Search This Blog

Showing posts with label Certification Exam. Show all posts
Showing posts with label Certification Exam. Show all posts

Friday, February 8, 2019

AWS Certified Developer - Associate 2018 Exam 14 Hours Video Course DVD



Duration : 14:38 Hours

Course content
Introduction
Introduction To The Certified Developer - Associate Course
Information For Students Who Have Completed The Solutions Architect Course
Exam Blue Print
The Free Alexa Skill For Amazon Echo
Beginners Guide To IAM
IAM 101
IAM Lab
IAM Summary
AWS This Week
Beginners Guide to EC2
EC2 101
EC2 Lab
Using Putty For SSH (Windows Users Only)
Elastic Load Balancer
Route53 Lab
CLI Demo
EC2 with S3 Role Lab
RDS 101 
RDS Lab
RDS Multi-AZ & Read Replicas
Elasticache 101 
Summary
S3
S3 101
S3 Security
S3 Policies
S3 Encryption
Setup Encryption On An S3 Bucket
CORS Configuration Lab
CloudFront
CloudFront Lab
S3 Performance Optimization
S3 Performance Update
S3 Summary
Introduction to Serverless Computing
Serverless 101
Lambda
API Gateway
Build a Simple Serverless Website with Route 53, API Gateway, Lambda and S3
Version Control With Lambda
Using Polly to Help Your Exam Lab - Part 1
Using Polly to Help Your Exam Lab - Part 2
Make an Alexa Skill Lab
Step Functions
13:14
Advanced API Gateway
Guru Of The Week
Serverless Summary
Introduction to Serverless Computing
Learn More About Serverless
DynamoDB
Introduction to DynamoDB
Creating a DynamoDB Table Lab
Indexes Deepdive
Scan vs Query API Call
DynamoDB Provisioned Throughput
DynamoDB On Demand Capacity
DynamoDB Accelerator (DAX)
Elasticache
DynamoDB Transactions
DynamoDB TTL
DynamoDB Streams
Provisioned Throughput Exceeded & Exponential Backoff
DynamoDB Summary
DynamoDB
KMS & Encryption on AWS
KMS 101
KMS API Calls
KMS Envelope Encryption
KMS Exam Tips
Other AWS Services
SQS
Simple Notification Service
Mobile App
SES vs SNS
ElasticBeanstalk 101
Deploying Applications Using ElasticBeanstalk
Updating ElasticBeanstalk
Advanced ElasticBeanstalk
RDS & ElasticBeanstalk
Kinesis 101
Kinesis Lab
Maker Labs
Other AWS Services Summary
Developer Theory
What Is CI/CD
CodeCommit 101
CodeCommit Lab
CodeDeploy 101
CodeDeploy Lab
CodePipeline 101
CodePipeline Lab
Advanced CodeDeploy the AppSpec File
Docker and CodeBuild Lab Part 1
Docker and CodeBuild Lab Part 2
CloudFormation
CloudFormation Lab
Serverless Application Model (SAM)
CloudFormation & SAM Lab
CloudFormation Nested Stacks
Developer Theory Summary
Advanced IAM
Web Identity Federation
Cognito User Pools
Cognito Lab
Inline Policies vs Managed Policies vs Custom Policies
Advanced IAM Summary
Advanced IAM
Monitoring
Introduction To CloudWatch
CloudWatch Lab
CloudWatch Vs CloudTrail
The End!!
What to expect? 

Buy This Course DVD Now @







                                   







Certified Digital Forensics Examiner - CDFE Exam Video Training Course on 2 DVDs




Duration : 6.40 hours

16 Modules

30 Video Lessons 



Module 01 – Introduction 

Module 02 – Computer Forensic Incidents 

Module 03 – Investigation Process 

Module 04 – Disk Storage Concepts

Module 05 – Digital Acquisition & Analysis 

Module 06 – Forensic Examination Protocols 

Module 07 – Digital Evidence Protocols

Module 08 – CFI Theory 

Module 09 – Digital Evidence Presentation 

Module 10 – Computer Forensic Laboratory Protocols 

Module 11 – Computer Forensic Processing 

Module 12 – Digital Forensics Reporting

Module 13 – Specialized Artifact Recovery

Module 14 – e-Discovery and ESI 

Module 15 – Cell Phone Forensics

Module 16 – USB Forensics 

Buy This Course DVD Now @







                                   







Cisco CCNP Security 300-206 SENSS Exam 30 Hours Video Training Course on 2 DVDs



DURATION : 30hr 15min


Course Outline: 
Introduction4 Videos
Course Introduction
Course Topology & Equipment
Certification & Exam Preparation :: Part 1
Certification & Exam Preparation :: Part 2

