Course Links!!!!
/\
/ \ _ __ ___ _ __ _ _ _ __ ___ ___ _ _ ___
/ /\ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __|
/ ____ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \
/_/ \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/
__/ |
|___/
Courses pirated & dumped by Case, S1rlancelot & dave + some random contributions
irc.anonops.com/6697
#learninghub
* This series of videocourses will guide you through the core material that an entry-level "ethical" hacker needs.
* Go to pluralsight.com (most links here are from there) and search the course if you want to see the table of contents.
* You may want to use a media player that allows you to increase the speed of the videos
* The number does not mean the order in which you should follow the courses, its just the order in which they were added.
* Use ?desc <coursenumber> to check the description of a course. Eg: ?desc 81
* Special thanks to ClaudiaD who haxed her way and made downloading the videos a lot easier, you rock. I also reused the code of her IRC bot which lead to the birth of SexyTeacherBot. Thanks ;)
* Special thanks to S1rlancelot who has also dumped a great deal of courses as well and helps more than I could ever ask for in #learninghub and is also leet as fuck
Don't know where to start? <-------------------------------------------------------------------------> Don't know where to start? <------------------------------------------------------------------------------------------------------------------------------------------------
-> BEGINNERS MUST WATCH: 10,000 foot view of penetration testing: 81. https://ift.tt/2Dhi9Gb
-> The top 10 OWASP vulnerabilities explained & exploited. Good for getting a big picture of present day web hacking: 2. https://ift.tt/2B5sfnD
-> A ~9 hour long course on website vulnerabilities and how to exploit/secure them: 1. https://ift.tt/2Df6Gql (Hack Yourself First; How to go on the Cyber-Offense)
-------------------------------------------------------------------------------> The rest of the courses listed below will go deeper into each step of hacking and the different attack techniques. <-------------------------------------------------------------------------------
*** IF YOU FEEL THAT YOU NEED TO KNOW MORE BASICS ABOUT COMPUTERS BEFORE GETTING TO HACKING CHECK BELOW WHERE IT SAYS "BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW"
