Quantcast
Channel: Torrents by keyword "cbt" - KickassTorrents
Viewing all 631 articles
Browse latest View live

CBT Nuggets Microsoft Windows Server 2012 70-410 Installing And Configuring Server 2012-PRODEV

$
0
0
MICROSOFT WINDOWS SERVER 2012 70-410 Installing and Configuring Server 2012 Release Name: CBT.Nuggets.Microsoft.Windows.Server.2012.70-410.Installing.And.Configuring.Server.2012-PRODEV Release Date: 2012-11-12 Release Size: 2359Mb Release URL : http://www.cbtnuggets.com/it-training-videos/series/msft_70_410 INSTALLATION: 1. Extract 2. Mount/Burn 3. Play & Learn SUMMARY: Are you ready for Windows Server 2012? You will be after viewing this training series by James Conrad. Get familiar with Windows Server 2012 and prepare for the new 70-410 exam, part of the MCSA. Server 2012 is Microsoft's best release to date, and this series shows the exciting new features and improvements. Topics covered in this series include: Installing and configuring Windows Server 2012; managing Active Directory Domain Services objects; automating Active Directory Domain Services administration; implementing networking services; implementing local storage; implementing file and print services; implementing group policy; and implementing server virtualization with Hyper-V. Windows Server admins will love learning about the hot new features of Server 2012, including the new tools that will help make Windows Server installations more compact, efficient, and secure. New or future admins will get to know the essentials to keep systems running and feature-rich, including the tips that are usually known only to experienced admins! RESPECT: iNKiSO, JGTiSO, AG, CFE, LiBiSO

CBT Nuggets - Microsoft Windows Server 2012 70-410

$
0
0
Are you ready for Windows Server 2012? You will be after viewing this training series by James Conrad. Get familiar with Windows Server 2012 and prepare for the new 70-410 exam, part of the MCSA. Server 2012 is Microsoft's best release to date, and this series shows the exciting new features and improvements. Topics covered in this series include: Installing and configuring Windows Server 2012; managing Active Directory Domain Services objects; automating Active Directory Domain Services administration; implementing networking services; implementing local storage; implementing file and print services; implementing group policy; and implementing server virtualization with Hyper-V. Windows Server admins will love learning about the hot new features of Server 2012, including the new tools that will help make Windows Server installations more compact, efficient, and secure. New or future admins will get to know the essentials to keep systems running and feature-rich, including the tips that are usually known only to experienced admins!

CBT Nuggets CISA

$
0
0
Is your organization's critical information protected? ...Really? Without comprehensive security plans, policies, and procedures, your organization's information security could be missing something. And that's all it takes for the worst to happen. As a Certified Information Systems Auditor (CISA), you'll perform a business-critical function -- assess your organization's IT and business systems to ensure they are monitored, controlled, and protected. These are valuable skills... and CISA is a valuable certification There is rapidly growing demand for skilled CISAs. CISA is on the level of CISSP and CCIE in prestige and in the way it distinguishes you from your peers. It's globally recognized within the IT industry and beyond. It's used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that just having the CISA credential can increase your salary.* Gain knowledge in 6 critical Information Security areas Instructor Michael Shannon walks you through the 6 major knowledge areas every CISA must be proficient in: Area 1: The Information System Audit Process Area 2: Information Technology Governance Area 3: Systems and Infrastructure Life Cycle Management Area 4: IT Service Delivery and support Area 5: Protection of Information Assets Area 6: Business Continuity and Disaster Recovery These are the building blocks to a successful career as a top-notch information security professional.

Atomix Blade&Soul CBT2

$
0
0
Atomix Blade&Soul CBT2 Full Patch forums.atomixro.com

CBT Nuggets - Microsoft Windows Server 2012 70-413

$
0
0
Prepare yourself to design and implement a Windows Server 2012-based server infrastructure! Covering the major topics and concepts you'll need to succeed, this series with trainer Don Jones addresses all of the major objective points on the Microsoft 70-413 exam. You'll learn the valuable background concepts and decision points that will enable you to make the right design and implementation decisions for any situation. Combined with some hands-on practice and experience, this series will put you on the path to becoming a Server Infrastructure expert!

CBT Nuggets - Scrum Certification

$
0
0
[image=Wj7wQrKPst] This series will provide a comprehensive review of the Scrum development approaches and provide the background needed to become a Certified Scrum Master.Trainer Steve Caseley provides an overview of Scrum, including the roles, activities and project management tools. Steve breaks down the specific duties of each Scrum Role: Scrum Master, Product Owner and Scrum Team, as well as the Scrum rituals that form the core of Scrum. The series also explores the similarities and differences between Scrum and traditional development approaches and examines the six different Scrum certifications from the Agile Alliance. Course Outline 01. Introduction to Scrum 02. Scrum versus Traditional Development 03. Scrum Roles 04. Scrum Meetings 05. Scrum Artifacts 06. Scrum Master 07. Product Vision and Product Backlog 08. What is done 09. Release and Sprint Planning 10. Scrum Estimating 11. A Sprint 12. Daily Scrum 13. Tracking Progress 14. Dealing with Changes 15. The Product Owner 16. Sprint Review and Retrospective 17. Backlog Grooming 18. Writing User Stories 19. Team and Business Dynamics 20. Technology and Process Debt 21. Agile Development Techniques – 1 22. Agile Development Techniques – 2 23. Delivering Large Projects with Scrum 24. Distributed Scrum 25. Scrum Process Improvement 26. How to Deal with Organizational Resistance 27. How to Get Started with Scrum

