SEC599 Defeating Advanced Adversaries – Implementing Kill Chain Defenses

SEC599: Defeating Advanced Adversaries – Implementing Kill Chain Defenses
English | Size: 3.57 GB
Category: e-books

This Course Will Prepare You To:

Understand how recent high-profile attacks were delivered and how they could have been stopped
Implement security controls throughout the different phases in the APT Attack Cycle to prevent, detect, and respond to attacks. We will define the following stages in the APT Attack Cycle:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Action on objectives
[Read more…]

INE – Implementing vSphere Data Protection Replication

INE – Implementing vSphere Data Protection Replication
English | Size: 395.6 MB
Category: Cloud-Comp | E-learning | Networking | VMware

In this course you will learn about the benefits, the architecture, the requirements and limitations of vSphere Data Protection. We will cover the deployment and configuration of vSphere Data Protection. This is followed by demonstration of the creation of backup jobs, backup data replication and application backup configurations. You will then learn about restoring virtual machines, performing File Level Restore and how to perform vSphere Data Protection Emergency Restore. Next, youíll learn about the benefits and the architecture of vSphere Replication. We will also cover the deployment and configuration of the vSphere Replication Appliance, as well as the setting of a Disaster Recovery site to act as a vSphere Replication target. Finally, you will learn how to configure replications and how to recover virtual machines. [Read more…]

INE – Implementing vSphere Data Protection Replication

INE – Implementing vSphere Data Protection Replication
English | Size: 395.6 MB
Category: Cloud-Comp | E-learning | Networking | VMware

In this course you will learn about the benefits, the architecture, the requirements and limitations of vSphere Data Protection. We will cover the deployment and configuration of vSphere Data Protection. This is followed by demonstration of the creation of backup jobs, backup data replication and application backup configurations. You will then learn about restoring virtual machines, performing File Level Restore and how to perform vSphere Data Protection Emergency Restore. Next, youíll learn about the benefits and the architecture of vSphere Replication. We will also cover the deployment and configuration of the vSphere Replication Appliance, as well as the setting of a Disaster Recovery site to act as a vSphere Replication target. Finally, you will learn how to configure replications and how to recover virtual machines. [Read more…]

Implementing Cisco Unified Computing Systems

Implementing Cisco Unified Computing Systems
English | Size: 3.21 GB
Category: Cisco | E-learning | Networking

Cisco UCS are servers optimized for virtualization, giving companies the capability to provide high availability, support for Fibre Channel or iSCSI and fast provisioning. Experienced instructor, Desiree Lindfield, guides you through a step-by-step configuration of Resource Pools, Service Profiles, and how to set up common administrative tasks such as Backups.
[Read more…]

CBT – 70-533 Implementing Microsoft Azure Infrastructure Solutions with ARM Updates (Jan 2018)

CBT – 70-533 Implementing Microsoft Azure Infrastructure Solutions with ARM Updates (Jan 2018)
English | Size: 804.76 MB
Category: CBTs

In this Microsoft Azure course, trainer Ben Finkel will prepare you to implement enterprise-grade application architecture on the Microsoft Azure Platform.

Throughout this course, you will cover various solutions and concepts, such as Azure Resource Manager, App Service apps, Active Directory, and storage solutions. This course will also prepare you for Microsoft’s 70-533 exam. [Read more…]

Pluralsight – Planning and Implementing DirectAccess with Windows Server 2016 by Richard Hicks

Pluralsight – Planning and Implementing DirectAccess with Windows Server 2016 by Richard Hicks
English | Size: 330.9 MB
Category: Tutorial

With today’s highly mobile workplace, providing secure remote access for workers is crucial to supporting the highest levels of productivity in the organization. In addition, administrators are seeking better ways to more effectively manage the field-based assets. DirectAccess, with its seamless and transparent always-on remote connectivity, can help you meet both of these requirements. In this course, Planning and Implementing DirectAccess with Windows Server 2016, you will learn how to plan and implement DirectAccess with Windows Server 2016. First, you will choose the best networking topology for DirectAccess. [Read more…]

Pluralsight – Implementing Windows Server 2016 Distributed Networking Services by Peter Grant

Pluralsight – Implementing Windows Server 2016 Distributed Networking Services by Peter Grant
English | Size: 497.64 MB
Category: Tutorial

Many organizations have distributed data across multiple sites and all users expect quick data access no matter where they reside. In this course, Implementing Windows Server 2016 Distributed Networking Services, you’ll learn about the two core distributed data technologies built into Windows Server and how each can be used to address different use cases. You’ll start by learning DFS and DFS Replication and then you’ll look at BranchCache and how and when that should be used as an alternative solution. At the end of this course, you’ll be able to describe each of the technologies, which problems they solve, and how to implement and troubleshoot them. [Read more…]

Implementing Azure Functions

Implementing Azure Functions
English | Size: 1.85 GB
Category: Tutorial

Students will learn how to implement Microsoft Azure Functions. Students will also learn about how they work, when to use them, and why they are useful in modern cloud application development. Lecture presentations, demonstrations, and lab exercises will help the student to become proficient in developing serverless code solutions that scale efficiently using Microsoft Azure Functions. [Read more…]

SANS SEC566 Implementing and Auditing the Critical Security Controls In-Depth (PDF 2016)

SANS SEC566 Implementing and Auditing the Critical Security Controls In-Depth (PDF 2016)
English | Size: 165.79 MB
Category: E-learning | Networking | Security

Cybersecurity attacks are increasing and evolving so rapidly that it is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches? This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS).
[Read more…]

SANS SEC566 Implementing and Auditing the Critical Security Controls – In-Depth (2016)

SANS SEC566: Implementing and Auditing the Critical Security Controls – In-Depth (2016)
English | Size: 165.79 MB
Category: Tutorial

SANS’ in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats. [Read more…]