azika
Members-
Posts
47 -
Joined
-
Last visited
Everything posted by azika
-
Palo Alto Networks Panorama
-
EDU-220a-10.0-Lab-Guide EDU_220a_10.0_Lab_Guide.pdf.pdf
- 5 replies
-
- 38
-
Req: Can anyone please help to download DNAC-SW-2.3.3.7.iso
-
check forum link
-
DNA Center is still not available on a VM. It is only available on an appliance
-
Edit and start your request with [Req] AJSEC Study Guide
-
Always start with [Req] CCIE Security v6 EVE-NG otherwise your post won't get attention
-
Please could you re-share as link is dead
- 25 replies
-
- IT Courses
- cyber security
-
(and 1 more)
Tagged with:
-
You need to start your request with [req] otherwise it won't any attention. Check the request session for example.
-
[OFFER] Exam cracked today -- AWS proff pass
azika replied to Henry's topic in AWS Solution Architect - SAP-C01
my account was hacked, please be careful don't do any financial transaction with anyone claiming to be me. -
Please share if you have the Udemy - BIG-IP Local Traffic Manager(LTM) V13 Training. Thanks
-
Please share if you have the Udemy - F5 LTM Training from Beginner to Expert course training video. Thanks
-
Please can anyone recommend a good software to download Plurasight video, I have access that will soon expiry. Thanks
-
[REQ] Bluecoat training - Professional(BCCPP) and Administrator(BCCPA)
azika replied to timo18241's topic in OTHER SHARES
[Hidden Content]- 38 replies
-
- 87
-
The course is not yet completed by CBT Nugget, the VPN section is not complete yet.
-
[Offer] CCIE Security v6.0 Real lab workbook (New Lab)
azika replied to ccieeii's topic in CCIE Security
@yalhoo, if you finish module (1) in less than 3 hrs, whatever time you have left is not transferred to module 2 (configuration), once you start module 2 you have exactly 5 hours allocated to you. If you somehow start configuration when you haven't seen the questions for module 2, you open yourself up for Cisco to know you have cheated, this means you have seen the exam questions beforehand. -
Hi ammanch, You need to add Request in front of your post, your time should read as below, otherwise you won't get attention. [REQUEST] Red Hat OpenShift Installation Lab (DO322)
-
Hi wooo, there are no dumps for CISSP. No vendor has CISSP dumps if they try to market one to you don't buy. Study the exam is not difficult but requires you to know a little of lots of topics. It is not deep but wide and you will be better for it. Many have shared resources in the forum already, search and you will find useful study guides and videos, there are 8 domains, study topics that have to do with GDPR, software development and other areas are not already familiar with, you should be ok, there is no real practice exam I used that was anyway close to the real exam. The exam test your ability to apply the knowledge, question ask you for the BEST answer, options normally have more than one correct answer. The answer is usually the options that covers the MOST area. Example: VPN will be the BEST answer to connect over the Internet than GRE etc. Goodluck
-
Thanks for sharing your exam experience, I know a lot of people have had positive and negative reactions to your post, but I believe you have done a great service to so many others. Sharing your experience about a particular vendor is based on your experience with them, others have had similar poor experiences with other vendors as well and don't share because of the negative reactions they will face. It is left for each person to make up their mind on what they want to believe. I would feel hurt and warn others if I had the same experience after spending should a huge amount of money. Thanks once more for the courage to share your experience.
-
As NiceGuy said, the best position is at the Perimeter of the Network, where you connect to external networks (Internet edge). As best practice you also need to have firewall internally in your network. The internal firewalls are usually referred to Internal Segmentation Firewall (ISFW), these are used to separate for example department traffic from one another. You don't want your internal users to reach every important asset inside your business. For example, you want only HR employees to reach the HR servers that contains all employee information (addresses, salary information etc), so you create rules in the ISFW that only allow the HR employee to reach that server and no one else.