Types Lecture 22 Security Audits Lecture 23 Vulnerability Scan Lecture 24 Terms: Asset, Threat, Vulnerability, Risk, Exploit Lecture 25 Penetration Test Approaches Lecture 26 Planning a Penetration Test Lecture 27 Penetration Test Phases Lecture 28 Legal Issues & Testing Standards Section 4: Basic Networking Lecture 29 What is "Protocol" Lecture 30 Reference Models Lecture 31 OSI Reference Model Lecture 32 OSI vs TCP/IP Lecture 33 Demonstration using Wireshark Lecture 34 Standards & Protocols Lecture 35 Ethernet: Principles, Frame & Headers Lecture 36 ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets Lecture 37 ARP Hand-On Practices Lecture 38 VLANs - Virtual Local Area Networks Lecture 39 WLANs - Wireless Local Area Networks Lecture 40 Introduction to Network Layer Lecture 41 Internet Protocol - IP Lecture 42 IPv4 Adressing System Lecture 43 IPv4 Packet Header Lecture 44 IPv4 Subnetting: Classful Networks Lecture 45 IPv4 Subnetting: Subnet Mask Lecture 46 IPv4 Subnetting: Understanding Lecture 47 IPv4 Shortage Lecture 48 Private Networks Lecture 49 Private Networks - Demonstration Lecture 50 NAT - Network Address Translation Lecture 51 IPv6, Packet Header & Addressing Lecture 52 DHCP - How the Mechanism Works Lecture 53 ICMP - Internet Control Message Protocol Lecture 54 What is OSPF? Lecture 55 Traceroute Lecture 56 Introduction to Transport Layer Lecture 57 TCP - Transmission Control Protocol Lecture 58 TCP Header Lecture 59 UDP - User Datagram Protocol Lecture 60 STP Attacks, Root Guard and BPDU Guard Lecture 61 Introduction to Application Layer Lecture 62 DNS - Domain Name System Lecture 63 HTTP ( Hyper Text Transfer Protocol ) Lecture 64 HTTPS Lecture 65 Traffic Topologies Lecture 66 VPNs Lecture 67 DHCP Snooping Lecture 68 Firewalls Lecture 69 Well-known Network Attacks Section 5: Information Gathering Lecture 70 Intro to Reconnaissance Lecture 71 Extract Domain Registration Information: Whois Lecture 72 Identifying Hosts or Subdomains Using DNS: Fierce & Theharvester Lecture 73 Detect Applications on The Same Service Lecture 74 Ports and Services on The Web Server Lecture 75 Review Technology/Architecture Information Lecture 76 Extracting Directory Structure: Crawling Lecture 77 Minimum Information Principle Lecture 78 Using Search Engines: Google Hacking Lecture 79 Shodan Lecture 80 Web Archives Lecture 81 FOCA - Fingerprinting Organisations with Collected Archives Lecture 82 Maltego - Visual Link Analysis Tool Lecture 83 Password Crackers Lecture 84 Network Scanners Lecture 85 Wireless Scanners / Cracker Lecture 86 Banner Grabbing Lecture 87 Fingerprinting Tools: The Harvester and Recon-NG Lecture 88 Gathering Information About the People Section 6: Vulnerability Scan and Introduction to Nessus Lecture 89 Introduction to Vulnerability Scan Lecture 90 Introduction to Nessus Lecture 91 Nessus: Download Lecture 92 Nessus: Install & Setup Lecture 93 Nessus: Creating a Custom Policy Lecture 94 Nessus: First Scan Lecture 95 An Aggressive Scan Lecture 96 Results of an Aggressive Scan Lecture 97 Results of an Aggressive Scan with Windows Systems Lecture 98 Nessus: Report Function Section 7: Network Scan & Network Attacks Lecture 99 Passive Scan - Definition Lecture 100 Passive Scan - ARP Tables Lecture 101 Passive Scan - Wireshark Lecture 102 Wireshark: Following Stream Lecture 103 Wireshark: Summarise Network Lecture 104 Active Scan Lecture 105 MitM: Listening to the traffic Lecture 106 Sniffing Lecture 107 TCPDump Lecture 108 Router, Switch, Hub Lecture 109 How to Expand Sniffing Space? Lecture 110 MAC Flood: Switching Lecture 111 MAC Flood: Using Macof Tool Lecture 112 MacFlood - Countermeasures Lecture 113 ARP Spoof Lecture 114 ARP Cache Poisoning using Ettercap Lecture 115 DHCP Starvation & DHCP Spoofing Lecture 116 DHCP Mechanism Section 8: Network Scan & Network Attacks Lecture 117 DHCP Starvation - Scenario Lecture 118 DHCP Starvation Demonstration with Yersinia Lecture 119 VLAN Hopping Lecture 120 VLAN Hopping: Switch Spoofing Lecture 121 VLAN Hopping: Double Tagging Lecture 122 What is SNMP Lecture 123 Write Access Check Using SNMP-Check Tool Lecture 124 Dos and DDos Lecture 125 Brute Force Lecture 126 DNS Spoofing Lecture 127 War Driving Lecture 128 Evil Twin Lecture 129 Packet Sniffers Lecture 130 Man-in-the-Middle Attacks Section 9: Nmap Lecture 131 What is Nmap? Lecture 132 Nmap First Scan Lecture 133 Interpretation of Nmap Results Lecture 134 Scanning Specific IPs or Specific Targets With Nmap Lecture 135 Nmap IP List Creation Lecture 136 Nmap Random Scan and Exclude Ips Lecture 137 Input-Output Management Lecture 138 What is Port? Nmap Port Scan Lecture 139 Scanning Top 20, Top 100 Ports With Nmap Lecture 140 Scanning Specific Ports With Nmap Lecture 141 Nmap Syn Scannig Lecture 142 Nmap TCP Scan Lecture 143 Nmap UDP Scan Lecture 144 Nmap FiN, Xmas, Null and ACK Scan in Ethical Hacking Lecture 145 Discovering hosts with ARP ping scans Lecture 146 Discovering hosts with ICMP ping scans Lecture 147 Nmap Fast Scan Lecture 148 Nmap Open Ports Scan Lecture 149 Nmap No PORT Scan Lecture 150 Nmap PING and noPING Scan Lecture 151 Nmap Verbose Command Lecture 152 Nmap Version Detection Lecture 153 Nmap Operating System Detection Lecture 154 Nmap Script Engine (NSE) Lecture 155 Nmap Script Engine Example - 1 Lecture 156 Nmap Script Engine Example - 2 Lecture 157 NMAP Brute Force Attacks Lecture 158 Nmap Timing Templates Lecture 159 Bypass of IPS & IDS Systems With Nmap Section 10: Using Metasploit Framework Lecture 160 Why Metasploit Framework? AKA: MSF Lecture 161 Importance of Penetration Testing Lecture 162 Penetration Testing Execution Standard Lecture 163 Requirements ( Like Storage. Processor ) Lecture 164 Lab Connectivity and Taking Snapshots Lecture 165 Evolution of Metasploit Lecture 166 Metasploit Filesystem and Libraries Lecture 167 The Architecture of MSF Lecture 168 Auxiliary Modules Lecture 169 Payload Modules Lecture 170 Exploit Modules Lecture 171 Encoder Modules Lecture 172 Post Modules Lecture 173 Metasploit Editions Lecture 174 Metasploit Community Lecture 175 Metasploit Interfaces Lecture 176 Armitage Lecture 177 MSFconsole Lecture 178 MSFConsole Basic Commands 1 Lecture 179 MSFConsole Basic Commands 2 Lecture 180 MSFConsole Basic Commands 3 Lecture 181 Using Databases in MSF 1 Lecture 182 Using Databases in MSF 2 Lecture 183 More on Exploits in MSF Section 11: Enumeration Lecture 184 What is Enumeration? Lecture 185 SMB and Samba Enumeration Lecture 186 MySQL Enumeration Lecture 187 FTP Enumeration Lecture 188 SSH Enumeration Lecture 189 HTTP Enumeration Lecture 190 SNMP Enumeration Lecture 191 SMTP Enumeration Lecture 192 NMAP DNS Enumeration Lecture 193 NMAP HTTP Enumeration Lecture 194 NMAP MySQL Enumeration Lecture 195 NMAP SMB Enumeration Lecture 196 NMAP SNMP Enumeration Section 12: Social Engineering Lecture 197 Terminologies Part 1 Lecture 198 Terminologies Part 2 Lecture 199 Creating Malware and Terminologies Lecture 200 Why Social Engineering Works Lecture 201 MSFvenom Part 1 Lecture 202 MSFvenom Part 2 Lecture 203 Veil Installation Lecture 204 Veil in Action Lecture 205 TheFatRat Installation Lecture 206 TheFatRat in Action Lecture 207 TheFatRat: Overcoming a Problem Lecture 208 Embedding Malware in PDF Lecture 209 Embedding Malware in WORD Lecture 210 Embedding Malware in Firefox Add-on Lecture 211 Empire Installation Lecture 212 Empire in Action Part 1 Lecture 213 Empire in Action Part 2 Lecture 214 Exploiting Java Vulnerabilities Lecture 215 Social