Cisco FirePower- PluralSight (Katherine Mcnamare)
Cisco FirePower- PluralSight (Katherine Mcnamare) – Getting Started with Cisco Firepower – Initial Configuration – Operationalizing-Cisco-FirePower...
View ArticleKali Linux 2018: Windows Penetration Testing,2nd Edition
Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows...
View ArticleCybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore...
View ArticleSD-WAN Cisco Viptela Collection
SD-WAN Cisco Viptela Collection – 23.5 GB (25,313,210,368 bytes) UCM asr1000-ucmk9.16.10.2.SPA.bin asr1000-ucmk9.16.11.1a.SPA.bin asr1001x-ucmk9.16.10.2.SPA.bin asr1001x-ucmk9.16.11.1a.SPA.bin...
View ArticleNetworking with MikroTik: MTCNA Study Guide
Networking with MikroTik An MTCNA Study Guide is an introduction to the MikroTik network platform and an exploration of the MTCNA certification topics. Written by the author of the MikroTik Security...
View ArticleAWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam
Everything you need to know for the Solutions Architect – Associate Exam, fully updated The AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam is your complete and fully updated...
View ArticleCloudera Administation
Take your knowledge to the next level with Cloudera’s Administrator Training and Certification. Cloudera University’s four-day administrator training course provides participants with a comprehensive...
View ArticleImmunity Debugger for Exploit Devs – YCSC Lab Essentials | Udemy
Immunity Debugger is the go to debugger for most security professionals. Immunity Inc describes it as a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds...
View ArticleFULL IMAGES FOR EVE-NG HUGE PACK
FULL IMAGES FOR EVE-NG HUGE PACK – 213Gb Files: dynamips/c1710-bk9no3r2sy-mz.124-23.image37540240 (35.8M) dynamips/c3725-adventerprisek9-mz.124-15.T14.image 97859480 (93.3M)...
View ArticleCheck Point Security R71 75 CCMSE 156-815.71
If you’ve already proven your chops with the CCSA and CCSE certifications, you’re ready to move on to Check Point’s advanced certification for security professionals: The coveted Check Point Certified...
View ArticleCheck Point R80.30 T200 – Gateway, Management, Documentation, Dashboard
R80.30, part of the Check Point Infinity architecture, delivers the most innovative and effective security that keeps our customers protected against large scale, fifth generation cyber threats. The...
View ArticlePenetration Testing of Identity, Authentication and Authorization Mechanism |...
Learn how you can perform web application penetration testing on a website’s Identity Management, Authentication and Authorization mechanism and help organizations view their security posture before a...
View ArticleCisco CCNA / ICND1 (100-105) Complete Course: Sims and GNS3 | Udemy
Welcome to the complete Cisco CCNA and CCENT / ICND1 (100-105) course! This course helps you prepare for the newest CCNA and CCENT 100-105 exam (ICND1). This is your first step towards attaining your...
View ArticleFortinet FortiGate Firewall 4-in-1 Training Bundle Course | Udemy
Welcome to Fortinet Class ! This course represents a bundle training of 4 courses that I have already published on Udemy. I want to make learning as affordable as possible, so I am now making all my...
View ArticleLinux High Availability Clustering | Udemy
This course helps you to understand high availability clustering by providing a strong concept and hands-on experience with Pacemaker and Corosync components of Red Hat / CentOS Enterprise High...
View ArticleCisco Firepower Fundamentals | Pluralsight
Imagine it’s a Friday afternoon and as you are getting ready to leave for the weekend, you discover that an employee within your company has just inadvertently downloaded some malware that is causing...
View ArticleMalware Analysis: Identifying and Defeating Packing | Pluralsight
Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In...
View ArticleTERACOM-VOIP All in One
V1: Fundamentals of Telecommunications Part 1 Fundamentals of Telephony 1.03 The Public Switched Telephone Network (PSTN) 1.05 Analog Circuits 1.07 What is Sound? 1.09 The Voiceband 1.11 Plain Ordinary...
View ArticleASA – A Complete tutorial
This is the complete ASA Solution from different educational tutorials. It is compressed to save the storage. It contents video tutorials of – INE – ITPro.tv – InfiniteSkills – Zero-to-Hero Security...
View ArticlePenetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate...
View Article