Control Plane Security5 Videos
Network Device Planes of Operation
Control Plane Policing :: Part 1
Control Plane Policing :: Part 2
Control Plane Protection
Routing Protocol Security

Management Plane Security 19 Videos
Management Plane Protection
Secure Device Management
SNMP Overview
SNMP Configuration :: Part 1
SNMP Configuration :: Part 2
NTP Overview :: Part 1
NTP Overview :: Part 2
NTP Configuration
Network Event Logging :: Part 1
Network Event Logging :: Part 2
Netflow :: Part 1
Netflow :: Part 2
AAA Overview :: Part 1
AAA Overview :: Part 2
IOS AAA Configuration :: Part 1
IOS AAA Configuration :: Part 2
ASA AAA Configuration :: Part 1
ASA AAA Configuration :: Part 2
ASA AAA Configuration :: Part 3

Data-Plane Security 12 Videos
Port Security
DHCP Snooping Overview :: Part 1
DHCP Snooping Overview :: Part 2
DHCP Snooping Configuration
Dynamic ARP Inspection Overview
Dynamic ARP Inspection Configuration
IP Spoofing Overview
IP Spoofing Configuration
STP Security Toolkit
Storm Control
Private VLAN Overview
Private VLAN Configuration

IOS Firewall Threat Defense 18 Videos
NAT Overview :: Part 1
NAT Overview :: Part 2
Static NAT Configuration
Dynamic NAT Configuration
Policy NAT Configuration :: Part 1
Policy NAT Configuration :: Part 2
Zone Based Policy Firewall Overview
Two Zone Firewall Configuration :: Part 1
Two Zone Firewall Configuration :: Part 2
Two Zone with NAT Firewall Configuration
Three Zone Firewall Configuration :: Part 1
Three Zone Firewall Configuration :: Part 2
Zone Based Policy Firewall Tuning Overview
Zone Based Policy Firewall Tuning Configuration
Zone Based Policy Firewall Application Inspection :: Part 1
Zone Based Policy Firewall Application Inspection :: Part 2
Zone Based Policy Firewall Self Zone :: Part 1
Zone Based Policy Firewall Self Zone :: Part 2

ASA Firewall Threat Defense 20 Videos
ASA Firewall Overview :: Part 1
ASA Firewall Overview :: Part 2
ASA Firewall ACL Overview :: Part 1
ASA Firewall ACL Overview :: Part 2
ASA Firewall ACL Configuration :: Part 1
ASA Firewall ACL Configuration :: Part 2
ASA Firewall Object Groups
ASA Identity Firewall Overview :: Part 1
ASA Identity Firewall Overview :: Part 2
ASA Firewall Modular Policy Framework Overview :: Part 1
ASA Firewall Modular Policy Framework Overview :: Part 2
ASA Firewall MPF Advanced Inspections :: Part 1
ASA Firewall MPF Advanced Inspections :: Part 2
ASA Firewall MPF Dynamic Protocol Inspection :: Part 1
ASA Firewall MPF Dynamic Protocol Inspection :: Part 2
ASA Firewall MPF Application Inspection
ASA Firewall NAT Overview
ASA Firewall Object NAT Configuration
ASA Firewall Twice NAT Configuration :: Part 1
ASA Firewall Twice NAT Configuration :: Part 2


Buy This Course DVD Now @







                                   






