New here? Post 10 threads to unlock access to threads, or upgrade now to access Crax all content instantly!
Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today! Read the detailed thread here
You are using an out of date browser. It may not display this or other websites correctly. You should upgrade or use an alternative browser.
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 42 Lectures ( 4h 25m ) | Size: 2 GB
Learn to write your own Nmap scripts.
What you'll learn:
Learn how to use nmap
Learn how to write code in Lua
Learn how to use NSE
Learn how to write Nmap...
µ
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 256.78 MB | Duration: 0h 31m
Hack the Planet with Kali Linux
What you'll learn
Basics of Networking
How to Brute Froce SSH
How to Brute Force FTP
Network Protocols
Requirements
Basic Linux knowledge
Description...
JOIN NOW MY CHANNEL IN TG
IF YOU WANT MORE HQ COMBOS
@FREECOMBOSMAILS
Download:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
100-490 RSTECH Supporting Cisco Routing & Switching Network
Prepare for 100-490 RSTECH Exam with Practice Questions & Answers - Test Your Knowledge of Supporting Cisco Routing & Sw
Description
This practice test is part of our extensive offering to enable professionals to pass the 100-490 RSTECH...
500-451 ENUAE Enterprise Network Unified Access Essentials
Prepare for the 500-451 ENUAE Exam: Practice Test for Cisco Enterprise Network Unified Access Essentials.
Description
This practice test is designed to help you prepare for the Cisco Enterprise Network Unified Access Essentials exam...
500-750 CNSS Cisco Network Security Specialist Practice Test
The Ultimate Practice Test for Cisco Network Security Specialist: Master the Concepts and Technologies
Description
As businesses and organizations increasingly rely on network infrastructure to support their operations, the importance...
300-730 Implementing Secure Solutions w Virtual Private Net.
Secure Virtual Private Network: Implementation, Site-to-Site, Remote Access, Troubleshooting and Architectures
Description
In this practice test, students will learn about implementing secure virtual private networks (VPNs) and secure...
300-535 SPAUTO Automating and Programming Cisco Service TEST
Master Network Automation with Cisco SPAUTO Practice Test: Learn to automate and program Cisco Service Provider Solution
Description
As service provider networks become increasingly complex, automating tasks is essential for efficiency...
AZ-700 Design and Implement Microsoft Azure Network Solution
Azure Networking Solutions - Master the Designing and Implementation Techniques
Description
This practice test is designed to help students prepare for the AZ-700 Microsoft Azure Networking Solutions certification exam. It covers all...
Real NMAP : Elite Network Scanning & Recon in 10 Hours|CNMP+
Real Power of Nmap: Master Network Scanning, Reconnaissance and Exploit Discovery for Effective Penetration Testing|2023
What you'll learn
Nmap's network scanning capabilities and how to use them effectively.
Utilizing NSE scripts to...
Programming Network Applications in Java
TCP and UDP sockets in Java
What you'll learn
Programming basic network applications
Programming client-server applications
TCP Sockets in Java
UDP Sockets in Java
Running multiple clients at the same time (multithreading)
*** Hidden text: You do not...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Fundamentals of Network Security
Here we will discuss network security, the OSI model, and network attack and protection
What you'll learn
Learn the Information Security Threats.
Identify the Layer of OSI Model
Understand the different Network Attack.
Learn the Network Protection Method.
***...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.46 GB | Duration: 8h 13m
Learn Zabbix in a Professional way from Scratch. Become an expert in Network Monitoring, from ZERO to HERO!
What you'll learn
At the end of the course, you will fully master Zabbix, to be...
Udemy - Complete Home Network Security Monitoring w Security Onion 10-2023. by Benjamin Patterson, MA
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Programming Network Applications in Java
TCP and UDP sockets in Java
What you'll learn
Programming basic network applications
Programming client-server applications
TCP Sockets in Java
UDP Sockets in Java
Running multiple clients at the same time (multithreading)
*** Hidden text: You do not...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Mastering Active Directory: Manage and Optimize The Network
Gain Essential Active Directory Skills for Windows Network Management
What you'll learn
System Administrators who are responsible for managing and maintaining the Windows Servers
Network Engineers who are responsible for designing...
Udemy Link - https://www.udemy.com/course/nmap-advanced-techniques-course-a-to-z-on-network-scan-2021/
Mega link - https://mega.nz/file/ZHlRDDKZ#P3XrgSBPJV6oyMt1vhdbJBTtMsDzfXTwWS-t5AOdL2M
Joining link - Join Now
Green Computing in Network Security
EPUB
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
PDF
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
What you'll learn
Understand the role of the internet in modern marketing practices.
Grasp foundational concepts of online advertising, branding, and customer engagement.
Learn techniques to improve website visibility through organic search results (SEO).
Gain proficiency in crafting and...
Nmap Advanced Techniques Course A To Z On Network Scan 2023
Nmap (Network Mapper) The Most Advanced Tool Useful by Pentesters To Make Network Full Scaning
What you'll learn
You will become an expert in using Nmap for ethical hacking, system administration and network security.
Network Mapper...
CBTNuggets - SEC503 - Network Monitoring and Threat Detection In-Depth Online Training 2023, by Erik Choron
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack
What you’ll learn
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Becoming an...
Flow analysis
A dedicated Web interface allows for flow analysis.
Download:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Learn Ethical Hacking with Network Security, Sniffing, Subnetting, Networking, Password Cracking & implement MitM attack
What you’ll learn
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system.
Becoming an...
Ethical Hacking: Network Exploitation Basics
Hack Servers and Install a Backdoor
What you'll learn
Hack into Servers
How to do passive renassaince
How to setup a Linux/Mac backdoor
Use Networking tools
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
A network is a collection of interconnected devices or nodes that are linked together to facilitate communication, data sharing, or resource sharing among these devices. Networks come in various forms, and they play a fundamental role in modern computing and communication. Here are some key...
How the Internet Works & the Web Development Process
Learn how the Internet Works - HTTP/HTTPS, Mail Delivery (SMTP), LAN, WAN, Network Basics & Firewalls
What you'll learn
How the Internet Facilities the movement of Data Packets
The Difference between Local and Wide Area Networks (LAN, WAN)...