Jump to content

celt2005

Members
  • Posts

    24
  • Joined

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

celt2005's Achievements

Rising Star

Rising Star (9/14)

  • Collaborator
  • One Year In
  • Very Popular Rare
  • Conversation Starter
  • Reacting Well

Recent Badges

1.7k

Reputation

  1. I was wondering if you can you do another COR exam to re-certify CCNP-EI ? An example would be do SPCOR , to re-certify the CCNP-EI , or even another exam like ENARSI rather than ENCOR Thank you
  2. CBT Nuggets | Advanced MPLS Tutorial For Cisco Network Engineers [FCO] torrent [Hidden Content] CBT Nuggets - Advanced MPLS Tutorial for Cisco Network Engineers [FCO] About This Advanced MPLS Tutorial for Cisco Network Engineers training prepares network admins to optimize traffic through particularly large or complex networks by configuring Multiprotocol Label Switching on their network routers. Once a network gets complex enough or large enough —or both — it needs a better way to direct traffic through its nodes than long addresses and address tables. One of the better ways available to experienced network administrators and engineers is multiprotocol label switching, which uses short path labels rather than long addresses to choose where each piece of traffic should go next. This can help with network efficiency so that only certain kinds of traffic transit certain areas and low-urgency traffic can take longer, slower routes. Learning to configure MPLS on network devices is an advanced skill that can accelerate a network professional’s career. After finishing the videos in this Advanced MPLS Tutorial for Cisco Network Engineers training, you'll know how to optimize traffic through particularly large or complex networks by configuring Multiprotocol Label Switching on your network routers. For anyone who manages their Cisco training, this Cisco training can be used to onboard new network admins, curated into individual or team training plans, or as a Cisco reference resource. Advanced MPLS Tutorial for Cisco Network Engineers: What You Need to Know This Advanced MPLS Tutorial for Cisco Network Engineers training has videos that cover topics such as: - Configuring VPLS and EoMPLS - Configuring the core interfaces for MPLS TE - Understanding multi-domain segment routing traffic engineering - Configuring BGP and PCEP Who Should Take Advanced MPLS Tutorial for Cisco Network Engineers Training? This Advanced MPLS Tutorial for Cisco Network Engineers training is considered associate-level Cisco training, which means it was designed for network admins. This MPLS skills course is designed for network admins with three to five years of experience with Cisco networking. New or aspiring network admins . MPLS is an advanced networking topic, and network administrators with little to no work experience could find themselves overwhelmed. But if you find yourself in need of an MPLS tutorial, this is one of the better places to learn, as you'll also practice configuring MPLS. Experienced network admins . Network administrators with a few years of experience should take this course if the next step in their career is network engineering or network design. If you'd like to move away from the nuts and bolts of administration and start working on more advanced protocols like MPLS, this is a great place to start. Instructor(s) David Smith, Nugget trainer since 2021 “I love to be able to explain a technology to someone who does not fully understand it — so that they can implement it properly and hopefully advance their careers.” David Smith brings 25 years of IT experience to his training. He also has a background in helping people learn IT, having served as CCIE bootcamp instructor prior to joining CBT Nuggets. David dates his love of technology to when he was 12 years old after his grandfather gave him a TRS-80 Model 1 for his birthday. In his spare time, David enjoys gaming, watching movies, music, and going off-roading. General Info: Author(s) : David Smith Language : English Updated : 2022 Videos Duration : 9h Course Source : [Hidden Content]
  3. INE | The Network Engineer's Guide To MPLS [FCO] torrent [Hidden Content] INE - The Network Engineer's Guide To MPLS [FCO] LEARNING PATH About The Network Engineer's Guide to MPLS will be a tour de force into the world of Multiprotocol Label Switching (MPLS) to include coverage of segment routing. This path will provide learners with all the tools to successfully build, maintain, and troubleshoot both simple and complex MPLS VPN networks. This will include in-depth coverage of history and background of MPLS, the definition of MPLS key terms and concepts, MPLS labels and the MPLS label stack, Forwarding Equivalence Classes (FECs), the Label Distribution Protocol (LDP), TTL propagation, LIB/LFIB, CEF, Layer 2 and Layer 3 MPLS VPNs, Any Transport over MPLS (ATOM), MPLS Traffic Engineering (MPLS TE), Virtual Private LAN Service (VPLS), MPLS Quality of Service (QoS), MPLS Operations and Maintenance (OAM), 6VPE, 6PE, and segment routing concepts, configuration, and troubleshooting. This path will use a blend of physical Cisco ISRG1/G2 routers running IOS 15.x code and Cisco's Virtual Internet Routing Lab (VIRL) for all configuration and packet capture activities and configurations for all activities will be provided. Table Of Content (Courses): - MPLS History, Fundamentals & Foundational Concepts - The Label Distribution Protocol (LDP) - Service Provider Core Configuration - MPLS L3 VPN - MPLS L2 VPN - IPv6, MPLS, Internet Access & Multi-VRF CE - Inter-AS Scenarios - MPLS Traffic Engineering - MPLS Troubleshooting, OAM, QoS & Segment Routing Instructor(s) Travis Bonfigli, I am a dedicated and passionate educator of over 20 years with a demonstrated commitment to an equity-based and learner-centered approach to classroom instruction. I embrace this commitment as my guide to assist learners on their individual educational journeys. I rely on my life, learning, and classroom experiences to contribute to active learning in a safe, fun, and engaging environment. I strive to ensure the social, emotional, and academic development of every unique learner. General Info: Author(s) : Travis Bonfigli Language : English Updated : 2022 Videos Duration : 48h 59m Course Source : [Hidden Content]
  4. Would be great if we also got the answers , Thank you for the guidebook
  5. CompTIA CASP+ (CAS-004) TORRENT 19.94 GB [hide]magnet:?xt=urn:btih:132D24C41B3C647C5CF4231A8B74503F0439A5E4&tr=http%3A%2F%2Fbt3.t-ru.org%2Fann%3Fmagnet&dn=%5BITPRO.TV%5DCompTIA%20CASP%2B%20(CAS-004%20%5B2022%2C%20ENG%5D [/hide] Release year : 2022 Manufacturer : ITPRO.TV Manufacturer website : www.itpro.tv/courses/comptia/comptia-casp-cas004/ Duration : 26h 20m Type of material being distributed : Video lesson Language : English Оverview: Those looking to complete the CompTIA Advanced Security Practitioner (CASP+) certification will find in this course an overview of the process in achieving the certification and a brief amount of details about the exam required to pass in order to receive the certification. CASP+ covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The certification is designed for advanced security professionals that have knowledge of Security+, have a few years of experience in the field, and will go on to learn more advanced skills and need to understand things like risk management and incident response and is also approved by U.S. Dept. of Defense to meet IA technical and management certification requirements. 01. Overview 02. Services - Discussion 03. Segmentation - Discussion 04. Services & Segmentation - Scenarios 05. DeperimeterizationZero Trust 06. Merging of Networks 07. Software-defined Networking (SDN) 08. Infrastructure Design - Discussion 09. Infrastructure Design - Scenarios 10. Baselines & Templates & Software Assurance 11. Integrating Enterprise Applications 12. Security in the Development Lifecycle 13. Securing Enterprise Architecture 14. Authentication & Authorization - Discussion 15. Authentication & Authorization - Scenarios 16. Secure Cloud & Virtualization 17. Cryptography & PKI 18. Impact of Emerging Technologies 19. Security Architecture - Key Points 20. Perform Threat Management 21. Indicators of Compromise & Response 22. Vulnerability Management Activities 23. Vulnerability Assessment - Methods & Tools 24. Analyze Vulnerabilities - Vulnerabilities 25. Analyze Vulnerabilities - Vulnerable Systems 26. Analyze Vulnerabilities - Attacks 27. Use Processes to Reduce Risk 28. Triage & Incident Response 29. Forensic Concepts 30. File Carving & Binary Analysis 31. Analysis Tools 32. Live Collection Tools 33. Security Operations - Key Points 34. Managed Configurations 35. Deployment Scenarios 36. Security Considerations 37. Hardening Techniques 38. Processes 39. Mandatory Access Control 40. Trustworthy Computing 41. Compensating Controls 42. Security Considerations - Embedded 43. Security Considerations - ICS-SCADA 44. Security Considerations - Protocols 45. Security Considerations - Sectors 46. Cloud Technology - Basics 47. Cloud Technology - Advanced 48. PKI - Basics 49. PKI - Advanced 50. Hashing & Symmetric Algorithms 51. Asymmetric Algorithms & Protocols 52. Troubleshoot Cryptography - Keys 53. Security Engineering & Cryptography - Key Points 54. Troubleshoot Cryptography - Misconfigurations 55. Risk Assessment 56. Risk Handling Techniques 57. Risk Types 58. Risk Management Life Cycle 59. Risk Tracking 60. Policies and Security Practices 61. Shared Responsibility Model - Cloud 62. Performing Vendor Assessments 63. Technical Considerations 64. Data Considerations 65. Regulations Accreditations & Standards 66. Legal Considerations 67. Contract and Agreement Types 68. Business Impact Analysis (BIA) 69. Privacy Impact Assessment 70. Disaster Recovery & Business Continuity Planning 71. Incident Response Plan 72. Testing Plans 73. Governance, Risk & Compliance - Key Points CASP004-ADISH.zip
  6. File has expired and does not exist anymore on this server