CBT Nuggets - Cisco CCNP Security IPS 642-627

$
0
0
[center][img]http://i23.fastpic.ru/big/2011/0612/11/457d870706a7ac787ed8cccc4244ea11.jpg[/img][/center] If you defend your Cisco network with the vigilance of a proud parent, make sure you’ve got the know-how and skills needed to effectively deploy Cisco IPS-based security solutions for your organization or customers. With Cisco super-trainer Michael Shannon, you’ll learn how use Cisco’s powerful IPS features to mitigate a wide variety of potential risks to your IT infrastructure and applications. Michael will also lead you through a number of live demonstrations, detailing operations support for both the standalone and modular IPS sensors. Protect your network and prove your security savoir-faire with Cisco’s CCNP Security or IPS Specialist certifications. Michael Shannon’s Intrusion Prevention System v7.0 series will prepare you for both. [b][color=blue]Content:[/color][/b] [b]Introduction to IPS[/b] Explore IDS/IPS terminology and features of the Cisco IPS. You'll also learn about the architecture, software, and hardware. You'll explore the eight traffic analysis methods and finish up with a look at Cisco IPS anti-evasion techniques. [b]IPS Network Integration[/b] Become familiar with the different options for deploying and integrating your sensor solution into your network. Topics include promiscuous mode, inline pairs, VLAN pair mode, VLAN groups, and best practices for each option. [b]Initial Setup and Management[/b] Get your feet wet with some implementation by looking at the CLI on a 4240 and AIP-SSM, then jumping into the IPS Device Manager (IDM) for basic setup, configuration, and sensor management through the GUI. [b]Basic Traffic Analysis[/b] See the IPS sensor in action with a real-world configuration of the default virtual sensor engine. You'll also learn about traffic normalization settings, IPv6 support, software bypass, and an introduction to IPS signatures. [b]Engines, Basic Tuning, and Responses (Part 1)[/b] In part one of two nuggets dedicated to signature engines and responses, you'll survey all of the engine types and explore basic signature tuning, including event counting and summarization. You'll enable the FTP and HTTP AIC engines as well, and will learn how to set up a Windows system in a virtual machine as your target host for ongoing penetration testing through the IPS sensor. [b]Engines, Basic Tuning, and Responses (Part 2)[/b] In this continuation of Part 1, you will further explore detective and aggressive actions, the components and purpose of risk rating, remote blocking, and IP logging. Included are several awesome real-world configurations. [b]IPS Anomaly Detection[/b] Here you will learn all about the powerful Anomaly Detection feature for your Cisco IDS/IPS implementation. Topics include concepts, functionality, components, configuration, monitoring, and troubleshooting of the Anomaly Detection service. [b]Custom Traffic Analysis (Part 1)[/b] This is the first of two nuggets that explores expert-level advanced traffic analysis and tuning on the 4240 sensor. This action-packed module includes event counting, dynamic summarization, event action overrides, event filters, target value rating (TVR) configuration, and POSFP. [b]Custom Traffic Analysis (Part 2)[/b] In part two you will continue the advanced analysis by generating custom signatures both manually and wizard-driven. You will also learn techniques to manage false positives and false negatives on an ongoing basis. [b]IPS Manager Express[/b] You're really gonna love this exploration of the IME including its features, display options, configuration, real-time and historical monitoring as well as powerful reporting features for up to 10 devices at once. [b]Global Correlation, Reputation-Based Filtering, SIO, and Intellishield[/b] Well, the title of this nugget says it all! We are going to learn about the Global Correlation and Reputation-Based Filtering features with the Sensorbase network, Cisco Security Intelligence Operations (SIO), Intellishield services, and some awesome test tips to finish it off. [b]Optimizing Sensor Performance[/b] Let's make sure that our sensors are banging on all cylinders! We will explore sensor throughput requirements, recognition and detection of performance issues with CLI, IDM, and IME metric indicators. We will also discuss SPAN issues for promiscuous mode operations, load-sharing, and traffic-reduction methods. [b]Sensor High-Availability Options[/b] This nugget is really a companion piece to the optimization module. Here you will learn about the high-availability choices for the IPS sensor - which often go hand-in-hand with performance. This nugget covers a definition of sensor high-availability; switched-based HA; router-based HA; and AIP-SSM HA using the Adaptive Security Appliance active-standby and active-active solutions. 00:26:35 [b]AIP SSM and AIP SSC Modules[/b] It's "Module" time! Prepare for a fascinating look at the ins and outs of the AIP-SSM and AIP-SSC5 modules of the 5500 series security appliances. [b]ISR IPS AIM and IPS NME Modules[/b] In this little gem of a nugget you will learn all about the IPS Advanced Integration Module (AIM) and IPS Network Module Enhanced (NME) modules that are deployed in the Cisco Integrated Services Routers. [b]Cisco IDSM-2 Essentials[/b] This final nugget takes a brief tour of the specifications and features of the Intrusion detection System Services Module-2 (IDSM-2) that is installed in the Catalyst 6500-series switch platforms. [center] [img]http://kastatic.com/i2/u/1917497/bWPCYrHg1p.gif[/img] [img]http://kastatic.com/i2/u/1917497/sXYcrGpCkn.gif[/img] [img]http://kastatic.com/i2/u/1917497/p1belV8LNY.gif[/img] [img]http://kastatic.com/i2/u/1917497/o1ORBg3csd.gif[/img] [/center]

