INE Wireshark Advanced Technologies-TUTOR

INE Wireshark Advanced Technologies-TUTOR
English | Size: 2.27 GB
Category: CBTS

Wireshark Advanced Technologies

2018-04-02: I N F O: This Wireshark Advanced Technologies course, taught by bestselling author and trainer Robert Shimonski, features nearly 11 hours of training and is designed to provide network administrators with the practical skills needed to solve problems, analyze data, view the inner workings of packets, and perform advanced configurations to solve tough issues. In this course, Rob covers more advanced troubleshooting techniques, how to use Wireshark with Cisco networking equipment, and continues to prep you for the Wireshark Certified Network Analyst (WCNA) certification. Course Duration: 10hrs 48min [Read more…]

iAwake Technologies – The Freedom of Forgiveness

iAwake Technologies – The Freedom of Forgiveness
English | Size: 366.13 MB
Category: Tutorial

Forgiveness is essential for healing, transformation, and authentic happiness. We have all been hurt by others, and we have all hurt others ourselves. With The Freedom of Forgiveness, Dr. Bob Weathers and Douglas Prater have created a powerful new tool and practice to help us experience the freedom of forgiveness.
[Read more…]

iAwake Technologies – Neurohacks

iAwake Technologies – Neurohacks
English | Size: 479.16 MB
Category: Tutorial

This program combines sophisticated brainwave entrainment technology with both deeply invigorating and deeply relaxing brainwave rhythms and biofield signals so you can:

Give yourself a dramatic cognitive edge
Renew your energy as needed
Refresh your brain after demanding study or work sessions
Recover from travel/jet lag
Maintain steady energy during the afternoon
Relax into bliss after a long, hard day
Release negative emotions
Clear your mind for deep sleep
[Read more…]

iAwake Technologies – Call of the Heart

iAwake Technologies – Call of the Heart
English | Size: 265.15 MB
Category: Tutorial

Scandinavian Lullabies with Theta Waves and Biofield Energy to Open and Heal Your Heart
Truly beautiful, new tech-infused music. Scandinavian lullabies sung by a little known but evocative and incredible singer with sparse, haunting, sweet, deep music – embedded with sound technologies designed to support healing, opening, loving, and becoming centered. [Read more…]

INE – Wireshark Advanced Technologies

INE – Wireshark Advanced Technologies
English | Size: 2.27 GB
Category: Cisco | E-learning | Networking | Security | Wireless | others

This Wireshark Advanced Technologies course, taught by bestselling author and trainer Robert Shimonski, features nearly 11 hours of training and is designed to provide network administrators with the practical skills needed to solve problems, analyze data, view the inner workings of packets, and perform advanced configurations to solve tough issues. In this course, Rob covers more advanced troubleshooting techniques, how to use Wireshark with Cisco networking equipment, and continues to prep you for the Wireshark Certified Network Analyst (WCNA) certification. [Read more…]

INE – CCIE Security v5 Technologies GETVPN

INE – CCIE Security v5 Technologies GETVPN
English | Size: 528.35 MB
Category: Cisco | E-learning | Networking | Security

This course is a part of our CCIE Security v5 Technology series. It consists of several modules focused on many different aspects of the Group Encrypted Transport VPN (GETVPN) technology, such as operations, configuration and redundancy. [Read more…]

iAwake Technologies – Eric Thompson – Neurohacks

iAwake Technologies – Eric Thompson – Neurohacks
English | Size: 479.16 MB
Category: Tutorial

Give yourself a dramatic cognitive edge
Renew your energy as needed
Refresh your brain after demanding study or work sessions
Recover from travel/jet lag
Maintain steady energy during the afternoon
Relax into bliss after a long, hard day
Release negative emotions
Clear your mind for deep sleep [Read more…]

iAwake Technologies – Joseph Kao – Sound Asleep

iAwake Technologies – Joseph Kao – Sound Asleep
English | Size: 814.82 MB
Category: Self Growth

A deeply soothing guided meditation with embedded brainwave frequencies for restorative, sound sleep
One of the most effective things you can do to enhance your well-being is to improve the quality of your sleep. A good night’s sleep makes you healthier, happier, and more creative.
With Sound Asleep, hypnotherapist Joseph Kao has created a uniquely effective tool to gently lull you into the very deepest stages of sleep.
[Read more…]

udemy – Docker Technologies for DevOps and Developers

udemy – Docker Technologies for DevOps and Developers
English | Size: 415.90 MB
Category: CBTs

Docker Technologies for DevOps and Developers
Learn how to develop and deploy web applications with Docker technologies. Take your DevOps skills to the next level.
4.5 (4,538 ratings)
25,928 students enrolled
Created by Tao W., Level Up, James Lee
Last updated 12/2017
English [Read more…]

Pluralsight – Technologies and Tools for CompTIA Security+

Pluralsight – Technologies and Tools for CompTIA Security+
English | Size: 436.51 MB
Category: CBTs

IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company’s data secure. In this course, Technologies and Tools for CompTIA Security+, you’ll learn the networking components (hardware and software) required to maintain organizational security. First, you’ll explore the concepts required to troubleshoot and remediate issues. Next, you’ll discover the tools required to properly assess a company’s security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you’ll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company’s assets. By the end of this course, you’ll understand the various technologies and tools required to assess a company’s security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks. [Read more…]