Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

Microsoft Exchange Server 2016 | LiveLessons

Learn from an expert while you become the expert. This video is designed to teach Exchange Server administrators (and aspiring Exchange Server admins) how to work with Exchange Server 2016. This video...

View Article


Designing/Deploying Exchange 2016 (70-345) Coure | Pluralsight

This course is designed to help you prepare for your Exchange Server 2016 certificate exam, and focuses on the exam objectives for the “Plan, deploy and manage Exchange infrastructure, recipients, and...

View Article


Reverse Engineering with Radare 2 | Udemy

How to use Radare 2 to reverse engineer binaries. Disassembling binaries. Navigating in the binary. Debugging executables. Patching executables. In this course we will learn about the Radare 2 reverse...

View Article

Labminutes Complete Video Bundle

This is Complete Video Bundle from Labminutes.com All videos from Routing, Security, Wireless and Service Provider, 83Gb in total. Actual on 15.01.2019...

View Article

MOC10965D – IT Service Management with System Center Service Manager

This five-day course will provide students with the key knowledge required to deploy and configure System Center 2016 Service Manager.Using hands-on labs, students will learn the following: Where...

View Article


BASELINE – SANS & Offensive-Security

SANS 401 – Security Essentials Bootcamp Style.tar.gz SANS 408 – Windows Forensic Analysis.tar.gz SANS 410 – ICS & SCADA Security Essentials.tar.gz SANS 414 – Training Program for CISSP...

View Article

Microsoft Learning, Microsoft SQL Server 2014 original courses

20-461: Querying Microsoft SQL Server 2014 20-462: Administering Microsoft SQL Server 2014 Databases 20-464: Developing Microsoft SQL Server 2014 Databases 20-465: Designing Database Solutions for...

View Article

SANS SEC506: Securing Linux/Unix

provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate...

View Article


The Complete WiFi Ethical Hacking Course for Beginners | Udemy

How to Hack WiFi Networks (WEP, WPA, WPA2) How to protect yourself from Wi-Fi attacks Collect passwords for access points from open sources Required Equipment for Wireless Hacking Work with utilities...

View Article


SANS SEC560: Network Penetration Testing and Ethical Hacking PDF + MP3

As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you...

View Article

SANS SEC501: Advanced Security Essentials – Enterprise Defender MP3

Effective cybersecurity is more important than ever as attacks become stealthier, have a greater financial impact, and cause broad reputational damage. SEC501: Advanced Security Essentials – Enterprise...

View Article

SANS SEC555: SIEM with Tactical Analytics PDF

Many organizations have logging capabilities but lack the people and processes to analyze it. In addition, logging systems collect vast amounts of data from a variety of data sources which require an...

View Article

SANS SEC542: Web App Penetration Testing and Ethical Hacking

Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business...

View Article


SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security...

View Article

SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...

Advanced Network Forensics: Threat Hunting, Analysis and Incident Response Course Topics: Foundational network forensics tools: tcpdump and Wireshark refresher Packet capture applications and data...

View Article


SANS MGT514: Security Strategic Planning, Policy, and Leadership PDF

As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams...

View Article

Advanced Techniques for AWS Monitoring, Metrics and Logging | Cloud Academy

Modern AWS cloud deployments are increasingly distributed systems, comprising of many different components and services interacting with each other to deliver software. In order to ensure quality...

View Article


Linkedin – Learning Azure for Architects Design a Compute Strategy

Linkedin – Learning Azure for Architects Design a Compute Strategy-ZHEnglish | Size: 200.76 MBCategory: Tutorial Learn about designing a compute strategy with Microsoft Azure and prepare for the...

View Article

Linux Essentials for Cybersecurity (Pearson IT Cybersecurity Curriculum (ITCC))

Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of...

View Article

Cybersecurity: The Beginner’s Guide: A comprehensive guide to getting started...

It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC...

View Article
Browsing all 6856 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>