ITProTV – Microsoft Deployment Toolkit

ITProTV – Microsoft Deployment Toolkit
English | Size: 372.58 MB
Category: Tutorial


Using MDT 24 M
Microsoft Deployment Toolkit (MDT) allows you to automate the deployment of computers in your organization.

Skillshare – The Complete Python Natural Language Toolkit NLTK for Text Mining

Skillshare – The Complete Python Natural Language Toolkit NLTK for Text Mining-ViGOROUS
English | Size: 1.02 GB
Category: Tutorial


Text mining and Natural language processing (NLP) are among the most active research areas. Pre-processing your text data before feeding it to an algorithm is a crucial part of NLP. In this course, you will learn NLP using natural language toolkit (NLTK), which is part of the Python. You will learn pre-processing of data to make it ready for any NLP application.

PluralSight – Social Engineering with the Social-Engineer Toolkit

PluralSight – Social Engineering with the Social-Engineer Toolkit-iNKiSO
English | Size: 469.01 MB
Category: Tutorial


The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you’ll learn the social engineering attacks that SET supports. First, you’ll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you’ll explore how to use the website attack vector, along with creating a payload and a listener. Then, you’ll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that you’ll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you’ll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you’ll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently