Jump to content

rom1987

Banned
  • Content Count

    0
  • Joined

  • Last visited

  • Days Won

    6

rom1987 last won the day on January 28 2018

rom1987 had the most liked content!

Community Reputation

1,832 Excellent

About rom1987

  • Rank
    Newbie

Recent Profile Visitors

194 profile views
  1. James Colquhoun - Beauty, Skin & Gut Summit WEBRip | English | MP4 + PDF Guides | 1280 x 720 | AVC ~1774 kbps | 25 fps AAC | 256 Kbps | 48.0 KHz | 2 channels | ~32 hours | 13.3 GB Genre: eLearning Video / Health, Yoga Have you been searching for a proven way to look and feel naturally radiant every day? Maybe you’ve been told that the secret to having glowing skin and abundant energy lies in some new pill or expensive cream? Well the truth is, our skin, hair, and bodies crave something completely different! The Beauty, Skin & Gut Summit will take you by the hand into a life of more self love, radiance, and natural good looks! We’ve designed it to have the perfect blend of cutting edge advice and powerfully practical solutions for transforming your life from the inside out! You’ll learn from experts like Marc David, JJ Virgin, Jon Gabriel, Donna Gates, and many others, how to: Naturally Heal Your Gut Easily Manage Digestion, Stress & Weight Heal Candida & Yeast Infections Use Secret Mood, Skin & Gut Remedies Avoid Toxins In The Beauty Industry Use Everyday Beauty Rituals to Detoxify Your Skin Diagnose Your Health Through Looking At Your Skin Feel Like a Goddess Through Choosing the Right Foods Transform Your Health & Beauty With Essential Oils And Build Abundant Self Love & Confidence From the Inside Out [Hidden Content]
  2. ITPro: A+ 900 Series (220-901/220-902) WEBRip | English | MP4 | 1280 x 720 | AVC ~540 kbps | 30 fps AAC | 112 Kbps | 44.1 KHz | 2 channels | 52:22:45 | 21.33 GB Genre: Video Tutorial / Networking & Security The CompTIA A+ Complete Study Guide is your complete solution for A+ exam preparation. Covering 100% of Exam 220-901 and Exam 220-902 objectives, this book gives you everything you need to ensure that you not only understand the basics of IT, but that you can demonstrate your understanding effectively. Now in its third edition, this guide has been updated to reflect the exam's new focus. Coverage includes the latest best practices, Windows 8/8.1 and mobile OSes, and an emphasis on the practical skills required on the job. Clear and concise, this book helps you solidify your understanding of crucial hardware and operating system maintenance and troubleshooting topics covered on the exam. You also gain access to the Sybex exclusive online interactive learning environment and test bank, featuring bonus practice exams, electronic flashcards, and a searchable PDF glossary of the most important terms you need to understand. The CompTIA A+ certification is the essential computer technician credential, and is required by over 100 leading employers. This book helps you prepare and practice so you can approach the exam with confidence, and pass with flying colors. Review the components of personal computers, laptops, and portable devices Understand operating systems, networks, and security Get up to speed on safety and environmental issues Practice effective communication and the "soft skills" of professionalism More than just a review of computer parts, this book covers everything you'll see on the exam. Why go in unprepared when you can have the Sybex advantage? [Hidden Content]
  3. Todd Brown - E5 CAMP Masterclass WEBRip | English | MP4 + PDF Guides | 1280 x 720 | AVC ~246 kbps | 30 fps AAC | 118 Kbps | 48.0 KHz | 2 channels | 34:56:37 | 8.31 GB Genre: eLearning Video / Business, Net: E-Commerce I want to share with you the most reliable and predictable way I know to engineer a wildly profitable marketing funnel. It’s a process that’s been developed, honed, and darn near perfected over the last 24 months as I’ve personally guided the engineering and release of well-over 370 marketing funnels. Not including my own. With many generating tens of millions of dollars. And dozens generating six and seven figures. The process I’m referring to is the exact framework I teach our coaching students here at MFA… It’s the exact framework I use when designing my own marketing funnels… And, it’s the exact framework used by my team when we design and launch funnels for our agency clients paying us tens of thousands of dollars. I’ve named it: The