Microsoft Exchange Server 2016 | LiveLessons
Learn from an expert while you become the expert. This video is designed to teach Exchange Server administrators (and aspiring Exchange Server admins) how to work with Exchange Server 2016. This video...
View ArticleDesigning/Deploying Exchange 2016 (70-345) Coure | Pluralsight
This course is designed to help you prepare for your Exchange Server 2016 certificate exam, and focuses on the exam objectives for the “Plan, deploy and manage Exchange infrastructure, recipients, and...
View ArticleReverse Engineering with Radare 2 | Udemy
How to use Radare 2 to reverse engineer binaries. Disassembling binaries. Navigating in the binary. Debugging executables. Patching executables. In this course we will learn about the Radare 2 reverse...
View ArticleLabminutes Complete Video Bundle
This is Complete Video Bundle from Labminutes.com All videos from Routing, Security, Wireless and Service Provider, 83Gb in total. Actual on 15.01.2019...
View ArticleMOC10965D – IT Service Management with System Center Service Manager
This five-day course will provide students with the key knowledge required to deploy and configure System Center 2016 Service Manager.Using hands-on labs, students will learn the following: Where...
View ArticleBASELINE – SANS & Offensive-Security
SANS 401 – Security Essentials Bootcamp Style.tar.gz SANS 408 – Windows Forensic Analysis.tar.gz SANS 410 – ICS & SCADA Security Essentials.tar.gz SANS 414 – Training Program for CISSP...
View ArticleMicrosoft Learning, Microsoft SQL Server 2014 original courses
20-461: Querying Microsoft SQL Server 2014 20-462: Administering Microsoft SQL Server 2014 Databases 20-464: Developing Microsoft SQL Server 2014 Databases 20-465: Designing Database Solutions for...
View ArticleSANS SEC506: Securing Linux/Unix
provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate...
View ArticleThe Complete WiFi Ethical Hacking Course for Beginners | Udemy
How to Hack WiFi Networks (WEP, WPA, WPA2) How to protect yourself from Wi-Fi attacks Collect passwords for access points from open sources Required Equipment for Wireless Hacking Work with utilities...
View ArticleSANS SEC560: Network Penetration Testing and Ethical Hacking PDF + MP3
As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you...
View ArticleSANS SEC501: Advanced Security Essentials – Enterprise Defender MP3
Effective cybersecurity is more important than ever as attacks become stealthier, have a greater financial impact, and cause broad reputational damage. SEC501: Advanced Security Essentials – Enterprise...
View ArticleSANS SEC555: SIEM with Tactical Analytics PDF
Many organizations have logging capabilities but lack the people and processes to analyze it. In addition, logging systems collect vast amounts of data from a variety of data sources which require an...
View ArticleSANS SEC542: Web App Penetration Testing and Ethical Hacking
Web applications play a vital role in every modern organization. But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business...
View ArticleSANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Learn to turn malware inside out! This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security...
View ArticleSANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and...
Advanced Network Forensics: Threat Hunting, Analysis and Incident Response Course Topics: Foundational network forensics tools: tcpdump and Wireshark refresher Packet capture applications and data...
View ArticleSANS MGT514: Security Strategic Planning, Policy, and Leadership PDF
As security professionals we have seen the landscape change. Cybersecurity is now more vital and relevant to the growth of your organization than ever before. As a result, information security teams...
View ArticleAdvanced Techniques for AWS Monitoring, Metrics and Logging | Cloud Academy
Modern AWS cloud deployments are increasingly distributed systems, comprising of many different components and services interacting with each other to deliver software. In order to ensure quality...
View ArticleLinkedin – Learning Azure for Architects Design a Compute Strategy
Linkedin – Learning Azure for Architects Design a Compute Strategy-ZHEnglish | Size: 200.76 MBCategory: Tutorial Learn about designing a compute strategy with Microsoft Azure and prepare for the...
View ArticleLinux Essentials for Cybersecurity (Pearson IT Cybersecurity Curriculum (ITCC))
Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of...
View ArticleCybersecurity: The Beginner’s Guide: A comprehensive guide to getting started...
It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC...
View Article