*** IT IS ADVISED THAT YOU LEARN A LOW LEVEL PROGRAMMING LANGUAGE SUCH AS C++ BEFORE GETTING TO HACK
*** TRY NOT TO GET OVERWHELMED BY THE AMOUNT OF CONTENT!!
# EC-Council's Certified Ethical Hacker (CEH)
3. https://ift.tt/2B72aEG -- Reconnaissance/Footprinting
4. https://ift.tt/2Df6Hup -- SQL Injection
5. https://ift.tt/2B3TNJP -- Scanning Networks
6. https://ift.tt/2Df6KGB -- Enumeration
7. https://ift.tt/2B41AYp -- Hacking Web Servers
8. https://ift.tt/2DeCICU -- Hacking Web Applications
9. https://ift.tt/2B4N6r9 -- Cryptography
10. https://ift.tt/2DhfufG -- Sniffing
11. https://ift.tt/2B72bIK -- Session Hijacking
12. https://ift.tt/2DgxJBP -- Social Engineering
13. https://ift.tt/2B5ADn9 -- System Hacking
14. https://ift.tt/2Dgw3s6 -- Denial of Service
15. https://ift.tt/2B5sgId -- Hacking Wireless Networks
16. https://ift.tt/2Dgw4MG -- Malware Threats
17. https://ift.tt/2B5rURE -- Evading IDS, Firewalls, and Honeypots
18. https://ift.tt/2DhilVV -- Hacking Mobile Platforms
# Offensive Security Certification - by mickers, you rock dude!
https://ift.tt/2B3yV5I
# More hacking courses
0. https://ift.tt/2Df2wiy -- Introduction to Pentesting and Ethical Hacking with Kali Linux
19. https://ift.tt/2B5w1x9 -- Introduction to Firewalls
20. https://ift.tt/2Dhfuwc -- Introduction to browser security headers
21. https://ift.tt/2B6dYXw -- Introduction to Wireshark
22. https://ift.tt/2DfU56r -- Troubleshooting with Wireshark
80. https://ift.tt/2B5oxuc -- Wireshark 2.0
82. https://ift.tt/2KvCB4K -- Network Security Testing with Nmap
23. https://ift.tt/2DjpAwg -- All about buffer overflows
24. https://ift.tt/2B5sjDT -- Network Pentesting using Python and Kali linux
25. https://ift.tt/2DhiubV -- Metasploit Basics
26. https://ift.tt/2B4V8Ac -- CloudFlare Security
27. https://ift.tt/2DfU5mX -- Hack your API first
28. https://ift.tt/2B4Wrz4 -- SSCP: Risk Identification, Monitoring, and Analysis
29. https://ift.tt/2DeWs9z Check Point Certified Security Administrator; Install & Deploy
73. https://ift.tt/2MnRKXw -- Cloud Security
79. https://ift.tt/2B5SmL5 -- Cloud Computing
74. https://ift.tt/2KvMXBQ -- Introduction to Pentesting using Metasploit
# Computer Hacking Forensic Investigator (CHFI)
88. https://ift.tt/2M5pD2t —- 1 Introduction
89. https://ift.tt/2DhiBEn —- 2 Forensics & Investigation Process
90. https://ift.tt/2B5rVoG —- 3 Searching & Seizing
91. https://ift.tt/2DhiDft —- 4 Digital Evidence
92. https://ift.tt/2M6qQXp —- 5 Responder Procedures
93. https://ift.tt/2KvN4xg —- 6 Forensic Lab
94. https://ift.tt/2OJvrx3 —- 7 Hard Disks & File Systems
95. https://ift.tt/2B4WxXs —- 8 Windows Forensics
96. https://ift.tt/2OJvsB7 —- 9 Data Akquisition & Duplication
97. https://ift.tt/2MkJpUw —- 10 Recovering deleted Files & & partitions
98. https://ift.tt/2M6P2ZA —- 11 Using Access Data FTK
99. https://ift.tt/2MquQ1C —- 12 Using EnCase
100. https://ift.tt/2OH5vSK —- 13 Steganography
101. https://ift.tt/2KwqaFI —- 14 Password Crackers
102. https://ift.tt/2OH5y0S —- 15 Log Correlation
103. https://ift.tt/2KxiR0F —- 16 Network Forensics
104. https://ift.tt/2OH5z4W —- 17 Wireless Attacks
105. https://ift.tt/2MmqcSk —- 18 Web Attacks
106. https://ift.tt/2M5pKuV —- 19 Email Crimes
107. https://ift.tt/2MlfZWu —- 20 Mobile Investigation
108. https://ift.tt/2OJvyZv —- 21 Investigative Reports
109. https://ift.tt/2KtUNMh —- 22 Expert Witness
# Certified Information Systems Security Pro (CISSP)
110. https://ift.tt/2OJvzwx —- 1 Security and Risk Management
111. https://ift.tt/2Mm6hDf —- 2 Asset Security
112. https://ift.tt/2M5jjYH —- 3 Security Engineering
113. https://ift.tt/2Mlg24C —- 4 Communication and Network Security
114. https://ift.tt/2OH5C0C —- 5 Identity and Access Management
115. https://ift.tt/2KuuSE4 —- 6 Security Assessment Testing
116. https://ift.tt/2M5pPid —- 7 Security Operations
117. https://ift.tt/2MjEUtf —- 8 Software Development Security
# Certified Information Systems Auditor (CISA)
118. https://ift.tt/2M5jm6P —- CISA Lesson 1
119. https://ift.tt/2Mn1HEP —- CISA Lesson 2
120. https://ift.tt/2OJvDfL —- CISA Lesson 3
121. https://ift.tt/2MquQyE —- CISA Lesson 4
122. https://ift.tt/2OJvEQR —- CISA Lesson 5
123. https://ift.tt/2KuxH7W —- CISA Lesson 6
124. https://ift.tt/2OJvGbr —- CISA Lesson 7
# Certified Information Security Manager (CISM)
125. https://ift.tt/2Kur59V -- Information Security Governance
126. https://ift.tt/2M5pVGB -- Risk Management
127. https://ift.tt/2Kv3hCF -- Information Security Program
128. https://ift.tt/2OH5Ip0 -- Information Security Program Implementation
129. https://ift.tt/2KvNlQO -- Incident Management and Response
130. https://ift.tt/2OH5KNE
# Coursera
30. https://ift.tt/2KuCTJ6 -- Software Security
31. https://ift.tt/2M5pZGl -- Hardware Security
32. http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z -- Bitcoin & Cryptocurrency tech, by anominous - thanks!
