Juniper Networks vSRX3.0 (18.4R1)

Juniper Networks vSRX3.0 (18.4R1) 1902082111590088

Juniper Networks vSRX3.0 (18.4R1)
English | Size: 698.38 MB
Category: Tutorial

Juniper Networks vSRX3.0 (18.4R1) – Virtual Firewall.
This is the newest vSRX (Codename vSRX3.0) KVM Image. Brand new WebUI (similar to JunOS Space)
Can be used for GNS, EVE-NG or UNL
Enjoy! [Read more…]

JUNIPER Introduction to Juniper Networks – JNCIA

JUNIPER Introduction to Juniper Networks – JNCIA 1901032213220114

JUNIPER: Introduction to Juniper Networks – JNCIA
English | Size: 6.8 GB
Category: Tutorial

Juniper
-Introduction to Juniper Networks
-JNCIA
[Read more…]

CISCO PRESS WIRELESS NETWORKS IOT AND MOBILE DEVICES HACKING THE ART OF HACKING SERIES

CISCO PRESS WIRELESS NETWORKS IOT AND MOBILE DEVICES HACKING THE ART OF HACKING SERIES 1812151351430106

CISCO PRESS WIRELESS NETWORKS IOT AND MOBILE DEVICES HACKING THE ART OF HACKING SERIES
English | Size: 5.46 GB
Category: Tutorial

Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables [Read more…]

How to Hack WiFi Networks for Beginners

How to Hack WiFi Networks for Beginners 1812021420370124

How to Hack WiFi Networks for Beginners
English | Size: 120.26 MB
Category: CBTs

This course is all about WiFi and the security of wireless networks. You will study the different threats, weaknesses and attack methods.

No special skills are required as the course covers everything from the very basics including the installation of Kali Linux.
[Read more…]

Apress Ethical Hacking Networks and Websites-RiDWAR

Apress Ethical Hacking Networks and Websites-RiDWAR 1811302253480115

Apress Ethical Hacking Networks and Websites-RiDWAR
English | Size: 298.39 MB
Category: Tutorial

Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities [Read more…]

F5-Networks-Administering-BIG-IP-v12 F5-NetAdmin-v12

F5-Networks-Administering-BIG-IP-v12 F5-NetAdmin-v12 1809062135490093

F5-Networks-Administering-BIG-IP-v12 F5-NetAdmin-v12
English | Size: 180.04 MB /
Category: Networking | Security

F5 Networks Administering BIG-IP V12 (F5-NetAdmin-V12)
This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
Course Objectives
Describe the role of the BIG-IP system as a full proxy device in an application delivery network
Set up, start/restart/stop, license, and provision the BIG-IP system out-of-the-box
Create a basic network configuration on the BIG-IP system including VLANs and self IPs [Read more…]

Udemy – Computer Networks for Beginners

Udemy – Computer Networks for Beginners 1807101510290083

Udemy – Computer Networks for Beginners
English | Size: 157.06 MB
Category: Tutorial

Computer networks are growing trend. You can find them at your home, school, work, and most of the places you go on daily basis.

Learn the basic concepts of computer networks, which hardware to use to set it up, and how to secure it.

Become aware of networks surrounding you
When you start noticing networks around you, you will also understand big part of the IT world. You will learn how the Internet works, how your Internet Service Provider (ISP) allows you to connect online, how do people share data without the Internet access, and much more. Everything starts by becoming aware of computer networks. [Read more…]

INE Ethical Hacking Module 3 Scanning Networks Josue Vargas

INE  Ethical Hacking Module 3  Scanning Networks  Josue Vargas e7usi94

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas
English | Size: 485.86 MB
Category: CBTs

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. In this course you will become prepared to handle this portion of the CEH exam.
[Read more…]

LiveLessons – Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series)

LiveLessons – Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series) s

LiveLessons – Wireless Networks, IoT and Mobile Devices Hacking (The Art of Hacking Series)
English | Size: 1.69 GB
Category: CBTs

Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. [Read more…]

CS231n Convolutional Neural Networks (Deep Learning)

CS231n Convolutional Neural Networks (Deep Learning) s

CS231n: Convolutional Neural Networks (Deep Learning)
English | Size: 4.75 GB
Category: tUTORIAL

Computer Vision has become ubiquitous in our society, with applications in search, image understanding, apps, mapping, medicine, drones, and self-driving cars. Core to many of these applications are visual recognition tasks such as image classification, localization and detection. Recent developments in neural network (aka “deep learning”) approaches have greatly advanced the performance of these state-of-the-art visual recognition systems. This course is a deep dive into details of the deep learning architectures with a focus on learning end-to-end models for these tasks, particularly image classification. During the 10-week course, students will learn to implement, train and debug their own neural networks and gain a detailed understanding of cutting-edge research in computer vision. The final assignment will involve training a multi-million parameter convolutional neural network and applying it on the largest image classification dataset (ImageNet). We will focus on teaching how to set up the problem of image recognition, the learning algorithms (e.g. backpropagation), practical engineering tricks for training and fine-tuning the networks and guide the students through hands-on assignments and a final course project. Much of the background and materials of this course will be drawn from the ImageNet Challenge. [Read more…]

Skip to toolbar