E5 Funnel Architecting Framework. Module One: Examine - Part 1 Lesson #1: Conducting The Prospect Analysis Lesson #2: Conducting the Product Analysis Lesson #3: Conducting the Competitive Analysis Module Two: Examine - Part 2 Lesson #4: Conducting the Promise Exposure Spectrum Analysis Lesson #5: Conducting the Prospect Awareness Pyramid Analysis Lesson #6: Creating the Three Dimensional Prospect Profile Module Three: Engineer - Part 1 Lesson #7: Your Engineering Tools Lesson #8: Engineering the Perfect Customer-Generating Product Lesson #9: Engineering the Perfect Offer Lesson #10: Engineering the Perfect Marketing Funnel Thesis Lesson #11: Engineering the Perfect Big Idea Module Four: Engineer - Part 2 Lesson #12: Flawless Funnel Copywriting Lesson #13: Engineering the Perfect Headline & Lead Lesson #14: Engineering the Perfect Marketing Message Module Five: Engineer - Part 3 Lesson #15: Engineering the Perfect Minimum Viable Funnel Lesson #16: Engineering the Perfect Lead Capture Page Lesson #17: Engineering the Perfect Marketing/Sales Page Lesson #18: Engineering the Perfect Order Form Module Six: Evaluate Lesson #19: Testing Your Minimum Viable Funnel (MVF) Lesson #20: Understanding Your MVF Response Module Seven: Enhance Lesson #21: Enhancing with the the Perfect Upsell Sequence Lesson #22: Enhancing with the Perfect Follow-Up Sequence Lesson #23: Enhance Overall Conversion Lesson #24: Setting-up the Perfect Testing Module Eight: Expand Lesson #25: Expanding Your Level of Acquisition Aggression Lesson #26: Expanding With Competitive Analysis Lesson #27: Expanding With The Perfect Tracking Set-Up Lesson #28: Expanding Your Acquisition With B.A.C.O. Lesson #29: Expanding with The Perfect Metrics Reporting Lesson #30: Expanding Through Your Backend [Hidden Content]
  4. Career.Academy.Certified.Information.Systems.Auditor.CISA.Series.TUTORIAL-SoSISO TYPE: TuTorial DATE: Mar 19,2017 FILES: 67x50MB ARCHIVE: cacisacs.rar Release Information Our CISA Certified Information Systems Auditor Series provides the student with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate their skill set. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the "Body of Knowledge" for the CISA exam and will provide the student the tools to build their technical skills to develop, manage, and perform IT security audits Installation Burn or Mount [Hidden Content]
  5. Steven Aitchison - Your Digital Formula WEBRip | English | MP4 + PDF Guides | 1280 x 720 | AVC ~485 kbps | 30 fps AAC | 128 Kbps | 44.1 KHz | 2 channels | 03:02:47 | 4.88 GB Genre: eLearning Video / Business, Net: E-Commerce Are You Looking to Grow Your Facebook Page AND Grow Sales in Your Online Business? Forget Everything You Thought You Knew About Facebook And Growing a Business Online Would You Like To Become Another Success Story? Grow Your Page – To get more likes, more shares, more comments and truly engage your readers. Grow Your Business – To make more sales, grow your brand and become known as a leader in your field. Change your Life – And start taking back control of your business, your personal life and help people from all over the world. “….This is ALL About Having A Heart Centred Business Where You Make Money Doing What You Love and Your Readers & Customers Fall in Love With You and Your Business….” What’s Included In the Program? Module 1: How to Create an Ad To Get Page Likes Module 2: The Most Powerful Strategy in Internet Marketing Module 3: How to Boost A Post Module 4: How to Get 100% Royalty Free Content To Share and Build Your Audience For Free Module 5: How to Get Subscribers to Your List For FREE Module 6: The Most Ignored Strategy on Facebook… Module 7: The Recipe for Funneling Huge Numbers of Traffic to Your Site Module 8: Powerful Traffic Generating Tools [Hidden Content]