=== OTHER VIDEO COURSES ===
# Programming
33. https://ift.tt/2KtvN7S -- C++ Fundamentals
34. https://ift.tt/2OH5NZQ -- C++ Advanced topics
75. https://ift.tt/2KuHMSH -- C Fundamentals
76. https://ift.tt/2M5jwLt -- C in Action
77. https://ift.tt/2Kxp8JM -- Java Fundamentals
35. https://ift.tt/2OJvRU9 -- Javascript from Scratch
36. https://ift.tt/2Kv4A4D -- Introduction to Javascript, by anominous - thanks dude, you rock!
37. https://ift.tt/2M5jyTB -- Introduction to HTML (for designers - you don't really need to be a designer)
38. https://ift.tt/2Mp6N39 -- Introduction to JQuery
39. https://ift.tt/2OMhjTR -- Introduction to CSS
84. https://ift.tt/2Kur3Pl -- Introduction to Arduino
40. https://ift.tt/2M5q9xr -- Get started with AngularJS
41. https://ift.tt/2Kw0JEf -- Building Angular and Node JS Apps with the MEAN Stack
42. https://ift.tt/2ON9GMT -- ExtJS Desktop Fundamentals
43. https://ift.tt/2KAyOU0 -- Python Fundamentals
44. https://ift.tt/2M5qdgF -- Python Beyond the basics
87. https://ift.tt/2MmsCAv -- Django Fundamentals
45. https://ift.tt/2M5jD9R -- Ruby 2.0, by anominous - thanks dude!
46. https://ift.tt/2MquSXi -- Getting started with BackBone.js, by anominous - thanks dude!
83. https://ift.tt/2M5jEdV -- Introduction to PowerShell
85. https://ift.tt/2MluBoM -- Raspberry Pi Home Server
86. https://ift.tt/2M5qf8h -- Raspberry Pi for Developers
[We need feedback on the following courses]
132. Code-Clinic-Python,
Programming-Fundamentals-Real-World,
Python-3-Essential-Training.zip,
Python-GUI-Development-Tkinter.zip
Up-Running-Python.zip
Up-Running-Python-Django.zip -> https://ift.tt/2KuxHVu
133. Penetration-Testing-Essential-Training https://ift.tt/2M5qhwV
134. Become a C++ developer (6 courses): https://ift.tt/2MiD2Bi
# Cisco CCNA Security (640-554)
47. https://ift.tt/2M5jFhZ -- Introduction to Network Security
48. https://ift.tt/2KuxKk8 -- AAA and IP Security
49. https://ift.tt/2ONc06r -- Firewalls and VPNs
## BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW
# CompTIA A+ (220-801)
50. https://ift.tt/2KvOo31 -- CompTIA A+ Part 1: Computer Hardware
51. https://ift.tt/2M1XQA4 -- CompTIA A+ Part 2: Networking
52. https://ift.tt/2Mjuqu5 -- CompTIA A+ Part 3: Peripherals and best practices
53. https://ift.tt/2ONjZ3t -- CompTIA A+ Part 4: Operating System
54. https://ift.tt/2MoACkG -- CompTIA A+ Part 5: Mobile Devices and Troubleshooting
# CompTIA Security+ (SY0-401)
55. https://ift.tt/2ONk1bB -- CompTIA Security+ Domain 1 - Network Security.
