CISSP Cert Prep: 4 Communication and Network Security

CISSP Cert Prep: 4 Communication and Network Security
English | Size: 447.4 MB
Category: Video Training


The Certified Information System Security Professional (CISSP) certification is the industry’s gold standard in information security. CISSP certification is an important component of any security professional’s resume, and is a requirement for many top jobs. In this course, prepare for the fourth domain of the exam: Communication and Network Security.
[Read more…]

Linux: Desktops and Remote Access

Linux: Desktops and Remote Access
English | Size: 259.0 MB
Category: Video Training


Find the most productive way to work in Linux. Linux: Desktops and Remote Access covers the most popular desktop environments, terminal emulators, and shells used to access and administer Linux systems, both locally and remotely. Instructor Grant McWilliams reviews GUI options such as KDE, GNOME, MATE, Cinnamon, and Xfce, as well as remote access tools like VNC, RDP, and X2Go. Then explore the advantages and disadvantages of command-line access and the productivity features in Bash, and learn how to create secure remote connections to the Linux CLI on Windows, macOS, iOS, and Android devices. All the tools and techniques are demonstrated using CentOS 7, but the lessons apply to any Linux distribution.
[Read more…]

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier
English | Size: 440.8 MB
Category: Video Training


Are your Windows apps underperforming? Application threads often wait too long on synchronization objects (locks), which results in processor cores being underutilized. Discover how to use the Locks and Waits analysis in Intel’s VTune Amplifier to identify and remove deadlocks: one of the most common reasons for inefficient parallel execution within a Windows application. Follow along with instructor Thomas Pantels as he demos the analysis tool and shows where to locate and enhance source code to remove deadlocks.
[Read more…]

Windows Performance Tools: Memory Leak Analysis with Intel Inspector

Windows Performance Tools: Memory Leak Analysis with Intel Inspector
English | Size: 3.8 GB
Category: Video Training


Memory leaks are a common cause of unexpected crashes in Windows applications. It’s important to detect them before your apps go live. Luckily, there is a tool to help. Intel Inspector XE is a memory and threading debugger that can be used to detect memory leaks in C, C++, and Fortran applications running on Windows. Learn to use the Intel Inspector to easily find and repair memory leaks in any of your own Windows applications, with this installment of Windows Performance Tools. Thomas Pantels shows how to profile a C++ application, detect memory issues with Inspector XE, and pinpoint memory leaks in an OpenCV demo app. By the end of this course, you will be able to use the Intel Inspector to easily find memory-related issues like memory leaks in any of your own applications. [Read more…]

Windows Performance Tools: Thread Analysis with Intel VTune Amplifier

Windows Performance Tools: Thread Analysis with Intel VTune Amplifier
English | Size: 835.5 MB
Category: Video Training


Multithreaded apps can perform better than single-threaded apps, but the performance improvements come with increased code complexity and overhead. By comparing and analyzing different versions of your apps with VTune Amplifier, you can decide whether this trade-off is worth it. In this course, Thomas Pantels shows how to visualize and analyze two versions of a demo C++ application that simulates house-building tasks. The first version is single threaded; the second is multithreaded. By the end of this course, you will know how to install and configure Intel’s VTune Amplifier. You will walk away knowing how to use the tool to analyze and compare both single-threaded and multithreaded Windows applications and understand the results. [Read more…]

VMware vSphere: Configure Advanced High Availability Features

VMware vSphere: Configure Advanced High Availability Features
English | Size: 243.7 MB
Category: Video Training


Being able to keep a vSphere virtual environment running is critical. vSphere’s High Availability utility allows for high uptime and rapid recovery of failed hosts. This course provides an overview of what it takes to configure advanced vSphere High Availability features to keep your virtual network up and running. Join Russell Long as he explains the basics of clusters and the causes of cluster failures, and explains how to configure HA clusters to perform their best. Find out how to use heartbeats to monitor hosts and how to define failover capacities with admission control. Plus, learn HA best practices for networking, interoperability, and cluster monitoring.
[Read more…]

Ethical Hacking: Website and Web Application Testing

Ethical Hacking: Website and Web Application Testing
English | Size: 262.0 MB
Category: Video Training


Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application (focusing on the most vulnerable components), and introduces the Open Web Application Security Project (OWASP), which provides documentation, tools, and forums for web developers and testers. Malcolm also provides an overview of popular testing tools, including Burp Suite, Vega, and WebScarab. Learn how to use these utilities to run basic and advanced tests, and shore up sites against common attacks, such as SQL injections and cross-site scripting exploits. The course closes with some resources for practicing your skills, including testing sites such as Trustwave CrackMe Bank and Google Gruyere.
[Read more…]

Pluralsight – USB Forensics Fundamentals

Pluralsight – USB Forensics Fundamentals
English | Size: 326.44 MB
Category: CBTs

This course is the first in a series to cover USB in depth. Throughout the series, emphasis will be placed on USB mass storage devices which are nearly always a part of forensic investigations. USB Human Interface Devices (HID) will also be discussed as they are used in a number of attacks. This course covers the fundamentals of how USB devices interact with hosts. The course should be valuable not only to forensics and information security professionals, but to anyone wanting a deeper understanding of how USB works under the covers. [Read more…]

Pluralsight – Performing OSINT Gathering on Corporate Targets

Pluralsight – Performing OSINT Gathering on Corporate Targets
English | Size: 804.10 MB
Category: CBTs

Open Source Intelligence (OSINT) gathering is a critical component of penetration testing. This course will teach you how to gather various forms of corporate OSINT, including physical, logical, org chart, electronic, infrastructure, and financial.
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets, you’ll learn foundational knowledge of gathering various forms of corporate OSINT as part of a penetration test. First, you’ll explore tools and techniques for collecting OSINT. [Read more…]

RouteHub – SRX Training

RouteHub – SRX Training
English | Size: 4.11 GB
Category: Video Training


Do you want to learn how to block certain applications like BitTorrent, Skype, to FTP? Do you want to learn how to block certain files uploaded towards the Internet? Do you want to block inappropriate websites to viruses? Do you want to setup remote access for users to access the network remotely? In this video series you will learn how to do many of these things and much more.
[Read more…]