  6. Nick Stephenson - Your First 10,000 Readers WEBRip | English | MP4 + PDF Guides | 1152 x 720 | AVC ~234 kbps | 23.976 fps AAC | 128 Kbps | 44.1 KHz | 2 channels | 08:20:39 | 8.24 GB Genre: eLearning Video / Business, Net: E-Commerce HOW TO FIND YOUR FIRST 10,000 READERS This is the exact system I used to grow my business from $0 to over $1,000,000 in 24 months and is used by thousands of my students worldwide. Learn how to grow your audience on autopilot and sell more books and other products - without being "sleazy". Your First 10,000 Readers is best-selling author Nick Stephenson’s online training course for authors and entrepreneurs who are serious about using books and publishing to grow their audience and automate their marketing. The techniques, tools and strategies in the course are the exact blueprint Nick used to build his audience to over 40,000 subscribers in less than one year. It includes the launch templates and promotional strategies he uses in his own multi-six-figure publishing business. This is a highly practical, zero-fluff course with proven results from over 2,000 students. Nick is considered one of the most influential indie author marketing experts on the web, and has reached over a million readers with his fiction and has helped tens of thousands more with his teaching on how to publish, market, and create freedom from books and writing. Target Audience Your First 10,000 Readers is aimed at two key audiences: Authors who want to grow their readership and sell more books. Entrepreneurs in other businesses who want to use books and publishing to build authority and grow their audience and revenue (speakers, coaches, consultants, influencers, online marketers, etc). What’s in the Course? Forever access to the members’ area, video lessons, live calls, and the following bonuses: Six-Figure Swipe Copy Email Templates Private Facebook Support Group Tools of the Trade Video Breakdowns Facebook Ads for Authors Training Pre-recorded Group Coaching Calls and access to future live calls “The Author Marketing Machine” [Hidden Content]
  7. The Juniper Networks Certified Specialist Security (JNCIS-SEC) certification track allows you to show core competency with general Juniper Networks security technology and the Junos software for SRX Series devices. In this CBT Nugget series from security expert Michael J. Shannon, you will explore: SRX appliance essentials, security zones, SCREEN options, security policy, NAT and PAT, IPSec VPNs, high availability clustering options, IDP, firewall user authentication, an introduction to UTM, anti-spam filtering, anti-virus protection, content and web filtering, and more. Plus, you'l be prepared to take the JN0-332 exam! Introduction to the Juniper SRX This first Nugget of the Juniper Networks JNCIS-SEC series answers the question: What is a firewall system? Next, you will get a bit of history of what led up to the Juniper SRX security gateway product line. Then, you will look at the SRX as a branch/remote/retail office security gateway solution along with the related features. Finally, you will go on a web safari to find out about the SRX product line. 00:27:11 Junos CLI for the SRX We need to establish core competency with the Junos CLI early on in order to establish a baseline for the remainder of the JNCIS-SEC series. This Nugget is will function as either a refresher for the earlier JNCIA Nugget series from Michael - or as a Junos CLI Primer for those who are new to Junos or perhaps migrating rapidly from a Cisco (or other vendor) security solution. This Nugget will be the first of many hands-on, real-world Nuggets in this series. 00:38:08 SRX Interface and Zone Basics This Nugget covers the differences between classic firewalls and zone-based firewalls. We also define zones; examine packet flow through a SRX; explore interface basics; and review edit/show commands. 00:35:39 Configuring Remote Access to the SRX We must first explore the SRX factory default configuration - in anticipation of configuring remote access connectivity to the security device. We will configure the interfaces and zones that were discussed in the previous Nugget. Next, we will configure system services like telnet, SSH, and HTTPS. We will confirure a default route as well. Finally, we will look at cennecting to and configuring the SRX with J-Web. 00:37:04 Administrative Access Control This Nugget focuses on the fundamentals of administrative access to the SRX including local users and classes, custom classes, configuring the SRX to use a RADIUS server, demonstarting a possible scenario on a AAA authentication server. 00:38:21 System and Network Management Every Juniper device, including the SRX, needs to have basic system and network management functionality configured early on in the deployment lifecycle. In this Nugget you will learn how to configure four key management services: NTP, DNS, SNMP, and Syslog. 