Search This Blog

Showing posts with label Programming. Show all posts
Showing posts with label Programming. Show all posts

Sunday, October 29, 2017

Learn Data Structures and Algorithms Video Training Course DVD




Overall Duration : 13 Hours

211 Video Lessons

Learning Data Structures and Algorithms

Duration: 7 hours 32 minutes

Chapter 1 - Introduction
 Introduction And Course Overview
About The Author
How To Access Your Working Files
Chapter 2 - Complexity Theory
 Complexity Theory
Big O Notation
Typical Runtime Functions
Comparing Runtime Functions
P And NP
Chapter 3 - Numerical Algorithms
 Random Numbers
Linear Congruential Generators
Randomizing Arrays - Part 1
Randomizing Arrays - Part 2
GCD
LCM
Prime Factorization - Part 1
Prime Factorization - Part 2
Finding Primes
Testing Primality
Numerical Integration
Chapter 4 - Linked Lists
 Singly Linked Lists - Part 1
Singly Linked Lists - Part 2
Sorted Linked Lists
Sorting With Linked Lists
Doubly Linked Lists
Chapter 5 - Arrays
 One-Dimensional Arrays
Triangular Arrays - Part 1
Triangular Arrays - Part 2
Sparse Arrays - Part 1
Sparse Arrays - Part 2
Chapter 6 - Stacks And Queues
 Stacks
Stack Algorithms
Double Stacks
Queues
Chapter 7 - Sorting
 Sorting Algorithms
Insertionsort
Selectionsort
Quicksort - Part 1
Quicksort - Part 2
Heapsort - Part 1
Heapsort - Part 2
Heapsort - Part 3
Mergesort - Part 1
Mergesort - Part 2
Bubblesort - Part 1
Bubblesort - Part 2
Countingsort - Part 1
Countingsort - Part 2
Sorting Summary
Chapter 8 - Searching
 Linear Search
Binary Search
Interpolation Search
Chapter 9 - Hash Tables
 Hash Tables
Chaining
Open Addressing - Basics
Open Addressing - Linear Probing
Open Addressing - Quadratic Probing
Open Addressing - Double Hashing
Chapter 10 - Recursion
 Recursion Basics
Fibonacci Numbers
Tower Of Hanoi
Koch Curves
Hilbert Curves
Gaskets
Removing Tail Recursion
Removing Recursion With Stacks
Fixing Fibonacci
Selections
Permutations
Chapter 11 - Backtracking Algorithms
 Backtracking
The Eight Queens Problem - Part 1
The Eight Queens Problem - Part 2
The Eight Queens Problem - Part 3
The Knights Tour
Chapter 12 - Trees
 Tree Terms
Binary Tree Properties
Traversals - Preorder
Traversals - Postorder
Traversals - Inorder
Traversals - Breadth-First
Building Sorted Trees
Editing Sorted Trees
Chapter 13 - Balanced Trees
 Why Do You Need Balanced Trees?
B-Trees - B-Tree Basics
B-Trees - Adding Items
B-Trees - Removing Items
Chapter 14 - Decision Trees
 Definition
Exhaustive Search
Branch And Bound
Heuristics
Chapter 15 - Network Algorithms
 Network Terminology
Network Classes
Depth-First Traversal
Breadth-First Traversal
Spanning Trees - Part 1
Spanning Trees - Part 2
Shortest Paths - Part 1
Shortest Paths - Part 2
Chapter 16 - Wrap-Up
 Wrap-Up

