Ethical Hacking using Kali Linux from A to Z Course
The course designed for anyone who want to learn Ethical Hacking from scratch using Kali Linux and moving to the world of professional penetration testing. The course introduces students to the latest...
View ArticleWireshark tutorial in 60 minutes – video course | Udemy
Install and configure Wireshark for packet capture on Windows, Mac OS X and Linux Capture network traffic for future analysis Analyse captured network packets Use Wireshark capture filters and display...
View ArticleData Communications and Networking 5E – Forouzan
The fifth edition of Behrouz Forouzan’s Data Communications and Networking presents a comprehensive and accessible approach to data communications and networking that has made this book a favorite with...
View Article30sec Subnetting Technique to Success at Cisco CCNA Exam
Subnetting is an absolutely critical component for CCNA success. In this videos, we are first going to review how subnetting works, ensure you master the 30 sec method and understand the mathematics...
View ArticleBasic Security Testing With Kali Linux, 3rd Edition
Kali Linux (2018) is an Ethical Hacking platform that allows security professionals to use the same tools and techniques that a hacker would use, so they can find security issues before the attackers...
View ArticleCloud: Executive Briefing | Pluralsight
This is a practical, pragmatic introduction to Cloud Computing: how best to think about it, and how to recognize where and when to use it—whether that’s for yourself, your team, your organization, or...
View ArticleLinkedin Learning – Azure Security Technologies Manage Identity and Access
Linkedin Learning – Azure Security Technologies Manage Identity and Access-ZHEnglish | Size: 139.54 MBCategory: Tutorial Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security...
View ArticleProtocol Deep Dive: IPsec | Pluralsight
IPsec helps us to secure our infrastructure and offer services securely to our organization. This course will teach you how to configure, verify, and analyze IPsec, as well as teach you knowledge to...
View ArticleCreating a Lab with VMware Workstation Pro | Pluralsight
In this course, you’ll learn why you should create a lab, how to create a lab step by step, and how to virtualize a variety of different operating systems. If you want to build an awesome virtual lab...
View ArticleCCNP Service Provider Technology Course: 642-883 SPROUTE | INE
This course will cover configuring, verifying, and troubleshooting IPv4 and IPv6 advanced OSPF and IS-IS configuration, BGP configuration, using Cisco IOS-XR RPL to implement routing policies, and...
View ArticleCCNP Service Provider Technology Course: 642-889 SPEDGE | INE
This course will cover the concepts and implementation of VPN solutions from the Service Providers perspective, including simple and complex layer 3 MPLS VPNs, CSC, 6VPE, and layer 2 VPNs such as AToM...
View ArticleCCNP Service Provider Technology Course: 642-885 SPADVROUTE | INE
This course will cover configuring, verifying, and troubleshooting IPv4 and IPv6 advanced BGP configuration, IP multicasting, and IPv6 transition mechanisms in implementing and supporting a service...
View ArticleCCNP Service Provider Technology Course: 642-887 SPCORE | INE
This course will cover the concepts and implementation of MPLS, LDP, MPLS-TE and QoS policies from the Service Provider perspective. This exam covers the Cisco IOS, IOS-XE and IOS-XR operating systems....
View ArticleModSecurity Handbook, Second Edition
ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book...
View ArticleInformation Storage and Management (ISM) V4
The spiraling growth of digital information makes the ISM book a “must have” addition to your IT reference library. This exponential growth has driven information management technology to new levels of...
View ArticleThe Complete VMware Horizon 7: Beginner to Advanced: 3-in-1 | Udemy
Learn the latest features and architecture of VMware Horizon 7 Learn how to build and optimize desktop OS for VDI Revolutionize the way you manage your desktop infrastructure, while delivering a...
View ArticleUdemy – Microsoft SQL server 2019
Udemy – Microsoft SQL server 2019English | Size: 1.84 GBCategory: Tutorial What you’ll learn know about Microsoft SQL Server 2019 – Latest Version How to do Installation, Configuration of MS SQL Server...
View ArticleDesigning an Azure Compute Infrastructure | Udemy
Microsoft Azure offers services for a wide variety of compute-related needs, including traditional compute resources like virtual machines, as well as serverless and container-based services. In this...
View ArticleCisco Core Security: Describing and Configuring VPNs | Pluralsight
VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD. The internet is an insecure way...
View ArticleCloud Academy – Building a Chatbot on Azure
Cloud Academy – Building a Chatbot on Azure-STMEnglish | Size: 410.33 MBCategory: AZURE The ‘Building a Chatbot on Azure’ course will allow team members to learn how to automate basic support tasks by...
View Article