Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

Ethical Hacking using Kali Linux from A to Z Course

The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing. The course introduces students to the latest...

View Article


Wireshark tutorial in 60 minutes – video course | Udemy

Install and configure Wireshark for packet capture on Windows, Mac OS X and Linux Capture network traffic for future analysis Analyse captured network packets Use Wireshark capture filters and display...

View Article


Data Communications and Networking 5E – Forouzan

The fifth edition of Behrouz Forouzan’s Data Communications and Networking presents a comprehensive and accessible approach to data communications and networking that has made this book a favorite with...

View Article

30sec Subnetting Technique to Success at Cisco CCNA Exam

Subnetting is an absolutely critical component for CCNA success. In this videos, we are first going to review how subnetting works, ensure you master the 30 sec method and understand the mathematics...

View Article

Basic Security Testing With Kali Linux, 3rd Edition

Kali Linux (2018) is an Ethical Hacking platform that allows security professionals to use the same tools and techniques that a hacker would use, so they can find security issues before the attackers...

View Article


Cloud: Executive Briefing | Pluralsight

This is a practical, pragmatic introduction to Cloud Computing: how best to think about it, and how to recognize where and when to use it—whether that’s for yourself, your team, your organization, or...

View Article

Linkedin Learning – Azure Security Technologies Manage Identity and Access

Linkedin Learning – Azure Security Technologies Manage Identity and Access-ZHEnglish | Size: 139.54 MBCategory: Tutorial Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security...

View Article

Protocol Deep Dive: IPsec | Pluralsight

IPsec helps us to secure our infrastructure and offer services securely to our organization. This course will teach you how to configure, verify, and analyze IPsec, as well as teach you knowledge to...

View Article


Creating a Lab with VMware Workstation Pro | Pluralsight

In this course, you’ll learn why you should create a lab, how to create a lab step by step, and how to virtualize a variety of different operating systems. If you want to build an awesome virtual lab...

View Article


CCNP Service Provider Technology Course: 642-883 SPROUTE | INE

This course will cover configuring, verifying, and troubleshooting IPv4 and IPv6 advanced OSPF and IS-IS configuration, BGP configuration, using Cisco IOS-XR RPL to implement routing policies, and...

View Article

CCNP Service Provider Technology Course: 642-889 SPEDGE | INE

This course will cover the concepts and implementation of VPN solutions from the Service Providers perspective, including simple and complex layer 3 MPLS VPNs, CSC, 6VPE, and layer 2 VPNs such as AToM...

View Article

CCNP Service Provider Technology Course: 642-885 SPADVROUTE | INE

This course will cover configuring, verifying, and troubleshooting IPv4 and IPv6 advanced BGP configuration, IP multicasting, and IPv6 transition mechanisms in implementing and supporting a service...

View Article

CCNP Service Provider Technology Course: 642-887 SPCORE | INE

This course will cover the concepts and implementation of MPLS, LDP, MPLS-TE and QoS policies from the Service Provider perspective. This exam covers the Cisco IOS, IOS-XE and IOS-XR operating systems....

View Article


ModSecurity Handbook, Second Edition

ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book...

View Article

Information Storage and Management (ISM) V4

The spiraling growth of digital information makes the ISM book a “must have” addition to your IT reference library. This exponential growth has driven information management technology to new levels of...

View Article


The Complete VMware Horizon 7: Beginner to Advanced: 3-in-1 | Udemy

Learn the latest features and architecture of VMware Horizon 7 Learn how to build and optimize desktop OS for VDI Revolutionize the way you manage your desktop infrastructure, while delivering a...

View Article

Udemy – Microsoft SQL server 2019

Udemy – Microsoft SQL server 2019English | Size: 1.84 GBCategory: Tutorial What you’ll learn know about Microsoft SQL Server 2019 – Latest Version How to do Installation, Configuration of MS SQL Server...

View Article


Designing an Azure Compute Infrastructure | Udemy

Microsoft Azure offers services for a wide variety of compute-related needs, including traditional compute resources like virtual machines, as well as serverless and container-based services. In this...

View Article

Cisco Core Security: Describing and Configuring VPNs | Pluralsight

VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD. The internet is an insecure way...

View Article

Cloud Academy – Building a Chatbot on Azure

Cloud Academy – Building a Chatbot on Azure-STMEnglish | Size: 410.33 MBCategory: AZURE The ‘Building a Chatbot on Azure’ course will allow team members to learn how to automate basic support tasks by...

View Article
Browsing all 6856 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>