Bonus

Algorithms and Data Structures Part 1
Duration 3h 13m

Algorithms and Data Structures Part 2
Duration 2h 30m

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 

=======================================================================



Term

Wednesday, October 11, 2017

Kotlin Programming Beginner to Advanced Video Training on 2 DVDs


Total Duration : 8 Hours

88 Video Lessons


Introduction to Kotlin Programming Training Video 

Duration : 5 : 15


01. Part 1: Introduction

0101 Welcome to the Course 

0102 Why Kotlin


02. Part 2: A Primer on Kotlin

0201 Introduction to the JVM 

0202 Installing the Tooling 

0203 The Kotlin REPL 

0204 The Kotlin Application 

0205 Kotlin with IntelliJ IDEA 

0206 Conventions Used with Kotlin & Summary


03. Part 3: The Basics of Kotlin

0301 Declaring Variables in Kotlin 

0302 Working with Basic Types in Kotlin 

0303 Loops and Ranges in Kotlin 

0304 Kotlin 

0305 Packages and Imports in Kotlin & Summary of Kotlin Basics


04. Part 4: fun with Functions

0401 Functions in Kotlin 

0402 Functions with Default and Named Parameters in Kotlin 

0403 Functions with Unlimited Parameters in Kotlin


05. Part 5: Classes in Kotlin

0501 Classes in Kotlin 

0502 Kotlin 

0503 Kotlin 0503 

Kotlin Data Classes 

0505 Enum Classes in Kotlin 

0506 Objects in Kotlin & Summary


06. Part 6: Inheritance et al. 

0601 Inheritance in Kotlin 

0602 Working with Abstracts in Kotlin 

0603 Interfaces in Kotlin 

0604 A Brief Look at Generations in Kotlin & Summary


07. Part 7: Working with Nulls

0701 Null Safety & Summary


08.Part 8: A handful of tidbits

0801 Type in Kotlin 

0802 Tuples 

0803 Deconstructing values 

0804 Working with Exception 

0805 Declaring Constants 

0806 Annotations in Kotlin & Summary


09. Part 9: Getting Functional

0901 

Lambda Expressions in Kotlin 

0903 Closures in Kotlin 

0904 Extension Functions in Kotlin & Summary


10. Part 10: Interoperability

1001 Interoperability with Java 

1002 Talking to Java from Kotlin 

1003 Working with nulls from Java 

1004 Talking Kotlin in Java 

1005 Top-level Functions and Properties in Kotlin

1006 Extension Functions from Java 

1007 Interop with Java 7 and 8 & Summary


11. Part 11: Standard Library

1101 Kotlin 

1102 Filtering, Mapping, and Flatmapping in Kotlin 

1103 Lazy Evaluation with Sequences in Kotlin 

1104 String Extensions in Kotlin & Summary


12. Part 12: Build Tools

1201 Build Tools in Kotlin & Summary



Advanced Kotlin Programming Training Video

Duration : 3:00


01. Part 1: Introduction

0101 Welcome to the Course


02. Part 2: Diving Deeper into functions

0201 Local Functions in Kotlin 

0202 Infinity Functions in Kotlin 

0203 Anonymous Functions in Kotlin 

0204 Inline Functions in Kotlin 

0205 Returns and Local Returns in Kotlin 

0206 Tail Recursion in Kotlin 

0207 Operator Overloading in Kotlin 

0208 Lambda Extensions in Kotlin 

0209 Involving Kotlin 

0210 in Kotlin 0210 Functional Constructs in Kotlin & Summary


03. Part 3: Class Scenarios

0301 Fields in Kotlin 

0302 Late Initialization in Kotlin 

0303 Nested Classes in Kotlin

0304 Companion Objects in Kotlin 

0305 Hiding Constructors in Kotlin 

0306 Sealed Classes in Kotlin 

0307 Aliases in Kotlin Type & Summary


04. Part 4: Delegation

0401 The Concept of Delegation in Kotlin 

0402 Delegating Member Functions in Kotlin 

0403 Delegating Properties in Kotlin 

0404 Built-in Delegated Properties in Kotlin 

0405 Local Delegates in Kotlin 

0406 Extension Properties in Kotlin & Summary


05. Part 5: Diving Deeper into Generics

0501 Generic Constraints in Kotlin 

0502 Generics and Invariance 