CompTIA Network+ (N10-007) Exam 20 Hours Video Training Course DVD



Duration : 20 H 41 M
Video Lessons : 228
Subtitle : Yes



CompTIA Network+ (N10-007) PART-01
1. OSI Layers, Ports & Protocols: AXI 
2. OSI Layers, Ports & Protocols: ASCI 
3. OSI Layers, Ports & Protocols: TCP / IP Suite Layers 
4. OSI Layers, Ports & Protocols: Core TCP / IP Protocols 
5. OSI Layers, Ports & Protocols: TCP / IP Protocols 
6. OSI Layers, Ports & Protocols: Ports / IP 
7. OSI Layers, & Ports Protocols: Verifying Ports L4 with Wireshark 
8. OSI Layers, & Ports Protocols: Common and Their Protocols Well-known Ports 
9. OSI Layers, & Ports Protocols: TCP 's Three-way Handshake 
10. OSI Layers, Ports & Protocols TCP 3-Way Handshake 
11. Ethernet Switching: Properties of Network Traffic 
12. Ethernet Switching: Layers 2 Ethernet Addresses 
13. Ethernet Switching: How a Layer 2 Switch Works 
14. Ethernet Switching: Demonstration: Switch Dynamic Learning 
15. Ethernet Switching: Understanding VLANs 
16. Ethernet Switching: Configuring a VLAN 
17. Ethernet Switching: Overview of 802.1Q and Trunks 
18 Ethernet Switching: Configuring an 802.1Q Ethernet Trunk 
19. Ethernet Switching: Operates 
. 20. Ethernet Switching: Predicting the MAC Address Table 
. 21. Ethernet Switching: Validating MAC Address Table Predictions 
. 22. Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4 
23. Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5 
24. Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP) 
25. Ethernet Switching: STP Reacting to a Network Change 
26. Ethernet Switching: Design Considerations and PoE 
27. Ethernet Switching: Switch Port Mirroring 
28. IP Routing and Forwarding: Introduction to IP Routing 
29. IP Routing and Forwarding: How to Train a Router 
30. IP Routing and Forwarding: Options for Static Route 
31. IP Routing and Forwarding: Configuring Static Routes 
32. IP Routing and Forwarding: Dynamic Routing Protocol Overview 
33. IP Routing and Forwarding: Dynamic Routing Protocol Demonstration 
4. IP Routing and Forwarding: Address Translation with 
35. IP Routing and Forwarding: One- to-one Translations with NAT 
36. Routing and Forwarding IP: Using Wireshark to Verify IP Translations 
37. IP Routing and Forwarding: Access Control Lists 
38. IP Routing and Forwarding: ACL Demonstration 
39. IP Routing and Forwarding: Enterprise Network Forwarding 
40. IP Addressing and Subnetting: IPv4 Overview 
41. IP Addressing and Subnetting: Binary Basics 
42. IP Addressing and Subnetting: Converting Decimal to Binary 
43. IP Addressing and Subnetting: Converting Binary to Decimal 
44. IP Addressing and Subnetting: The IP Mask 
45. IP Addressing and Subnetting: Practice Using a Different IP Mask 
46. ​​IP Addressing and Subnetting: Borrowing Host Bits
47. IP Addressing and Subnetting: Practicing the Finger Game 
48. IP Addressing and Subnetting: Identifying New Subnets 
49. IP Addressing and Subnetting Exercise 1: Identifying the New Subnets 
50. IP Addressing and Subnetting Exercise 2 : Identify the New Subnets 
51. IP Addressing and Subnetting: ID 
52. IP Addressing and Subnetting Exercise 1: ID 
 53 Valid Host Addresses 5. IP Addressing and Subnetting Exercise 2: ID Valid Host Addresses 
54. IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet 
55. IP Addressing and Subnetting: Hosting IP Address 
56. IP Addressing and Subnetting: Planning and Assigning IP Addresses 
57. IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab 
58. IP Addressing and Subnetting: IPv6 Concepts 
59. Network Topologies: Wired Topologies 
60. Network Topologies: Wireless Topologies 
61. Network Topologies: Types of Networks 
62. Network Topologies: Introducing the Internet of Things (IoT) 
63. Network Topologies: Internet of Things (IoT) Technologies 
64. Wireless Technologies and Configurations: The Purpose of Wireless 
. 65. Wireless Technologies and Configurations: Understanding Radio Frequency 
66. Wireless Technologies and Configurations: Understanding Radio Channels 
67. Wireless Technologies and Configurations: Wireless Communication Technologies 
68 . Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage 
69. Configurations and Wireless Technologies: Understanding Wireless Antennas 
70. Configurations and Wireless Technologies: Wireless Performance Improvements 
71. Cloud Concepts: Types of Services 
72. Cloud Concepts: Cloud Delivery Models 
73. Cloud Concepts: Connectivity Methods 
74. Cloud Concepts: Security Implications / Considerations 
75. Cloud Concepts: Local and Cloud Resource Relationships 
CompTIA Network+ (N10-007) PART-02
76. Network Services: DHCP Overview 
77. Network Services: Verify DHCP with Wireshark 
78. Network Services: DNS Overview 
79. Network Services: DNS Methods, Records, and Design Options 
