Search This Blog

Showing posts with label Certification Exam. Show all posts
Showing posts with label Certification Exam. Show all posts

Monday, July 8, 2019

Microsoft Exam AZ-100 Azure Infrastructure & Deployment 2019 Course DVD




Course Duration : 12 Hours


Size : 3.73 GB 



CompTIA Network+ (N10-007) 2019 updated Video Training Course on 5 DVDs



Duration : 23 hours

171 Video Lessons

Size : 17.4 GB 

Subtitle also Available



01 Network Models
02 Cabling and Topology
03 Ethernet Basics
04 Modern Ethernet
05 Installing a Physical Network
06 TCP_IP Basics
07 Routing
08 TCP_IP Applications
09 Network Naming
10 Securing TCP_IP
11 Advanced Networking Devices
12 IPv6
13 Remote Connectivity
14 Wireless Networking
15 Virtualization and Cloud Computing
16 Mobile Networking
17 Building a Real-World Network
18 Managing Risk
19 Protecting your Network
20 Network Monitoring
21 Network Troubleshooting

CCNA WIRELESS 640-722 IUWNE EXAM VIDEO TRAINING COURSE DVD



Duration : 18 Hours

Size :  4.17 GB  

01. Introduction and Agend
02. Cisco Wireless Certifications
03. Brief Overview of Wireless
04. Radio Frequency Fundamentals
05. RF Math
06. Fun with Antennas
07. Spectrum Modulation and Encoding
08. Regulations and Standards
09. Media Access
10. CUWNA :: Part 1
11. CUWNA :: Part 2
12. WLC Ports and Interfaces
13. Switch VLANs SVIs and DHCP Demo
14. WLC Interfaces and AP Association
15. AP Radio and WLAN Configuration in the WLC :: Part 1
16. AP Radio and WLAN Configuration in the WLC :: Part 2
17. Client Association and Monitoring
18. Client Association Packet Capture and CCX
19. Client Mobility and Roaming
20. Wireless QoS and WME WMM
21. Wireless Security Authentication and Encryption
22. Wireless Security Authentication and Encryption Demo
23. Wireless Control System - WCS
24. Autonomous AP Configs and Conversions
25. Maintainence and Troublelshooting

Security Penetration Testing 2018 Video Training 10 Hours Course 2 DVDs



Duration : 10 Hours

DOWNLOAD Size : 6.42 GB 

2 DVDs



01 - Security Penetration Testing  Introduction

02 - 1.0 Learning objectives

03 - 1.1 Introducing Ethical Hacking and Pen Testing

04 - 1.2 Getting Started with Ethical Hacking and Pen Testing

05 - 1.3 Understanding the Legal Aspects of Penetration Testing

06 - 1.4 Exploring Penetration Testing Methodologies

07 - 1.5 Exploring Penetration Testing and other Cyber Security Certifications

08 - 1.6 Building Your Own Lab

09 - 1.7 Understanding Vulnerabilities, Threats, and Exploits

10 - 1.8 Understanding the Current Threat Landscape

11 - 2.0 Learning objectives

12 - 2.1 Installing Kali

13 - 2.2 Examining Kali Modules and Architecture

14 - 2.3 Managing Kali Services

15 - 3.0 Learning objectives

16 - 3.1 Understanding Passive Reconnaissance

17 - 3.2 Exploring Passive Reconnaissance Methodologies

18 - 3.3 Surveying Essential Tools for Passive Reconnaissance

19 - 4.0 Learning objectives

20 - 4.1 Understanding Active Reconnaissance

21 - 4.2 Exploring Active Reconnaissance Methodologies

22 - 4.3 Surveying Essential Tools for Active Reconnaissance

23 - 5.0 Learning objectives

24 - 5.1 Understanding Web Applications

25 - 5.2 Understanding Web Architectures

26 - 5.3 Uncovering Web Vulnerabilities

27 - 5.4 Exploring Methodologies for Testing Web Applications

28 - 5.5 Understanding the Exploitation of Web Applications

29 - 5.6 Surveying Defenses to Mitigate Web Application Hacking

30 - 6.0 Learning objectives

31 - 6.1 Understanding Authentication and Authorization Mechanisms

32 - 6.2 Understanding Authentication and Authorization Attacks

33 - 6.3 Exploring Password Storage Mechanisms

34 - 6.4 Attacking Password Storage

35 - 6.5 Exploring Password Cracking

36 - 7.0 Learning objectives

37 - 7.1 Reviewing Database Fundamentals

38 - 7.2 Attacking a Database

39 - 7.3 Surveying Defenses to Mitigate Database Hacking

40 - Security Penetration Testing  Summary

Thursday, July 4, 2019

Cisco CCNP Routing and Switching TSHOOT Exams 13 Hours Video Course DVD





CCNP Route 300-101 Hands-on Labs Exam Prep
Duration :  4 .40 Hours
24 Video Lessons
Size : 1.38 GB
Level : Advanced