0503 Covariance 

in Kotlin 

0505


06. Part 6: Metaprogramming

0601 An Introduction to Reflection 

0602 Using Java Reflection with Kotlin 

0603 Using Kotlin Reflection 

0604 Type of Erasure on the JVM 

0605 Reproduction Generation in Kotlin 

0606 Custom Annotations in Kotlin & Summary


07. Part 7: Asynchronous Programming

0701 The Problem of Asynchronous Programming 

0702 Coroutines in Kotlin & Coroutine in Kotlin 

0703 Async and Await in Kotlin 

0704 Koutlin 

0705 Coroutines and Reactive Extensions in Kotlin & Summary


08. Conclusion

0801 Course Summary


======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

Wednesday, October 4, 2017

Advanced Kotlin Programming Video Training DVD



1. Welcome to the Course.
2. Local Functions in Kotlin.
3. Infix Functions in Kotlin.
4. Anonymous Functions in Kotlin.
5. Inline Functions in Kotlin.
6. Returns and Local Returns in Kotlin.
7. Tail Recursion in Kotlin.
8. Operator Overloading in Kotlin.
9. Lambda Extensions in Kotlin.
10. Invoking instances in Kotlin.
11. Functional Constructs in Kotlin & Summary.
12. Fields in Kotlin.
13. Late Initialization in Kotlin.
14. Nested Classes in Kotlin.
15. Companion Objects in Kotlin.
16. Hiding Constructors in Kotlin.
17. Sealed Classes in Kotlin.
18. Type Aliases in Kotlin & Summary.
19. The Concept of Delegation in Kotlin.
20. Delegating Member Functions in Kotlin.
21. Delegating Properties in Kotlin.
22. Built-in Delegated Properties in Kotlin.
23. Local Delegates in Kotlin.
24. Extension Properties in Kotlin & Summary.
25. Generic Constraints in Kotlin.
26. Generics and Invariance.
27. Covariance in Kotlin.
28. Contravariance in Kotlin.
29. Type Projections in Kotlin & Summary.
30. An Introduction to Reflection.
31. Using Java Reflection with Kotlin.
32. Using Kotlin Reflection.
33. Type Erasure on the JVM.
34. Reified Generics in Kotlin.
35. Custom Annotations in Kotlin & Summary.
36. The Problem of Asynchronous Programming.
37. Coroutines in Kotlin & Coroutine Implementation in Kotlin.
38. Async and Await in Kotlin.
39. Yields in Kotlin.
40. Coroutines and Reactive Extensions in Kotlin & Summary.
41. Course Summary.

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term




Wednesday, September 20, 2017

Ethical Hacking From Scratch Video Course Training DVD






Duration : 12 Hours

Introduction 12:34
Course Introduction & Overview 03:15
Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam  06:10
What Is Hacking & Why Learn It ? 03:09
Setting up The Lab 25:39
Lab Overview & Needed Software  03:25
Installing Kali 2017 As a Virtual Machine 08:32
Installing Metasploitable As a Virtual Machine 04:13
Installing Windows As a Virtual Machine  03:21
Creating & Using Snapshots  06:08

Linux Basics 20:53
Basic Overview of Kali Linux  07:05
The Terminal & Linux Commands  09:06
Updating Sources & Installing Programs  04:42
Network Penetration Testing 28:47
Network Penetration Testing Introduction 02:42

Networks Basics  03:09
Connecting a Wireless Adapter To Kali 07:18
What is MAC Address & How To Change It 04:44
Wireless Modes (Managed & Monitor) 05:02
Enabling Monitor Mode Manually (2nd method) 02:36
Enabling Monitor Mode Using airmon-ng (3rd method) 03:16

Network Penetration Testing - Pre Connection Attacks31:57
Packet Sniffing Basics Using Airodump-ng 05:40
Targeted Packet Sniffing Using Airodump-ng 07:27
Deauthentication Attack (Disconnecting Any Device From The Network) 05:16
Creating a Fake Access Point (Honeypot) - Theory 03:44
Creating a Fake Access Point (Honeypot) - Practical 09:50
Network Penetration Testing - Gaining Access (WEP/WPA/WPA2 Cracking)55:38