Engineering Toolkit Lecture 216 Sending Fake Emails - Phishing Lecture 217 Vishing - Voice Phishing Lecture 218 Shoulder Surfing Lecture 219 Tricking Users with Hoaxes Lecture 220 Watering Hole Attacks Lecture 221 Whaling Lecture 222 Tailgating and Mantraps Lecture 223 Dumpster Diving Section 13: Wi-Fİ Hacking And Tools Lecture 224 Hardware and Software Requiments Lecture 225 What is Wireless LAN Lecture 226 Authentication Technologies Lecture 227 Authorization and Accounting Methods Lecture 228 Wi-Fi Adapter Settings Lecture 229 IEE-802.11 Lecture 230 Basic Terminologies and Concepts Lecture 231 Wireless Operating Modes Lecture 232 MAC Frame Structure Lecture 233 Wireless Packet Types Lecture 234 Wireshark: Analysing Packet Types Lecture 235 Wi-Fi Network Interaction Lecture 236 Wireless Encryption Protocols: WEP vs. WPA Lecture 237 WPA 4-Way Handshake Lecture 238 WPA2 Personal and Enterprise Lecture 239 Wireshark: WEP and WPA Lecture 240 Wi-Fi Protected Setup (WPS) Lecture 241 Wireless Recon with Bettercap Lecture 242 Wardriving with Kismet: Configuration Lecture 243 Wardriving with Kismet: Mapping Lecture 244 Airbase-ng Lecture 245 Evil Twin Attack Lecture 246 Wifi Pumpkin 3 Lecture 247 Fluxion: Installation Lecture 248 Fluxion: Handshake Snooper Attack Lecture 249 Fluxion: Captive Portal Attack Lecture 250 WEP Cracking - Preparing Attacks Lecture 251 WEP Cracking - Fake Authentication Attack Lecture 252 WEP Cracking - Deauthentication Attack Lecture 253 WEP Cracking - Deauthentication Attack with Bettercap Lecture 254 WEP Cracking - ARP Request Replay Attack Lecture 255 WEP Cracking - Fragmentation Attack Lecture 256 WEP Cracking - ChopChop Attack Lecture 257 WPA/WPA2 Cracking - Introduction Lecture 258 WPA/WPA2 Cracking - Aircrack-ng Lecture 259 WPA/WPA2 Cracking - John The Ripper Lecture 260 WPA/WPA2 Cracking - CoWPAtty Lecture 261 WPA/WPA2 Cracking - Wifite 2 Lecture 262 WPA/WPA2 Cracking with GPUs : Hashcat Lecture 263 WPA/WPA2 Cracking - Key Reinstallation Attack (KRACK) Lecture 264 WPS Cracking - Wifite 2: PIN Attack Section 14: Web Application Pentesting Lecture 265 Reflected Cross-Site Scripting Attacks Lecture 266 Reflected Cross-Site Scripting over JSON Lecture 267 Stored Cross-Site Scripting Attacks Lecture 268 DOM Based Cross-Site Scripting Attacks Lecture 269 Inband SQL Injection over a Search Form Lecture 270 Inband SQL Injection over a Select Form Lecture 271 Error-Based SQL Injection over a Login Form Lecture 272 SQL Injection over Insert Statement Lecture 273 Boolean Based Blind SQL Injection Lecture 274 Time Based Blind SQL Injection Lecture 275 Detecting and Exploiting SQL Injection with SQLmap Lecture 276 Detecting and Exploiting Error Based SQL Injection with SQLmap Lecture 277 Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap Lecture 278 Command Injection Introduction Lecture 279 Automate Command Injection Attacks: Commix Lecture 280 XML/XPATH Injection Lecture 281 SMTP Mail Header Injection Lecture 282 PHP Code Injection Lecture 283 Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner Lecture 284 Introduction to Burp: Downloading, Installing and Running Lecture 285 Intercepting HTTP Traffic with Burp Suite Lecture 286 Intercepting HTTPS Traffic with Burp Suite Section 15: Authentication and Authorization Testing Lecture 287 Securing Network Access by Using AAA Lecture 288 Definition Lecture 289 Creating a Password List: Crunch Lecture 290 Differece Between HTTP and HTTPS Traffic: Wireshark Lecture 291 Attacking Insecure Login Mechanisms Lecture 292 Attacking Insecure Logout Mechanisms Lecture 293 Attacking Improper Password Recovery Mechanisms Lecture 294 Attacking Insecure CAPTCHA Implementations Lecture 295 Path Traversal: Directory Lecture 296 Path Traversal: File Lecture 297 Introduction to File Inclusion Vulnerabilities Lecture 298 Local File Inclusion Vulnerabilities Lecture 299 Remote File Inclusion Vulnerabilities Section 16: Post Exploitation Lecture 300 Post-Exploitation Lecture 301 What is "Persistence" Lecture 302 Meterpreter's Persistence module Lecture 303 Removing the Backdoor Section 17: IoT & Mobile Lecture 304 What is IoT Lecture 305 Where does IoT Exist in Our Lives Lecture 306 How does IoT work Lecture 307 Connection Standarts Lecture 308 IoT Security Lecture 309 Mobile Security Threats Section 18: Cloud Lecture 310 Characteristics of Cloud Computing Lecture 311 What is Cloud Computing Lecture 312 What is Cloud Security Lecture 313 How does cloud security work Lecture 314 What makes cloud security different Section 19: Scripting Basics Lecture 315 Bash Scripting 101 Section 20: Python Scripting Lecture 316 Installing Anaconda Distribution For Windows in Python Lecture 317 Installing Python 3.9.7 and PyCharm For Windows in Python Lecture 318 Variables in python Lecture 319 Numbers in Python Lecture 320 String Operations and Useful String Methods in python examples Lecture 321 Data Type Conversion in Python Lecture 322 Exercise : Company Email Generator in python Lecture 323 Conditionals in python Lecture 324 bool() Function in Python Lecture 325 Comparison and Logical Operators in Python Lecture 326 If Statements in Python Lecture 327 Exercise: Calculator Lecture 328 Loops in Python Lecture 329 While Loops in Python Lecture 330 For Loops in python Lecture 331 Range Function in Python Lecture 332 Control Statements in python Lecture 333 Functions in Python Programming Lecture 334 Create A New Function and Function Calls in Python programming Lecture 335 Return Statement in python Lecture 336 Lambda Functions in Python Lecture 337 Lists and List Operations in Python Programming Lecture 338 List Methods in Python Programming Lecture 339 Dictionaries in Python Hands-on Lecture 340 Dictionary Comprehensions in Python Hands-on Lecture 341 Logic of OOP in Object Oriented Programming (OOP) Lecture 342 Constructor in Object Oriented Programming (OOP) Lecture 343 Methods in Object Oriented Programming (OOP) Lecture 344 Inheritance in Object Oriented Programming (OOP) Lecture 345 Overriding and Overloading in Object Oriented Programming (OOP) Section 21: Ruby Scripting Lecture 346 Ruby Set Up - Installing Ruby on Windows Lecture 347 Ruby Development Editor Lecture 348 First Program Lecture 349 Debugging Lecture 350 Comments Lecture 351 What is a variable? Lecture 352 Data Types Lecture 353 Arithmetic Operators Lecture 354 Assignment Operator Lecture 355 Parallel Assignment Lecture 356 Comparison Operators Lecture 357 Logical Operators Lecture 358 Special Operators Lecture 359 Operation Ordering Lecture 360 String Operations Lecture 361 String Methods Lecture 362 If Statements Lecture 363 Unless Statements Lecture 364 Case Statements Lecture 365 Loops Lecture 366 For Loops and Iterators Lecture 367 Do / While Loops Lecture 368 Break and Next Keywords Lecture 369 Method Calls Lecture 370 Create A New Method Lecture 371 Blocks Lecture 372 Method Arguments Lecture 373 Lambda Functions Lecture 374 Global and Local Variables Lecture 375 Recursive Functions Lecture 376 Modules Lecture 377 Arrays Lecture 378 Traverse an Array Lecture 379 Array Operations Lecture 380 Array Methods Lecture 381 Hashes Lecture 382 Traverse a Hash Lecture 383 Hash Operations Lecture 384 Hash Methods Lecture 385 Files and Directories Lecture 386 File Operations Lecture 387 Exceptions Lecture 388 Throw-Catch Statements Section 22: Password Cracking Tools Lecture 389 Hydra: Cracking the Password of a Web App Lecture 390 Hydra: Online SSH Password Cracking Lecture 391 Cain and Abel: Install & Run Lecture 392 Cain and Abel: Gathering Hashes Lecture 393 Cain & Abel: A Dictionary Attack Lecture 394 Cain & Abel: A Brute Force Attack Lecture 395 John the Ripper Section 23: CompTIA PenTest+ PT0-002 Exam Prep Section 24: Extra Lecture 396 CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab Those who want to get CompTIA Pentest+ certificate.,Anyone interested in security,Those who have a career goal in the field of security.,Those who have a basic knowledge of security and want to take it to higher levels.,Those who want to learn about pentest+, pentesting, ethical hacking, comptia pentest+ pt0-002,Those who want to be certified ethical hacker,Those who want to step into the world of security,Junior Security elements.,Those who want to step into the Penetration Testing. TurboBit https://turbobit.net/gvcjsii7d99c/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part01.rar.html https://turbobit.net/u2vs2e2fagve/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part02.rar.html https://turbobit.net/6x9ifzthyvcm/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part03.rar.html https://turbobit.net/lyfm84ljcl8l/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part04.rar.html https://turbobit.net/j4a4cwd5317o/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part05.rar.html https://turbobit.net/wmg87kl49par/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part06.rar.html https://turbobit.net/aoqvrhjetkbx/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part07.rar.html https://turbobit.net/afcfzl8ucq45/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part08.rar.html https://turbobit.net/o7z1slec6yvt/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part09.rar.html https://turbobit.net/n8v9cvh6hr9h/.CompTIA.Pentest%2B.PT0-002.Ethical.Hacking..Pentest%2B.Lab.-.OAK.Academy.Team.Feb.2025.part10.rar.html RapidGator https://rapidgator.net/file/3504f7d9f05418e144c4f350dfe81182/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part01.rar https://rapidgator.net/file/9e8bb958284dd300ab10148cca0bbaf4/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part02.rar https://rapidgator.net/file/61449c64802ba8bb87b888751d8a2547/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part03.rar https://rapidgator.net/file/85e9d9a52fe0f40cbab7bcb1d8fc1c77/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part04.rar https://rapidgator.net/file/1f914acc8da9670e43c1fc50f92ed6dc/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part05.rar https://rapidgator.net/file/f4a6fb955e76a18234f362b69e99ed29/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part06.rar https://rapidgator.net/file/8644b9a5eb8abd1100967fd514f3e380/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part07.rar https://rapidgator.net/file/98b64408e8cf761450801eec3c1e4961/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part08.rar https://rapidgator.net/file/d2f7b9d4a0069f5e80bcad61327ffb57/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part09.rar https://rapidgator.net/file/21290e83cd23da967a856f63b24f3caf/.CompTIA.Pentest_.PT0-002.Ethical.Hacking..Pentest_.Lab.-.OAK.Academy.Team.Feb.2025.part10.rar FileFactory
  19. Cybersecurity Career Jumpstart Published 6/2023 Duration: 17h 41m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 8.71 GB Genre: eLearning | Language: English Find Out if a Cybersecurity Career is for You What you'll learn You'll learn why you should seriously consider a lucrative and exciting career in cybersecurity. Discover a role that would be a good fit for you. We'll dispel common misconceptions such as all cyber roles require programming. You will be presented with a high-level description of most roles in the field, what they offer and how to find the requirements associated with each position. You'll learn how to take the next steps to get started down the cybersecurity career path. We'll teach you how to accelerate your path to employment and avoid common pitfalls when seeking a new position. Requirements No programming experience required Description Find Out if a Cybersecurity Career is for You. Fast! Don't take a chance on your future. These cybersecurity courses will give you the information needed to make a wise decision. You'll learn from industry experts with years of experience in the cybersecurity field and gain the knowledge and skills necessary to succeed. With our jumpstart program, you'll learn the basics of cybersecurity, including threat detection, risk assessment, pentesting, and incident response. Our jumpstart program provides the tools to help people looking to launch a new career in cybersecurity, whether that be the first career for someone after High School or someone looking to transition to a new and more rewarding career. This training program will help students navigate the early stages of pursuing a cybersecurity career. The outcome is an understanding of how vast the field is, what role might be proper for you in the long and short term, Why you want it, and how you're going to get there. Plus, with the demand for cybersecurity professionals at an all-time high, there's never been a better time to explore this exciting and rewarding field. Don't miss out on this opportunity to jumpstart your career in cybersecurity. Enroll in our program today! Who this course is for: People that want to enter the cybersecurity field as fast as possible More Info TurboBit https://turbobit.net/lxad1huqterc/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part01.rar.html https://turbobit.net/mdmeg283ad0f/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part02.rar.html https://turbobit.net/sb71jfm1i2g5/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part03.rar.html https://turbobit.net/o9p5nxoknc3e/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part04.rar.html https://turbobit.net/3rxfuv9qje3v/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part05.rar.html https://turbobit.net/xvwegvv1xlqa/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part06.rar.html https://turbobit.net/xeufh29waskw/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part07.rar.html https://turbobit.net/geysrywrq1st/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part08.rar.html https://turbobit.net/eu2x74n7f3ke/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part09.rar.html https://turbobit.net/pttccnd6b89h/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part10.rar.html RapidGator https://rapidgator.net/file/446a6ee0f9b759d51cfd21f2272a0b6f/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part01.rar https://rapidgator.net/file/d8e6d629d46b47082513eda4b41a6b2f/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part02.rar https://rapidgator.net/file/aeca2c52ee6a433c3bb6b12682886b82/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part03.rar https://rapidgator.net/file/a746da4a15da90543e546dd52908a177/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part04.rar https://rapidgator.net/file/1398129560e5d7553608afab1be2df02/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part05.rar https://rapidgator.net/file/0680267dd1ffc10973ab8d10bfd02f14/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part06.rar https://rapidgator.net/file/208d9a11e8ae3bb7eb6303bbe1d85d06/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part07.rar https://rapidgator.net/file/397e1a8dfc0eaac35fe4d5b4283ba0ac/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part08.rar https://rapidgator.net/file/fbc7c8b93e291155007029f357a1062c/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part09.rar https://rapidgator.net/file/b80ec9755a254ec54cd068fb9b2f5b8d/.Cybersecurity.Career.Jumpstart.-.James.Mullahey.Nov.2024.part10.rar FileFactory
