Enterprise Automation with Python Packt Publishing

Enterprise Automation with Python | Packt Publishing
English | Size: 319.97 MB
Category: CBTs

In the coming years, Python programming has developed massively in terms of automation. Enterprise automation with Python will teach you how simple python programming can make your life easier by automating your infrastructure.
[Read more…]

Packt Enterprise Automation with Python-RiDWARE

Packt Enterprise Automation with Python-RiDWARE
English | Size: 293.90 MB
Category: CBTs

In the coming years, Python programming has developed massively in terms of automation. Enterprise automation with Python will teach you how simple python programming can make your life easier by automating your infrastructure. [Read more…]

Enterprise Automation with Python | Packt Publishing

Enterprise Automation with Python | Packt Publishing
English | Size: 319.97 MB
Category: CBTs

In the coming years, Python programming has developed massively in terms of automation. Enterprise automation with Python will teach you how simple python programming can make your life easier by automating your infrastructure.
[Read more…]

PS – Building an Enterprise Private Blockchain on Salesforce

PS – Building an Enterprise Private Blockchain on Salesforce
English | Size: 205.59 MB
Category: Tutorial

Private blockchains can have a major role in securing enterprise data while maintaining tight access and privacy controls. In this course, you’ll use specific examples on the Salesforce platform to know about the role of blockchain in the enterprise.
Table of contents
1.Course Overview2m 15s
2.Our Journey Begins3m 16s
3.A Brief Introduction to Blockchain (It’s a Ledger!)4m 16s
4.Distributed Blockchains and Cryptocurrency4m 37s
5.Distributed Blockchains and the Enterprise4m 9s
6.Blockchain Mania4m 20s [Read more…]

SANS 501 Advanced Security Essentials – Enterprise Defender PDFs

SANS 501: Advanced Security Essentials – Enterprise Defender PDFs
English | Size: 82.56 MB
Category: CBTs

SEC501: Advanced Security Essentials – Enterprise Defender builds on a solid foundation of core policies and practices to enable security teams to defend their enterprise. It has been said of security that "prevention is ideal, but detection is a must." However, detection without response has little value. Network security needs to be constantly improved to prevent as many attacks as possible and to swiftly detect and appropriately respond to any breach that does occur.
[Read more…]

Enterprise Agile Growing Scrum

Enterprise Agile: Growing Scrum
English | Size: 461.21 MB
Category: Tutorial

Large-Scale Scrum (LeSS) is an enterprise agile framework that allows you to scale up your agile mindset for use on large, enterprise-level products. In this course-an installment in a larger series on enterprise agile-learn the fundamentals of LeSS, and discover how to leverage this framework to enhance the overall efficiency of your organization’s product delivery. Doug Rose covers key concepts such as LeSS principles and Larman’s Laws and explains how LeSS upsizes key scrum roles to help product owners and scrum masters successfully tackle bigger projects. Plus, he covers how LeSS tackles sprint planning, working in component teams, and team coordination, as well as how to organize a sprint review and overall retrospective. [Read more…]

SANS SEC580 Metasploit Kung Fu for Enterprise Pen Testing (2016)

SANS SEC580: Metasploit Kung Fu for Enterprise Pen Testing (2016)
English | Size: 264.95 MB
Category: CBTs

This class will show students how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests. Students who complete the course will have a firm understanding of how Metasploit can fit into their penetration testing and day-to-day assessment activities. The course will provide an in-depth understanding of the Metasploit Framework far beyond simply showing attendees how to exploit a remote system.
[Read more…]

SEC580 Metasploit Kung Fu for Enterprise Pen Testing (Videos, PDF)

SEC580: Metasploit Kung Fu for Enterprise Pen Testing (Videos, PDF)
English | Size: 778.85 MB
Category: Programming | E-learning | HACKING | Security

Many enterprises today face regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments. Commercial tools and services for performing such tests can be expensive. While really solid free tools such as Metasploit, are available, many testers do not understand the comprehensive feature sets of such tools and how to apply them in a professional-grade testing methodology. Metasploit was designed to help testers with confirming vulnerabilities using an Open Source and easy-to-use framework. This course will help students get the most out of this free tool. [Read more…]

Enterprise IPv6 Technology Training

Enterprise IPv6 Technology Training
English | Size: 393.91 MB
Category: CBTs

Upon completion of this course, you will be able to:
Describe the reason for upgrading IPv4 to IPv6. Describe the IPv6 address structure and IPv6 packet format. Describe the packet types of ICMPv6. Describe the IPv6 neighbor discovery process. Describe the working principle of IPv6 address auto configuration. Describe the working principle of IPv6 PMTU. Describe the working principle of IPv6 DNS
Configure IPv6 address. Configure IPv6 NDP. Configure IPv6 PMTU. Configure IPv6 application
Describe the forwarding mechanism of IPv6 unicast packets. Describe the principle of RIPng
[Read more…]

Packt Publishing – Puppet Techniques for Enterprise Deployments

Packt Publishing – Puppet Techniques for Enterprise Deployments
English | Size: 1.01 GB
Category: Tutorial

A comprehensive guide, filled with quick step-by-step instructions that are immediately applicable to those who have mastered advanced topics in Puppet.

Puppet is a configuration management tool that allows you to automate all your IT configurations, giving you control over what you do to each Puppet Agent in a network, and when and how you do it. In this age of digital delivery and ubiquitous internet presence, it’s becoming increasingly important to implement scalable and portable solutions, not only in terms of software, but also the systems that run it. [Read more…]