Gaining Access Introduction 01:16
WEP Cracking - Theory Behind Cracking WEP Encryption 03:26
WEP Cracking - Basic Case 06:27
WEP Cracking - Fake Authentication 05:59
WEP Cracking - ARP Request Replay Attack 04:44
WPA Cracking - Introduction 02:03
WPA Cracking - Exploiting WPS Feature 07:17
WPA Cracking - Theory Behind WPA/WPA2 Cracking 02:18
WPA Cracking - How To Capture The Handshake 04:43
WPA Cracking - Creating a Wordlist 06:08
WPA Cracking - Using a Wordlist Attack 02:49
Securing Your Network From The Above Attacks 02:03
How to Configure Wireless Security Settings To Secure Your Network 06:25

Network Penetration Testing - Post Connection Attacks 01:43:25
Introduction  02:43
Information Gathering - Discovering Connected Clients using netdiscover 03:31
Gathering More Information Using Autoscan 08:42
Gathering Even More Information Using Zenmap 11:15
MITM - ARP Poisonning Theory 05:51
MITM - ARP Spoofing using arpspoof 05:51
MITM - ARP Spoofing Using MITMf 05:21
MITM - Bypassing HTTPS 04:40
MITM - Session Hijacking 06:34
MITM - DNS Spoofing 05:10
MITM - Capturing Screen Of Target & Injecting a Keylogger 05:12
MITM - Injecting Javascript/HTML Code 06:43
MITM - Using MITMf Against Real Networks 09:08
Wireshark - Basic Overview & How To Use It With MITM Attacks 09:08
Wireshark - Sniffing Data & Analysing HTTP Traffic 08:00
Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network 05:36
Network Penetration Testing - Detection & Security 11:02
Detecting ARP Poisonning Attacks 05:11
Detecting suspicious Activities Using Wireshark 05:51
Gaining Access To Computer Devices 04:14
Gaining Access Introduction 04:14

Gaining Access - Server Side Attacks 01:17:44
Introduction 04:05
Basic Information Gathering & Exploitation 10:05
Using a Basic Metasploit Exploit  07:31
Exploiting a Code Execution Vulnerability 10:03
MSFC - Installing MSFC (Metasploit Community) 05:46
MSFC - Scanning Target(s) For Vulnerabilities 03:21
MSFC - Analysing Scan results & Exploiting Target System 09:42
Nexpose - Installing Nexpose 09:59
Nexpose - How To Configure & Launch a Scan09:16
Nexpose - Analysing Scan Results & Generating Reports  07:56

Gaining Access - Client Side Attacks 01:03:46
Introduction 02:19
Installing Veil 3 07:49
Veil Overview & Payloads Basics 07:20
Generating An Undetectable Backdoor Using Veil 3 09:44
Listening For Incoming Connections 07:18
Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10 07:12
Backdoor Delivery Method 1 - Using a Fake Update 09:50
Backdoor Delivery Method 2 - Backdooring Downloads on The Fly 08:23
How to Protect Yourself From The Discussed Delivery Methods 03:51

Gaining Access - Client Side Attacks - Social Engineering 01:29:26
Introduction 02:43
Maltego Basics 05:48
Discovering Websites, Links & Social Networking Accounts Associated With Target 07:32
Discovering Twitter Friends & Associated Accounts 04:57
Discovering Emails Of The Target's Friends 03:48
Analysing The Gathered Info & Building An Attack Stratigy 08:41
Backdooring Any File Type (images, pdf's ...etc) 04:41
Compiling & Changing Trojan's Icon 06:16
Spoofing .exe Extension To Any Extension (jpg, pdf ...etc) 08:29
Spoofing Emails - Send Emails As Any Email Account You Want 07:33
BeEF Overview & Basic Hook Method 06:39
BeEF - hooking targets using MITMf 03:11
BeEF - Running Basic Commands On Target 04:24
BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 02:17
BeEF - Gaining Full Control Over Windows Target 03:39
Detecting Trojans Manually 05:32
Detecting Trojans Using a Sandbox 03:16
-
Gaining Access - Using The Above Attacks Outside The Local Network 24:17
Overview of the Setup 06:06
Ex1 - Generating a Backdoor That Works Outside The Network 05:24
Configuring The Router To Forward Connections To Kali 06:58
Ex2 - Using BeEF Outside The Network 05:49
Post Exploitation 43:29
Introduction 02:02
Meterpreter Basics 06:22
File System Commands 05:09
Maintaining Access - Basic Methods 05:07
Maintaining Access - Using a Reliable & Undetectable Method 06:53
Spying - Capturing Key Strikes & Taking Screen Shots 02:39
Pivoting - Theory (What is Pivoting?) 07:06
Pivoting - Exploiting Devices on The Same Network As The Target Computer 08:11