CBT GNS Keith Barker

$
0
0
CBT Nuggets GNS3: The Definitive Guide for Working with GNS3 GNS3 is a free, open-source tool that provides emulation of network hardware (such as Cisco routers and firewalls), so that customers can practice, configure, and troubleshoot network scenarios all in a virtual environment running right on their Windows, Mac OSX or Linux computers. Multiple network topologies can be saved, paused and/or resumed on the fly so that the learner can practice at the convenience of their own schedule. GNS3 provides the emulation of the physical devices, and the user provides the OS image for the version/vendor of the software they want to practice on. GNS3 is a fantastic tool, but there are a few stumbling blocks facing the typical user. In this video series, CBT Nuggets trainer Keith Barker becomes your tour guide and introduces the typical issues facing every GNS3 user and, more importantly, how to overcome and solve each of these challenges. Topics in the video series include running GNS3 in Windows, Mac and Linux environments; how to integrate virtual workstations into the GNS3 topology; how to connect the virtual GNS3 network to a live network; and much more.

CBT Nuggets - Citrix CCA Basic Administration for XenApp6

$
0
0
[b]CBT Nuggets Citrix Virtualization CCA XenApp 6[/b] English Genre: Video Training Learn to install, configure, and administer Citrix XenApp 6 on-demand applications. If you're starting out with XenApp or want a refresher on the new topics that have evolved since Citrix released its last version, this is the training for you. What's new? XenApp 6 now integrates its management tools into a streamlined single-pane solution with the Citrix Delivery Services Console. Also new are policies, which apply settings configuration in much the same way as Active Directory Group Policy. Finally, in this release Citrix further integrates streaming and presented applications to better tailor application delivery to user requirements. By the time you've finished watching this series, you'll be better equipped to build and manage a XenApp infrastructure. Plus, you'll be prepared for the CCA A-18 exam. More Info_http://anonym.to/?http://www.cbtnuggets.com/it-training-videos/series/ctrx_a18_xenapp6

CBT Nuggets - Python Programming Python Language : On-the-job Training

$
0
0
If you're interested in learning how to write computer programs, you'll love this training. It's perfect for desktop/web application developers who need an intro course in Python, for systems administrators who are interested in using Python for automation and for anyone interested in a programming career. By the time you're done watching, you'll be ready to develop Python automation scripts, desktop apps, and/or Web apps. You'll also have a thorough knowledge of how to use Python on all major platforms and a healthy jumpstart for learning other programming languages (like Java, Perl, C and Ruby). [b]Content:[/b] Course Introduction 00:42:49 How This Course Works. What You Need to Get Started. What is Python? In this nugget we provide a high-level overview on how this course works. We also cover why Python is and what tools you need in order to practice your skills along with the training. Introduction to Python 00:44:57 Installing Python. Using IDLE. Running Python Programs. In this nugget we learn how to obtain, install, and configure CPython. Next, we introduce the IDLE integrated development environment (IDE). Finally, we present a quick-start on the myriad ways in which Python programs can be run on Windows, Mac OS X, and Linux. Data Types, Part I 00:46:07 Introduction to Data Types. Numbers. Strings. In this nugget we introduce data types in Python: what they are, why they are essential, and how to implement them in our Python code. We then commence our data type deep-dive by considering the number and string types. Data Types, Part II 00:34:49 Lists. Tuples. Dictionaries. In this nugget we continue our consideration of Python data types by discussing lists, tuples, and dictionaries. These so-called data structures allow you to store increasingly complex arrays of data into names (variables), with which you can perform operations. Statements, Documentation, and Help 00:44:54 Python Statements. Rules for Variables. Comments and Docstrings. Online Help. In this nugget we examine Python syntax and rules for Python names. We spend some time on the important subject of documentation and Python docstrings, and finish the lesson up with a demo on how to employ Python online help to best effect. Strings, Revisited 00:26:13 Advanced String Methods. String Formatting. Obtaining Keyboard Input.In this nugget we revisit the string data type, building upon the foundation we established during an earlier nugget. Here we cover advanced string methods, string formatting, and how to use the input() function to obtain keyboard input from the user. Control Flow, Part I 00:27:57 Decision Making with the if Statement. Boolean Logic. Break and Continue. In this nugget we big to add various forms of logic to our Python code. Specifically, we learn how to use the if statement to conduct decision making, Boolean logic to institute true vs. false arguments, and the break and continue statements to control flow through looping constructs. Control Flow, Part II 00:25:36 Counting with For Loops. Evaluating with While Loops. In this nugget we continue our trolley ride through implementing conditional logic and control flow in Python. Here we learn to count with for loops and evaluate conditions with the while loop. Data Structures, Revisited 00:32:00 Counting with For Loops. Evaluating with While Loops. In this nugget we continue our trolley ride through implementing conditional logic and control flow in Python. Here we learn to count with for loops and evaluate conditions with the while loop. Functions 00:50:25 Components of a Function. Calling Functions. Return Values. In this nugget we begin to consider functions, which lie at the heart of a procedural programming language like Python. We will learn how functions work, how to write them, and how to manage return values. File Handling 00:44:47 Accessing the File System. Reading and Writing Files. In this nugget we turn our attention to how we can program Python to access the host operating system and file system. We will also learn how to create, edit, and manage files by using Python code. Accessing the Network and Internet 00:35:43 Accessing LAN Resources. Interacting with Web Pages. Connecting to FTP Sites. Continuing the theme begun in the previous nugget, in this nugget we discover how to fetch Web content by using Python. We will also review the basics of Python-based File Transfer Protocol (FTP) access. Exception Handling 00:37:39 Understanding Exceptions. Raising and Catching Exceptions. In this nugget we understand what exceptions are and specifically how we can catch and manage these exceptions in our Python programs. Modular Programming 00:37:45 Using Modules. The Module Search Path. Python Packages. In this nugget we formally consider multi-file Python programming. In particular, we understand what modules are, how to import them, and how to manage the Python module search path. Finally, we provide an overview on how multi-file Python programs can be bundled into packages for easier distribution. Object-Oriented Programming 00:30:36 OOP Principles. Creating and Using Classes. Python is a multi-paradigm programming language. In this nugget we formally introduce Python's object-oriented programming (OOP) features. We undertake a general overview of OOP terminology, and then learn the mechanics of creating and using classes. Advanced Topics 00:18:52 Generators. Decorators. In this nugget we take a look at some topics that require some previous experience with Python--experience that you now have! In particular, we learn how to use generators as well as decorators to produce faster, more memory efficient Python code. GUI Development 00:22:53 Python and Database Access 00:22:17 Database Access Frameworks. Interacting with sqlite. In this nugget we "stretch" Python to the realm of relational database management systems (RDBMSs). We first cover the basic mechanics of Python-RDBMS communications. Next, we learn how to program Python to interact with the built-in sqlite RDBMS. Porting Python Code 00:16:24 Python 2 vs Python 3. Using the 2to3 Utility. In this nugget we learn how to port Python 2 code to Python 3. This skill is particularly important when we recall that the majority of downloadable code on the Internet (as well as many popular Python-based frameworks) are written in Python 2.x. During the course of this nugget we will gain familiarity with the 2to3 Python script, which is the built-in Python 3 utility for performing an "automatic" code conversion. Python Frameworks and IDEs 00:23:37 Web Application Frameworks. Python IDEs. In this nugget we provide a survey of the most powerful Python-based Web application frameworks. We conclude the training with another survey, this time examining the major Python integrated development environments (IDEs).