  20. Bgp Fundamentals And Advanced Topics: All-In-One Course Published 8/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 6.01 GB | Duration: 8h 5m Master the Essentials and Advanced Techniques of Border Gateway Protocol (BGP) for Network Stability and Performance What you'll learn Understanding the role and importance of BGP in networking Differences between Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) BGP attributes and how they influence routing decisions Path selection process BGP message types (OPEN, UPDATE, NOTIFICATION, KEEPALIVE) Configuring basic BGP settings Establishing BGP sessions (iBGP and eBGP) BGP route aggregation and summarization Route reflectors and confederations BGP multi-homing BGP Policy and Filtering BGP Scalability and Performance Implementing BGP security features (e.g., TTL Security Check, MD5 authentication) Tools and techniques for BGP troubleshooting Use cases for BGP in large-scale networks Real-world lab exercises to reinforce theoretical knowledge Requirements Basic Networking Knowledge Understanding of Routing Protocols Access to Networking Lab Environment Basic Command-Line Skills Description Welcome to "BGP Fundamentals and Advanced Topics: All-in-One Course," the ultimate guide to mastering Border Gateway Protocol (BGP) from the ground up. Whether you're a network engineer, IT professional, or a student eager to expand your networking knowledge, this comprehensive course will equip you with the skills and understanding necessary to implement, manage, and troubleshoot BGP in any networking environment.What You'll LearnIntroduction to BGPThe role and importance of BGP in modern networkingKey differences between IGPs and EGPsBGP BasicsBGP attributes and their impact on routing decisionsUnderstanding BGP message types (OPEN, UPDATE, NOTIFICATION, KEEPALIVE)BGP path selection processBGP Configuration and ImplementationSetting up BGP on routersConfiguring basic BGP settings and establishing BGP sessions (iBGP and eBGP)Managing BGP neighbor relationshipsAdvanced BGP ConceptsBGP route aggregation and summarizationImplementing route reflectors and confederationsUsing BGP communities for routing policiesMulti-homing and redundancy in BGPBGP Policy and FilteringApplying route maps, prefix lists, and access lists with BGPImplementing BGP policies to control routing behaviorFiltering BGP routes to ensure network stability and securityBGP Scalability and PerformanceEnhancing BGP scalability techniquesReducing BGP convergence timeBest practices for optimizing BGP performanceBGP SecurityIdentifying and mitigating common BGP security threatsImplementing BGP security features like TTL Security Check and MD5 authenticationBest practices for securing BGP implementationsBGP Troubleshooting and MonitoringCommon BGP issues and troubleshooting techniquesTools and methods for BGP monitoring and diagnosticsEnsuring BGP performance and stability in your networkBGP in Data Centers and Service Provider NetworksThe role of BGP in modern data centersBGP applications in service provider environmentsReal-world use cases for BGP in large-scale networksReal-World BGP Scenarios and Case StudiesAnalyzing and solving real-world BGP implementation scenariosCase studies demonstrating effective BGP solutions for network challengesBGP and SDN (Software-Defined Networking)Integrating BGP with SDN architecturesExploring future trends and developments in BGP and networkingHands-On Labs and Practical ExercisesConfiguring BGP in simulated environmentsReal-world lab exercises to reinforce theoretical knowledgeStep-by-step guides for implementing BGP solutionsRequirementsBasic networking knowledge (IP addressing, subnetting)Familiarity with common networking devices (routers, switches)Basic experience with network configuration using CLIUnderstanding of basic routing protocols (OSPF, EIGRP)Access to a networking lab environment (physical or virtual) for practiceWho This Course is ForNetwork engineers and administratorsNetwork architectsIT professionals and support teamsStudents and learners in networking fieldsSystem administratorsTelecommunications professionalsCybersecurity professionalsNetworking enthusiastsWhy Enroll?By the end of this course, you will have a thorough understanding of BGP, from fundamental concepts to advanced techniques. You will be equipped with practical skills to implement, configure, and troubleshoot BGP in various networking environments, making you a valuable asset in any network operations or engineering team. Enroll today and take the next step in your networking career! Overview Section 1: Introduction Lecture 1 Introduction Section 2: BGP Introduction Lecture 2 Basics of BGP Lecture 3 Understanding eBGP & iBGP Lecture 4 Setting up the topology Lecture 5 Lab: Basic BGP Configuration Lecture 6 BGP Route Advertisement Lecture 7 BGP Route Advertisement Continued Section 3: BGP Features Explained Lecture 8 BGP Redistribute Connected Feature Lecture 9 Redistributing IGP into BGP Methods Lecture 10 eBGP Multihop Theory & Lab Lecture 11 eBGP MD5 Authentication Theory and Lab Lecture 12 iBGP Configuring Underlay Routing Lecture 13 Configuring iBGP using loopbacks and route propagation Lecture 14 Configuring Next Hop Self feature in iBGP and route propagation Lecture 15 iBGP Full Mesh and Route Reflector Theory Lecture 16 iBGP Full Mesh and Route Reflector Theory & Lab Lecture 17 iBGP Peer-Group Theory Lecture 18 iBGP Peer-Group Lab Lecture 19 Demistifying Access-list and Prefix-List for Route-Filtering - Part-1 Lecture 20 Demistifying Access-list and Prefix-List for Route-Filtering - Part-2 Lecture 21 Configuring Route-Filtering in BGP - ACL Method Lecture 22 Configuring Route-Filtering in BGP - Prefix-List Professionals responsible for configuring, managing, and maintaining network infrastructures.,Those looking to deepen their knowledge of routing protocols and enhance their network engineering skills.,IT staff seeking to expand their expertise in network protocols and routing technologies.,Support engineers responsible for diagnosing and resolving network issues.,Individuals preparing for networking certifications (e.g., Cisco CCNP, Juniper JNCIS, or equivalent),Self-learners seeking to acquire new skills in network routing and protocols. TurboBit https://turbobit.net/kc72lqx91utc/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part01.rar.html https://turbobit.net/b07p5k0j3sw8/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part02.rar.html https://turbobit.net/6xt8kbqmrh9n/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part03.rar.html https://turbobit.net/kz4flmxrkke5/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part04.rar.html https://turbobit.net/9gi0b24qdm37/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part05.rar.html https://turbobit.net/xkxfq6hmctrt/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part06.rar.html https://turbobit.net/lohy5s65bdxk/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part07.rar.html https://turbobit.net/o07ca1jodpsl/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part08.rar.html https://turbobit.net/c29iaze8ay79/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part09.rar.html https://turbobit.net/lwu56a4it3k6/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part10.rar.html RapidGator