00:38:21 Security Policy Basics (Part 1) Here we will build a strong conceptual foundation for one of the most vital components of the SRX Security Gateway - security policy. You will learn the basic components of security policies (firewall rules), the syntax and logic of the policy, policy flow, and finishing up with address books and address sets. 00:30:52 Security Policy Basics (Part 2) This second part of security policies will look at "Policy in Action." We will explore several real-world case studies that apply fundamental security policies in various scenarios. 00:40:26 Security Policy Basics (Part 3) In this final Nugget on security policy, we take up where part two left off with a proof-of-concept demonstration of a denial policy. Then you will go deeper into syslog with the SRX as you learn how to send data to the Security Threat Response Monitor (STRM). Finally, you will learn methods for performing queries on existing log files and troubleshooting with TraceOptions. 00:29:00 NAT - Network Address Translation Network Address Translation is a method for dealing with IPv4 address space depletion as well as a way to hide the addressing scheme of your security zones. This Nugget defines this important feature and describes the three major types of NAT supported on th SRX. You will also see configuration examples of Source NAT to the interface and a NAT pool. 00:36:16 IPsec VPN (Part 1) Before we explore the vital function of virtual private netwotking on the SRX we must learn the fundamentals of VPNs, the various topologies and flavors, as well as how IPsec operates in a universal way. These concepts will be mastered before diving in to the IPsec distinctives on the Juniper SRX. 00:43:27 IPsec VPN (Part 2) In part two we will look at Junos IPsec distinctives, including Routing and Policy-Based VPNs; pre-deployment considerations and options; and various VPN settings. Then you will look at the configuration of a site-to-site IPsec VPN in J-Web and the Junos CLI between two SRX security gateways. 00:39:43 Screen Options Organizations are bombarded on a daily basis with a wide variety of reconnaisance attacks and information gathering sweeps that lead to more dangerous structured attacks. In this Nugget, we will explore the Screen option on the SRX to protect our network from a wide variety of vulnerabilities to ICMP, IP, TCP, and UDP. We will also take a peek at a common toolkit for launching this code: Back|Track 5. 00:39:12 Intrusion Detection and Prevention (IDP/IPS) Fundamentals After the deployment of stateful firewalls and screens, the next critcal component of your firewall system will be intrusion detection and prevention (IDP). This feature is also being more commonly referred to as IPS in the Juniper world. In this Nugget, we will explore the key concepts and terminology of IDP along with the fundamentals for configuring this service on the SRX appliance. 00:32:32 Overview of HA Clustering In this Nugget we will look at a pillar of security disaster recovery - high availability. You will learn the key concepts and technologies surrounding Chassis Clustering with focus on an Active/Passive cluster between two SRX210 devices. 00:31:08 Firewall User Authentication Here is an interesting feature that is found on most firewalls where select users can authenticate with a telnet, ftp, or http session against a local or remote database to get access to resources in other zones. In this Nugget, you will learn about the two types of user authentication on the SRX: Pass-Through Authentication and Web Authentication. 00:24:55 UTM: Anti-Virus Protection First we will define and explore the overall Unified Threat Management (UTM) feature on the SRX. Then we will tackle the four main types, one at a time, starting with the SRX anti-virus capabilities of UTM. 00:27:14 UTM: Web Filtering Here we get a look at the three methods for filtering URLs on the SRX (as well as the J-Series router): Local Web Filtering, Integrated Web Filtering, and Redirect Filtering to a Websense server. We will specifically look at the configuration of Local Web Filtering on the SRX210. 00:20:21 UTM: Content and Anti-Spam Filtering The final Nugget of the JNCIS-SEC series focuses on the last two Unified Threat Management features available on the SRX. First, you will learn about Content Filtering for MIME patterns and extensions as well as blocking content like ActiveX and Java applets. Second, the Anti-Spam feature will help us stop unwanted email from commercial, malicious, and fraudulent sources. 00:23:32 Total Series Duration: 10 hours [Hidden Content]