CBT Nuggets - Cisco CCNP Security IPS 642-627

$
0
0
[center][img]http://i23.fastpic.ru/big/2011/0612/11/457d870706a7ac787ed8cccc4244ea11.jpg[/img][/center] If you defend your Cisco network with the vigilance of a proud parent, make sure you’ve got the know-how and skills needed to effectively deploy Cisco IPS-based security solutions for your organization or customers. With Cisco super-trainer Michael Shannon, you’ll learn how use Cisco’s powerful IPS features to mitigate a wide variety of potential risks to your IT infrastructure and applications. Michael will also lead you through a number of live demonstrations, detailing operations support for both the standalone and modular IPS sensors. Protect your network and prove your security savoir-faire with Cisco’s CCNP Security or IPS Specialist certifications. Michael Shannon’s Intrusion Prevention System v7.0 series will prepare you for both. [b][color=blue]Content:[/color][/b] [b]Introduction to IPS[/b] Explore IDS/IPS terminology and features of the Cisco IPS. You'll also learn about the architecture, software, and hardware. You'll explore the eight traffic analysis methods and finish up with a look at Cisco IPS anti-evasion techniques. [b]IPS Network Integration[/b] Become familiar with the different options for deploying and integrating your sensor solution into your network. Topics include promiscuous mode, inline pairs, VLAN pair mode, VLAN groups, and best practices for each option. [b]Initial Setup and Management[/b] Get your feet wet with some implementation by looking at the CLI on a 4240 and AIP-SSM, then jumping into the IPS Device Manager (IDM) for basic setup, configuration, and sensor management through the GUI. [b]Basic Traffic Analysis[/b] See the IPS sensor in action with a real-world configuration of the default virtual sensor engine. You'll also learn about traffic normalization settings, IPv6 support, software bypass, and an introduction to IPS signatures. [b]Engines, Basic Tuning, and Responses (Part 1)[/b] In part one of two nuggets dedicated to signature engines and responses, you'll survey all of the engine types and explore basic signature tuning, including event counting and summarization. You'll enable the FTP and HTTP AIC engines as well, and will learn how to set up a Windows system in a virtual machine as your target host for ongoing penetration testing through the IPS sensor. [b]Engines, Basic Tuning, and Responses (Part 2)[/b] In this continuation of Part 1, you will further explore detective and aggressive actions, the components and purpose of risk rating, remote blocking, and IP logging. Included are several awesome real-world configurations. [b]IPS Anomaly Detection[/b] Here you will learn all about the powerful Anomaly Detection feature for your Cisco IDS/IPS implementation. Topics include concepts, functionality, components, configuration, monitoring, and troubleshooting of the Anomaly Detection service. [b]Custom Traffic Analysis (Part 1)[/b] This is the first of two nuggets that explores expert-level advanced traffic analysis and tuning on the 4240 sensor. This action-packed module includes event counting, dynamic summarization, event action overrides, event filters, target value rating (TVR) configuration, and POSFP. [b]Custom Traffic Analysis (Part 2)[/b] In part two you will continue the advanced analysis by generating custom signatures both manually and wizard-driven. You will also learn techniques to manage false positives and false negatives on an ongoing basis. [b]IPS Manager Express[/b] You're really gonna love this exploration of the IME including its features, display options, configuration, real-time and historical monitoring as well as powerful reporting features for up to 10 devices at once. [b]Global Correlation, Reputation-Based Filtering, SIO, and Intellishield[/b] Well, the title of this nugget says it all! We are going to learn about the Global Correlation and Reputation-Based Filtering features with the Sensorbase network, Cisco Security Intelligence Operations (SIO), Intellishield services, and some awesome test tips to finish it off. [b]Optimizing Sensor Performance[/b] Let's make sure that our sensors are banging on all cylinders! We will explore sensor throughput requirements, recognition and detection of performance issues with CLI, IDM, and IME metric indicators. We will also discuss SPAN issues for promiscuous mode operations, load-sharing, and traffic-reduction methods. [b]Sensor High-Availability Options[/b] This nugget is really a companion piece to the optimization module. Here you will learn about the high-availability choices for the IPS sensor - which often go hand-in-hand with performance. This nugget covers a definition of sensor high-availability; switched-based HA; router-based HA; and AIP-SSM HA using the Adaptive Security Appliance active-standby and active-active solutions. 00:26:35 [b]AIP SSM and AIP SSC Modules[/b] It's "Module" time! Prepare for a fascinating look at the ins and outs of the AIP-SSM and AIP-SSC5 modules of the 5500 series security appliances. [b]ISR IPS AIM and IPS NME Modules[/b] In this little gem of a nugget you will learn all about the IPS Advanced Integration Module (AIM) and IPS Network Module Enhanced (NME) modules that are deployed in the Cisco Integrated Services Routers. [b]Cisco IDSM-2 Essentials[/b] This final nugget takes a brief tour of the specifications and features of the Intrusion detection System Services Module-2 (IDSM-2) that is installed in the Catalyst 6500-series switch platforms. [center] [img]http://kastatic.com/i2/u/1917497/bWPCYrHg1p.gif[/img] [img]http://kastatic.com/i2/u/1917497/sXYcrGpCkn.gif[/img] [img]http://kastatic.com/i2/u/1917497/p1belV8LNY.gif[/img] [img]http://kastatic.com/i2/u/1917497/o1ORBg3csd.gif[/img] [/center]

