Search This Blog
Showing posts with label Certification Exam. Show all posts
Showing posts with label Certification Exam. Show all posts
Monday, July 8, 2019
CompTIA Network+ (N10-007) 2019 updated Video Training Course on 5 DVDs
Duration : 23 hours
171 Video Lessons
Size : 17.4 GB
Subtitle also Available
01 Network Models
02 Cabling and Topology
03 Ethernet Basics
04 Modern Ethernet
05 Installing a Physical Network
06 TCP_IP Basics
07 Routing
08 TCP_IP Applications
09 Network Naming
10 Securing TCP_IP
11 Advanced Networking Devices
12 IPv6
13 Remote Connectivity
14 Wireless Networking
15 Virtualization and Cloud Computing
16 Mobile Networking
17 Building a Real-World Network
18 Managing Risk
19 Protecting your Network
20 Network Monitoring
21 Network Troubleshooting
CCNA WIRELESS 640-722 IUWNE EXAM VIDEO TRAINING COURSE DVD
Duration : 18 Hours
Size : 4.17 GB
01. Introduction and Agend
02. Cisco Wireless Certifications
03. Brief Overview of Wireless
04. Radio Frequency Fundamentals
05. RF Math
06. Fun with Antennas
07. Spectrum Modulation and Encoding
08. Regulations and Standards
09. Media Access
10. CUWNA :: Part 1
11. CUWNA :: Part 2
12. WLC Ports and Interfaces
13. Switch VLANs SVIs and DHCP Demo
14. WLC Interfaces and AP Association
15. AP Radio and WLAN Configuration in the WLC :: Part 1
16. AP Radio and WLAN Configuration in the WLC :: Part 2
17. Client Association and Monitoring
18. Client Association Packet Capture and CCX
19. Client Mobility and Roaming
20. Wireless QoS and WME WMM
21. Wireless Security Authentication and Encryption
22. Wireless Security Authentication and Encryption Demo
23. Wireless Control System - WCS
24. Autonomous AP Configs and Conversions
25. Maintainence and Troublelshooting
Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs
Duration : 10 Hours
DOWNLOAD Size : 6.42 GB
2 DVDs
01 - Security Penetration Testing Introduction
02 - 1.0 Learning objectives
03 - 1.1 Introducing Ethical Hacking and Pen Testing
04 - 1.2 Getting Started with Ethical Hacking and Pen Testing
05 - 1.3 Understanding the Legal Aspects of Penetration Testing
06 - 1.4 Exploring Penetration Testing Methodologies
07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications
08 - 1.6 Building Your Own Lab
09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits
10 - 1.8 Understanding the Current Threat Landscape
11 - 2.0 Learning objectives
12 - 2.1 Installing Kali
13 - 2.2 Examining Kali Modules and Architecture
14 - 2.3 Managing Kali Services
15 - 3.0 Learning objectives
16 - 3.1 Understanding Passive Reconnaissance
17 - 3.2 Exploring Passive Reconnaissance Methodologies
18 - 3.3 Surveying Essential Tools for Passive Reconnaissance
19 - 4.0 Learning objectives
20 - 4.1 Understanding Active Reconnaissance
21 - 4.2 Exploring Active Reconnaissance Methodologies
22 - 4.3 Surveying Essential Tools for Active Reconnaissance
23 - 5.0 Learning objectives
24 - 5.1 Understanding Web Applications
25 - 5.2 Understanding Web Architectures
26 - 5.3 Uncovering Web Vulnerabilities
27 - 5.4 Exploring Methodologies for Testing Web Applications
28 - 5.5 Understanding the Exploitation of Web Applications
29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking
30 - 6.0 Learning objectives
31 - 6.1 Understanding Authentication and Authorization Mechanisms
32 - 6.2 Understanding Authentication and Authorization Attacks
33 - 6.3 Exploring Password Storage Mechanisms
34 - 6.4 Attacking Password Storage
35 - 6.5 Exploring Password Cracking
36 - 7.0 Learning objectives
37 - 7.1 Reviewing Database Fundamentals
38 - 7.2 Attacking a Database
39 - 7.3 Surveying Defenses to Mitigate Database Hacking
40 - Security Penetration Testing Summary
Thursday, July 4, 2019
Cisco CCNP Routing and Switching TSHOOT Exams 13 Hours Video Course DVD
CCNP Route 300-101 Hands-on Labs Exam Prep
Duration : 4 .40 Hours
24 Video Lessons
Size : 1.38 GB
Level : Advanced
CCNP Switch 300-115 Hands-On Labs Exam Prep
Duration : 3.10 Hours
18 Video Lessons
Size : 670 MB
Level : Advanced
CCNP Routing and Switching 300-135 (TSHOOT) Hands-on Labs Exam Prep