  8. Advanced Cisco studies using GNS3 by GN3vault BGP - Advanced lab in GNS3 BGP - IBGP EBGP Local Preference MED lab in GNS3 BGP - Basic BGP Lab in GNS3 BGP - BGP always compare MED lab in GNS3 BGP - BGP backdoor lab in GNS3 BGP - BGP Disable Connected Check lab in GNS3 BGP - BGP EBGP Multihop lab in GNS3 BGP - BGP Next Hop Self lab in GNS3 BGP - BGP Regular Expressions lab in GNS3 BGP - BGP Route Reflector lab in GNS3 BGP - BGP Update Source lab in GNS3 BGP Configuration on Cisco IOS Using GNS3 - Part 1 of 3 BGP Configuration on Cisco IOS Using GNS3 - Part 2 of 3 BGP Configuration on Cisco IOS Using GNS3 - Part 3 of 3 Basic MPLS VPN Lab in GNS3 - Part 1 - 3 Basic MPLS VPN Lab in GNS3 - Part 2 - 3 Basic MPLS VPN Lab in GNS3 - Part 3 - 3 Inter Provider MPLS VPN (Back to Back VRF) Part 1 of 4 Inter Provider MPLS VPN (Back to Back VRF) Part 2 of 4 Inter Provider MPLS VPN (Back to Back VRF) Part 3 of 4 Inter Provider MPLS VPN (Back to Back VRF) Part 4 of 4 MPLS Carrier Supporting Carrier Configuration Part 1 of 3 MPLS Carrier Supporting Carrier Configuration Part 2 of 3 MPLS Carrier Supporting Carrier Configuration Part 3 of 3 MPLS Traffic Engineering Fast ReRoute MPLS Traffic Engineering Part 1 of 2 MPLS Traffic Engineering Part 2 of 2 MPLS VPN (BGP PE-CE Routing Configuration and Verification) part 1 of 2 MPLS VPN (BGP PE-CE Routing Configuration and Verification) part 2 of 2 MPLS VPN Hub and Spoke Topology Part 1 of 2 MPLS VPN Hub and Spoke Topology Part 2 of 2 MPLS VPN OSPF PE-CE Routing Configuration Part 1 of 4 MPLS VPN OSPF PE-CE Routing Configuration Part 2 of 4 MPLS VPN OSPF PE-CE Routing Configuration Part 3 of 4 MPLS VPN OSPF PE-CE Routing Configuration Part 4 of 4 AToM (EoMPLS Preferred Path using MPLS Traffic Engineering) AToM (Ethernet over MPLS in VLAN mode) EIGRP Stub Leak Map in GNS3 EIGRP Troubleshooting lab in GNS3 Basic EIGRP Configuration Part 1 of 2 Basic EIGRP Configuration Part 2 of 2 Frame Relay Back to Back in GNS3 Frame relay Basics lab in GNS3 Frame Relay Switch lab in GNS3 ASA Application Inspection and Policing - PART1 ASA Application Inspection and Policing - PART2 ASA Clientles SSL VPN Configuration PART 1 of 2 ASA Clientles SSL VPN Configuration PART 2 of 2 ASA IPSec Site to Site VPN ASA Multicontext Mode Configuration PART 1 ASA Multicontext Mode Configuration PART2 ASA Multicontext Mode Configuration PART3 AToM (EoMPLS Preferred Path using IP routing) Remote Access IPSec VPN - PART1 Remote Access IPSec VPN - PART2 Certificate Base Remote Access IPSec VPN - PART1 Certificate Base Remote Access IPSec VPN - PART2 LAN Protocol over L2TPv3 (port-to-port manual session with keepalive) LAN Protocol over L2TPv3 (port-to-port manual session) Layer 3 VPNs Over Multipoint L2TPv3 Tunnels Part 1 of 2 Layer 3 VPNs Over Multipoint L2TPv3 Tunnels Part 2 of 2 ASDM GNS3 Encrypted GRE lab in GNS3 GRE over IPSEC lab in GNS3 GRE Tunnel Basic lab in GNS3 IPv6 6to4 Tunneling lab in GNS3 IPv6 ISATAP lab in GNS3 IPv6 NAT-PT Static lab in GNS3 IPv6 Tunneling over IPv4 lab in GNS3 Multicast AutoRP lab in GNS3 Multicast AutoRP listener lab in GNS3 Multicast PIM Accept RP lab in GNS3 Multicast PIM Bootstrap lab in GNS3 Multicast PIM Dense-Mode in GNS3 Multicast PIM NBMA lab in GNS3 Multicast PIM Sparse-Dense Mode lab in GNS3 Multicast PIM Sparse-Mode lab in GNS3 Multicast RPF Failure lab in GNS3 Multicast Stub IGMP Helper lab in GNS3 Multicast Tunneling lab in GNS3 NAT Dynamic Troubleshooting lab in GNS3 OSPF Demonstration on GNS3 -part1 OSPF Demonstration on GNS3 -part2 OSPF AREA TYPEs and LSA TYPEs PART 1 of 2 OSPF AREA TYPEs and LSA TYPEs PART 2 of 2 OSPF Intermediate Lab in GNS3 - Part 1 - 2 OSPF Intermediate Lab in GNS3 - Part 2 - 2 OSPF NSSA (Not so stubby area) Lab in GNS3 OSPF over Frame Relay - Non-Broadcast Lab in GNS3 OSPF over Frame Relay lab in GNS3 OSPF Over Frame-Relay - Point-to-Multipoint in GNS3 OSPF Over Frame-Relay - Point-to-Multipoint Non-Broadcast in GNS3 OSPF over Frame-Relay Broadcast Lab in GNS3 OSPF over Frame-Relay Point-to-Point in GNS3 OSPF RIP Redistribution AD Troubleshooting lab in GNS3 OSPF Single Area Lab in GNS3 OSPF Stub Lab in GNS3 OSPF Totally NSSA Lab in GNS3 OSPF Totally Stub Lab in GNS3 OSPF Troubleshooting lab in GNS3 OSPF Virtual Link and Summarization Lab in GNS3 PPP Advanced Authentication lab in GNS3 PPP Authentication lab in GNS3 PPPOE over Ethernet lab in GNS3 RIP Advanced lab in GNS3 RIP Beginner lab in GNS3 RIPv2 & OSPF Redistribution In GNS3 Virtual Voice Lab - GNS3 PSTN Simulation Part 1 Virtual Voice Lab - GNS3 PSTN Simulation Part 2 [Hidden Content]