# CompTIA Network+ (N10-006)
56. https://ift.tt/2MiyHOm -- Network Architecture
57. https://ift.tt/2M5jIub -- Network Operations
58. https://ift.tt/2KwxGAN -- Network Security
# Linux
59. https://ift.tt/2M5jJyf -- Linux Installation and Initial Configuration
60. https://ift.tt/2MmltAc -- Introduction to the Bash Shell
61. https://ift.tt/2ON9Js3 -- Shell Scripting with Bash
62. https://ift.tt/2KxiV0p -- Linux Command Line Interface Fundamentals
# Video editing
63. https://ift.tt/2ONYNuu -- Adobe Premiere Pro CC Fundamentals
64. https://ift.tt/2Mmlwfm -- Animation and Video Editing in Photoshop CS6
65. https://ift.tt/2ONjXbR -- Color Correction and Grading in Adobe Premiere Pro and SpeedGrade
66. https://ift.tt/2MmlwMo -- Action Scene Editing Techniques in Adobe Premiere Pro
67. https://ift.tt/2ONk1Z9 -- Adobe Premiere Pro CS6 Setup [This is the software, not a course]
# Others
68. https://ift.tt/2Mmlxjq -- Clean Code
69. https://ift.tt/2M2J5gl -- Test Driven Development with Brad Wilson
70. https://ift.tt/2MmLNtX -- The fundamentals of Scrum methodology
71. https://ift.tt/2M5jN0X -- Building a successful blog
72. https://ift.tt/2KuHNpJ -- Building a high traffic profitable blog
78. https://ift.tt/2M6hlHF -- Fiddler
=== Other Resources ===
https://ift.tt/2MmLP53 -- Useful PDFs about a huge amount of topics regarding hacking, extracted from repository.root-me.org
https://ift.tt/2M435yZ -- Perl documents
https://ift.tt/2MmLPC5 -- Red hat documents
https://ift.tt/2OJw1uJ -- Reverse Engineering
https://ift.tt/2MmlBQc -- Assembly
https://ift.tt/2eF2e66 -- Free course series by University of Helsinki in collaboration with F-Secure
https://ift.tt/2MmLRdb -- 160 books on security stuff
https://ift.tt/1h3YZUe -- A curated list of awesome information security resources
https://ift.tt/2MmLSxL -- A curated list of awesome self hosted alternatives to cloud services.
https://ift.tt/1E0qyl6 -- A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes.
https://ift.tt/2IHx5wo -- OSCP Prepare
https://ift.tt/2bp3WYM -- All you need to pass OSCP
https://ift.tt/2MmlEvm -- A collection of handy bookmarks
** Ask Case for PDFs and other stuff on a specific topic. There are also the following courses available which have not been categorized yet:
Introduction to game development with Unity https://ift.tt/2M6FIVy
FMOD https://ift.tt/2KuuUvG
Digital audio fundamentals https://ift.tt/2OK9aiJ
Alchemy synth https://ift.tt/2Kur6L1
=== Practice what you learn ===
* https://ift.tt/1ajHYOj
* root-me.org -> webclient and webserver challenges can be done on the go, Capture The Flag, etc.
* hackerrank.com -> Very good for learning programming, has on-the-go exercises
* codeacademy.com
* use fucking google
* hacksplaining.com
* vulnhub.com
Other free hacking/IT videos: www.cybrary.it
Interesting github: https://ift.tt/1GaumkM -- Check out Hacking Team if you haven't!
from BITCOIN NEWS https://ift.tt/2AQbIJ4
via Bitcoin News Update
from Bitcoin News Update https://ift.tt/2M2w06I
via IFTTT
/\
/ \ _ __ ___ _ __ _ _ _ __ ___ ___ _ _ ___
/ /\ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __|
/ ____ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \
/_/ \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/
__/ |
|___/
Courses pirated & dumped by Case, S1rlancelot & dave + some random contributions
irc.anonops.com/6697
#learninghub
* This series of videocourses will guide you through the core material that an entry-level "ethical" hacker needs.
