Search This Blog

Showing posts with label CompTIA. Show all posts
Showing posts with label CompTIA. Show all posts

Monday, July 8, 2019

CompTIA CySA+ Cybersecurity Analyst Plus CS0-001 Video Training Course DVD



Duration : 10 Hours
Size :  2.60 GB 

CompTIA Security+ (SY0-501) Exam 20 Hours Video Training Course DVD




Duration : 20 Hours
Video Lessons : 86
DOWNLOAD Size :  4.22 GB 

CompTIA Pentest+ (Ethical Hacking) PT0-001 Exam Video Training Course 2 DVD




Duration : 8 Hours
Video Lessons : 82
Subtitle : Yes
Size :  8.23 GB 

CompTIA Network+ (N10-007) 2019 updated Video Training Course on 5 DVDs



Duration : 23 hours

171 Video Lessons

Size : 17.4 GB 

Subtitle also Available



01 Network Models
02 Cabling and Topology
03 Ethernet Basics
04 Modern Ethernet
05 Installing a Physical Network
06 TCP_IP Basics
07 Routing
08 TCP_IP Applications
09 Network Naming
10 Securing TCP_IP
11 Advanced Networking Devices
12 IPv6
13 Remote Connectivity
14 Wireless Networking
15 Virtualization and Cloud Computing
16 Mobile Networking
17 Building a Real-World Network
18 Managing Risk
19 Protecting your Network
20 Network Monitoring
21 Network Troubleshooting

Friday, February 8, 2019

CompTIA Network+ (N10-007) Exam 20 Hours Video Training Course DVD



Duration : 20 H 41 M
Video Lessons : 228
Subtitle : Yes



CompTIA Network+ (N10-007) PART-01
1. OSI Layers, Ports & Protocols: AXI 
2. OSI Layers, Ports & Protocols: ASCI 
3. OSI Layers, Ports & Protocols: TCP / IP Suite Layers 
4. OSI Layers, Ports & Protocols: Core TCP / IP Protocols 
5. OSI Layers, Ports & Protocols: TCP / IP Protocols 
6. OSI Layers, Ports & Protocols: Ports / IP 
7. OSI Layers, & Ports Protocols: Verifying Ports L4 with Wireshark 
8. OSI Layers, & Ports Protocols: Common and Their Protocols Well-known Ports 
9. OSI Layers, & Ports Protocols: TCP 's Three-way Handshake 
10. OSI Layers, Ports & Protocols TCP 3-Way Handshake 
11. Ethernet Switching: Properties of Network Traffic 
12. Ethernet Switching: Layers 2 Ethernet Addresses 
13. Ethernet Switching: How a Layer 2 Switch Works 
14. Ethernet Switching: Demonstration: Switch Dynamic Learning 
15. Ethernet Switching: Understanding VLANs 
16. Ethernet Switching: Configuring a VLAN 
17. Ethernet Switching: Overview of 802.1Q and Trunks 
18 Ethernet Switching: Configuring an 802.1Q Ethernet Trunk 
19. Ethernet Switching: Operates 
. 20. Ethernet Switching: Predicting the MAC Address Table 
. 21. Ethernet Switching: Validating MAC Address Table Predictions 
. 22. Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4 
23. Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5 
24. Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP) 
25. Ethernet Switching: STP Reacting to a Network Change 
26. Ethernet Switching: Design Considerations and PoE 
27. Ethernet Switching: Switch Port Mirroring 
28. IP Routing and Forwarding: Introduction to IP Routing 
29. IP Routing and Forwarding: How to Train a Router 
30. IP Routing and Forwarding: Options for Static Route 
31. IP Routing and Forwarding: Configuring Static Routes 
32. IP Routing and Forwarding: Dynamic Routing Protocol Overview 
33. IP Routing and Forwarding: Dynamic Routing Protocol Demonstration 
4. IP Routing and Forwarding: Address Translation with 
35. IP Routing and Forwarding: One- to-one Translations with NAT 
36. Routing and Forwarding IP: Using Wireshark to Verify IP Translations 
37. IP Routing and Forwarding: Access Control Lists 
38. IP Routing and Forwarding: ACL Demonstration 
39. IP Routing and Forwarding: Enterprise Network Forwarding 
40. IP Addressing and Subnetting: IPv4 Overview 
41. IP Addressing and Subnetting: Binary Basics 
42. IP Addressing and Subnetting: Converting Decimal to Binary 
43. IP Addressing and Subnetting: Converting Binary to Decimal 
44. IP Addressing and Subnetting: The IP Mask 
45. IP Addressing and Subnetting: Practice Using a Different IP Mask 
46. ​​IP Addressing and Subnetting: Borrowing Host Bits
47. IP Addressing and Subnetting: Practicing the Finger Game 
48. IP Addressing and Subnetting: Identifying New Subnets 
49. IP Addressing and Subnetting Exercise 1: Identifying the New Subnets 
50. IP Addressing and Subnetting Exercise 2 : Identify the New Subnets 
51. IP Addressing and Subnetting: ID 
52. IP Addressing and Subnetting Exercise 1: ID 
 53 Valid Host Addresses 5. IP Addressing and Subnetting Exercise 2: ID Valid Host Addresses 
54. IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet 
55. IP Addressing and Subnetting: Hosting IP Address 
56. IP Addressing and Subnetting: Planning and Assigning IP Addresses 
57. IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab 
58. IP Addressing and Subnetting: IPv6 Concepts 
59. Network Topologies: Wired Topologies 
60. Network Topologies: Wireless Topologies 
61. Network Topologies: Types of Networks 
62. Network Topologies: Introducing the Internet of Things (IoT) 
63. Network Topologies: Internet of Things (IoT) Technologies 
64. Wireless Technologies and Configurations: The Purpose of Wireless 
. 65. Wireless Technologies and Configurations: Understanding Radio Frequency 
66. Wireless Technologies and Configurations: Understanding Radio Channels 
67. Wireless Technologies and Configurations: Wireless Communication Technologies 
68 . Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage 
69. Configurations and Wireless Technologies: Understanding Wireless Antennas 
70. Configurations and Wireless Technologies: Wireless Performance Improvements 
71. Cloud Concepts: Types of Services 
72. Cloud Concepts: Cloud Delivery Models 
73. Cloud Concepts: Connectivity Methods 
74. Cloud Concepts: Security Implications / Considerations 
75. Cloud Concepts: Local and Cloud Resource Relationships 
CompTIA Network+ (N10-007) PART-02
76. Network Services: DHCP Overview 
77. Network Services: Verify DHCP with Wireshark 
78. Network Services: DNS Overview 
79. Network Services: DNS Methods, Records, and Design Options 
80. Network Services: DNS Testing and Validation 
81. Network Services: Network Time Protocol (NTP) 
82. Network Services: IP Address Management (IPAM) 
83. Deploying Appropriate Cabling Solutions: Copper Network Media Types 
84. Deploying Appropriate Cabling Solutions: Fiber Network Media Types 
85. Deploying Appropriate Cabling Solutions: Network Termination Points 
86. Deploying Appropriate Cabling Solutions: Network Transceivers 
87. Device Placement and Configuration: Network Device Placement 
88. Device Placement and Configuration: Device Configuration Overview 
89. Device Placement and Configuration: Configure Switch Ports Lab 
90. Device Placement and Configuration: Configure IP Addresses Lab 
91. Device Placement and Configuration: Configure IP Routing Lab 
92. Device Placement and Configuration: Configuring DHCP Services Lab 
93. Device Placement and Configuration: Configuring a VLAN Interface Lab 
94. Device Placement and Configuration: Configuring NAT Lab 
95. Advanced Networking Devices: Multi-Layer Switch Overview 
96. Advanced Networking Devices: Configure Multi-Layer Switch: Lab 
97. Advanced Networking Devices: Load Balancer Overview 
98. Advanced Networking Devices: IDS and IPS 
99. Advanced Networking Devices: Proxy Servers and Content Filtering 
100. Advanced Networking Devices: Security Network Devices 
101. Advanced Networking Devices: AAA / RADIUS Server 
102. Advanced Networking Devices: VoIP PBX and Gateway 
103. Advanced Networking Devices: Wireless Controller 
104. Virtualization & Network Storage: Hypervisor Introduction 
105. Virtualization & Network Storage: Virtual Networking Components 
106. Virtualization & Network Storage: Virtual Switch & VM Lab 
107. Virtualization & Network Storage: Network Storage 
108. WAN Technologies: Understanding the LAN, MAN, and WAN Difference 
109. WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite 
110. WAN Technologies: WAN Types - ISDN / PRI, T1-T3, E1-E3, and OC 
111. WAN Technologies: WAN Types - Cable, DSL, Dial-up 
112. WAN Technologies: WAN Characteristics - Frame Relay, ATM, MPLS, and DMVPN 
113. WAN Technologies: What is PPP and PPPoE? 
114. WAN Technologies: What is SIP Trunking? 
115. WAN Technologies: WAN Connection 
116. Network Diagram & Documentation: Network Documentation is Fun!
117. Network Diagram & Documentation: Creating Logical Network Diagrams 
118. Network Diagram & Documentation: Creating Physical Diagrams 
119. Network Diagram & Documentation: Naming Conventions and Labeling 
120. Network Diagram & Documentation: Documenting Wiring and Port Locations 
121. Network Diagram & Documentation: SOPs and Work Instructions 
122. Network Diagram & Documentation: Network Management Change 
123. Network Diagram & Documentation: Configuration and Monitoring Baselines 
124. Network Diagram & Documentation: Inventory Management 
125. Business Continuity: Availability Concepts 
126. Business Continuity: Load Sharing and Balancing 
127. Business Continuity: Power Management 
128. Business Continuity: Site Recovery Options 
129. Business Continuity: Backups 
130. Business Continuity: Backup and Restore Hands On Lab 
131. Business Continuity: MTBF and MTTR 
132. Business Continuity: SLA Requirements 
33. Scanning, Monitoring & Patching: Overview Scanning 
 134. Scanning, & Patching Monitoring: Network Scanning Methodology 
135. Scanning, Monitoring & Patching: Port Scanning and Discovery 
136. Scanning, Monitoring & Patching: OS Discovery and Fingerprinting 
137. Scanning, Monitoring & Patching: Motivators for Vulnerability Management 
138. Scanning, Monitoring & Patching: Vulnerability Scanning 
139. Scanning, Monitoring & Patching: Logging and Review 
140. Scanning, Monitoring & Patching: Packet and Traffic Analysis 
141. Scanning, Monitoring & Patching: Packet Capture and Analysis Lab 
142. Scanning, Monitoring & Patching: Remediation and Patch Management 
143. Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab 
144. Scanning, Monitoring & Patching: Baselines 
145. Remote Access Methods: Telnet and SSH for CLI Remote Access 
146. Remote Access Methods: HTTPS Management URLs 
147. Remote Access Methods: VPNs 
148. Remote Access Methods: Remote Desktop Access 
149. Remote Access Methods: Out-of-Band Management 
150. Identify Policies & Best Practices: Privileged User Agreement 
CompTIA Network+ (N10-007) PART-03
151. Identify Policies & Best Practices: Password Policy 
152. Identify Policies & Best Practices: On-boarding and Off-boarding 
153. Identify Policies & Best Practices: Licensing Restrictions 
154. Identify Policies & Best Practices: International Export Controls 
155. Identify Policies & Best Practices: Data Loss Prevention 
156. Identify Policies & Best Practices: Remote Access Policies 
157. Identify Policies & Best Practices: Incident Response Policies 
158. Identify Policies & Best Practices: Bring Your Own Device (BYOD) 
159. Identify Policies & Best Practices: Acceptable Use Policy (AUP) 
160. Identify Policies & Best Practices: Non-disclosure Agreements (NDA) 
161. Identify Policies & Best Practices: System Life Cycle 
162. Identify Policies & Best Practices: Safety Procedures and Policies 
 163. Physical Security & Network Attacks: Let's Break into a Data Center 
 164. the Physical Security & the Network Attacks: the Video Surveillance and the Motion Detection's 
165. the Physical Security & the Network Attacks: Badges and the Smart Cards 
166. the Physical Security & the Network Attacks: Biometrics 
167. Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection 
168. Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service) 
169. Physical Security & Network Attacks: DDoS (Distributed Denial of Service) 
170. Physical Security & Network Attacks: DDoS with ICMP and Smurfing 
171. Physical Security & Network Attacks: DDoS with DNS and NTP 
172. Physical Security & Network Attacks: Let's Go Phishing 
173. Physical Security & Network Attacks: Social Engineering and Insider Threats 
174. Physical Security & Network Attacks: Ransomware and Scareware 
175. Physical Security Network & Attacks: Cryptolocker and Logic Bombs 
176. Physical Security & Network Attacks: DNS Spoofing (Poisoning) 
177. Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing 
178. Physical Security & Network Attacks: Wardriving and Deauthentication 
179. Physical Security & Network Attacks: Evil Twins and Rogue Access Points 
180. Authentication & Access Control: AAA 
181. Authentication & Access Control: Multi-factor Authentication Overview 
182. Authentication & Access Control: Using Two-Factor Authentication (2FA) 
183. Authentication & Access Control Demo: Implementing 2FA 
184. Authentication & Access Control: Switch Port Security 
 185. Authentication & Access Control: Access Control Methods 
186. Basic Wireless Network Security: The Wireless Security Evolution 
187. Basic Wireless Network Security: Authentication and Authorization Wireless Types 
188. Mitigation Techniques: Network Device Hardening 
189. Mitigation Techniques: Hardening a Windows Server System 
190. Mitigation Techniques: Signature Management 
191. Mitigation Techniques: File Integrity Monitoring 
192. Mitigation Techniques: Privileged User Accounts and Role Separation 
193. Mitigation Techniques: Network Segmentation 
194. Mitigation Techniques: Switch Port Protections 
195. Mitigation Techniques: The Native VLAN 
196. Mitigation Techniques: Filtering with Access Control Lists (ACLs) 
197. Mitigation Techniques: Honeypots and Honeynets 
198. Mitigation Techniques: Penetration Testing 
199. Troubleshooting Methodology: a Methodology Network Troubleshooting 
200. Troubleshooting Methodology: Identify the Problem 
201. Troubleshooting Methodology: Establish a Theory of Probable Cause 
202. Troubleshooting Methodology: Test the Theory to Determine the Root Cause 
203. Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem 
204. Troubleshooting Methodology: Problem Solving, Verification, and Documentation 
205. Network Troubleshooting: Hardware Tools 
206. Network Troubleshooting: Software Tools 
207. Network Troubleshooting: Using the CLI Network Tools: ipconfig, ping, arp 
208. Network Troubleshooting: Using the CLI Network Tools: nslookup, dig 
209. Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route 
210. Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat 
211. Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter 
212. Wired Connectivity & Performance Issues: Crosstalk, EMI, Open / Short 
213. Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types 
214. Wired Connectivity & Performance Issues: Mismatched Damaged Cables and 
215. Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators 
216. Wired Connectivity & Performance Issues: Duplex and Speed ​​Mismatches 
217. Wired Connectivity & Performance Issues:VLAN Mismatches
218. Wired Connectivity & Performance Issues: Native VLAN Mismatches 
219. Wired Connectivity & Performance Issues: Bottlenecks 
220. Troubleshooting Wireless: The Nature of Airwaves 
221. Wireless Troubleshooting: Fighting Frequencies 
222. Wireless Troubleshooting : Understanding Antenna Types 
223. Troubleshooting Wireless: Misconfigurations 
224. Common Network Service Issues: Troubleshooting Name Resolution 
225. Common Network Service Issues: Troubleshooting MAC Addressing 
226. Common Network Service Issues: Troubleshooting IP Addressing 
227. Common Network Service Issues: Troubleshooting Security Settings 
228. Common Network Service Issues: Troubleshooting Miscellaneous Service Issues 

Buy This Course DVD Now @







                                   






CompTIA A+ 220-901 & 220-902 Exams 20 Hours Video Training Course on 2 DVDs



Duration : 20 Hours


CompTIA A+ Exam Prep (220-901) Core Processing
Duration:2h 22m 40s
CompTIA A+ Exam Prep (220-901) Core Hardware
Duration:2h 37m 41s
CompTIA A+ Exam Prep (220-901)  Peripherals and Building a PC
Duration:1h 9m 42s
CompTIA A+ Exam Prep (220-901) Displays and Printers
Duration:1h 41m 38s
CompTIA A+ Exam Prep (220-901) Laptops and Mobile Devices
Duration:1h 16m
CompTIA A+ Exam Prep (220-901) Networking
Duration:5h 9m 13s

CompTIA A+ 220-902
Duration:8 Hours
01 - Course Introduction.mp4
02 - Using Your Electronic Flash Cards
03 - 32-bit vs - 64-bit
04 - Fun Windows Features
05 - Upgrading Windows
06 - Windows Install Boot Methods
07 - Types of Windows Installations
08 - Partitions and File Systems
09 - Other Windows Installation Concerns
10 - Hands-on Lab Installing Windows
11 - Hands-on Lab Command Line Tools
12 - Hands-on Lab Administrative Tools
13 - Hands-on Lab MSCONFIG
14 - Hands-on Lab Task Manager
15 - Hands-on Lab Disk Management
16 - Other Tools
17 - Hands-on Lab System Utilities
18 - Hands-on Lab Control Panel
19 - Hands-on Lab Windows Networking
20 - Preventative Maintenance in Windows
21 - Mac OS and Linux
22 - Basic Linux Commands
23 - Hands-on Lab Client Side Virtualization
24 - Basic Cloud Concepts
25 - Networked Hosts
26 - Mobile Operating Systems
27 - Mobile Networking and Email
28 - Mobile Device Sync
29 - Common Security Threats
30 - Common Prevention Methods
31 - Windows Security Settings
32 - Hands-on Lab Securing a Workstation
33 - Securing Mobile Devices
34 - Data Destruction and Disposal
35 - Hands-on Lab Securing Wireless Wired
36 - Hands-on Lab Common PC Problems Symptoms
37 - Hands-on Lab Tools for PC Problems
38 - Hands-on Lab Security Problem Symptoms
39 - Hands-on Lab Security Tools
40 - Hands-on Lab Malware Removal
41 - Troubleshoot Mobile Devices
42 - Mobile Application and Security Issues
43 - Safety Procedures
44 - Environmental Controls
45 - Enforcing Privacy
46 - Proper Communication
47 - Troubleshooting Theory
48 - Your CompTIA A+ 220-902 Exam

Buy This Course DVD Now @