  9. Course Instructor Terrence Cox A veteran of twenty years in Information Technology in a variety of roles. He has worked in development, security and infrastructure well before they merged into what we now call DevOps. He provides training in Linux, VMWare, DevOps (Ansible, Jenkins, etc) as well as containers and AWS topics. Details The Linux job market continues to expand and this course will help prepare you for one of the standard industry Linux administration certifications. This course has been updated in 2016 with a new list of domains and competencies matching those detailed by the Linux Foundation. Create and Edit Text Files - Part I 00:13:22 Create and Edit Text Files - Part II 00:20:02 Use Input/Output Redirection (>, >>, |) / Compare Text Files / Compare Binary Files 00:10:59 Search for Files 00:18:30 Archive, Compress, Unpack and Uncompress Files 00:12:48 Manage Access to the Root Account 00:05:31 List, Set and Change Standard File Permissions 00:13:23 Transfer Files Securely Via the Network - SCP 00:09:01 Transfer Files Securely Via the Network - SFTP 00:08:58 Monitor Security and Conduct Audits 00:18:38 Exercise: Editing Text Files on the Command Line: Vi/Vim, Uniq, Sort, SED 00:30:00 Exercise: Manipulating Text Files from the Command Line 00:30:00 Exercise: Archiving and Compressing Files and Directories 00:30:00 Exercise: Transfer Files Securely via the Network 00:30:00 Exercise: Finding Files on the Filesystem 00:30:00 Operation of Running Systems (20% of Exam) Change the Priority of a Process/Identify Resource Utilization by Process 00:14:30 Manage the Startup Processes and Services 00:13:09 Install and Update Packages from the Network, a Remote Repository or the Local Filesystem (Debian/Ubuntu Distributions) 00:23:48 Install and Update Packages from the Network, a Remote Repository, or the Local Filesystem (RHEL/CentOS Distributions) 00:23:31 Set File Permission and Ownership 00:12:01 Use Shell Scripting to Automate System Maintenance Tasks - Part I 00:08:34 Use Shell Scripting to Automate System Maintenance Tasks - Part II 00:17:03 Exercise: Managing the Startup Process and Related Services 00:30:00 Exercise: Managing User Processes 00:30:00 Exercise: Installing Software Packages (Debian/Ubuntu Distributions) 00:30:00 Exercise: Installing Software Packages (RedHat/RPM Distributions) 00:30:00 Exercise: Update Packages from the Network, a Repository or the Local File System (Ubuntu/Debian) 00:30:00 Exercise: Update Packages from the Network, a Repository or the Local File System (Red Hat/CentOS) 00:30:00 Exercise: Basic Bash Shell Scripting: Basic Setup and Execution 00:30:00 Exercise: Basic Bash Shell Scripting: Conditionals and Loops 00:30:00 Exercise: Managing File Permissions 00:30:00 Exercise: File Attributes 00:30:00 User and Group Management (15% of Exam) Create, Delete and Modify Local User Accounts 00:07:10 Create, Delete and Modify Local Groups 00:08:41 Use sudo to Access the root Acount 00:08:12 Manage User Accounts 00:11:45 Manage User Processes 00:14:30 User Account Attributes 00:08:42 Exercise: Using sudo to Manage Access to the root Account 00:30:00 Exercise: Managing Local User Accounts 00:30:00 Exercise: Creating Local User Groups 00:30:00 Networking (15% of Exam) Implement Packet Filtering 00:09:11 Configure Firewall Settings 00:17:03 Configure Network Services to Start on Boot - systemd 00:09:28 Configure Network Services to Start on Boot - sysvinit 00:07:51 Monitor Network Performance 00:10:39 Statically Route IP Traffic 00:09:09 Dynamically Route IP Traffic 00:14:48 Exercise: Configure Network Services to Start Automatically at Boot: SystemD Method 00:30:00 Exercise: Monitor Network Performance 00:30:00 Service Configuration (10% of Exam) Provide/Configure Network Shares via NFS/CIFS – Server 00:10:01 Provide/Configure Network Shares via NFS/CIFS – Client 00:10:01 Configure an SMTP Service 00:10:14 Configure Email Aliases 00:07:05 Restrict Access to an SMTP Service 00:09:26 Configure an IMAP/IMAPS Service 00:09:51 Verify Email Configuration 00:10:10 Configure SSH-Based Remote Access Using Public/Private Key Pairs 00:09:34 Configure HTTP Proxy Server 00:10:16 Create HTTP Proxy Server Blacklist 00:10:47 Restrict