* Go to pluralsight.com (most links here are from there) and search the course if you want to see the table of contents.
* You may want to use a media player that allows you to increase the speed of the videos
* The number does not mean the order in which you should follow the courses, its just the order in which they were added.
* Use ?desc <coursenumber> to check the description of a course. Eg: ?desc 81
* Special thanks to ClaudiaD who haxed her way and made downloading the videos a lot easier, you rock. I also reused the code of her IRC bot which lead to the birth of SexyTeacherBot. Thanks ;)
* Special thanks to S1rlancelot who has also dumped a great deal of courses as well and helps more than I could ever ask for in #learninghub and is also leet as fuck
Don't know where to start? <-------------------------------------------------------------------------> Don't know where to start? <------------------------------------------------------------------------------------------------------------------------------------------------
-> BEGINNERS MUST WATCH: 10,000 foot view of penetration testing: 81. https://ift.tt/2Dhi9Gb
-> The top 10 OWASP vulnerabilities explained & exploited. Good for getting a big picture of present day web hacking: 2. https://ift.tt/2B5sfnD
-> A ~9 hour long course on website vulnerabilities and how to exploit/secure them: 1. https://ift.tt/2Df6Gql (Hack Yourself First; How to go on the Cyber-Offense)
-------------------------------------------------------------------------------> The rest of the courses listed below will go deeper into each step of hacking and the different attack techniques. <-------------------------------------------------------------------------------
*** IF YOU FEEL THAT YOU NEED TO KNOW MORE BASICS ABOUT COMPUTERS BEFORE GETTING TO HACKING CHECK BELOW WHERE IT SAYS "BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW"