CBT Nuggets - Cisco CCNA Labs - Cisco For The Real World

CBT Nuggets - Cisco CCNP Security FIREWALL v2.0 642-618

$
0
0
Firewalls have come a long way over the years, and the Cisco Adaptive Security Appliance (ASA) firewall has as well. In this "soup-to-dessert" video series, trainer Keith Barker walks you through the entire process of implementing the ASA on the network, beginning with bootstrapping the ASA so that it will allow basic management, all the way to configuring advanced features such as the new Network Address Translation (NAT, which changed between versions 8.2 and 8.3), redundant interfaces, etherchannel, transparent L2 firewall services, multiple-contexts (virtual firewalls), application layer inspection, failover for high availability (HA), and more. By the time you finish this series, you'll be able to return to your network with confidence in the care and feeding of the ASA. This series addresses all the objectives for exam 642-618 (Firewall v2), which is part of the Cisco Firewall Specialist, ASA Specialist and CCNP Security certifications. Plus, a GNS3 Nugget covers how to create a complete ASA virtual lab environment, for hands-on practice. Viewers who have taken the CCNA Security (or has the equivalent knowledge) will get the most out of this series. Exam 642-618 is one of the requirements for ASA Specialist, Firewall Specialist and CCNP Security certifications; pre-requisites for these 3 certifications include CCNA (RS) and CCNA Security. This series is also valuable if you're applying for network/security positions where the employer has ASAs in place and are looking for skilled ASA network technicians and engineers.

CBT Nuggets - Cisco CCNP Security SECURE 642-637

$
0
0
CISCO CCNP SECURITY (FORMERLY KNOWN AS CCSP) SECURE 642-637 Secure v1.0 Securing Networks with Cisco Routers and Switches Take your first big step towards CCNP Security certification by passing Cisco's 642-637 exam. Why does Cisco CCNP Security certification give you instant job security? Because IT managers, CEOs and corporate shareholders are really nervous about network security. With 642-637 under your belt, you'll be advancing your security knowledge and career, upping your odds for scoring a promotion and building your clout within any IT team. Trainer Michael Shannon covers everything you need to know, from NFP controls to VPN deployment. By the time you've finished this training series, you'll understand Cisco defense-in-depth and how to deploy, implement, and configure Cisco security features. Plus, you'll be ready for the CCNP Security 642-637 exam!

CBT Nuggets - PowerShell 3 Foundations

$
0
0
[image=9v5sXb8c1O] Ready to learn Windows PowerShell? Learn from the best: Microsoft MVP award recipient Don Jones, author of "Learn Windows PowerShell 3 in a Month of Lunches," presents a video training series that will help you master PowerShell's foundations with absolutely zero prior experience. Using a friendly, approachable style and a carefully planned outline, Don introduces you to PowerShell's ins and outs, one piece at a time. With a focus on teaching you how to use PowerShell to actually teach yourself, you'll become "immediately effective" in just a few short lessons, and start exploring some of PowerShell's high-end capabilities. Full of clear demonstrations and advice for avoiding the most common pitfalls and "gotchas," this is the perfect way to learn Microsoft's new command-line and scripting technology.