CCNP Switch 300-115 Hands-On Labs Exam Prep
Duration : 3.10 Hours
18 Video Lessons
Size : 670 MB
Level : Advanced

CCNP Routing and Switching 300-135 (TSHOOT) Hands-on Labs Exam Prep
Duration : 5.00 Hours
34 Video Lessosn
Size : 1.27 GB
Level : Advanced

Certified Professional Ethical Hacker (CPEH) 14 modules Video Course DVD



Duration : 7 Hours
14 Moduels
27  Video Lessons
Size : 1.62 GB

0-Security Fundamentals
1-Malware
2-Firewalls
3-Access Controls Part1
4-Access Controls Part2
5-Protocols Part1
6-Protocols Part2
7-Cryptography Part1
8-Cryptography Part2
9-Cryptography Part3
10-Cryptography Part4
11-Why Vulnerability Assessments Part1
12-Why Vulnerability Assessments Part2
13-Vulnerability Tools of the Trade
14-Output Analysis and Reports
15-Reconnaissance, Enumeration and Scanning Part1
16-Reconnaissance, Enumeration and Scanning Part2
17-Reconnaissance, Enumeration and Scanning Part3
18-Gaining Access Part 1
19-Gaining Access Part 2
20-Maintaining Access
21-Covering Tracks
22-Malware Part 1
23-Malware Part 2
24-Buffer Overflows Part 1
25-Buffer Overflows Part 2
26-Password Cracking Part 1
27-Password Cracking Part 2

CPEH .pdf
CPEH-Cert Professional Ethical Hacker .pdf

Windows 10 Installing and Configuring MCSA Exam 70-698 Course DVD



Duration : 10 Hours
size : 2.5 GB


01 - 70-698 Course Introduction
02 - Intro to the Implement Windows Section
03 - Hardware Requirements and Compatibility
04 - Upgrades Versus Clean Installs
05 - Windows 10 Editions
06 - Requirements for Special Features
07. Creating Appropriate Installation Media
08 - Performing Various Installations
09 - Performing a Clean Install
10 - Installing Additional Windows Features
11 - Additional Regional and Language Support
12 - Device Drivers
13 - Advanced Device Driver Management
14 - Start Menu, Desktop, Taskbar, and Notification Settings
15 - Accessibility Options
16 - Cortana
17 - Microsoft Edge
18 - Internet Explorer
19 - Hyper-V
20 - Power Settings
21 - Windows Imaging and Configuration Designer (ICD) Tool
22 - Volume Activation
23 - Miscellaneous Activation Topics
24 - Introducing Active Directory
25 - Active Directory and Group Policies
26 - User Account Control (UAC)
27 - Intro to the Configure and Support Core Services Section
28 - IPv4 and IPv6 Network Settings
29 - Name Resolution
30 - Connect to a Network
31 - Network Locations
32 - Windows Firewall
33 - Windows Firewall with Advanced Security
34 - Network Discovery
35 - Wi-Fi Settings
36 - Wi-Fi Direct, Wi-Fi Sense, and Hotspot 2.0
37 - Troubleshoot Network Issues
38 - VPNs
39 - IPsec
40 - DirectAccess
41 - Disk Management and Windows PowerShell
42 - VHDs
43 - Storage Spaces
44 - Removable Devices
45 - Troubleshoot Storage
46 - File and Printer Sharing
47 - Folder Shares, Public Folders, and OneDrive
48 - File System Permissions
49 - Troubleshoot Data Access
50 - Desktop Apps
51 - Startup Options
52 - Windows Store
53 - Provisioning Packages
54 - Windows PowerShell
55 - The Microsoft Management Console (MMC)
56 - Remote Management
57 - Introduction to the Manage and Maintain Windows Section
58 - Configure Updates
59 - Event Viewer
60 - Task Manager and Resource Monitor
61 - Performance Monitor
62 - Monitor and Manage Printers
63 - Indexing Options
64 - Windows Defender
65 - Reliability Monitor
66 - Troubleshoot Performance Issues
67 - Recovery Options
68 - Backup Options
69 - Authorization and Authentication
70 - Configure Services
71 - Task Scheduler
72 - Your 70-698 Exam

Juniper SSG Firewall Practical Video Training Course DVD




Duration : 3.30 Hours
Size : 1.38 GB
48 Video Lessons

The video Training Course is focused on deploying a Juniper Firewall appliance in a practical type deployment that involves a user network, a guest network, and a DMZ server network. You will learn how to configure the Juniper SSG firewall step-by-step for many of the common features with firewall policies, Client VPN, Site VPN with a Cisco router, to 802.1Q trunking (VLAN tagging). Our configuration will also involve Network Address Translation (NAT) using the DIP, MIP, and VIP features in our topology. We will configure our Juniper firewall in NAT mode, but also in Transparent mode with firewall policies. We will configure and talk the truth about Screening (Advanced Security). 