*** IT IS ADVISED THAT YOU LEARN A LOW LEVEL PROGRAMMING LANGUAGE SUCH AS C++ BEFORE GETTING TO HACK
*** TRY NOT TO GET OVERWHELMED BY THE AMOUNT OF CONTENT!!
# EC-Council's Certified Ethical Hacker (CEH)
3. https://ift.tt/2B72aEG -- Reconnaissance/Footprinting
4. https://ift.tt/2Df6Hup -- SQL Injection
5. https://ift.tt/2B3TNJP -- Scanning Networks
6. https://ift.tt/2Df6KGB -- Enumeration
7. https://ift.tt/2B41AYp -- Hacking Web Servers
8. https://ift.tt/2DeCICU -- Hacking Web Applications
9. https://ift.tt/2B4N6r9 -- Cryptography
10. https://ift.tt/2DhfufG -- Sniffing
11. https://ift.tt/2B72bIK -- Session Hijacking
12. https://ift.tt/2DgxJBP -- Social Engineering
13. https://ift.tt/2B5ADn9 -- System Hacking
14. https://ift.tt/2Dgw3s6 -- Denial of Service
15. https://ift.tt/2B5sgId -- Hacking Wireless Networks
16. https://ift.tt/2Dgw4MG -- Malware Threats
17. https://ift.tt/2B5rURE -- Evading IDS, Firewalls, and Honeypots
18. https://ift.tt/2DhilVV -- Hacking Mobile Platforms
# Offensive Security Certification - by mickers, you rock dude!
https://ift.tt/2B3yV5I
# More hacking courses
0. https://ift.tt/2Df2wiy -- Introduction to Pentesting and Ethical Hacking with Kali Linux
19. https://ift.tt/2B5w1x9 -- Introduction to Firewalls
20. https://ift.tt/2Dhfuwc -- Introduction to browser security headers
21. https://ift.tt/2B6dYXw -- Introduction to Wireshark
22. https://ift.tt/2DfU56r -- Troubleshooting with Wireshark
80. https://ift.tt/2B5oxuc -- Wireshark 2.0
82. https://ift.tt/2KvCB4K -- Network Security Testing with Nmap
23. https://ift.tt/2DjpAwg -- All about buffer overflows
24. https://ift.tt/2B5sjDT -- Network Pentesting using Python and Kali linux
25. https://ift.tt/2DhiubV -- Metasploit Basics
26. https://ift.tt/2B4V8Ac -- CloudFlare Security
27. https://ift.tt/2DfU5mX -- Hack your API first
28. https://ift.tt/2B4Wrz4 -- SSCP: Risk Identification, Monitoring, and Analysis
29. https://ift.tt/2DeWs9z Check Point Certified Security Administrator; Install & Deploy
73. https://ift.tt/2MnRKXw -- Cloud Security
79. https://ift.tt/2B5SmL5 -- Cloud Computing
74. https://ift.tt/2KvMXBQ -- Introduction to Pentesting using Metasploit
# Computer Hacking Forensic Investigator (CHFI)
88. https://ift.tt/2M5pD2t —- 1 Introduction
89. https://ift.tt/2DhiBEn —- 2 Forensics & Investigation Process
90. https://ift.tt/2B5rVoG —- 3 Searching & Seizing
91. https://ift.tt/2DhiDft —- 4 Digital Evidence
92. https://ift.tt/2M6qQXp —- 5 Responder Procedures
93. https://ift.tt/2KvN4xg —- 6 Forensic Lab
94. https://ift.tt/2OJvrx3 —- 7 Hard Disks & File Systems
95. https://ift.tt/2B4WxXs —- 8 Windows Forensics
96. https://ift.tt/2OJvsB7 —- 9 Data Akquisition & Duplication
97. https://ift.tt/2MkJpUw —- 10 Recovering deleted Files & & partitions
98. https://ift.tt/2M6P2ZA —- 11 Using Access Data FTK
99. https://ift.tt/2MquQ1C —- 12 Using EnCase
100. https://ift.tt/2OH5vSK —- 13 Steganography
101. https://ift.tt/2KwqaFI —- 14 Password Crackers
102. https://ift.tt/2OH5y0S —- 15 Log Correlation
103. https://ift.tt/2KxiR0F —- 16 Network Forensics
104. https://ift.tt/2OH5z4W —- 17 Wireless Attacks
105. https://ift.tt/2MmqcSk —- 18 Web Attacks
106. https://ift.tt/2M5pKuV —- 19 Email Crimes
107. https://ift.tt/2MlfZWu —- 20 Mobile Investigation
108. https://ift.tt/2OJvyZv —- 21 Investigative Reports
109. https://ift.tt/2KtUNMh —- 22 Expert Witness
# Certified Information Systems Security Pro (CISSP)
110. https://ift.tt/2OJvzwx —- 1 Security and Risk Management
111. https://ift.tt/2Mm6hDf —- 2 Asset Security
112. https://ift.tt/2M5jjYH —- 3 Security Engineering
113. https://ift.tt/2Mlg24C —- 4 Communication and Network Security
114. https://ift.tt/2OH5C0C —- 5 Identity and Access Management
115. https://ift.tt/2KuuSE4 —- 6 Security Assessment Testing
116. https://ift.tt/2M5pPid —- 7 Security Operations
117. https://ift.tt/2MjEUtf —- 8 Software Development Security
# Certified Information Systems Auditor (CISA)
118. https://ift.tt/2M5jm6P —- CISA Lesson 1
119. https://ift.tt/2Mn1HEP —- CISA Lesson 2
120. https://ift.tt/2OJvDfL —- CISA Lesson 3
121. https://ift.tt/2MquQyE —- CISA Lesson 4
122. https://ift.tt/2OJvEQR —- CISA Lesson 5
123. https://ift.tt/2KuxH7W —- CISA Lesson 6
124. https://ift.tt/2OJvGbr —- CISA Lesson 7
# Certified Information Security Manager (CISM)
125. https://ift.tt/2Kur59V -- Information Security Governance
126. https://ift.tt/2M5pVGB -- Risk Management
127. https://ift.tt/2Kv3hCF -- Information Security Program
128. https://ift.tt/2OH5Ip0 -- Information Security Program Implementation
129. https://ift.tt/2KvNlQO -- Incident Management and Response
130. https://ift.tt/2OH5KNE
# Coursera
30. https://ift.tt/2KuCTJ6 -- Software Security
31. https://ift.tt/2M5pZGl -- Hardware Security
32. http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z -- Bitcoin & Cryptocurrency tech, by anominous - thanks!