https://rapidgator.net/file/96597a751053ce7d2fc9205ef80dc0ba/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part01.rar https://rapidgator.net/file/2a709e6aedef30843e742a4db0ec956b/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part02.rar https://rapidgator.net/file/560c4c9b0a6ee782a08cb6196a355cf8/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part03.rar https://rapidgator.net/file/c4bc196f54e68b616978f245064b328a/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part04.rar https://rapidgator.net/file/63d28e123bcadd305d6e547ec3e934ae/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part05.rar https://rapidgator.net/file/72196fb0ab20608ec4c6303dc6c3baee/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part06.rar https://rapidgator.net/file/ce7479a52d21464cffb545db75ec8752/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part07.rar https://rapidgator.net/file/29ae91a49a7f55c793d66dfaf31cb7ba/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part08.rar https://rapidgator.net/file/75476a36c50bcde4021d4fa247e38d4d/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part09.rar https://rapidgator.net/file/d2a7e60a284b708877965c578f91a852/.-.BGP.Fundamentals.and.Advanced.Topics.All-in-One.Course.-.ZB.Networks.2024.12.part10.rar FileFactory
  21. Learning Minitab Released: 3/11/2025 Duration: 1h 43m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 181 MB Genre: eLearning | Language: English This course introduces and teaches how to use Minitab to draw graphs and charts, run descriptive statistics, and conduct inferential statistical tests for data-driven decision making. Data sets are provided for you to follow along step by step with instructor Dr. Richard Chua. This course introduces new users to the latest version of Minitab on the web and its useful and popular features, and also serves as a useful resource for existing users. More Info TurboBit https://turbobit.net/fnxiujvwav9b/Linkedin.Learning.Learning.Minitab.UPDATED.2025-03-11. -SCHOLASTiC.rar.html RapidGator https://rapidgator.net/file/31dbc4b38c76876f084d22823ab5e78c/Linkedin.Learning.Learning.Minitab.UPDATED.2025-03-11. -SCHOLASTiC.rar FileFactory -SCHOLASTiC.rar
  22. The Complete Python Course from Beginner to Expert for 2020 Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 2.85 GB Genre: eLearning Video | Duration: 117 lectures (8 hour, 32 mins) | Language: English Python Developer | 7 Hacks for Python Interview | Introduction to Machine Learning and Deep Learning | Hands on project. What you'll learn The Complete Python Developer Course from Scratch for 2020. Course start from the very beginning by teaching you python basics and then moving into advance topics and later we Introduce to different career fields like Machine Learning, Deep Learning in python so you can get real world practice and prepared for real world job. This is comprehensive course which include all the modern skills of a python developer and gets up to date along the way. The curriculum will be very hands on as we walk you to become a professional Python developer from start to finish. Requirements A computer (Windows/Mac/Linux). That's it! No previous programming experience is needed. No prior knowledge of Python is required. Description Become a Complete Python developer! This is a brand-new python course, Launched in the fall of 2020. This course is all about learning Python from Scratch which covers beginner to expert level concepts. The fact is, Python is one of the most popular programming languages in the world - Huge companies like Google use it in mission-critical applications like Google Search. This is a comprehensive course that includes all the modern skills of a python developer and gets up to date along the way. We learn real-world projects to add to your resume (Which helps you to understand better of python and have fun along the way with numerous skills in your kitty). The curriculum will be very hands-on as we walk you to become a professional Python developer from start to finish. We'll start from the very beginning by teaching you the python basics and then moving into advanced topics and Introduction to different career fields like Machine Learning, Deep Learning in python so you can get real-world practice and prepare for the real-world job. The subject dealt with in this course include: - What is Programming - Python Basics - Python Development Environment (PyCharm, Google Colab Notebook, and Repel) - Virtual Environments - Python Functions - Python Object-Oriented Programming - Python Functional Programming - Pure Function (map(), filter(), zip(), reduce(), lambda() - Decorators in Python - Python Errors and Exceptions - Generators in Python - Modules in Python - Debugging - Python File Handling - Regular Expressions in Python - Testing in Python - Web Scraping in Python and Beautiful Soup - Introduction to Machine Learning - Algorithms in Machine Learning - Introduction to Deep Learning - Neural Network - Types of Neural Network - Terminologies in Machine Learning and Deep Learning - Image Fundamentals You'll be a full Python developer by the end of this course who can be employed at Multinational companies. We are going to use Python to work with a web scraper for crawling data from random websites, build a chatbot, and build a secure password checker. By the end, you will have a stack of knowledge you have built over time and ready to implement in your profession. Here's the truth: Python is taught by most courses and they just do that. They show you how to get started. But the thing is you don't know where to go from there or in what all the fields are open when you learn python. Remember if you learn python, It will be applied in fields like Machine Learning, Deep Learning, Automation, etc there are plenty of fields that python has an impact. Stack Overflow rated python is the most promising programming language for the future. Whether you're new to programming, trying to upgrade your Python skills, or come from a different language of programming, this course is for you. This course is not about simply making your code alone, It's about bringing impact on your programming career. Here it won't be a situation where you just get the theory part, you will become best of yourself with python knowledge. This course will push you and challenge you to go from an absolute beginner with no coding experience to someone that can go off, and get hired. Why should you take this course? There are a lot of Python courses - I am an instructor as well as being a Software Developer I bring new skills, original content, updates in the field, information about new technology into the table. You can enroll in the course safely. In the knowledge that I am not just here to teach I am here to help you, and also update myself along the journey with you people. you will not only be learning Python, but you will be learning industry best practices for Python programming that real employers demand in the industry. Does the course get updated? It's amazing how technology is advancing at a rapid rate every day. New, more powerful hardware and software are being released every day, meaning it's crucial to stay on top with the latest knowledge and update yourself with new technology into the market. Let me tell you a real-world story about what happened as well as what is happening. Automation being on cards and the manual data entry people are fired from companies. Imagine the competition in this advanced technological era and think about