Access to the HTTP Proxy Server 00:07:33 Configure an HTTP Client to Automatically Use a Proxy Server 00:08:45 Configure an HTTP Server - RHEL/CentOS 00:08:29 Configure an HTTP Server - Debian/Ubuntu 00:08:02 Configure HTTP Server Logs 00:11:37 Configure SSL with HTTP Server - Certificate Creation and Installation 00:09:14 Configure SSL with HTTP Server - Server Setup 00:09:52 Set Up Name Based Virtual Web Hosts - RHEL/CentOS 00:12:24 Set Up Name Based Virtual Web Hosts with SSL - RHEL/CentOS 00:08:32 Set Up Name Based Virtual Web Hosts - Debian/Ubuntu 00:13:44 Set Up Name Based Virtual Web Hosts with SSL - Debian/Ubuntu 00:12:57 Deploy a Basic Web Application/Restrict Access to a Web Page 00:10:00 Exercise: Provide/Configure Network Shares via NFS: Server Setup 00:30:00 Exercise: Provide/Configure Network Shares via NFS: Client Setup 00:30:00 Exercise: Install and Configure SMTP Service 00:30:00 Exercise: Restrict Access to SMTP Server 00:30:00 Exercise: Install and Configure SSL for Apache Web Server - Create Self Signed Certificate 00:30:00 Exercise: Configuring SSH-Based Remote Access Using Public/Private Key Pairs 00:30:00 Exercise: Install and Configure and Apache Web Server: RedHat/CentOS 00:30:00 Exercise: Install and Configure Apache Web Server: Debian/Ubuntu 00:30:00 Exercise: Setting Up Name Based Virtual Web Hosts: Debian/Ubuntu HTTP 00:30:00 Exercise: Setting Up Name Based Virtual Web Hosts: Debian/Ubuntu HTTPS 00:30:00 Exercise: Setting Up Name Based Virtual Web Hosts: Red Hat/CentOS HTTP 00:30:00 Exercise: Setting Up Name Based Virtual Web Hosts: Red Hat/CentOS HTTPS 00:30:00 Storage Management (10% of Exam) List, Create, Delete and Modify Storage Partitions 00:10:19 Create, Migrate and Remove Physical/Logical/Virtual Volumes/Add New Partitions and Logical Volumes 00:10:12 Configure Systems to Mount File Systems at or During Boot 00:08:56 Create and Assemble Volume Groups/Add or Extend Volumes and Filesystems/Assemble Volume and RAID Groups 00:19:40 Create and Configure Swap Space 00:09:03 Create and Configure Encrypted Partitions 00:12:34 Create, Mount and Unmount Standard Linux Filesystems 00:08:01 Configure Systems to Mount Standard, Encrypted and Network File Systems on Demand 00:10:02 Diagnose and Correct Filesystem Problems 00:07:03 Design and Test Backup/Recovery Strategies - Part I 00:07:05 Design and Test Backup/Recovery Strategies - Part II 00:08:23 Exercise: Configure Systems to Mount Standard, Encrypted and Network File Systems on Demand: Encryption 00:30:00 Exercise: Configure Systems to Mount Standard, Encrypted and Network File Systems on Demand: Standard Filesystem 00:30:00 Exercise: Creating Swap Partitions 00:30:00 Exercise: Assembling Partitions as LVM Devices 00:30:00 Virtualization (5% of Exam) Configure a Hypervisor to Host Virtual Guests 00:06:06 Configure Virtual Networking to Support Virtualized Guests 00:07:17 Install Linux Systems as Virtual Guests 00:12:39 Start, Stop and Modify the Status of a Virtual Machine/Access a VM Console/Configure Systems to Launch At Boot Time - GUI 00:08:04 Start, Stop and Modify the Status of a Virtual Machine/Access a VM Console/Configure Systems to Launch At Boot Time - CLI 00:07:38 Resize RAM or Storage of Virtual Machine/Evaluate Virtual Machine Memory Usage 00:06:32 Conclusions, Next Steps and Registering for the Exam Conclusions and Next Steps 00:05:02 Registering for the Exam 00:07:55 Linux Academy Certificate of Completion 00:05:37 [Hidden Content]
  10. Many enterprises today face regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments. Commercial tools and services for performing such tests can be expensive. While really solid free tools such as metasploit, are available, many testers do not understand the comprehensive feature sets of such tools and how to apply them in a professional-grade testing methodology. metasploit was designed to help testers with confirming vulnerabilities using an Open Source and easy-to-use framework. This course will help students get the most out of this free tool. This class will show students how to apply the incredible capabilities of the metasploit framework in a comprehensive penetration testing and vulnerability assessment regimen, according to a thorough methodology for performing effective tests. Students who complete the course will have a firm understanding of how metasploit can fit into their penetration testing and day-to-day