Duration : 5.00 Hours
34 Video Lessosn
Size : 1.27 GB
Level : Advanced
Certified Professional Ethical Hacker (CPEH) 14 modules Video Course DVD
Duration : 7 Hours
14 Moduels
27 Video Lessons
Size : 1.62 GB
0-Security Fundamentals
1-Malware
2-Firewalls
3-Access Controls Part1
4-Access Controls Part2
5-Protocols Part1
6-Protocols Part2
7-Cryptography Part1
8-Cryptography Part2
9-Cryptography Part3
10-Cryptography Part4
11-Why Vulnerability Assessments Part1
12-Why Vulnerability Assessments Part2
13-Vulnerability Tools of the Trade
14-Output Analysis and Reports
15-Reconnaissance, Enumeration and Scanning Part1
16-Reconnaissance, Enumeration and Scanning Part2
17-Reconnaissance, Enumeration and Scanning Part3
18-Gaining Access Part 1
19-Gaining Access Part 2
20-Maintaining Access
21-Covering Tracks
22-Malware Part 1
23-Malware Part 2
24-Buffer Overflows Part 1
25-Buffer Overflows Part 2
26-Password Cracking Part 1
27-Password Cracking Part 2
CPEH .pdf
CPEH-Cert Professional Ethical Hacker .pdf
Windows 10 Installing and Configuring MCSA Exam 70-698 Course DVD
Duration : 10 Hours
size : 2.5 GB
01 - 70-698 Course Introduction
02 - Intro to the Implement Windows Section
03 - Hardware Requirements and Compatibility
04 - Upgrades Versus Clean Installs
05 - Windows 10 Editions
06 - Requirements for Special Features
07. Creating Appropriate Installation Media
08 - Performing Various Installations
09 - Performing a Clean Install
10 - Installing Additional Windows Features
11 - Additional Regional and Language Support
12 - Device Drivers
13 - Advanced Device Driver Management
14 - Start Menu, Desktop, Taskbar, and Notification Settings
15 - Accessibility Options
16 - Cortana
17 - Microsoft Edge
18 - Internet Explorer
19 - Hyper-V
20 - Power Settings
21 - Windows Imaging and Configuration Designer (ICD) Tool
22 - Volume Activation
23 - Miscellaneous Activation Topics
24 - Introducing Active Directory
25 - Active Directory and Group Policies
26 - User Account Control (UAC)
27 - Intro to the Configure and Support Core Services Section
28 - IPv4 and IPv6 Network Settings
29 - Name Resolution
30 - Connect to a Network
31 - Network Locations
32 - Windows Firewall
33 - Windows Firewall with Advanced Security
34 - Network Discovery
35 - Wi-Fi Settings
36 - Wi-Fi Direct, Wi-Fi Sense, and Hotspot 2.0
37 - Troubleshoot Network Issues
38 - VPNs
39 - IPsec
40 - DirectAccess
41 - Disk Management and Windows PowerShell
42 - VHDs
43 - Storage Spaces
44 - Removable Devices
45 - Troubleshoot Storage
46 - File and Printer Sharing
47 - Folder Shares, Public Folders, and OneDrive
48 - File System Permissions
49 - Troubleshoot Data Access
50 - Desktop Apps
51 - Startup Options
52 - Windows Store
53 - Provisioning Packages
54 - Windows PowerShell
55 - The Microsoft Management Console (MMC)
56 - Remote Management
57 - Introduction to the Manage and Maintain Windows Section
58 - Configure Updates
59 - Event Viewer
60 - Task Manager and Resource Monitor
61 - Performance Monitor
62 - Monitor and Manage Printers
63 - Indexing Options
64 - Windows Defender
65 - Reliability Monitor
66 - Troubleshoot Performance Issues
67 - Recovery Options
68 - Backup Options
69 - Authorization and Authentication
70 - Configure Services
71 - Task Scheduler
72 - Your 70-698 Exam
Juniper SSG Firewall Practical Video Training Course DVD
Duration : 3.30 Hours
Size : 1.38 GB
48 Video Lessons
The video Training Course is focused on deploying a Juniper Firewall appliance in a practical type deployment that involves a user network, a guest network, and a DMZ server network. You will learn how to configure the Juniper SSG firewall step-by-step for many of the common features with firewall policies, Client VPN, Site VPN with a Cisco router, to 802.1Q trunking (VLAN tagging). Our configuration will also involve Network Address Translation (NAT) using the DIP, MIP, and VIP features in our topology. We will configure our Juniper firewall in NAT mode, but also in Transparent mode with firewall policies. We will configure and talk the truth about Screening (Advanced Security).