your situation where do you stand? What may happen if you don't upgrade yourself? A lot of other courses on Udemy get released once, and never get updated. Learning from an outdated course and/or an outdated version of Python won't give you any productive results and even worse it could teach you the wrong way to do things. I am here to bring a difference in the course. I teach by continually updating the course. The Fact: This is my first Udemy course and being a Software Developer I want to help you. I want to teach you to make a difference. What if you have questions? Yes! I will answer your question. I created this course not just I want to teach you all but I want to learn from you guys, I want to upgrade myself and I believe in teaching, getting aware of my mistakes and redoing my work and teach again. Content Inside the course What you'll learn · Become a professional Python Developer and get hired · Master Python 3 fundamentals as well as advanced topics · Learn Cool Inbuilt Functions · Learn Object-Oriented Programming · Learn Function Programming · Build real-world Python projects · Learn Introduction Machine Learning · Learn and understand Machine Learning Algorithms · Build a Web Scraper with Python and Beautiful Soup · Learn Unit testing, Debugging and Handle Errors and Exceptions in your Python programs · Learn what are Neural Networks · Learn types of Neural Networks · Set up a professional workspace with Google Colab Notebooks, PyCharm, and repel. Are there any course requirements or prerequisites? · A computer (Windows/Mac/Linux). That's it! · No prior knowledge of Python is required. · No previous programming experience is needed. Who this course is for: · Anyone who wants to master Python 3 · Anyone who wants to learn to code · Anyone looking to level up their skills and master a new programming language. Who this course is for: Beginner Python Developers. Students who are pursuing Computer Science, Electronics and Communication, background in their education. Professional who want change their career into different domain. Graduates who want get hired from Multi National Companies. Professional who want learn Complete Python Developer Course from Scratch. Students, Graduates who are looking for jobs. For More Courses Visit & Bookmark Your Preferred Language Blog From Here: - - - - - - - - Download Links TurboBit https://turbobit.net/ego9u2ral8ch/Udemy_The_Complete_Python_Course_2025_2024-12.part01.rar.html https://turbobit.net/5ynvvp12eqxq/Udemy_The_Complete_Python_Course_2025_2024-12.part02.rar.html https://turbobit.net/zvz465f7xikh/Udemy_The_Complete_Python_Course_2025_2024-12.part03.rar.html https://turbobit.net/5koql6o39fkq/Udemy_The_Complete_Python_Course_2025_2024-12.part04.rar.html https://turbobit.net/p3tztij0y1s9/Udemy_The_Complete_Python_Course_2025_2024-12.part05.rar.html https://turbobit.net/v50ih9t541we/Udemy_The_Complete_Python_Course_2025_2024-12.part06.rar.html https://turbobit.net/sr213yzjr6ac/Udemy_The_Complete_Python_Course_2025_2024-12.part07.rar.html https://turbobit.net/a8yzwfi5ql4w/Udemy_The_Complete_Python_Course_2025_2024-12.part08.rar.html https://turbobit.net/zr3do0wouyng/Udemy_The_Complete_Python_Course_2025_2024-12.part09.rar.html https://turbobit.net/peauaop3wx3v/Udemy_The_Complete_Python_Course_2025_2024-12.part10.rar.html https://turbobit.net/vjjdkey22u8e/Udemy_The_Complete_Python_Course_2025_2024-12.part11.rar.html https://turbobit.net/h93jqyi1z7zx/Udemy_The_Complete_Python_Course_2025_2024-12.part12.rar.html https://turbobit.net/xarpzv0ei23d/Udemy_The_Complete_Python_Course_2025_2024-12.part13.rar.html https://turbobit.net/29awa5x2gb35/Udemy_The_Complete_Python_Course_2025_2024-12.part14.rar.html https://turbobit.net/rg0lev2lh59t/Udemy_The_Complete_Python_Course_2025_2024-12.part15.rar.html https://turbobit.net/asibjvhpbqr7/Udemy_The_Complete_Python_Course_2025_2024-12.part16.rar.html https://turbobit.net/ftadqe0dgrka/Udemy_The_Complete_Python_Course_2025_2024-12.part17.rar.html RapidGator https://rapidgator.net/file/80bd0cd1f1a92ddf3b81d5c22b1fd0b1/Udemy_The_Complete_Python_Course_2025_2024-12.part01.rar https://rapidgator.net/file/4e219a2435e65ed80dca914e42ff446a/Udemy_The_Complete_Python_Course_2025_2024-12.part02.rar https://rapidgator.net/file/8443d57b68f609d8a53316b78cd395e7/Udemy_The_Complete_Python_Course_2025_2024-12.part03.rar https://rapidgator.net/file/921eb191f7468ff66406b4679b7670d6/Udemy_The_Complete_Python_Course_2025_2024-12.part04.rar https://rapidgator.net/file/1372b52f53cc7392cf831eb3a2c4d4e3/Udemy_The_Complete_Python_Course_2025_2024-12.part05.rar https://rapidgator.net/file/baaf045c604ad4005222bb0341113226/Udemy_The_Complete_Python_Course_2025_2024-12.part06.rar https://rapidgator.net/file/f275434c05dafbd53225d244dc738700/Udemy_The_Complete_Python_Course_2025_2024-12.part07.rar https://rapidgator.net/file/2d93c7a89c1429e4d24b351ae39211aa/Udemy_The_Complete_Python_Course_2025_2024-12.part08.rar https://rapidgator.net/file/6436c17c85f976be9fcbd0c7f113cc02/Udemy_The_Complete_Python_Course_2025_2024-12.part09.rar https://rapidgator.net/file/42032cb508735efc4772751aca932fe8/Udemy_The_Complete_Python_Course_2025_2024-12.part10.rar https://rapidgator.net/file/ce7e06c86d0c20b20468069d0230685d/Udemy_The_Complete_Python_Course_2025_2024-12.part11.rar https://rapidgator.net/file/e6454072ce8c8117e579464328671984/Udemy_The_Complete_Python_Course_2025_2024-12.part12.rar https://rapidgator.net/file/1e63de78562faa8bc8d90505afa91fc6/Udemy_The_Complete_Python_Course_2025_2024-12.part13.rar https://rapidgator.net/file/68022e36d3bf11e388e82e55e4204e92/Udemy_The_Complete_Python_Course_2025_2024-12.part14.rar https://rapidgator.net/file/6100909319808ae3a96032574e5b45c8/Udemy_The_Complete_Python_Course_2025_2024-12.part15.rar https://rapidgator.net/file/b6a8b83352012bb7b4621e321a359697/Udemy_The_Complete_Python_Course_2025_2024-12.part16.rar https://rapidgator.net/file/ed1db63df2b8fac8209f0ea0c5447cc2/Udemy_The_Complete_Python_Course_2025_2024-12.part17.rar
  23. Statistics with StatCrunch by the Math Sorcerer MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 9.84 GB | Duration: 15h 13m Full College Course on Statistics with StatCrunch What you'll learn How to use StatCrunch for Statistics The Difference Between Qualitative and Quantitative Data The Difference Between Discrete and Continuous Data Definitions of Population, Parameter, Sample, and Statistic Levels of Measurement: Nominal, Ordinal, Interval, Ratio Random Samples versus Simple Random Samples Cluster Sampling, Stratified Sampling, Convenience Sampling, and Systematic Sampling How to Construct a Frequency Table/Frequency Distribution from Scratch given the Data How to Fill in a Frequency Table given some Information How to Compute the Class Width from the Formula and from the Table How to Compute the Class Limits, Frequencies, Relative Frequencies, Class Midpoints, Cumulative Frequencies, and Class Boundaries Determine if a Frequency Table is Normal The Definition of an Outlier Finding the Mean and Standard Deviation from a Frequency Table How to Read a Histogram How to Identify the Shape of a Histogram How to Determine if a Histogram is Normal How to Create a Pareto Chart in StatCrunch How to Create a Pie Chart in StatCrunch How to Create a Stemplot(Stem and Leaf Display) in StatCrunch How to Create a Scatter Plot in StatCrunch How to Create a Dotplot in StatCrunch How to Read Statistical Graphs and Recognize Bad Graphs Understand the Notation in Statistics Understand the