CBT Nuggets Cisco CCNP CVoice 8.0 642-437

$
0
0
CBT Nuggets Cisco CCNP CVoice 8.0 642-437 1. Welcome to CVOICE 8.0: Cisco Certification and Getting the Most from this Series Welcome to the Cisco CVOICE video series! This opening Nugget discusses the series objectives and their relation to the Cisco CCNP Voice certification path. You'll also see recent changes to the Cisco certification process that make real-world training (which is the goal of CBT Nuggets) the best possible way to prepare. 00:21:41 2. Voice Gateways: The Bridge Between Worlds This Nugget discusses traditional telephony and Voice over IP (VoIP) comparison and key terms; understanding the Cisco VoIP Solution; Cisco VoIP design models (single-site, centralized, distributed, and clustering over the WAN); common Cisco VoIP hardware (Voice Gateways, PoE switches, ATA adapters, IP phones, and CUCM servers). 00:40:05 3. Voice Gateways: Understanding Analog Voice Ports This Nugget discusses analog voice port options: FXS, FXO, E&M, and CAMA; analog voice port signaling types and standards; analog voice port configuration: call progress tones (cptone), PLAR, ring cadence, and signaling. 00:40:58 4. Voice Gateways: Understanding Digital Voice Ports This Nugget discusses digital voice port options: T1, E1, PRI; digital voice port signaling: CAS, CCS, Q.921, Q.931, QSIG; and digital voice port configuration: ds0-group and pri-group. 00:31:57 5. Voice Gateways: Handling Echo, Cross Connect, Timers and Verification This Nugget discusses remedies for echo on a VoIP connection; cross-connecting analog and digital ports together; analog timers (initial, hookflash, interdigit, etc...); verification commands. 00:26:19 6. Voice Gateways: Voice CODECs and DSP Resources This Nugget discusses the common VoIP CODECs used in the Cisco world: G.711, G.729, and iLBC; calculating bandwidth consumed by voice calls; managing DSP resources and using DSPFarms. 00:44:37 7. VoIP Foundations: How Spoken Voice Becomes a Packet This Nugget discusses the process of converting analog signal into digital format, including Nyquist Theorum, PCM, Quantization, G.711ulaw, and G.711alaw. 00:16:39 8. Dial Peers: Understanding and Using Dial-Peers This Nugget discusses the concept of Cisco Call Legs, the differences between POTS and VoIP dial-peers, and performs a base configuration of POTS/VoIP dial-peers on two Cisco routers. 00:43:46 9. Dial Peers: Wildcards and Voice Route Matching This Nugget discusses Destination-Pattern Wildcards, matching inbound and outbound dial-peers, and the concept of the "Forsaken Default Dial Peer 0." 00:33:12 10. Dial Peers: End-to-End Practical Scenario This Nugget is subtitled, "How to Set up Your House for VoIP." Jeremy puts together a complete demonstration from scratch covering the following topics: Bringing a PSTN line into an FXO port, FXS configuration, PSTN dial-peers, Private Line Automatic Ringdown (PLAR), automatic digit stripping (POTS dial-peers), forward-digits, VoIP dial-peers, and CODEC modification. 00:46:15 11. Dial Peers: Overlapping, Hunting, and Basic Manipulation This Nugget discusses the methods routers use to handle overlapping dial-peers and duplicate destinations, dial-peer hunt options, creating hunt groups, and basic digit manipulation commands (prefix, forward-digits, num-exp). 00:22:58 12. Advanced Dial Plans: Digit Manipulation and Transformation This Nugget discusses methods used to modify Caller-ID (ANI) information, translation-rules, and provides many examples of regular expression use with called and calling transformations. 00:37:58 13. Advanced Dial Plans: Configuring, Applying, and Testing Digit Manipulation This Nugget applies the topics from the previous Nugget (regular expressions, calling and called party transformations) into practical configuration. Topics include transformation-rules and transformation-profiles configuration. 00:27:05 14. Advanced Dial Plans: Calling Privileges with Class of Restriction (COR) This Nugget covers the implementation of calling restrictions using the Class of Restriction (COR) lists feature of Cisco voice gateways. Topics include the purpose of calling restrictions, reconstructing PSTN dial-peers, and understanding and implementing COR Lists. 00:34:14 15. CME: IP Phones, VLANs, and Communication This Nugget discusses the characteristics of Cisco IP Phones (allowing you to pick which model suits you)000, presents an understanding of key network configurations needed to support Cisco IP Phones (Voice VLAN, Quality of Service (QoS), DHCP, and Power over Ethernet (PoE)), and the IP Phone boot and registration process. 00:35:15 16. CME: Base Configuration This Nugget walks through the base configuration needed to support IP Phones using CME: Power over Ethernet (PoE), Voice VLAN (VVLAN), Network Time Protocol (NTP), DHCP, IP Phone Firmware, telephony-service (SCCP) configuration, and SIP configuration. 00:39:28 17. CME: Ephones and Ephone-DNs, Part 1 This Nugget builds on the base configuration in the previous Nugget to configure Ephone and Ephone-DNs, making internal VoIP calling possible. 00:28:33 18. CME: Ephones and Ephone-DNs, Part 2 Picking up right where the last Nugget left off, we break down the "button" command and perform multiple examples of shared lines, button overlay, and auto-assignment. 00:28:32 19. CME: SIP Phones, Ephone Types, Codecs, and Verification This final Nugget focused on CME discusses the differences between SCCP and SIP for end-point control, how to set up SIP-based devices in CME, the configuration of ephone-types and default CODECs, and the verification/troubleshooting steps you can use with CME. 00:30:29 20. Voice Protocols: At the Core This Nugget provides an overview of the key voice protocols used day-to-day: RTP, RTCP, H.323, SIP, and MGCP. Also discussed are the multiple flavors and features of RTP: cRTP, SRTP, and VAD. 00:31:22 21. Voice Protocols: H.323 This Nugget provides an in-depth look at the H.323 signaling protocol, covering the call setup and feature negotiation protocols (H.225 and H.245) as well as H.225 RAS (for Gatekeeper signaling). The final portion of this Nugget covers H.323 gateway and gatekeeper configuration. 00:46:16 22. Voice Protocols: SIP This Nugget provides an in-depth look at the SIP signaling protocol, covering the protocol architecture (proxy, registrar, location, and redirect servers), call flow, and configuration. 00:36:54 23. Voice Protocols: MGCP This Nugget provides an in-depth look at the MGCP signaling protocol, covering the protocol architecture, call flow, and configuration (from the voice gateway perspective - please see CIPT for the Call Agent configuration). 00:21:45 24. Cisco Unified Border Element: The Voice Gateway of Voice Gateways This Nugget explores Cisco Unified Border Element (CUBE), which acts as a boundary for your voice network. Topics include CUBE concepts, H.323 and SIP protocol interaction, and configuration. 00:21:20 25. Quality of Service: The Missing Ingredient Without Quality of Service (QoS), your voice network will quickly crumble under the iron fist of data traffic. In this Nugget, Jeremy identifies the "Evil Villains" (delay, jitter, and packet loss) of the voice network and breaks down the different QoS tools you have at your disposal to handle them. The Nugget concludes with a configuration walk-through of the Modular QoS CLI (MQC) structure (class-map, policy-map, service-policy). 00:47:58 26. Quality of Service: CoS, ToS, DSCP, and Trust Boundaries Understanding the various markings you have at your disposal in the QoS world can be confusing at best! In this Nugget, Jeremy walks through the full explanation of Class of Service (CoS), Type of Service (ToS), IP Precedence, and DSCP. Get your brain ready for this one! 00:45:35 27. Quality of Service: Queuing with CBWFQ and LLQ In our modern times, all the previous congestion management (queuing) strategies - priority, custom, and weighted fair queuing - have all melded into one: Low Latency Queuing. Join Jeremy in this Nugget to discuss the need for queuing, the intricacies of LLQ, and the configuration of both LLQ and AutoQoS. 00:46:13 Total Series Duration: 15 hours