  7. [Hidden Content] CBT Nuggets - Advanced Network Automation with Cisco and Python torrent Description This intermediate Advanced Network Automation with Cisco and Python prepares network engineers to incorporate Nornir’s inventory abstraction and concurrent task execution into your network CI/CD automation environment. Technologies around network automation and continuous integration and delivery/deployment continue to improve, and make it all the more possible to build, test and merge code seamlessly. But at the same time, many of the tools and languages that are made to monitor, maintain and, ultimately, release code into the wild are so complicated and nuanced that learning the tools themselves is a harder task than just implementing and maintaining CI/CD practices in the first place. After finishing this Advanced Network Automation with Cisco and Python training, you’ll know how to incorporate Nornir’s inventory abstraction and concurrent task execution into your network CI/CD automation environment. For supervisors, this Cisco training can be used to onboard new network engineers, curated into individual or team training plans, or as a Cisco reference resource. Advanced Network Automation with Cisco and Python: What You Need to Know This Advanced Network Automation with Cisco and Python training covers Nornir topics including: Advanced filtering Handling connections to devices Inspecting complex structures Using ipdb with Nornir Transforming inventory data Who Should Take Advanced Network Automation with Cisco and Python Training? This Advanced Network Automation with Cisco and Python training is considered professional-level Cisco training, which means it was designed for network engineers. This Nornir skills course is designed for network engineers with three to five years of experience with network automation and CI/CD tools and practices. New or aspiring network engineers. If you’re just starting out as a network engineer, watch out: advanced network automation and CI/CD automation is — frankly — advanced. But if you know your organization is interested in pursuing CI/CD, or is struggling with implementing network automation tools, you could boost your career by investing early in understanding how Cisco and Nornir work together to make CI/CD automation a reality. Experienced network engineers. The obvious benefits of Nornir’s backwards compatibility and small codebase will appeal to network engineers with several years of experience. If you’ve been thinking about network automation for some time, you’ll probably appreciate what Nornir does to improve code quality: linting, code style, static type checking, and unit testing. Nornir and Cisco have advanced CI/CD tools and resources, you can learn about them with this training. Released 9/2020
  8. [hide] magnet:?xt=urn:btih:13930D104A3712FF1D278C73B991D745A140EFF6&dn=CBT+Nuggets+%7C+Penetration+Testing+Tools+%5BFCO%5D&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.jordan.im%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.bitsearch.to%3A1337%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ffe.dealclub.de%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce [/hide] CBT Nuggets - Penetration Testing Tools TORRENT Penetration Testing Tools Online Training This intermediate Penetration Testing Tools training prepares learners to recognize when to use different tools and software to round out their penetration testing repertoire and provide an understanding of a target's vulnerabilities. This training is also associated with the CompTIA PenTest+ certification. In the world of network and system security, few subjects carry as much excitement or mystery as penetration testing. But penetration testing has a dirty little secret: a lot of the work is done with industry tools. Sure they're not fire-and-forget or mindless seek-and-destroy missiles, but a lot of the mystique that surrounds penetration tests can, in fact, be duplicated. This Penetration Testing Tools training familiarizes security technicians with many of the tools that can be used to carry out penetration tests and secure networks against real threats. For anyone who leads a technology team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource. Penetration Testing Tools: What You Need to Know This Penetration Testing Tools training has videos that cover topics such as: • Identifying vulnerabilities and building a plan of attack • Exploiting targets revealed in scans and attacking devices • Deploying industry pentest tools like Kali, network mappers, password crackers, and more Who Should Take Penetration Testing Tools Training? This Penetration Testing Tools training is considered foundational-level CompTIA training, which means it was designed for security technicians. This pentration testing skills course is valuable for new IT professionals with at least a year of experience with penetration testing tools and experienced security technicians looking to validate their