Introduction and Juniper Defaults
Juniper Network Design
Zones
Network Configuration (VTP, VLAN, 802.1Q)
LAN Interfaces (Users, Guests, DMZ/Server)
Upgrading ScreenOS
WAN Interface
Static Routing
Basic Administration
Factory Defaults
NAT (MIP) and Firewall Policies
NAT (VIP) Port Redirect
Using Dedicated IP Address
Using WAN Interface IP Address
Firewall Policies using Policy Elements
Site IPSec VPN with Cisco Router
Web Authentication (WebAuth)
DHCP
NAT (DIP) using WAN Interface IP
NAT (DIP) using Dedicated IP Address
Client IPSec VPN (using Shrew Soft)
Screening
Logging and Syslog
Reports
Time Services using NTP
Bandwidth Interface
Transparent Firewall
Transparent Firewall Policies
Virtual Routers (VR)
Dynamic Routing: OSPF
Certified Digital Forensics Examiner - CDFE Exam Video Training Course DVD
Duration : 6.40 hours
16 Modules
30 Video Lessons
Size : 1.25 GB
Module 01 – Introduction
Module 02 – Computer Forensic Incidents
Module 03 – Investigation Process
Module 04 – Disk Storage Concepts
Module 05 – Digital Acquisition & Analysis
Module 06 – Forensic Examination Protocols
Module 07 – Digital Evidence Protocols
Module 08 – CFI Theory
Module 09 – Digital Evidence Presentation
Module 10 – Computer Forensic Laboratory Protocols
Module 11 – Computer Forensic Processing
Module 12 – Digital Forensics Reporting
Module 13 – Specialized Artifact Recovery
Module 14 – e-Discovery and ESI
Module 15 – Cell Phone Forensics
Module 16 – USB Forensics
ITIL 4 Foundation Complete Exam Preparation Video Course DVD
Dutaion : 5 Hours
Size : 1.38 GB
Recommended Experience
Exposure to IT
Related Certifications
ITIL Foundation
Related Job Functions
IT management
Project lead
Service provider
IT support
Exposure to IT
Related Certifications
ITIL Foundation
Related Job Functions
IT management
Project lead
Service provider
IT support
ITIL 4 Foundation Complete Course
01 - Introduction
02 - Service Management
03 - Four Dimensions of Service Management
04 - Service Value System
05 - Guiding Principles
06 - Service Value Chain
07 - Continual Improvement
08 - General Management Practices
09 - Service Management Practices
10 - Technical Management Practices
11 - Conclusion
Practice Exams
Study Guide (ITIL 4 Foundation).pdf
Subtitles
Thursday, May 2, 2019
Certified Ethical Hacking 2019 MEGA Course Video Training DVD
1. IT Security Trends
2. Computer Network Security
3. Designing Secure Computer Networks
4. Network administration
5. Wireless Networks Security
6. Operating Systems Security
7. Access Control
8. Windows Security
9. Security Policies
10. Risk Management
11. Defence in Depth
12. Disaster Recovery
13. Application Security
14. Application Security - Configuration and Management
15. Cryptography
16. Public Key Infrastructure
Wednesday, February 13, 2019
CISA 2018 (Certified Information Systems Auditor) Complete 5 Domains Video Course on 2 DVDs
Table of Contents
Domain 1: The Process of Auditing Information Systems
Lesson 1: Audit Fundamentals
1.1: Understanding the Audit Function
1.2: Adhering to ISACA IS Audit and Assurance Standards and Guidelines
1.3: Identifying the Risk/Audit Relationship
1.4: Surveying IS Controls
Lesson 1 Review
Lesson 2: Auditing
2.1: Performing an IS Audit
2.2: Gathering Audit Evidence
2.3: Understanding Sampling Techniques
2.4: Reporting and Communicating Audit Results
2.5: Audit Evolutions
Lesson 2 Review
Module 1 Summary
Domain 2: Governance and Management of IT
Lesson 3: Governance Structure, Processes, and Models
3.1: Understanding Corporate and Information Security Governance (Defining Governance)
3.2: Designing Strategic Plans, Policies, and Procedures
3.3: Surveying IT Organizational Structures and SOD
3.4: Surveying Maturity and Process Implementation Models
3.5: Understanding Performance Optimization
3.6: Auditing IT Governance
Lesson 3 Review
Lesson 4: Risk Management
4.1: Evaluating a Risk Management Program
4.2: Conducting a Risk Assessment
4.3: Auditing Risk Management
Lesson 4 Review