80. Network Services: DNS Testing and Validation 
81. Network Services: Network Time Protocol (NTP) 
82. Network Services: IP Address Management (IPAM) 
83. Deploying Appropriate Cabling Solutions: Copper Network Media Types 
84. Deploying Appropriate Cabling Solutions: Fiber Network Media Types 
85. Deploying Appropriate Cabling Solutions: Network Termination Points 
86. Deploying Appropriate Cabling Solutions: Network Transceivers 
87. Device Placement and Configuration: Network Device Placement 
88. Device Placement and Configuration: Device Configuration Overview 
89. Device Placement and Configuration: Configure Switch Ports Lab 
90. Device Placement and Configuration: Configure IP Addresses Lab 
91. Device Placement and Configuration: Configure IP Routing Lab 
92. Device Placement and Configuration: Configuring DHCP Services Lab 
93. Device Placement and Configuration: Configuring a VLAN Interface Lab 
94. Device Placement and Configuration: Configuring NAT Lab 
95. Advanced Networking Devices: Multi-Layer Switch Overview 
96. Advanced Networking Devices: Configure Multi-Layer Switch: Lab 
97. Advanced Networking Devices: Load Balancer Overview 
98. Advanced Networking Devices: IDS and IPS 
99. Advanced Networking Devices: Proxy Servers and Content Filtering 
100. Advanced Networking Devices: Security Network Devices 
101. Advanced Networking Devices: AAA / RADIUS Server 
102. Advanced Networking Devices: VoIP PBX and Gateway 
103. Advanced Networking Devices: Wireless Controller 
104. Virtualization & Network Storage: Hypervisor Introduction 
105. Virtualization & Network Storage: Virtual Networking Components 
106. Virtualization & Network Storage: Virtual Switch & VM Lab 
107. Virtualization & Network Storage: Network Storage 
108. WAN Technologies: Understanding the LAN, MAN, and WAN Difference 
109. WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite 
110. WAN Technologies: WAN Types - ISDN / PRI, T1-T3, E1-E3, and OC 
111. WAN Technologies: WAN Types - Cable, DSL, Dial-up 
112. WAN Technologies: WAN Characteristics - Frame Relay, ATM, MPLS, and DMVPN 
113. WAN Technologies: What is PPP and PPPoE? 
114. WAN Technologies: What is SIP Trunking? 
115. WAN Technologies: WAN Connection 
116. Network Diagram & Documentation: Network Documentation is Fun!
117. Network Diagram & Documentation: Creating Logical Network Diagrams 
118. Network Diagram & Documentation: Creating Physical Diagrams 
119. Network Diagram & Documentation: Naming Conventions and Labeling 
120. Network Diagram & Documentation: Documenting Wiring and Port Locations 
121. Network Diagram & Documentation: SOPs and Work Instructions 
122. Network Diagram & Documentation: Network Management Change 
123. Network Diagram & Documentation: Configuration and Monitoring Baselines 
124. Network Diagram & Documentation: Inventory Management 
125. Business Continuity: Availability Concepts 
126. Business Continuity: Load Sharing and Balancing 
127. Business Continuity: Power Management 
128. Business Continuity: Site Recovery Options 
129. Business Continuity: Backups 
130. Business Continuity: Backup and Restore Hands On Lab 
131. Business Continuity: MTBF and MTTR 
132. Business Continuity: SLA Requirements 
33. Scanning, Monitoring & Patching: Overview Scanning 
 134. Scanning, & Patching Monitoring: Network Scanning Methodology 
135. Scanning, Monitoring & Patching: Port Scanning and Discovery 
136. Scanning, Monitoring & Patching: OS Discovery and Fingerprinting 
137. Scanning, Monitoring & Patching: Motivators for Vulnerability Management 
138. Scanning, Monitoring & Patching: Vulnerability Scanning 
139. Scanning, Monitoring & Patching: Logging and Review 
140. Scanning, Monitoring & Patching: Packet and Traffic Analysis 
141. Scanning, Monitoring & Patching: Packet Capture and Analysis Lab 
142. Scanning, Monitoring & Patching: Remediation and Patch Management 
143. Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab 
144. Scanning, Monitoring & Patching: Baselines 
145. Remote Access Methods: Telnet and SSH for CLI Remote Access 
146. Remote Access Methods: HTTPS Management URLs 
147. Remote Access Methods: VPNs 
148. Remote Access Methods: Remote Desktop Access 
149. Remote Access Methods: Out-of-Band Management 
150. Identify Policies & Best Practices: Privileged User Agreement 
CompTIA Network+ (N10-007) PART-03
151. Identify Policies & Best Practices: Password Policy 
152. Identify Policies & Best Practices: On-boarding and Off-boarding 
153. Identify Policies & Best Practices: Licensing Restrictions 
154. Identify Policies & Best Practices: International Export Controls 
155. Identify Policies & Best Practices: Data Loss Prevention 
156. Identify Policies & Best Practices: Remote Access Policies 