Website Penetration Testing 08:07
Introduction - What Is A Website ? 04:16
How To Hack a Website? 03:51
Website Pentesting - Information Gathering 38:05
Gathering Basic Information Using Whois Lookup 05:36
Discoverin Technologies Used On The Website 06:03
Gathering Comprehensive DNS Information 05:57
Discovering Websites On The Same Server 03:42
Discovering Subdomains 05:05
Discovering Sensitive Files 07:25
Analysing Discovered Files 04:17

Website Pentesting - File Upload, Code Execution & File Inclusion Vulns 36:12
Discovering & Exploiting File Upload Vulnerabilities 06:43
Discovering & Exploiting Code Execution Vulnerabilities 07:25
Discovering & Exploiting Local File Inclusion Vulnerabilities 05:16
Remote File Inclusion Vulnerabilities - Configuring PHP Settings 03:45
Remote File Inclusion Vulnerabilities - Discovery & Exploitation 05:44
Preventing The Above Vulnerabilities 07:19

Website Pentesting - SQL Injection Vulnerabilities 59:18
What is SQL 05:48
Dangers of SQL Injection Vulnerabilities 02:53
Discovering SQL injections In POST 07:56
Bypassing Logins Using SQL injection Vulnerability 04:48
Discovering SQL injections in GET 06:44
Reading Database Information 05:26
Finding Database Tables 03:33
Extracting Sensitive Data Such As Passwords 04:29
Reading & Writing Files On The Server Using SQL Injection Vulnerability 05:57
Discoverting SQL Injections & Extracting Data Using SQLmap 06:47
The Right Way To Prevent SQL Injection 04:57

Website Pentesting - Cross Site Scripting Vulnerabilities 20:35
Introduction - What is XSS or Cross Site Scripting? 03:09
Discovering Reflected XSS 03:46
Discovering Stored XSS 02:56
Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF 05:31
Preventing XSS Vulnerabilities 05:13

Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP 08:29
Scanning Target Website For Vulnerabilities 04:18
Analysing Scan Results  04:11

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner

Friday, August 4, 2017

Data Pipelines with Python And Scaling Python for Big Data Video Training DVD Rs 425/-





Total Training Duration : 10.30 hours

Data Pipelines with Python
Duration: 3h 40m

Chapter: Introduction
 Welcome To The Course 02m 52s
About The Author 01m 55s
How To Access Your Working Files 01m 15s
Chapter: Automation 101
 Introduction To Automation 02m 47s
Adventures With Servers 06m 37s
Being A Good Systems Caretaker 06m 3s
What Is A Queue? 02m 31s
What Is A Consumer? What Is A Producer? 01m 59s
Chapter: Easy Task Processing With Celery
 Why Celery? 01m 48s
Celery Architecture & Set Up 05m 25s
Writing Your First Tasks 07m 48s
Deploying Your Tasks 06m 8s
Scaling Your Workers 08m 52s
Monitoring With Flower 05m 5s
Advanced Celery Features 06m 0s
Chapter: Scaling Data Analysis With Dask
 Why Dask? 03m 1s
First Steps With Dask 10m 8s
Dask Bags 10m 18s
Dask Distributed 09m 58s
Chapter: Data Pipelines With Luigi & Airflow
 What Are Data Pipelines? What Is Dag? 02m 36s
Luigi And Airflow: A Comparison 05m 49s
First Steps With Luigi 07m 12s
More Complex Luigi Tasks 09m 16s
Introduction To Hadoop 08m 21s
First Steps With Airflow 08m 7s
Custom Tasks With Airflow 09m 15s
Advanced Airflow: Subdags And Branches 11m 17s
Using Luigi With Hadoop 10m 15s
Chapter: Other Workflow Frameworks
 Apache Spark 08m 28s
Apache Spark Streaming 06m 31s
Django Channels 09m 38s
And Many More 05m 59s
Chapter: Testing With Pipelines
 Introduction To Testing With Python 07m 24s
Property-Based Testing With Hypothesis 06m 8s

