AWS MasterClass Monitoring and DevOps with AWS CloudWatch

AWS MasterClass Monitoring and DevOps with AWS CloudWatch
English | Size: 4.02 GB
Category: CBTs

What Will I Learn?
Learn how you can keep a close eye on AWS infrastructure you have using AWS CloudWatch
You will have everything you need to master on various alerting and monitoring services available from AWS
You will know about various AWS CloudWatch monitoring services such as EC2, RDS, EBS, ELB and you will be able to use them
Know about how you can use AWS SNS to send notifications
You will have a deep understanding about how to monitor your AWS billing and costs [Read more…]

Cisco AnyConnect Secure Mobility Client v4.x

Cisco AnyConnect Secure Mobility Client v4.x
English | Size: 201.27 MB
Category: Cisco | Networking

1-4.6.00362 ( the latest )
2-4.5.04029
3-4.5.03040
4-4.5.02036
5-4.5.02033
6-4.5.01044 [Read more…]

Udemy – Taming Big Data with Apache Spark and Python – Hands On (Feb-2018)

Udemy – Taming Big Data with Apache Spark and Python – Hands On (Feb-2018)
English | Size: 1.42 GB
Category: Tutorial

Created by Sundog Education by Frank Kane, Frank Kane
Last updated 2/2018
English
What Will I Learn?
Frame big data analysis problems as Spark problems
Use Amazon’s Elastic MapReduce service to run your job on a cluster with Hadoop YARN
Install and run Apache Spark on a desktop computer or on a cluster
Use Spark’s Resilient Distributed Datasets to process and analyze large data sets across many CPU’s
Implement iterative algorithms such as breadth-first-search using Spark
Use the MLLib machine learning library to answer common data mining questions
Understand how Spark SQL lets you work with structured data
Understand how Spark Streaming lets your process continuous streams of data in real time
Tune and troubleshoot large jobs running on a cluster
Share information between nodes on a Spark cluster using broadcast variables and accumulators
Understand how the GraphX library helps with network analysis problems
Requirements [Read more…]

Udemy – Python for network engineers netmiko napalm pyntc telnet ssh

Udemy – Python for network engineers netmiko napalm pyntc telnet ssh
English | Size: 2.12 GB
Category: CBTS

Learn Network Programmability and Network Automation using GNS3 and Python.

Want to program networks using Python, but not sure where to start? Well, this course will show you how you can start programming Cisco networks within 20 minutes.

This course was created for network engineers. There are too many other Python courses out there that try to make network engineers software developers. Instead of teaching network automation, they teach you Python theory. This course is different. [Read more…]

Udemy – Network Hacking Continued – Intermediate to Advanced (Jan-2018)

Udemy – Network Hacking Continued – Intermediate to Advanced (Jan-2018)
English | Size: 1.47 GB
Category: Tutorial

Learn advanced techniques to hack into WiFi & wired networks & write own python scripts to implement custom MITM attacks
Created by Zaid Sabih, z Security
Last updated 1/2018
English
English [Auto-generated]
What Will I Learn?
50 detailed videos about practical attacks against Wi-Fi networks
A number of MORE ADVANCED practical attacks
Disconnect multiple/all clients from their networks without knowing the key
Bypass MAC filtering (both black and white lists).
Discover names of hidden networks and connect to them
Crack more secure WEP implementation when SKA is used.
[Read more…]

Udemy – A Beginner’s Guide To Machine Learning with Unity (Complete)

Udemy – A Beginner’s Guide To Machine Learning with Unity (Complete)
English | Size: 2.1GB
Category: Tutorial

What if you could build a character that could learn while it played? Think about the types of game play you could develop where the enemies started to outsmart the player. This is what machine learning in games is all about. In this course we will discover the fascinating world of artificial intelligence beyond the simple stuff and examine the increasingly popular domain of machines that learn to think for themselves.
[Read more…]

Pluralsight Your First Day with PowerShell

Pluralsight Your First Day with PowerShell.
English | Size: 370.08 MB
Category: CBTs

You’ve decided to take the leap and begin learning PowerShell, but you don’t know where to begin or what to do first. In this course, Your First Day with PowerShell, you’ll learn the fundamental knowledge of Powershell and how to utilize the program efficiently. First, you’ll explore the critical skill of how to use the Powershell help system. Next, you’ll discover how to use commands and be introduced to aliases, cmdlets, providers, and psdrives. Finally, you’ll learn how to configure, navigate, and get the most out of the different PowerShell consoles. By the end of this course, you’ll develop an understanding of the fundamental knowledge to efficiently utilize Powershell. [Read more…]

Udemy – Network and Vulnerability Scanning By Using Nmap Nessus

Udemy – Network and Vulnerability Scanning By Using Nmap Nessus
English | Size: 315.17 MB
Category: Network

Welcome to the "Network and Vulnerability Scanning by using Nmap & Nessus" course. This course is our 3rd course in our Ethical Hacking series.

I wanted to use “Hacking Essentials” in front of the name of the course, but size limit didn’t allow it.

Why “hacking essentials”?
[Read more…]

SANS SEC505 Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos

SANS SEC505: Securing Windows with PowerShell and the critical security controls 2017 On-demand Videos
English | Size: 3.87 GB
Category: Tutorial

Hackers know how to use PowerShell for evil. Do you know how to use it for good? In SEC505 you will learn how to use PowerShell to automate Windows security management across an Active Directory enterprise and in the cloud. Don’t just learn PowerShell syntax, learn how to leverage PowerShell as a platform for security. [Read more…]

SANS FOR572: Advanced Network Forensics and Analysis [2017 PDF]

SANS FOR572: Advanced Network Forensics and Analysis [2017 PDF]
English | Size: 475.96 MB
Category: Networking | Security

FOR572: ADVANCED NETWORK FORENSICS: THREAT HUNTING, ANALYSIS AND INCIDENT RESPONSE was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. We focus on the knowledge necessary to expand the forensic mindset from residual data on the storage media from a system or device to the transient communications that occurred in the past or continue to occur. Even if the most skilled remote attacker compromised a system with an undetectable exploit, the system still has to communicate over the network. Without command-and-control and data extraction channels, the value of a compromised computer system drops to almost zero. Put another way: Bad guys are talking – we’ll teach you to listen. [Read more…]