157. Identify Policies & Best Practices: Incident Response Policies 
158. Identify Policies & Best Practices: Bring Your Own Device (BYOD) 
159. Identify Policies & Best Practices: Acceptable Use Policy (AUP) 
160. Identify Policies & Best Practices: Non-disclosure Agreements (NDA) 
161. Identify Policies & Best Practices: System Life Cycle 
162. Identify Policies & Best Practices: Safety Procedures and Policies 
 163. Physical Security & Network Attacks: Let's Break into a Data Center 
 164. the Physical Security & the Network Attacks: the Video Surveillance and the Motion Detection's 
165. the Physical Security & the Network Attacks: Badges and the Smart Cards 
166. the Physical Security & the Network Attacks: Biometrics 
167. Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection 
168. Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service) 
169. Physical Security & Network Attacks: DDoS (Distributed Denial of Service) 
170. Physical Security & Network Attacks: DDoS with ICMP and Smurfing 
171. Physical Security & Network Attacks: DDoS with DNS and NTP 
172. Physical Security & Network Attacks: Let's Go Phishing 
173. Physical Security & Network Attacks: Social Engineering and Insider Threats 
174. Physical Security & Network Attacks: Ransomware and Scareware 
175. Physical Security Network & Attacks: Cryptolocker and Logic Bombs 
176. Physical Security & Network Attacks: DNS Spoofing (Poisoning) 
177. Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing 
178. Physical Security & Network Attacks: Wardriving and Deauthentication 
179. Physical Security & Network Attacks: Evil Twins and Rogue Access Points 
180. Authentication & Access Control: AAA 
181. Authentication & Access Control: Multi-factor Authentication Overview 
182. Authentication & Access Control: Using Two-Factor Authentication (2FA) 
183. Authentication & Access Control Demo: Implementing 2FA 
184. Authentication & Access Control: Switch Port Security 
 185. Authentication & Access Control: Access Control Methods 
186. Basic Wireless Network Security: The Wireless Security Evolution 
187. Basic Wireless Network Security: Authentication and Authorization Wireless Types 
188. Mitigation Techniques: Network Device Hardening 
189. Mitigation Techniques: Hardening a Windows Server System 
190. Mitigation Techniques: Signature Management 
191. Mitigation Techniques: File Integrity Monitoring 
192. Mitigation Techniques: Privileged User Accounts and Role Separation 
193. Mitigation Techniques: Network Segmentation 
194. Mitigation Techniques: Switch Port Protections 
195. Mitigation Techniques: The Native VLAN 
196. Mitigation Techniques: Filtering with Access Control Lists (ACLs) 
197. Mitigation Techniques: Honeypots and Honeynets 
198. Mitigation Techniques: Penetration Testing 
199. Troubleshooting Methodology: a Methodology Network Troubleshooting 
200. Troubleshooting Methodology: Identify the Problem 
201. Troubleshooting Methodology: Establish a Theory of Probable Cause 
202. Troubleshooting Methodology: Test the Theory to Determine the Root Cause 
203. Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem 
204. Troubleshooting Methodology: Problem Solving, Verification, and Documentation 
205. Network Troubleshooting: Hardware Tools 
206. Network Troubleshooting: Software Tools 
207. Network Troubleshooting: Using the CLI Network Tools: ipconfig, ping, arp 
208. Network Troubleshooting: Using the CLI Network Tools: nslookup, dig 
209. Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route 
210. Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat 
211. Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter 
212. Wired Connectivity & Performance Issues: Crosstalk, EMI, Open / Short 
213. Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types 
214. Wired Connectivity & Performance Issues: Mismatched Damaged Cables and 
215. Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators 
216. Wired Connectivity & Performance Issues: Duplex and Speed ​​Mismatches 
217. Wired Connectivity & Performance Issues:VLAN Mismatches
218. Wired Connectivity & Performance Issues: Native VLAN Mismatches 
219. Wired Connectivity & Performance Issues: Bottlenecks 
220. Troubleshooting Wireless: The Nature of Airwaves 
221. Wireless Troubleshooting: Fighting Frequencies 
222. Wireless Troubleshooting : Understanding Antenna Types 
223. Troubleshooting Wireless: Misconfigurations 
224. Common Network Service Issues: Troubleshooting Name Resolution 
225. Common Network Service Issues: Troubleshooting MAC Addressing 
226. Common Network Service Issues: Troubleshooting IP Addressing 
227. Common Network Service Issues: Troubleshooting Security Settings 
228. Common Network Service Issues: Troubleshooting Miscellaneous Service Issues 

Buy This Course DVD Now @