Scaling Python for Big Data
Duration: 7h 3m

Welcome To The Course 00:02:53
About The Author 00:01:55
How To Access Your Working Files 00:01:15
Introduction To Automation 00:02:48
Adventures With Servers 00:06:37
Being A Good Systems Caretaker 00:06:03
What Is A Queue? 00:02:32
What Is A Consumer? What Is A Producer? 00:02:00
Why Celery? 00:01:49
Celery Architecture & Set Up 00:05:25
Writing Your First Tasks 00:07:49
Deploying Your Tasks 00:06:08
Scaling Your Workers 00:08:52
Monitoring With Flower 00:05:05
Advanced Celery Features 00:06:00
Why Dask? 00:03:01
First Steps With Dask 00:10:08
Dask Bags 00:10:18
Dask Distributed 00:09:58
What Are Data Pipelines? What Is Dag? 00:02:37
Luigi And Airflow: A Comparison 00:05:50
First Steps With Luigi 00:07:12
More Complex Luigi Tasks 00:09:17
Introduction To Hadoop 00:08:21
First Steps With Airflow 00:08:07
Custom Tasks With Airflow 00:09:16
Advanced Airflow: Subdags And Branches 00:11:17
Using Luigi With Hadoop 00:10:15
Apache Spark 00:08:28
Apache Spark Streaming 00:06:32
Django Channels 00:09:39
And Many More 00:05:59
Introduction To Testing With Python 00:07:24
Property-Based Testing With Hypothesis 00:06:09
What's Next? 00:03:57
Introduction to PySpark
Introduction And Course Overview 00:02:01
About The Author 00:01:02
Installing Python 00:04:38
Installing iPython And Using Notebooks 00:06:28
How To Access Your Working Files 00:01:15
Download And Setup 00:03:24
Running The Spark Shell 00:05:35
Running The Spark Shell With iPython 00:06:38
What Is A Resilient Distributed Dataset - RDD? 00:04:54
Reading A Text File 00:03:34
Actions 00:02:13
Transformations 00:02:30
Persisting Data 00:04:11
Map 00:03:04
Filter 00:03:56
Flatmap 00:03:16
MapPartitions 00:04:07
MapPartitionsWithIndex 00:01:51
Sample 00:02:36
Union 00:01:11
Intersection 00:01:28
Distinct 00:02:02
Cartesian 00:03:17
Pipe 00:03:40
Coalesce 00:02:12
Repartition 00:02:29
RepartitionAndSortWithinPartitions 00:03:58
Reduce 00:04:19
Collect 00:01:56
Count 00:03:05
First 00:01:20
Take 00:01:05
TakeSample 00:03:03
TakeOrdered 00:02:10
SaveAsTextFile 00:04:09
CountByKey 00:02:40
ForEach 00:03:11
GroupByKey 00:02:31
ReduceByKey 00:03:30
AggregateByKey 00:03:44
SortByKey 00:02:47
Join 00:04:16
CoGroup 00:02:09
WholeTextFile 00:03:15
Pickle Files 00:03:59
HadoopInputFormat 00:05:35
HadoopOutputFormat 00:05:31
Broadcast Variables 00:04:17
Accumulators 00:05:08
Using A Custom Accumulator 00:04:52
Partitioning 00:07:56
Spark Standalone Cluster 00:04:26
Mesos 00:03:38
Yarn 00:02:28
Client Versus Cluster Mode 00:02:41
Spark Streaming 00:04:21
Dataframes And SQL 00:03:28
MLlib 00:04:29
Resources And Where To Go From Here 00:01:02
Wrap Up 00:01:28

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term


Shipping Banner