=== OTHER VIDEO COURSES ===
# Programming
33. https://ift.tt/2KtvN7S -- C++ Fundamentals
34. https://ift.tt/2OH5NZQ -- C++ Advanced topics
75. https://ift.tt/2KuHMSH -- C Fundamentals
76. https://ift.tt/2M5jwLt -- C in Action
77. https://ift.tt/2Kxp8JM -- Java Fundamentals
35. https://ift.tt/2OJvRU9 -- Javascript from Scratch
36. https://ift.tt/2Kv4A4D -- Introduction to Javascript, by anominous - thanks dude, you rock!
37. https://ift.tt/2M5jyTB -- Introduction to HTML (for designers - you don't really need to be a designer)
38. https://ift.tt/2Mp6N39 -- Introduction to JQuery
39. https://ift.tt/2OMhjTR -- Introduction to CSS
84. https://ift.tt/2Kur3Pl -- Introduction to Arduino
40. https://ift.tt/2M5q9xr -- Get started with AngularJS
41. https://ift.tt/2Kw0JEf -- Building Angular and Node JS Apps with the MEAN Stack
42. https://ift.tt/2ON9GMT -- ExtJS Desktop Fundamentals
43. https://ift.tt/2KAyOU0 -- Python Fundamentals
44. https://ift.tt/2M5qdgF -- Python Beyond the basics
87. https://ift.tt/2MmsCAv -- Django Fundamentals
45. https://ift.tt/2M5jD9R -- Ruby 2.0, by anominous - thanks dude!
46. https://ift.tt/2MquSXi -- Getting started with BackBone.js, by anominous - thanks dude!
83. https://ift.tt/2M5jEdV -- Introduction to PowerShell
85. https://ift.tt/2MluBoM -- Raspberry Pi Home Server
86. https://ift.tt/2M5qf8h -- Raspberry Pi for Developers
[We need feedback on the following courses]
132. Code-Clinic-Python,
Programming-Fundamentals-Real-World,
Python-3-Essential-Training.zip,
Python-GUI-Development-Tkinter.zip
Up-Running-Python.zip
Up-Running-Python-Django.zip -> https://ift.tt/2KuxHVu
133. Penetration-Testing-Essential-Training https://ift.tt/2M5qhwV
134. Become a C++ developer (6 courses): https://ift.tt/2MiD2Bi
# Cisco CCNA Security (640-554)
47. https://ift.tt/2M5jFhZ -- Introduction to Network Security
48. https://ift.tt/2KuxKk8 -- AAA and IP Security
49. https://ift.tt/2ONc06r -- Firewalls and VPNs
## BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW
# CompTIA A+ (220-801)
50. https://ift.tt/2KvOo31 -- CompTIA A+ Part 1: Computer Hardware
51. https://ift.tt/2M1XQA4 -- CompTIA A+ Part 2: Networking
52. https://ift.tt/2Mjuqu5 -- CompTIA A+ Part 3: Peripherals and best practices
53. https://ift.tt/2ONjZ3t -- CompTIA A+ Part 4: Operating System
54. https://ift.tt/2MoACkG -- CompTIA A+ Part 5: Mobile Devices and Troubleshooting
# CompTIA Security+ (SY0-401)
55. https://ift.tt/2ONk1bB -- CompTIA Security+ Domain 1 - Network Security.