CBT Nuggets Oracle Certified Professional OCPm

$
0
0
SIZE 2.72 CBT Nuggets Oracle Certified Professional OCPm

CBTNuggets - Juniper Networks Certified Specialist Security (JNCIS-SEC)

$
0
0
[image=CzI1ibKksF] The Juniper Networks Certified Specialist Security (JNCIS-SEC) certification track allows you to show core competency with general Juniper Networks security technology and the Junos software for SRX Series devices. In this CBT Nugget series from security expert Michael J. Shannon, you will explore: SRX appliance essentials, security zones, SCREEN options, security policy, NAT and PAT, IPSec VPNs, high availability clustering options, IDP, firewall user authentication, an introduction to UTM, anti-spam filtering, anti-virus protection, content and web filtering, and more. Plus, you'l be prepared to take the JN0-332 exam! Introduction to the Juniper SRX This first Nugget of the Juniper Networks JNCIS-SEC series answers the question: What is a firewall system? Next, you will get a bit of history of what led up to the Juniper SRX security gateway product line. Then, you will look at the SRX as a branch/remote/retail office security gateway solution along with the related features. Finally, you will go on a web safari to find out about the SRX product line. 00:27:11 Junos CLI for the SRX We need to establish core competency with the Junos CLI early on in order to establish a baseline for the remainder of the JNCIS-SEC series. This Nugget is will function as either a refresher for the earlier JNCIA Nugget series from Michael - or as a Junos CLI Primer for those who are new to Junos or perhaps migrating rapidly from a Cisco (or other vendor) security solution. This Nugget will be the first of many hands-on, real-world Nuggets in this series. 00:38:08 SRX Interface and Zone Basics This Nugget covers the differences between classic firewalls and zone-based firewalls. We also define zones; examine packet flow through a SRX; explore interface basics; and review edit/show commands. 00:35:39 Configuring Remote Access to the SRX We must first explore the SRX factory default configuration - in anticipation of configuring remote access connectivity to the security device. We will configure the interfaces and zones that were discussed in the previous Nugget. Next, we will configure system services like telnet, SSH, and HTTPS. We will confirure a default route as well. Finally, we will look at cennecting to and configuring the SRX with J-Web. 00:37:04 Administrative Access Control This Nugget focuses on the fundamentals of administrative access to the SRX including local users and classes, custom classes, configuring the SRX to use a RADIUS server, demonstarting a possible scenario on a AAA authentication server. 00:38:21 System and Network Management Every Juniper device, including the SRX, needs to have basic system and network management functionality configured early on in the deployment lifecycle. In this Nugget you will learn how to configure four key management services: NTP, DNS, SNMP, and Syslog. 00:38:21 Security Policy Basics (Part 1) Here we will build a strong conceptual foundation for one of the most vital components of the SRX Security Gateway - security policy. You will learn the basic components of security policies (firewall rules), the syntax and logic of the policy, policy flow, and finishing up with address books and address sets. 00:30:52 Security Policy Basics (Part 2) This second part of security policies will look at "Policy in Action." We will explore several real-world case studies that apply fundamental security policies in various scenarios. 00:40:26 Security Policy Basics (Part 3) In this final Nugget on security policy, we take up where part two left off with a proof-of-concept demonstration of a denial policy. Then you will go deeper into syslog with the SRX as you learn how to send data to the Security Threat Response Monitor (STRM). Finally, you will learn methods for performing queries on existing log files and troubleshooting with TraceOptions. 00:29:00 NAT - Network Address Translation Network Address Translation is a method for dealing with IPv4 address space depletion as well as a way to hide the addressing scheme of your security zones. This Nugget defines this important feature and describes the three major types of NAT supported on th SRX. You will also see configuration examples of Source NAT to the interface and a NAT pool. 00:36:16 IPsec VPN (Part 1) Before we explore the vital function of virtual private netwotking on the SRX we must learn the fundamentals of VPNs, the various topologies and flavors, as well as how IPsec operates in a universal way. These concepts will be mastered before diving in to the IPsec distinctives on the Juniper SRX. 00:43:27 IPsec VPN (Part 2) In part two we will look at Junos IPsec distinctives, including Routing and Policy-Based VPNs; pre-deployment considerations and options; and various VPN settings. Then you will look at the configuration of a site-to-site IPsec VPN in J-Web and the Junos CLI between two SRX security gateways. 00:39:43 Screen Options Organizations are bombarded on a daily basis with a wide variety of reconnaisance attacks and information gathering sweeps that lead to more dangerous structured attacks. In this Nugget, we will explore the Screen option on the SRX to protect our network from a wide variety of vulnerabilities to ICMP, IP, TCP, and UDP. We will also take a peek at a common toolkit for launching this code: Back|Track 5. 00:39:12 Intrusion Detection and Prevention (IDP/IPS) Fundamentals After the deployment of stateful firewalls and screens, the next critcal component of your firewall system will be intrusion detection and prevention (IDP). This feature is also being more commonly referred to as IPS in the Juniper world. In this Nugget, we will explore the key concepts and terminology of IDP along with the fundamentals for configuring this service on the SRX appliance. 00:32:32 Overview of HA Clustering In this Nugget we will look at a pillar of security disaster recovery - high availability. You will learn the key concepts and technologies surrounding Chassis Clustering with focus on an Active/Passive cluster between two SRX210 devices. 00:31:08 Firewall User Authentication Here is an interesting feature that is found on most firewalls where select users can authenticate with a telnet, ftp, or http session against a local or remote database to get access to resources in other zones. In this Nugget, you will learn about the two types of user authentication on the SRX: Pass-Through Authentication and Web Authentication. 00:24:55 UTM: Anti-Virus Protection First we will define and explore the overall Unified Threat Management (UTM) feature on the SRX. Then we will tackle the four main types, one at a time, starting with the SRX anti-virus capabilities of UTM. 00:27:14 UTM: Web Filtering Here we get a look at the three methods for filtering URLs on the SRX (as well as the J-Series router): Local Web Filtering, Integrated Web Filtering, and Redirect Filtering to a Websense server. We will specifically look at the configuration of Local Web Filtering on the SRX210. 00:20:21 UTM: Content and Anti-Spam Filtering The final Nugget of the JNCIS-SEC series focuses on the last two Unified Threat Management features available on the SRX. First, you will learn about Content Filtering for MIME patterns and extensions as well as blocking content like ActiveX and Java applets. Second, the Anti-Spam feature will help us stop unwanted email from commercial, malicious, and fraudulent sources. 00:23:32 Total Series Duration: 10 hours

