Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

44 total results found

Me

Computer Science

Personal Development

Math

Medicine

Programmig

The intention of this section is to share information about programming in general. Books, resources, tutorials, etc...

Blockchain

Learn Smart contracts with a game -> https://cryptozombies.io/ Multiple resources -> https://www.codementor.io/learn/blockchain

Cibersecurity

https://www.infosecmatter.com/where-to-learn-ethical-hacking-and-penetration-testing/

Networking

Virtualization

Linux

About me

Welcome to my website Irving Llamas personal website Bring technology to as many people as possible, to spread knowledge and be prepared for our current realities. My slides The majority of slides that I created for courses are public. To access them, just...

Team Managment

Time managment

Version Control Systems

Proofs

https://sistemas.fciencias.unam.mx/~erhc/calculo1_20161/solow.pdf

Numerical methods

https://julianapinzon.wordpress.com/interpolacion-y-extrapolacion/

Functional

Oracle

Development

Programmig

Refactoring & patterns -> https://refactoring.guru/ Teach Yourself CS -> https://teachyourselfcs.com/

Algorithms

Programmig

Data structures -> https://medium.com/coderbyte/how-to-get-good-at-algorithms-data-structures-d33d5163353f Algorithms & data structures -> https://www.thealgorists.com/Algo List of free ebooks -> https://github.com/EbookFoundation/free-programming-books Bo...

Software Architecture

Programmig

Desing large-scale systems -> https://github.com/donnemartin/system-design-primer Designing data-intesive applications -> https://github.com/ept/ddia-references

Threat hunting

Cibersecurity

Introduction

Networking

https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/ https://docs.oracle.com/en-us/iaas/Content/Network/Concepts/overview.htm

CEH

Cibersecurity

Class1

Cibersecurity Threat hunting

https://go.kaspersky.com/rs/802-IJN-240/images/Common-TTPs-of-the-modern-ransomware_low-res.pdf https://attack.mitre.org/ L34rn1ng! slmgr.vbs /rearm P4$$w0rd!

Smartphone managment

Time managment

https://hbr.org/2018/03/having-your-smartphone-nearby-takes-a-toll-on-your-thinking

Github

Version Control Systems

Business

Cibersecurity

https://www.ftc.gov/es/guia-para-negocios/protegiendo-pequenos-negocios/ciberseguridad

Bash

Linux

https://explainshell.com/

Java

Programmig Development

https://apprize.best/javascript/oca_2/13.html

Subnetting

Networking

https://ptgmedia.pearsoncmg.com/images/9780136582755/errata/SubnettingPracticeExercises_revised.pdf

Floating IPs

Networking

https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-oracle-cloud-infrastructure/configure-activepassive-ha-on-oci

Tools

Networking

NetCat https://ubidots.com/blog/how-to-simulate-a-tcpudp-client-using-netcat/

Introduction

Networking

Overview Networking OCI

Networking Introduction

     

IP, subnets and CIDR

Networking Introduction

  https://www.digitalocean.com/community/tutorials/understanding-ip-addresses-subnets-and-cidr-notation-for-networking#ipv4-addresses-classes-and-reserved-ranges     

IP tables

Networking

IP tables reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/4/html/reference_guide/s2-iptables-options-commands

Python

Programmig Development

https://github.com/jpmorganchase/python-training 

Web development

Programmig Development

Pages for reference: http://www.awwwards.com/ 

8 MFI

Functional

All Slides https://drive.google.com/drive/folders/1hOvUtDLahfA9_1erDZc8jRyIfYH8PbwE  Dia 1 Jefrey Zuckerman Juramento hipocratico https://www.uv.es/~jaguilar/historias/jurhipo.html#:~:text=Guardar%C3%A9%20el%20m%C3%A1ximo%20respeto%20a,o%20experimental%...

Intro

Cibersecurity CEH

Basic cyber-security concepts Confidentiality: Only the allowed people can access the information Integrity: Data didn't change Availability: The information is available at any time   Authorization: Authentication:  Teams: Red team Attackers: Pen...

Oracle Cloud Infrastructure Foundations

Oracle

     

Getting Started with Oracle Cloud Infrastructure

Oracle