Jump to content

cciesp

Members
  • Posts

    132
  • Joined

  • Last visited

Recent Profile Visitors

3,586 profile views

cciesp's Achievements

Grand Master

Grand Master (14/14)

  • One Year In
  • Well Followed Rare
  • One Month Later
  • Dedicated
  • Collaborator

Recent Badges

15.3k

Reputation

  1. Table of contents Getting Started 10mins Introduction to Network Infrastructure Protection 51mins Control Plane Security for Cisco IOS 45mins Configuring CPPr and Routing Protocol Security 33mins Management Plane Security for Cisco IOS 68mins Management Plane Security for Cisco ASA 48mins Cisco Traffic Telemetry Methods 55mins IOS L2 Data Plane Security 48mins IOS L3 Data Plane Security 25mins Download:
  2. Course description Juniper security policies allow networking professionals working with Junos OS to secure access to a network's critical resources by defining the required security level for those resources. Grasping how these security policies work—and how to troubleshoot them—is key for anyone studying for the Juniper Networks Certified Associate, Security (JNCIA-SEC) certification exam. In this course, discover how to protect your network with security policies as you learn the concepts covered in the Security Policies objectives in the JNCIA-SEC exam. Instructor Shyam Raj covers planning and configuring security policies, as well as how you can use these policies to control traffic moving in and out of a network. Plus, discover how to schedule, monitor, and troubleshoot security policies. Downloads:
  3. About the course Hello, and welcome to Linux System Maintenance! This course is designed to equip you with the knowledge and utilities needed to maintain a Linux system. The course begins with installing programs from their source code, starting with the process of downloading and unpacking source code, and then the actual installation process and patching. The next section covers backup operations, which include the directories to consider for backups, the utilities required to create a backup, and the different physical media that can be used to store the backup. The course ends with automating communication on the host through logon messages, and manually communicating with users using the wall and shutdown commands. This is meant to be a standalone course, but is also part of the learning path toward the LPIC-2 201 exam. Download:
  4. About the course CompTIA introduced their new Linux+ certification in April of 2019 and we’ll help you prepare to succeed in taking it. This course is intended for the IT Professional who uses Linux every day in their personal and professional lives. You only have to pass a single exam now, but keep in mind you will no longer get the LPI 2-for-1 certification as a result. This certification preparation course is designed to cover job-focused Linux foundational skills. The exam covers tasks that are associated with all major distributions of Linux and lays the foundation for more advanced vendor or distribution specific knowledge. Download:
  5. About the course Migrating from monolithic applications to microservices carries many benefits, cost reduction and reliability included. So why isn’t everyone doing it yet? Moving from a monolithic application to one that’s run by microservices comes with many many challenges! There are a number of good ways to implement this, and one of them is to use containers. Kubernetes, an extremely popular orchestration tool for containers, has a lot of moving pieces to worry about – and that’s before you even get to see a “Hello World” app. AWS’ managed Kubernetes service, EKS (Elastic Kubernetes Service), is a great option, and facilitates access to other AWS services like IAM, AutoScaling, and CloudWatch. Learning how to manage all of this can be a tough journey. The more you learn, the more you realize there are a ton of other things to tackle. In this course we’ll be building a whole architecture where you can learn best practices and advanced techniques around Kubernetes, EKS, AWS, as well as the skills required for maintaining a production-ready environment. We are going to take a real-world project and develop it over the duration of the course. There is a LOT in here, so you will need to be confident with AWS already. In this course you’ll learn how to: Apply what you’ve learnt to production environments running on EKS. Solve common issues and improve solutions on a normal Kubernetes setup. Find room for improvement on existing EKS environments, and implement solutions to close them. Develop architectures that are aligned to the five pillars of the Well-Architected Framework. Make better decisions at the start of a new project in EKS, or migration from another Kubernetes architecture. Make your applications scalable, reliable, and highly available in Kubernetes, running under EKS. Please note that this course does not use the Hands-On Labs environment. The labs in this course build on each other, and they’re designed for you to follow along and build out the solution in your own environment, developing it over the duration of the course. We estimate USD $10-15 to cover the costs of EKS, Route53, VPC and your EC2 and Spot Instances, along with a domain name. Download:
