Pluralsight – Getting Started with AWS Developer Tools

Pluralsight – Getting Started with AWS Developer Tools
English | Size: 207.93 MB
Category: Tutorial

At the core of a strong development environment are powerful tools backed by the smarts to use them. In this course, Getting Started with AWS Developer Tools, you’ll learn how to use Amazon Web Services’ (AWS) cutting edge developer tools to help you succeed in the growing cloud industry. First, you’ll explore how to store and manage your CodeCommit. Next, you’ll discover how to build and package your code with CodeBuild, and deploy your code with CodeDeploy. Finally, you’ll connect all these different tools with CodePipelines to create a seamless Continuous Delivery Pipeline. When you’re finished with this course, you’ll have a foundational knowledge of AWS Developer Tools that will help you as you move forward in your cloud development environment. Software required: Git. [Read more…]

Pluralsight – Wireless Network Penetration Testing Advanced Techniques

Pluralsight – Wireless Network Penetration Testing Advanced Techniques
English | Size: 153.54 MB
Category: Tutorial

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you’ll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you’ll delve into rogue access points and fake captive portals.
[Read more…]

Pentester Academy WiFi Security and Testing

Pentester Academy_WiFi Security and Testing
English | Size: 3.27 GB
Category: E-learning | HACKING

This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:

Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs
Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise, Understanding encryption based flaws (WEP,TKIP,CCMP)
Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM, Wi-Fi Protected Setup
Advanced Enterprise Attacks – 802.1x, EAP, LEAP, PEAP, EAP-TTLS [Read more…]

[Packt] Networking and Security Best Practices on AWS

[Packt] Networking and Security Best Practices on AWS
English | Size: 330.49 MB
Category: Tutorial

Build secure web facing applications by learning the fundamental technologies required to secure your applications from the beginning of the architecture/development process
About This Video
Get hands-on with IAM
Build your own custom VPC
Integrate the VPC with On-Premise Networks

In Detail

This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring.

Pluralsight (Avril Salter) – Using Wireshark to Analyze and Troubleshoot Wi-Fi Networks

Pluralsight (Avril Salter) – Using Wireshark to Analyze and Troubleshoot Wi-Fi Networks
English | Size: 697.53 MB
Category: Comp: Network/Hardware

Are you responsible for designing, implementing or managing a Wi-Fi network? Or simply want to understand how Wi-Fi works? In this course, Using Wireshark to Analyze and Troubleshoot Wi-Fi Networks, you’ll learn how to capture, analyze, and troubleshoot Wi-Fi networks in Wireshark. First, you’ll learn how to capture Wi-Fi traffic over-the-air, including how to select the best hardware, and how to configure that hardware in your preferred OS environment. Next, you’ll explore how Wi-Fi isthe only protocol where Wireshark provides physical layer information utilizing the de facto Radiotap standard [Read more…]

Packt Publishing – Networking and Security Best Practices on AWS

Packt Publishing – Networking and Security Best Practices on AWS
English | Size: 330.11 MB
Category: Tutorial

Build secure web facing applications by learning the fundamental technologies required to secure your applications from the beginning of the architecture/development process.

This course will show you how to get started with the fundamental technologies required to secure your applications from the beginning of the architecture/development process: Identity Access Management (IAM) and Virtual Private Clouds (VPCs). Combined, these two technologies give you the essential capability you will need to create a secure and isolated virtual datacenter in the cloud, complete with fine-grained user access controls and activity monitoring. [Read more…]

INE- GNS3 Course

INE- GNS3 Course
English | Size: 2.46 GB
Category: Tutorial

This course is designed for learners who already have experience using GNS3 as well as at least a rudimentary understanding of SolarWinds NPM installation and usage. SolarWinds Network Performance Monitor (NPM) has always been a necessary tool to include in your network-monitoring-toolbelt, but have you ever considered how it could be paired with GNS3? For those with GNS3 experience, pairing GNS3 along with a virtual-machine running SolarWinds NPM can be one of the best ways to familiarize yourself with all of the features of this product, without impacting live, production networks. This course begins with a basic overview of NPM hardware and software requirements, so you can get a single machine up-and-running that will host both your GNS3 simulated topology, as well as a virtual-machine running NPM. We then progess on to explaining details and requirements for creating your VM, and how to correctly associate this VM within GNS3 so they can recognize and communicate to each other. You’ll learn how to configure NPM to dynamically discover all of the devices within your GNS3 topology as well as any physical lab devices you may have. Finally, you’ll learn about an exciting, new feature of NPM version 12.0 called NetPath services. You’ll see how you can play with this feature within the safe confines of your GNS3 environment, as well as deep-dives into how NetPath services actually accomplishes its task using Wireshark packet captures. [Read more…]

End-to-End Quality of Service Network Design LiveLessons (Video Training) QoS for Rich-Media and Cloud Networks

End-to-End Quality of Service Network Design LiveLessons (Video Training): QoS for Rich-Media and Cloud Networks
English | Size: 1.19 GB
Category: CBTS

This course will mirror the author’s recently released book, End-to-End QoS Network Design, exploring various QoS designs for new applications and technologies, industry standards and platforms (with more than 10 different Cisco product families being represented throughout). Tim Szigeti will supply design recommendations and enable the viewer to confidently and successfully design and deploy QoS across their Cisco networks. [Read more…]

INE – CCIE Data Center v2 Advanced Technologies – Application Centric Infrastructure (ACI) Part 2 – Application Centric Mod…

INE – CCIE Data Center v2 Advanced Technologies – Application Centric Infrastructure (ACI) Part 2 – Application Centric Mode
English | Size: 2.05 GB
Category: CBTs

CCIE Data Center v2 Advanced Technologies
The completed series will cover all of the fundamental topics you’ll need to know, as well as the technologies, hardware platforms, and software features that have been newly introduced in the v2 blueprint, including the new 60 minute Diagnostic module, which is used to assess skills needed to successfully diagnose network related problems. [Read more…]

INE – CCIE Data Center v2 Advanced Technologies – Application Centric Infrastructure (ACI) Part 1 – Network Centric Mode

INE – CCIE Data Center v2 Advanced Technologies – Application Centric Infrastructure (ACI) Part 1 – Network Centric Mode
English | Size: 7.5 GB
Category: CBTs

CCIE Data Center v2 Advanced Technologies
The completed series will cover all of the fundamental topics you’ll need to know, as well as the technologies, hardware platforms, and software features that have been newly introduced in the v2 blueprint, including the new 60 minute Diagnostic module, which is used to assess skills needed to successfully diagnose network related problems.
[Read more…]