PluralSight – Ethical Hacking Penetration Testing

PluralSight – Ethical Hacking Penetration Testing-REBAR
English | Size: 473.48 MB
Category: Tutorial


Pluralsight is not an official partner or accredited training center of EC-Council. What’s penetration testing? Well it’s simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can’t stop attackers, your job is to slow them down. How? Let’s start by doing exactly what the attacker will do. Penetration testing (pen testing) is the practice of attacking your own network or that of a client’s, using the same tools, techniques, and steps that an attacker would. The purpose of pen testing is to expose gaps, weaknesses, and possible entry points without doing any real damage. In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.

PluralSight – LFCE Linux Service Management Advanced Email Services

PluralSight – LFCE Linux Service Management Advanced Email Services-REBAR
English | Size: 175.05 MB
Category: Tutorial


Take your Linux sysadmin skills to the next level and get started on your LFSA/RHCSA or LFCE/RHCE path. In this course, LFCE: Linux Service Management – Advanced Email Services, you will dive into learning about SMTP services so you can provide a reliable and secure messaging platform for your systems. First, you will learn common email architectures. Next, you will discover how to implement email services with Postfix, a common email server. Finally, you will explore common mail scenarios, including how to secure email relay services and provide client’s access to email with IMAP. When you’re finished with this course, you will have the skills and knowledge of email services needed to enable messaging in your Linux based environment.

PluralSight – Malicious Code And Threats

PluralSight – Malicious Code And Threats-REBAR
English | Size: 111.84 MB
Category: Tutorial


In order to protect information and information systems, it is important to know the attacks and exploits commonly used by attackers. This course, Malicious Code and Threats, will teach you about the types of malware and attacks. First, you will explore the topic of preventing attacks. Next, you will learn about the compromise of systems. Finally, you will discover how to detect and remove any malware infections – and how to prevent them from happening again! By the end of this course, you will be better prepared and more knowledgeable in protecting your systems and information.

PluralSight – Building Your First API With ASP.NET Core

PluralSight – Building Your First API With ASP NET Core-REBAR
English | Size: 731.30 MB
Category: Tutorial


Hello! My name is Kevin Dockx, and welcome to Building Your First API with ASP.NET Core. In this course, you will learn how to build an API with ASP.NET Core that connects to a database via Entity Framework Core. You will get there by covering major topics like getting resources from services and manipulating them, the built-in dependency injection system & logger, working with different environments, configuration files and middleware, and Entity Framework Core related features like working with migrations and seeding the database. By the end of this course, you will be able to build an API from scratch with ASP.NET Core. Before you begin, make sure you are already familiar with C#. I hope you’ll join me, and I look forward to helping you on your learning journey here at Pluralsight.

PluralSight – The Information Systems Auditing Process IT Management

PluralSight – The Information Systems Auditing Process IT Management-REBAR
English | Size: 130.85 MB
Category: Tutorial


Auditing examines information systems in order to provide valuable information about the operations and security of information and information systems. This course, The Information Systems Auditing Process: Conducting an Audit, teaches you essential information in order to conduct information systems audits. First, you will learn about the audit planning process. Next, you will discover how to conduct audit procedures. Finally, you will explore the process of audit reporting. By the end of this course, you will understand the techniques of auditing in order to provide audit efficiently and effectively.