Measures of Center: Mean, Median, Mode, and Midrange Compute all the Measures of Center using StatCrunch Understand the Measures of Variation: Range, Standard Deviation, Variance, and Coefficient of Variation Compute all the Measures of Variation using StatCrunch How to Compute the Coefficient of Variation by Hand Understand Z-Scores and What they Mean Intuitively How to Compute Z-Scores by Hand with the Formula How to Find the Value of x Given the Z-Score How to Compute the Maximum and Minimum Usual Values Understand Boxplots(Box and Whisker Plots), the Five Number Summary, and the IQR(Interquartile Range) Create a Boxplot, Find the Five Number Summary, and Find the IQR using StatCrunch Understand How to Read Boxplots How to Find Percentiles Given the Data with StatCrunch Understand what a Probability Is Understand the Various ways to Compute Probabilities Understand The Basic Rules of Probability Understand Complements in Probability Understand the Addition Rule Formula for Probability and What it Means Intuitively How to use the Addition Rule in Probability Problems How to Compute Probabilities from a Table Understand the Multiplication Rule for Probability How to use the Multiplication Rule for Probability Both With and Without Replacement Understand Conditional Probability How to Compute Conditional Probabilities in Various Scenarios, including those which Include a Table Understand the Multiplication Rule for Counting(AKA the Fundamental Principle of Counting) and How to Use it Understand what a Permutation Actually Means Understand what a Combination Actually Means Understand the Difference between Permutations and Combinations Compute Permutations and Combinations by Hand with the Formulas Compute Permutations by Hand without the Formula Compute Permutations and Combinations with StatCrunch Compute Various Probabilities using the Theory of Counting(Multiplication Rule, Combinations, Permutations) Understand what a Random Variable Actually Is Determine if a Random Variable is Discrete or Continuous Understand what a Probability Distribution Actually is Determine if the Given Table Defines a Probability Distribution Compute Probabilities from a Given Probability Distribution using StatCrunch and By Hand Compute the Mean and Standard Deviation Given a Probability Distribution using StatCrunch Understand What the Expected Value Means in the Context of the Real World(Lottery) and How to Compute it by Hand Understand the Binomial Distribution and it's Purpose Compute Probabilities by Hand with the Binomial Distribution Compute Probabilities with StatCrunch and the Binomial Distribution Compute the Mean and Standard Deviation of the Binomial Distribution by Hand Understand the Poisson Distribution(Very Cool!) Compute Probabilities using the Poisson Distribution by Hand Use StatCrunch to Compute Probabilities with the Poisson Distribution Compute the Mean and Standard Deviation of the Poisson Distribution Construct a Probability Distribution for the Sample Means by Hand Construct a Probability Distribution for the Sample Proportions by Hand Understand the Normal Distribution and the Standard Normal Distribution How to Compute Probabilities with the Normal Distribution and StatCrunch Find the Area under the Normal Distribution with StatCrunch Compute Z-Scores given the Area under the Normal Curve with StatCrunch Find Percentiles with the Normal Distribution and StatCrunch Sketch Areas under the Normal Distribution with StatCrunch Find Cut-off Values with the Normal Distribution and StatCrunch Find Quartiles with the Normal Distribution and StatCrunch Understand and Use the Central Limit Theorem with StatCrunch Construct Confidence Intervals for the Population Proportion or Population Percentage using StatCrunch Find the Sample Size Needed to Estimate a Population Proportion or Percentage using StatCrunch Construct Confidence Intervals for the Population Mean using Z and StatCrunch Construct Confidence Intervals for the Population mean using T and StatCrunch Find the Sample Size needed to Estimate a Population Mean with StatCrunch Construct Confidence Intervals for Two Population Means using StatCrunch Construct Confidence Intervals for Two Population Proportions using StatCrunch Perform a Full Hypothesis Test for a Population Proportion or Percentage with StatCrunch Perform a Full Hypothesis Test for a Population Mean with StatCrunch Perform a Full Hypothesis Test for Two Population Means with StatCrunch Perform a Full Hypothesis Test for Two Population Proportions with StatCrunch Perform a Full Hypothesis Test for Dependent Data with StatCrunch How to Compute P-Values, Test Statistics, and Critical Values for Various Hypothesis Tests with StatCrunch Understand the Basics of Linear Correlation and What it Means Intuitively Understand what the Linear Correlation Coefficient Actually Means and Represents How to Determine if there is a Linear Correlation Both Mathematically and Graphically How to Compute the Linear Correlation Coefficient and Coefficient of Determination using StatCrunch How to Compute the Least Squares Line(Regression Line) using StatCrunch How to Make Predictions when there is a Linear Correlation using StatCrunch How to Make Predictions when there is not a Linear Correlation using StatCrunch Description This is a complete college level course in Statistics which uses StatCrunch. ****In order to fully benefit from this course, you must have access to StatCrunch.*** If you are currently taking Statistics using StatCrunch or plan to take Statistics in College using StatCrunch, then this is the PERFECT COURSE!!! Basically just, 1) Watch the videos, and try to follow along with a pencil and paper, take notes! 2) Eventually you should be able to do the problems before I do them. Try! Keep watching until you can do the problems on your own:) 3) Repeat! If you finish even 50% of this course you will know A LOT of Statistics and more importantly your Statistics skills will improve a ton! Statistics is an awesome class because it gives you real life examples of how mathematics is used. This is really the ideal course for anyone who wants to learn Statistics and already has StatCrunch or is willing to get it. I hope you enjoy watching these videos and working through these problems as much as I have:) Who this course is for Anyone Currently Taking a Course using StatCrunch Anyone who wants to Learn Statistics using StatCrunch(must have StatCrunch) TurboBit https://turbobit.net/3y8l4zkx5wvw/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part1.rar.html https://turbobit.net/bfpm19wd4xtz/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part2.rar.html https://turbobit.net/27qqq5sysmgu/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part3.rar.html https://turbobit.net/nan46gl8i9db/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part4.rar.html https://turbobit.net/xnxzvmhqy84q/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part5.rar.html https://turbobit.net/c7u1r8n3x099/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part6.rar.html https://turbobit.net/kqvb8grcguka/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part7.rar.html RapidGator https://rapidgator.net/file/d161f9b76f5b8562568de1f261a57f60/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part1.rar https://rapidgator.net/file/189e0b742994a49bbc7e2e3553e9b8cd/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part2.rar https://rapidgator.net/file/4c50e06fe684c06261579824d9e28ddb/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part3.rar https://rapidgator.net/file/06115ec6589c75b1b02f8932dd844458/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part4.rar https://rapidgator.net/file/d2326271eb55d44e51683123792b0326/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part5.rar https://rapidgator.net/file/8135060c8d12a3d48aeaa3d93f06613e/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part6.rar https://rapidgator.net/file/14a65aea87ada1faf931e6bb0417c27d/Statistics.with.StatCrunch.by.the.Math.Sorcerer.part7.rar FileFactory
