Windows Server 2012 R2 (70-410) Core Network Services

Windows Server 2012 R2 (70-410) Core Network Services
English | Size: 405.43 MB
Category: Tutorial

In this course, you’ll learn how to configure IP address options, IPv4 and IPv6 subnetting, interoperability between IPv4 and IPv6, intra-site automatic addressing protocol, and teredo. You will learn to deploy and configure DHCP, DHCP scopes, DHCP reservations, DHCP options, client and server PXE boot options, DHCP relay agent, and authorize a DHCP server.
[Read more…]

Implementing Cisco Network Security (IINS) v3.0

Implementing Cisco Network Security (IINS) v3.0
English | Size: 1.43 GB
Category: Tutorial

Cisco E-Learning IINS v3.0 is an all-inclusive e-learning solution designed to prepare CCNA Security candidates for the exam topics covered by the 210-260 IINS exam.
This course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a "real-life" network infrastructure. It focuses on security principles and technologies, using Cisco security products to provide hands-on examples.
[Read more…]

Packt Publishing – CompTIA Network+ Certification N10-006

Packt Publishing – CompTIA Network+ Certification N10-006
English | Size: 11.42 GB
Category: Tutorial

This course is over 15 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-006) Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.
[Read more…]

Packt Publishing – Basic and Low-level Python Network Attacks

Packt Publishing – Basic and Low-level Python Network Attacks
English | Size: 1.02 GB
Category: Tutorial

A penetration tester who only knows how to use tools written by others is limited to old techniques. Knowledge of a programming language will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.This course will commence by showing you how to get the Target and Attacker virtual machines running and properly networked together. You will learn how to connect to a server, and how to automate login requests. This will let you break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays.
[Read more…]

Sans – SEC560 Network Penetration Testing and Ethical Hacking

Sans – SEC560 Network Penetration Testing and Ethical Hacking
English | Size:
Category:

Section 0 – Getting started with your OnDemand SANS series
0.1 Welcome to your Sans OnDemand course
0.2 Introduction to Lab exercises
Section 1 – Comprehensive pen testing planning, scoping and reconnaissance
1.1 Pen testing foundations
1.2 Pen testing process
1.3 Reconnaissance
1.4 Appendix intro to Linux
[Read more…]

32C3 – Running Your own GSM Network and Beyond (3G3.5G) [2 MP4, 2 AUDIO RECORDINGS]

32C3 – Running Your own GSM Network and Beyond (3G/3.5G) [2 MP4, 2 AUDIO RECORDINGS]
English | Size: 685.41 MB
Category: Tutorial

This presentation will mark the first public release of a new GPL licensed Free Software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR. It will introduce the respective standards and protocols, as well as a short demonstration of an actual phone call between two mobile phones registered to the base station. The second part continues with more complex networks such as 3G/3.5G. [Read more…]

INE – Linux Fundamentals for Network Engineers (2015)

INE – Linux Fundamentals for Network Engineers (2015)
English | Size: 4.86 GB
Category: Comp: Software Training

This course is designed specifically to introduce both new and experienced professional network engineers to the Linux operating system and environment. The course begins with a comprehensive overview of Linux and quickly dives into the fundamentals of the CLI with real-world examples that demonstrate critical Linux concepts like the Bash shell interactive user interface, utilities, and the hierarchical Linux file system structure. With that solid foundation established, we progress to system and file security, user interface customization with the Bash shell, file editing, and system and network administration tasks, and take a brief look at the power of Bash shell scripting and how it can be leveraged from a network administrator perspective. This course will fully prepare attendees to continue on to the Shell scripting Fundamentals for Network Engineers course. [Read more…]

Ansible for network engineers

Ansible for network engineers
English | Size: 600.4 MB
Category: CBTs

In this webinar/online course you’ll learn the basics of Ansible, YAML and Jinja2, the pesky details that trip Ansible beginners, and how to use Ansible to automate your network. while solving numerous hands-on challenges on your way to becoming an Ansible expert. [Read more…]

Pluralsight – Enterprise WAN Network Design for Cisco CCDP ARCH (300-320)

Pluralsight – Enterprise WAN Network Design for Cisco CCDP ARCH (300-320)
English | Size: 124.13 MB
Category: Tutorial

Enterprise wide area networks (WAN) are essential for connecting different networks together. In this course, Enterprise WAN Network Design for Cisco CCDP ARCH (300-320), the third course of the Cisco CCDP ARCH (300-320) path, you’ll learn the necessary knowledge to design enterprise wide area networks, and prepare for the CCDP exam. First, you’ll cover WAN connectivity design aspects, such as private lines and virtual private network solutions.
[Read more…]

Pluralsight – Wireless Network Penetration Testing Advanced Techniques

Pluralsight – Wireless Network Penetration Testing Advanced Techniques
English | Size: 153.54 MB
Category: Tutorial

As attackers shift their techniques to attack not only technology but people, it is imperative that you are as vigilant as ever. In this course, Wireless Network Penetration Testing Advanced Techniques, you’ll focus on red teaming attacks so that you can identify the weaknesses in your own wireless networks and stop a potential compromise from ever occurring. First, you’ll delve into rogue access points and fake captive portals.
[Read more…]