Introduction and Juniper Defaults
Juniper Network Design
Zones
Network Configuration (VTP, VLAN, 802.1Q)
LAN Interfaces (Users, Guests, DMZ/Server)
Upgrading ScreenOS
WAN Interface
Static Routing
Basic Administration
Factory Defaults
NAT (MIP) and Firewall Policies
NAT (VIP) Port Redirect
Using Dedicated IP Address
Using WAN Interface IP Address
Firewall Policies using Policy Elements
Site IPSec VPN with Cisco Router
Web Authentication (WebAuth)
DHCP
NAT (DIP) using WAN Interface IP
NAT (DIP) using Dedicated IP Address
Client IPSec VPN (using Shrew Soft)
Screening
Logging and Syslog
Reports
Time Services using NTP
Bandwidth Interface
Transparent Firewall
Transparent Firewall Policies
Virtual Routers (VR)
Dynamic Routing: OSPF

Certified Digital Forensics Examiner - CDFE Exam Video Training Course DVD




Duration : 6.40 hours

16 Modules

30 Video Lessons 

Size : 1.25 GB 


Module 01 – Introduction 

Module 02 – Computer Forensic Incidents 

Module 03 – Investigation Process 

Module 04 – Disk Storage Concepts

Module 05 – Digital Acquisition & Analysis 

Module 06 – Forensic Examination Protocols 

Module 07 – Digital Evidence Protocols

Module 08 – CFI Theory 

Module 09 – Digital Evidence Presentation 

Module 10 – Computer Forensic Laboratory Protocols 

Module 11 – Computer Forensic Processing 

Module 12 – Digital Forensics Reporting

Module 13 – Specialized Artifact Recovery

Module 14 – e-Discovery and ESI 

Module 15 – Cell Phone Forensics

Module 16 – USB Forensics 

ITIL 4 Foundation Complete Exam Preparation Video Course DVD



Dutaion : 5 Hours
Size : 1.38 GB 
Recommended Experience
Exposure to IT
Related Certifications
ITIL Foundation
Related Job Functions
IT management
Project lead
Service provider
IT support

ITIL 4 Foundation Complete Course 

01 - Introduction
02 - Service Management
03 - Four Dimensions of Service Management
04 - Service Value System
05 - Guiding Principles
06 - Service Value Chain
07 - Continual Improvement
08 - General Management Practices
09 - Service Management Practices
10 - Technical Management Practices
11 - Conclusion
Practice Exams
Study Guide (ITIL 4 Foundation).pdf
Subtitles

Thursday, May 2, 2019

Certified Ethical Hacking 2019 MEGA Course Video Training DVD





1. IT Security Trends

2. Computer Network Security

3. Designing Secure Computer Networks

4. Network administration

5. Wireless Networks Security

6. Operating Systems Security

7. Access Control

8. Windows Security

9. Security Policies

10. Risk Management

11. Defence in Depth

12. Disaster Recovery

13. Application Security

14. Application Security - Configuration and Management

15. Cryptography

16. Public Key Infrastructure

Wednesday, February 13, 2019

CISA 2018 (Certified Information Systems Auditor) Complete 5 Domains Video Course on 2 DVDs



Table of Contents

Domain 1: The Process of Auditing Information Systems
Lesson 1: Audit Fundamentals
1.1: Understanding the Audit Function
1.2: Adhering to ISACA IS Audit and Assurance Standards and Guidelines
1.3: Identifying the Risk/Audit Relationship
1.4: Surveying IS Controls
Lesson 1 Review
Lesson 2: Auditing
2.1: Performing an IS Audit
2.2: Gathering Audit Evidence
2.3: Understanding Sampling Techniques
2.4: Reporting and Communicating Audit Results
2.5: Audit Evolutions
Lesson 2 Review
Module 1 Summary

Domain 2: Governance and Management of IT
Lesson 3: Governance Structure, Processes, and Models
3.1: Understanding Corporate and Information Security Governance (Defining Governance)
3.2: Designing Strategic Plans, Policies, and Procedures
3.3: Surveying IT Organizational Structures and SOD
3.4: Surveying Maturity and Process Implementation Models
3.5: Understanding Performance Optimization
3.6: Auditing IT Governance
Lesson 3 Review