Lesson 5: Third-Party Relationships
5.1: Examining Outsourcing and Third-Party Management
5.2: Deconstructing Cloud Computing
5.3: Auditing Third-Party Relationships
Lesson 5 Review
Lesson 6: Business Continuity
6.1: Defining Business Continuity Planning
6.2: Examining a Business Impact Analysis (BIA)
6.3: Designing Business Continuity Plans
6.4: Evaluating Business Continuity Testing and Readiness
6.5: Auditing Business Continuity
Lesson 6 Review
Module 2 Summary
Domain 3: Information Systems Acquisition, Development, and Implementation
Lesson 7: Project Management
7.1: Developing a Business Case
7.2: Understanding Portfolio Management
7.3: Defining Project Management
7.4: Auditing Project Management
Lesson 7 Review
Lesson 8: Application Development
8.1: Exploring Business Application Development
8.2: Identifying Software Development Testing Techniques
8.3: Recognizing Source Code Vulnerabilities
8.4: Auditing the Development Process
Lesson 8 Review
Lesson 9: System Acquisition and Implementation
9.1: Exploring Acquisition Processes
9.2: Deconstructing System Implementation
9.3: Recognizing Application Controls
9.4: Understanding Configuration and Change Management
9.5: Auditing Acquisition and Implementation
Lesson 9 Review
Module 3 Summary
Domain 4: Information Systems Operations, Maintenance, and Service Management
Lesson 10: IS Operational Management
10.1: Surveying Information Systems Management and Frameworks
10.2: Managing Operational Processes
10.3: Understanding Asset Management
10.4: Auditing IS Operational Management
Lesson 10 Review
Lesson 11: Data Management
11.1: Defining Data Management
11.2: Exploring Database Management Systems (DBMS)
11.3: Auditing Data Management
Lesson 11 Review
Lesson 12: Network Architecture
12.1: Examining OSI Model and TCP/IP Models
12.2: Exploring Transmission Media and Telecommunications
12.3: Understanding Wireless Networks
12.4: Exploring VoIP
12.5: Auditing Network Architecture
Lesson 12 Review
Lesson 13: Disaster Response and Recovery
13.1: Understanding Disaster Response and Recovery Objectives
13.2: Identifying Recovery Strategies
13.3: Assessing Backup and Replication Strategies
13.4: Evaluating Disaster Recovery Plan Maintenance
13.5: Auditing Disaster Response and Recovery
Lesson 13 Review
Module 4 Summary
Domain 5: Protection of Information Assets
Lesson 14: Information Security Program Management
14.1: Surveying Information Security Management Systems (ISMS)
14.2: Identifying Information Security Classifications and Controls
14.3: Exploring Cyberthreats and Adversaries
14.4: Understanding Incident Management
14.5: Evaluating Investigative and Evidence Handling Capabilities
14.6: Auditing Information Security Program Management
Lesson 14 Review
Lesson 15: Authentication and Authorization
15.1: Examining Identification and Authentication
15.2: Exploring Access Control
15.3: Monitoring Access
15.4: Auditing User Access Controls
Lesson 15 Review
Lesson 16: Infrastructure Security
16.1: Surveying Perimeter Security
16.2: Managing Malware
16.3: Security Endpoint
16.4: Mobile Device Challenges
16.5: Testing Network Infrastructure Security
16.6: Auditing Infrastructure Security Controls
Lesson 16 Review
Lesson 17: Cryptography
17.1: Demystifying Encryption
17.2: Applying Asymmetric Encryption
17.3: Examining Hashing and Digital Signatures
17.4: Understanding Digital Certificates
17.5: Identifying Cryptographic Protocols and Attacks
17.6: Auditing Cryptographic Protocols
Lesson 17 Review
Lesson 18: Physical and Environmental Security
18.1: Examining Environmental Threats
18.2: Securing People and Places
18.3: Auditing Environmental and Physical Access
Lesson 18 Review
Module 5 Summary
Module 6: Acing Your Exam
Lesson 19: Understanding the Exam Structure
Lesson 20: Test Taking Strategies
Lesson 21: What to Expect at the Testing Center
Lesson 22: Attaining and Maintaining Your CISA Certification
Buy This Course DVD Now @
Subscribe to:
Posts (Atom)