# CompTIA Network+ (N10-006)
56. https://ift.tt/2MiyHOm -- Network Architecture
57. https://ift.tt/2M5jIub -- Network Operations
58. https://ift.tt/2KwxGAN -- Network Security
# Linux
59. https://ift.tt/2M5jJyf -- Linux Installation and Initial Configuration
60. https://ift.tt/2MmltAc -- Introduction to the Bash Shell
61. https://ift.tt/2ON9Js3 -- Shell Scripting with Bash
62. https://ift.tt/2KxiV0p -- Linux Command Line Interface Fundamentals
# Video editing
63. https://ift.tt/2ONYNuu -- Adobe Premiere Pro CC Fundamentals
64. https://ift.tt/2Mmlwfm -- Animation and Video Editing in Photoshop CS6
65. https://ift.tt/2ONjXbR -- Color Correction and Grading in Adobe Premiere Pro and SpeedGrade
66. https://ift.tt/2MmlwMo -- Action Scene Editing Techniques in Adobe Premiere Pro
67. https://ift.tt/2ONk1Z9 -- Adobe Premiere Pro CS6 Setup [This is the software, not a course]
# Others
68. https://ift.tt/2Mmlxjq -- Clean Code
69. https://ift.tt/2M2J5gl -- Test Driven Development with Brad Wilson
70. https://ift.tt/2MmLNtX -- The fundamentals of Scrum methodology
71. https://ift.tt/2M5jN0X -- Building a successful blog
72. https://ift.tt/2KuHNpJ -- Building a high traffic profitable blog
78. https://ift.tt/2M6hlHF -- Fiddler
=== Other Resources ===
https://ift.tt/2MmLP53 -- Useful PDFs about a huge amount of topics regarding hacking, extracted from repository.root-me.org
https://ift.tt/2M435yZ -- Perl documents
https://ift.tt/2MmLPC5 -- Red hat documents
https://ift.tt/2OJw1uJ -- Reverse Engineering
https://ift.tt/2MmlBQc -- Assembly
https://ift.tt/2eF2e66 -- Free course series by University of Helsinki in collaboration with F-Secure
https://ift.tt/2MmLRdb -- 160 books on security stuff
https://ift.tt/1h3YZUe -- A curated list of awesome information security resources
https://ift.tt/2MmLSxL -- A curated list of awesome self hosted alternatives to cloud services.
https://ift.tt/1E0qyl6 -- A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes.
https://ift.tt/2IHx5wo -- OSCP Prepare
https://ift.tt/2bp3WYM -- All you need to pass OSCP
https://ift.tt/2MmlEvm -- A collection of handy bookmarks
** Ask Case for PDFs and other stuff on a specific topic. There are also the following courses available which have not been categorized yet:
Introduction to game development with Unity https://ift.tt/2M6FIVy
FMOD https://ift.tt/2KuuUvG
Digital audio fundamentals https://ift.tt/2OK9aiJ
Alchemy synth https://ift.tt/2Kur6L1
=== Practice what you learn ===
* https://ift.tt/1ajHYOj
* root-me.org -> webclient and webserver challenges can be done on the go, Capture The Flag, etc.
* hackerrank.com -> Very good for learning programming, has on-the-go exercises
* codeacademy.com
* use fucking google
* hacksplaining.com
* vulnhub.com
Other free hacking/IT videos: www.cybrary.it
Interesting github: https://ift.tt/1GaumkM -- Check out Hacking Team if you haven't!
from BITCOIN NEWS https://ift.tt/2AQbIJ4
via Bitcoin News Update
from Bitcoin News Update https://ift.tt/2M2w06I
via IFTTT