  6. Videos in this skill 1. Remote Connectivity to Azure (8:57) 2. Implementing a Site-to-Site VPN (11:56) 3. Point-to-Site VPN (12:24) 4. ExpressRoute (5:59) 5. Introducing the Network Load Balancer (3:43) 6. NLB Health Probes (2:55) 7. NLB Distribution Rules (2:29) 8. Deploying a Network Load Balancer (9:08) 9. Application Gateway (9:10) 10. Load Balancing the Load Balancers with Azure Traffic Manager (6:26) 11. Implementing Azure Traffic Manager (8:07) 12. Monitoring and Troubleshooting Network Connectivity (8:00) Download:
  7. About the course In this course, you will develop the skills you need to write effective and powerful scripts and tools using Python 3. We will go through the necessary features of the Python language to be able to leverage its additional benefits in writing scripts and creating command line tools (data types, loops, conditionals, functions, error handling, and more). Beyond the language itself, you will go through the full development process including project setup, planning, and automated testing to build two different command line tools. Download:
  8. Certified Blockchain Expert™ The Certified Blockchain Expert programme has a comprehensive curriculum that will introduce you to the various facets of Blockchain technology and the industry that is growing around it. The certification will also assist you in understanding Blockchain-based business applications. This training program will walk you through the various components of Blockchain technologies and how they affect enterprise imperatives. In addition, you'll learn how to interact with business executives in a practical way and match their needs with pragmatic and immediately effective solutions, with decentralisation at their heart. Overall, this certification will offer you a major competitive advantage. Certified Blockchain Expert™ is for anyone who wants to learn everything there is to know about enterprise Blockchains and how they may be used in the sector they wish to work in. Modules Included Introduction to Course Origin of Blockchain Technology Introduction to Blockchain Tokenize Everything Blockchain Ecosystem Blockchain Mining Transactions UTXO Vs Account Model Security and Privacy Other Consensus Mechanisms in Blockchain Blockchain Solutions - Steps and measures Use-Cases of Blockchain Other Use-Cases of Blockchain Bonus Exam Structure Download:
  9. This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. Job role: Solution Architect Preparation for exam: SC-100 Download:
  10. Number of Sensors : UNLIMITED UPDATE: CANNOT UPDATE AFTER ACTIVATION 🙂 PRTG License: More than 100 years 🙂 #1 run setup. it will force you to enter an email address. enter anything that looks like an email address, like “[email protected]” #2 now it will require license name and key. request one from their webserver. name doesn't matter, “prtgtrial” is fine. this will contact their server and activate the (trial) license. #3 choose custom (not express); paths are your choice; but skip auto-discovery #4 stop Services, eg via PowerShell: “Get-Service PRTG* | Stop-Service” #5 copy directory structure from “crack” to your install dir. this will not overwrite files, that's fine. #6 run keygen. patch hosts file. #7 adjust settings to your liking. most people will want Type “Site License” / “XL5”, and exp. date / maintenance 2099 or whatever #8 “save license”, overwrite the existing activation.dat. if you have problems with permissions, save it somewhere else and overwrite it manually. #9 start services again, eg “Get-Service PRTG* | Start-Service” .. enjoy
  11. What you'll learn Managing any modern network architecture is difficult as our infrastructure increases in size and complexity. In this course, Automating Cisco Meraki Operations Using APIs, you will learn foundational knowledge surrounding the wide variety of Meraki APIs available. First, you will learn how to create and update Meraki networks, which contain devices such as wireless access points and security cameras. Next, you will discover how to operate and manage security cameras in depth, including collecting and viewing live video footage. Finally, you will explore how to perform a variety of miscellaneous actions, such as setting up external captive portals, observing/reviewing client location data, and monitoring Meraki network performance using event webhooks. When you are finished with this course, you will have the skills and knowledge of Meraki automation needed to deploy and manage professional-grade Meraki networks. Download:
×
×
  • Create New...