BBC – Fighting the Power Britain after George Floyd (2020)

BBC – Fighting the Power: Britain after George Floyd (2020)
English | Size: 899 MB
Category: Documentary


George Floyd’s killing in the US state of Minnesota sparked protests about policing, privilege and a revolution in race relations. Britain boldly presents itself as a beacon of racial tolerance, but with demonstrations sweeping the country, organisers believe that they are closer than ever to changing the way British institutions and individuals treat black people across the UK. There have been multiple campaigns for equality and justice for black British communities in the past, but none quite like this.

CBT Nuggets – Cisco CCDA Design 200-310 DESGN

CBT Nuggets – Cisco CCDA Design 200-310 DESGN
English | Size: 1.5GB
Category: Tutorial


In this intermediate Cisco Design Associate training, Anthony Sequeira prepares network administrators to take the 200-310 DESGN exam, which is the one required exam to earn the CCDA certification.

Infosecinstitute – IACRB Certified Reverse Engineering Analyst (CREA)

Infosecinstitute – IACRB Certified Reverse Engineering Analyst (CREA)
English | Size: 5.86 GB
Category: Tutorial


14 courses // 85 videos // 8 hours of training
Certified Reverse Engineering Analyst (CREA) training
This learning path builds your reverse engineering skills and prepares you to earn your Certified Reverse Engineering Analyst (CREA) certification. You’ll take a deep dive into reverse engineering, including different malware types, tools and techniques, as you progress through 14 courses tied to the primary CREA certification exam objectives. Upon completion, you’ll be prepared to earn your CREA certification and validate your knowledge around reverse engineering malware.

PluralSight – Mitigating Security Vulnerabilities On Google Cloud Platform MAY2020

PluralSight – Mitigating Security Vulnerabilities On Google Cloud Platform MAY2020-REBAR
English | Size: 313.00 MB
Category: Tutorial


This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

CBT Nuggets – Transition to Salesforce Lightning for Business Users

CBT Nuggets – Transition to Salesforce Lightning for Business Users
English | Size: 436.56 MB
Category: Tutorial


In this intermediate Salesforce skills training, Jamie Grettum covers how to use the exciting features offered in the Lightning edition of Salesforce.