  24. 5.14 GB | 33min 43s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : FileName :01 welcome-to-the-specialization.mp4 | Size: (108.79 MB) FileName :01 welcome-to-course-2.mp4 | Size: (22.64 MB) FileName :02 meet-the-numpy-array.mp4 | Size: (49.07 MB) FileName :03 creating-a-numpy-array.mp4 | Size: (43.88 MB) FileName :04 array-attributes.mp4 | Size: (19.97 MB) FileName :06 handling-missing-data.mp4 | Size: (29.45 MB) FileName :07 basic-array-operations.mp4 | Size: (23.08 MB) FileName :09 debugging-demo.mp4 | Size: (86.84 MB) FileName :01 aggregating-functions.mp4 | Size: (41.68 MB) FileName :02 broadcasting.mp4 | Size: (71.93 MB) FileName :03 reshaping-arrays.mp4 | Size: (38.21 MB) FileName :04 sorting-arrays.mp4 | Size: (28.54 MB) FileName :05 joining-arrays.mp4 | Size: (23.18 MB) FileName :07 debugging-challenge.mp4 | Size: (54.93 MB) FileName :01 series-and-dataframes.mp4 | Size: (107.21 MB) FileName :02 reading-and-inspecting-dataframes.mp4 | Size: (64.72 MB) FileName :03 manipulating-dataframes-intro-to-map-and-apply.mp4 | Size: (70.45 MB) FileName :04 filtering-dataframes.mp4 | Size: (33.26 MB) FileName :05 handling-missing-data.mp4 | Size: (92.12 MB) FileName :06 debugging-challenge.mp4 | Size: (129.72 MB) FileName :01 concatenating-dataframes.mp4 | Size: (67.23 MB) FileName :02 merging-joining-dataframes.mp4 | Size: (86.88 MB) FileName :03 reshaping-dataframes.mp4 | Size: (105.02 MB) FileName :04 aggregation.mp4 | Size: (97.67 MB) FileName :05 filtration.mp4 | Size: (43.9 MB) FileName :06 transformation.mp4 | Size: (41.34 MB) FileName :07 apply.mp4 | Size: (64.37 MB) FileName :08 debugging-challenge-video.mp4 | Size: (69.99 MB) FileName :01 welcome-to-the-course-and-specialization.mp4 | Size: (108.79 MB) FileName :01 welcome-to-course-1.mp4 | Size: (24.72 MB) FileName :02 intro-to-jupyter-notebook.mp4 | Size: (53.91 MB) FileName :05 review-map-filter-list-comprehensions.mp4 | Size: (165.95 MB) FileName :01 overview-of-the-debugging-framework.mp4 | Size: (62.55 MB) FileName :02 orient-yourself.mp4 | Size: (135.89 MB) FileName :03 investigate-the-symptoms-part-i-understanding-error-messages.mp4 | Size: (60.56 MB) FileName :04 investigate-the-symptoms-part-ii-code-vs-intention-mismatch.mp4 | Size: (57.23 MB) FileName :05 investigate-the-symptoms-part-iii-misunderstanding-computations-and-data.mp4 | Size: (47.56 MB) FileName :06 locate-the-root-cause.mp4 | Size: (60.38 MB) FileName :07 experiment-with-a-fix.mp4 | Size: (100.93 MB) FileName :08 reflect.mp4 | Size: (211.63 MB) FileName :01 framework-example-2.mp4 | Size: (204.96 MB) FileName :02 framework-example-3.mp4 | Size: (145.65 MB) FileName :04 debugging-with-an-llm.mp4 | Size: (144.68 MB) FileName :05 debugging-with-the-internet.mp4 | Size: (71.41 MB) FileName :06 debugging-with-docs.mp4 | Size: (214.44 MB) FileName :07 using-the-jupyter-debugger.mp4 | Size: (177.18 MB) FileName :01 introduction-make-it-easy-on-future-you.mp4 | Size: (7.99 MB) FileName :02 dry-don-t-repeat-yourself-part-1-iterate.mp4 | Size: (36.24 MB) FileName :03 dry-don-t-repeat-yourself-part-2-write-a-function.mp4 | Size: (282 MB) FileName :04 documenting-functions.mp4 | Size: (156.78 MB) FileName :05 making-your-notebook-reproducible.mp4 | Size: (72.88 MB) FileName :01 welcome-to-the-course-and-specialization.mp4 | Size: (108.79 MB) FileName :01 welcome-to-course-4.mp4 | Size: (32.48 MB) FileName :02 your-briefing.mp4 | Size: (174.11 MB) FileName :01 new-briefing.mp4 | Size: (88.41 MB) FileName :03 outro-for-series.mp4 | Size: (24.11 MB) FileName :01 welcome-to-the-course-and-specialization.mp4 | Size: (108.79 MB) FileName :01 sampling-distributions.mp4 | Size: (130.12 MB) FileName :03 bootstrap-sampling.mp4 | Size: (134.71 MB) FileName :04 the-central-limit-theorem.mp4 | Size: (72.83 MB) FileName :09 debugging-challenge.mp4 | Size: (65.3 MB)] Screenshot TurboBit https://turbobit.net/u9pvfwse315q/Data-Oriented.Python.Programming.and.Debugging.Specialization.part1.rar.html https://turbobit.net/hyuq2okb0inf/Data-Oriented.Python.Programming.and.Debugging.Specialization.part2.rar.html https://turbobit.net/ga6v59wike0v/Data-Oriented.Python.Programming.and.Debugging.Specialization.part3.rar.html https://turbobit.net/hi8ydqskupys/Data-Oriented.Python.Programming.and.Debugging.Specialization.part4.rar.html https://turbobit.net/ynj2aq6nv244/Data-Oriented.Python.Programming.and.Debugging.Specialization.part5.rar.html https://turbobit.net/fnh8vd9e2xf6/Data-Oriented.Python.Programming.and.Debugging.Specialization.part6.rar.html https://turbobit.net/f28au26d54qw/Data-Oriented.Python.Programming.and.Debugging.Specialization.part7.rar.html https://turbobit.net/7ul693da4yl6/Data-Oriented.Python.Programming.and.Debugging.Specialization.part8.rar.html RapidGator https://rapidgator.net/file/fcd19eccbf08027e255d31b5aa89ecfa/Data-Oriented.Python.Programming.and.Debugging.Specialization.part1.rar https://rapidgator.net/file/df089df7fa0ac17474b69d2238767cfd/Data-Oriented.Python.Programming.and.Debugging.Specialization.part2.rar https://rapidgator.net/file/4dafcfb865a4543980f9542ea958c35c/Data-Oriented.Python.Programming.and.Debugging.Specialization.part3.rar https://rapidgator.net/file/980740b1776790c3200394d1faae57cc/Data-Oriented.Python.Programming.and.Debugging.Specialization.part4.rar https://rapidgator.net/file/4f8c774a7c5be1afae1ab1fdf328c8f4/Data-Oriented.Python.Programming.and.Debugging.Specialization.part5.rar https://rapidgator.net/file/8bc78fa3d41b46b96a8a7a0898e65841/Data-Oriented.Python.Programming.and.Debugging.Specialization.part6.rar https://rapidgator.net/file/9721c5945f1eaaafb52314ce8f830255/Data-Oriented.Python.Programming.and.Debugging.Specialization.part7.rar https://rapidgator.net/file/5501ccc047f7029c68d0bf5f791b38a0/Data-Oriented.Python.Programming.and.Debugging.Specialization.part8.rar
  25. 954.32 MB | 16min 11s | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English Files Included : FileName :1 -Introduction.mp4 | Size: (78.91 MB) FileName :2 -Apache Iceberg Complete Overview - Theory.mp4 | Size: (75.09 MB) FileName :3 -Installation - Docker Image ft Spark,Iceberg, S3 Storage, Jupyter Notebook.mp4 | Size: (95.7 MB) FileName :4 -Data Lake - (Optional - please feel free to skip if you have a basic idea).mp4 | Size: (54.49 MB) FileName :5 -Part 1 Technical Architecture - A Practical Walkthrough.mp4 | Size: (62.79 MB) FileName :6 -Part 2 Technical Architecture - A Practical Walkthrough.mp4 | Size: (208.54 MB) FileName :7 -Time Travel - Understanding the importance of Snapshots.mp4 | Size: (141.02 MB) FileName :8 -Hidden Partitioning - A Practical Deep Dive.mp4 | Size: (107.86 MB) FileName :9 -Schema Evolution - A Query-Driven Approach.mp4 | Size: (129.91 MB)] Screenshot TurboBit https://turbobit.net/opptbo7v5mlt/Apache.Iceberg.End-to-End.Data.Lakehouse.Masterclass.rar.html RapidGator https://rapidgator.net/file/5055b2776793bc0841d324b7d24a669d/Apache.Iceberg.End-to-End.Data.Lakehouse.Masterclass.rar
×
×
  • Create New...