Cbt Nuggets 70 414 rar

$
0
0
MicrosoftΓÇÖs 70-414 exists as the capstone to your entire certification effort. This exam doesnΓÇÖt so much ask ΓÇ£what to doΓÇ¥ as ΓÇ£when to do it." Indeed, youΓÇÖll get a few questions about Windows Server 2012 and System Center configurations, but the 70-414ΓÇÖs primary goal is proving you know when to implement Microsoft technologies. no pass

CBTNuggets Microsoft 70-415 MCSE Desktop Infrastructure (2013)

$
0
0
[image=U2eVLJD5Ax] Installing Windows the manual way can be a time-consuming, almost soul-sucking part of an IT desktop professional's daily life. This activity takes forever and requires interactive attention for only occasional button-clicks, all while eating away at your user productivity. But it doesn't have to be that way. Deploying Windows - and indeed your entire desktop infrastructure - is a task you can easily automate with free tools and a few up-front investments in time. With a surprisingly small amount of effort, you can completely automate Windows deployment throughout your entire environment. It's all about creating the right building blocks and layering them together in just the right way. Veteran CBT Nuggets instructor Greg Shields is a Microsoft MVP who's been installing Windows desktops since its earliest versions. He's built desktop deployment solutions for businesses very small to very large, and has figured out the smart ways to automate the entire process. He's also an expert on remote applications, having managed Terminal Server, Remote Desktop Services, and Citrix environments since back in the days of NCD WinFrame. Greg joins CBT Nuggets once again for his 19th training series, this time on the tips, tricks, and tactics in Implementing a Desktop Infrastructure - which these days is known as Microsoft's 70-415 exam. Are you an IT Desktop Administrator looking to eliminate the manual scut work from your everyday life? Are you ready to prove your skills by successfully passing Microsoft's new MCSE: Desktop Infrastructure? Then join Greg on this short-and-sweet exploration of complete automation in implementing your Windows desktop infrastructure. You'll shortcut your learning in deploying Windows automatically, from Microsoft's Light Touch to Zero Touch method. You'll learn how to rapidly deploy and manage applications atop Remote Desktop Services as well as implement VDI desktop virtualization with the Remote Desktop Virtualization Host atop Hyper-V. Save yourself weeks of research and accelerate your Windows desktop deployment learning in this deep dive with Microsoft MVP Greg Shields.
Viewing all 631 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>