CompTIA skills. New or aspiring security technicians. For brand new security technicians, this Penetration Testing Tools training might be slightly specialized -- there are fundamentals about network security that will provide a better foundation for a career at the very outset. However, learning how to use the tools used in penetration tests can make you a better network security operator and can eventually lead to getting placed on pentest teams -- prepare for that eventuality with this training. Experienced security technicians. If you've been working as a security technician for several years and you've been itching to advance in your career into doing penetration tests, this training will familiarize you with the tools that make them happen. Some are open source, others are paid products, but knowing the tools that support penetration testing can prepare you for the more advanced work of pentests and secure your place on those teams. About Author Bob Salmans - Nugget trainer since 2020 “I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.” Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking. General Info: Author : Bob Salmans Language : English Released : 2022 Duration : 19h 9m Course Source : https://www.cbtnuggets.com/it-training/cyber-security/penetration-testing-tools
  9. This is our 5-day Advanced-level web application security testing course. Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Note: Attendees will also benefit from a state-of-art Hacklab and we will be providing free 30 days lab access after the class to allow attendees more practice time. Course Overview Advanced Web Hacking course talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This course focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on course covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this course vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known. Course Details You will be able to: • Effectively exfiltrate data using Out of Band Techniques for certain vulnerabilities • Pen Test encrypted parameters to find vulnerabilities • Learn how to bypass SSO functionalities • Find SQL injection vulnerabilities not detected by Automated tools • Break weak crypto implementations • Learn ways to bypass password reset functionalities You will receive: Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class. Numerous scripts and tools will also be provided during the training, along with student handouts. Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class. What you can take away from the course: • The latest hacks in the world of web hacking. The class content has been carefully handpicked to focus on some neat, new and ridiculous attacks. • We provide a custom kali image for this class. The custom kali image has been loaded with a number of plugins and tools (some public and some NotSoPublic) and these aid in quickly identifying and exploiting vulnerabilities discussed during the class. • The class is taught by a real Pen Tester and the real-world stories shared during the class help attendees in putting things into perspective. Prerequisites Who Should Take This Class? • Web developers • SOC analysts • Intermediate level penetration testers • DevOps engineers, network engineers • Security architects • Security enthusiasts • Anyone who wants to take their skills to the next level You will need: Students must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM. General Info: Publisher : NotSoSecure Language : English Updated : 2022 Duration : 5h+ Course Source : https://notsosecure.com/security-training/advanced-web-hacking [hide] magnet:?xt=urn:btih:33B07E61F9510025361EB75DB0042259FB823970&dn=NotSoSecure+%7C+Advanced+Web+Hacking+%5BFCO%5D&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.jordan.im%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ffe.dealclub.de%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce [/hide]
  10. [hide] magnet:?xt=urn:btih:1F939457140121F85CD61DC377A3958DA47A54F6&tr=http%3A%2F%2Fbt4.t-ru.org%2Fann%3Fmagnet&dn=%5BLynda.com%20%2F%20Malcolm%20Shore%5D%20Penetration%20Testing%3A%20Advanced%20Kali%20Linux%20%5B2018%2C%20ENG%5D [/hide] Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting. Learn how to use the basic toolset and extend Kali, integrating native exploits into the Metasploitable environment. Find out how to generate and maintain a variety of shells, including Python and C++, and discover how to collect and use credentials. Get an introduction to the online Hack The Box lab where you can practice your pen-testing skills. Instructor Malcolm Shore focuses on the advanced customization of exploits and achieving root access through a sustainable shell. He has designed the course to help the learner advance as a professional pen tester, and learn key objectives needed to pass the Offensive Security Certified Professional (OSCP) exam. The training will appeal to all ethical hackers and pen testers, as well as general IT professionals.
×
×
  • Create New...