PluralSight – Windows Admin Center Unlock Azure Hybrid Value
PluralSight – Windows Admin Center Unlock Azure Hybrid Value-JGTiSOEnglish | Size: 162.70 MBCategory: Tutorial Leverage the power of the Azure cloud to intelligently secure, protect, monitor, and...
View ArticleCBT Nuggets – IPV6 Networking
In this course, Keith Barker walks you through the concepts, implementation, and verification of IPv6 in a Cisco infrastructure with various clients attached as hosts, including Windows, Linux, and...
View ArticleMaster in Hacking with Metasploit | Udemy
Exploit XP with smb server remotely Hack windows 7 using backdoor exe remotely Hack Apple Mac OS X remotely Hack all windows xp, vista, win 7, win 8, 8.1 and 10 remotely Download documents, create...
View ArticleComplete Hacking Tools in Kali Linux | Udemy
Perform basic to advanced tasks in Kali Linux Configure services and turn your Kali Linux into a server Complete ethical hacking tasks from Kali Linux Network hacking and Security Wifi hacking and...
View ArticleCloud Academy – Azure Active Directory Security
Cloud Academy – Azure Active Directory SecurityEnglish | Size: 314.47 MB Category: Networking | Security Azure Active Directory, commonly referred to as Azure AD, is Microsoft’s Identity and Access...
View ArticlePluralSight – Azure Automation for Managing Servers Across Your...
PluralSight – Azure Automation for Managing Servers Across Your Environment-JGTiSOEnglish | Size: 161.32 MBCategory: Tutorial Microsoft Ignite 2019 | Azure Automation for Managing Servers across Your...
View ArticleBecoming a Linux System Admin | ITPro
The Becoming a Linux Power User covers managing Linux systems in a business environment. Topics covered include installing Linux, managing software and using centralized user directories among others....
View ArticleGoogle Cloud Platform: Systems Operations | Cloud Academy
There are a lot of different options, across a variety of cloud platforms that are well suited for running specific workloads, such as web applications. Things such as Google App Engine, AWS Elastic...
View ArticleGoogle Cloud Platform: Fundamentals | Cloud Academy
If you’re going to work with modern software systems, then you can escape learning about cloud technologies. And that’s a rather broad umbrella. Across the three major cloud platform providers, we have...
View ArticleGetting Started with the Internet of Things | Cloud Academy
Internet of Things (IoT) is all of the rages nowadays. Internet of Things (IoT) are devices and components that exist all around us in our day to day lives which communicate with and connect through...
View ArticleGetting Started With Migrating to the Cloud | Cloud Academy
In this course, we will learn practical planning techniques for migrating business applications to public cloud services. The course is suitable for anyone wanting to learn more about how public cloud...
View ArticleGetting Started with Puppet | Cloud Academy
Puppet is an IT automation system. If you need to install, configure, and update servers, then Puppet can help you tremendously. Instead of doing all of these tasks manually, you can tell Puppet to...
View ArticlePluralSight – Get Your Organization Ready for Your Azure Journey
PluralSight – Get Your Organization Ready for Your Azure Journey-JGTiSOEnglish | Size: 143.00 MBCategory: Tutorial Microsoft Ignite 2019 | Get Your Organization Ready for Your Azure Journey | Dante...
View ArticleLeveraging Cloud-Based Machine Learning on Azure – Real-World Applications
Leveraging Cloud-Based Machine Learning on Azure – Real-World ApplicationsEnglish | Size: 157.78 MBCategory: Tutorial In order to successfully incorporate AI on the popular Azure platform, you must...
View ArticleExam AZ-103 Microsoft Azure Administrator (Video)
Exam AZ-103 Microsoft Azure Administrator (Video)English | Size: 1.88 GB Category: Tutorial 9 Hours of Video InstructionThe Exam AZ-103 Microsoft Azure Administrator (Video) offers full coverage of the...
View ArticleBeginner Linux for Ethical Hackers
Beginner Linux for Ethical Hackers In this series, we cover common beginner Linux commands you should know before you get into penetration testing/ethical hacking. We will start with the basics and...
View ArticleSANS FOR508: Advanced Incident Response, Threat Hunting, and Digital...
ADVANCED THREATS ARE IN YOUR NETWORK – IT’S TIME TO GO HUNTING! FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised...
View ArticleCompTIA Network+ N10-005 | CBT Nuggets
Introducing “CompTIA Network+ N10-005,” a new training series from CBT Nuggets. This series is the perfect way to get started in computer networking or improve on those networking skills you already...
View ArticleCCIE Routing & Switching v5.1 Advanced Technologies | INE
The CCIE Routing & Switching Advanced Technologies course is the first step toward understanding CCIE-level technologies and is a companion to our Routing & Switching Workbook Advanced...
View ArticleHow to Create and Embed Malware (2-in-1 Course) | Udemy
Learn embedding malware in pdf and images files Create Payloads to Hack Different Operating systems How to Encrypt the Payload to Avoid Detection You will Learn about the Metasploit Framework Secure...
View Article