Lesson 4: Risk Management
4.1: Evaluating a Risk Management Program
4.2: Conducting a Risk Assessment
4.3: Auditing Risk Management
Lesson 4 Review

Lesson 5: Third-Party Relationships
5.1: Examining Outsourcing and Third-Party Management
5.2: Deconstructing Cloud Computing
5.3: Auditing Third-Party Relationships
Lesson 5 Review

Lesson 6: Business Continuity
6.1: Defining Business Continuity Planning
6.2: Examining a Business Impact Analysis (BIA)
6.3: Designing Business Continuity Plans
6.4: Evaluating Business Continuity Testing and Readiness
6.5: Auditing Business Continuity
Lesson 6 Review
Module 2 Summary

Domain 3: Information Systems Acquisition, Development, and Implementation 
Lesson 7: Project Management
7.1: Developing a Business Case
7.2: Understanding Portfolio Management
7.3: Defining Project Management
7.4: Auditing Project Management
Lesson 7 Review

Lesson 8: Application Development
8.1: Exploring Business Application Development
8.2: Identifying Software Development Testing Techniques
8.3: Recognizing Source Code Vulnerabilities
8.4: Auditing the Development Process
Lesson 8 Review

Lesson 9: System Acquisition and Implementation
9.1: Exploring Acquisition Processes
9.2: Deconstructing System Implementation
9.3: Recognizing Application Controls
9.4: Understanding Configuration and Change Management
9.5: Auditing Acquisition and Implementation
Lesson 9 Review
Module 3 Summary

Domain 4: Information Systems Operations, Maintenance, and Service Management 
Lesson 10: IS Operational Management
10.1: Surveying Information Systems Management and Frameworks
10.2: Managing Operational Processes
10.3: Understanding Asset Management
10.4: Auditing IS Operational Management
Lesson 10 Review

Lesson 11: Data Management
11.1: Defining Data Management
11.2: Exploring Database Management Systems (DBMS)
11.3: Auditing Data Management
Lesson 11 Review

Lesson 12: Network Architecture
12.1: Examining OSI Model and TCP/IP Models
12.2: Exploring Transmission Media and Telecommunications
12.3: Understanding Wireless Networks
12.4: Exploring VoIP
12.5: Auditing Network Architecture
Lesson 12 Review

Lesson 13: Disaster Response and Recovery
13.1: Understanding Disaster Response and Recovery Objectives
13.2: Identifying Recovery Strategies
13.3: Assessing Backup and Replication Strategies
13.4: Evaluating Disaster Recovery Plan Maintenance
13.5: Auditing Disaster Response and Recovery
Lesson 13 Review
Module 4 Summary

Domain 5: Protection of Information Assets 
Lesson 14: Information Security Program Management
14.1: Surveying Information Security Management Systems (ISMS)
14.2: Identifying Information Security Classifications and Controls
14.3: Exploring Cyberthreats and Adversaries
14.4: Understanding Incident Management
14.5: Evaluating Investigative and Evidence Handling Capabilities
14.6: Auditing Information Security Program Management
Lesson 14 Review

Lesson 15: Authentication and Authorization
15.1: Examining Identification and Authentication
15.2: Exploring Access Control
15.3: Monitoring Access
15.4: Auditing User Access Controls
Lesson 15 Review

Lesson 16: Infrastructure Security
16.1: Surveying Perimeter Security
16.2: Managing Malware
16.3: Security Endpoint
16.4: Mobile Device Challenges
16.5: Testing Network Infrastructure Security
16.6: Auditing Infrastructure Security Controls
Lesson 16 Review

Lesson 17: Cryptography
17.1: Demystifying Encryption
17.2: Applying Asymmetric Encryption
17.3: Examining Hashing and Digital Signatures
17.4: Understanding Digital Certificates
17.5: Identifying Cryptographic Protocols and Attacks
17.6: Auditing Cryptographic Protocols 
Lesson 17 Review

Lesson 18: Physical and Environmental Security
18.1: Examining Environmental Threats
18.2: Securing People and Places
18.3: Auditing Environmental and Physical Access
Lesson 18 Review
Module 5 Summary

Module 6: Acing Your Exam 
Lesson 19: Understanding the Exam Structure
Lesson 20: Test Taking Strategies
Lesson 21: What to Expect at the Testing Center
Lesson 22: Attaining and Maintaining Your CISA Certification


Buy This Course DVD Now @