assessment activities. The course will provide an in-depth understanding of the metasploit framework far beyond simply showing attendees how to exploit a remote system. The class will cover exploitation, post-exploitation reconnaissance, token manipulation, spear-phishing attacks, and the rich feature set of the Meterpreter, a customized shell environment specially created for exploiting and analyzing security flaws. The course will also cover many of the pitfalls that a tester may encounter when using the metasploit framework and how to avoid or work around them, making tests more efficient and safe. SEC580.1: metasploit Kung Fu for Enterprise Pen Testing: Day 1 Day 1 of SANS Security 580: metasploit Kung Fu for PenetrationTesters is designed to help attendees master the most heavily used exploitation framework on the planet and see how they can wield it effectively in professional penetration testing. We analyze some of the most powerful and yet often overlooked capabilities of the framework with numerous exercises that make this class one of the most hands-on courses ever developed by SANS. In SEC580.1, you will go from zero to exploit and beyond faster than you ever thought possible. For example, after this day of class, you will understand the Ruby foundations of metasploit and how interacting with these underpinnings will greatly optimize and enhance your testing activities. Further, you will understand how far you can extend your exploitation activities through the effective use of some of the late-breaking features of the amazing Meterpreter. Finally, have you ever wondered how you can compromise an entire Domain from simple Windows system access? After this day you will know exactly how to achieve this kind of result. After all, shell is only the beginning. Topics A Guided Overview of metasploit's Architecture and Components A Deep Dive into the Msfconsole Interface, including Logging and Session Manipulation Careful and Effective Exploitation The Ultimate Payload: The metasploit Meterpreter In Depth Merciless Pivoting: Routing Through Exploited Systems metasploit Sniffing on Exploited Systems Windows Process Token Manipulation for Fun and Profit metasploit's Integration into a Professional Testing Methodology Automation with Meterpreter scripts to Achieve More in Less Time with Consistency It's Not All Exploits - Using metasploit as a Recon Tool Port and Vulnerability Scanning with metasploit, Including Integration with Nmap, Nessus, and Qualys Wielding metasploit Databases for Analysis and Ownage Integrating Db_autopwn Functionality in Safe and Effective Penetration Testing SEC580.2: metasploit Kung Fu for Enterprise Pen Testing: Day 2 In SANS Security 580.2, we build upon the deep foundations of Day 1 to see how metasploit can be used within a penetration tester's ecosystem of tools and techniques to attack systems in new and creative ways. We'll analyze the activities of the most effective bad guys to see how they target enterprises via complex and often non-traditional attack vectors so that we can model their behaviors in our penetration testing processes. Client-side attacks launched via email, phishing, and document payload attacks are currently some of the most heavily used attack vectors by the bad guys. They use these techniques because they almost always work. The course shows penetration testers how to wield such attacks with the goal of determining the business implications of vulnerabilities, all with the goal of improving the target organization's security stance. We'll also cover how metasploit can effectively integrate with tools like NeXpose, Nmap, and Nessus to manage large scan results to find exactly which system(s) you wish to exploit. We also cover how metasploit can become a main component of your wireless penetration testing regimen and how metasploit can be used to attack databases and web applications. Topics metasploit Integration with Other Tools Client-Side Exploitation Automating Client-Side Attacks with Browser_autopwn Using metasploit to Model Malware Attacks via Msfpayload Dodging Detection Like the Bad Guys with Msfencode Ultra Stealthy Techniques for Bypassing Anti-Virus Tools Making the Most of Windows Payloads Effective Tips and Tricks for Launching Unix Payload Attacks Adobe, Microsoft, and Java... Oh My... Attacking via File Format Exploits Exploiting the Soft Underbelly of Most Organizations through the Social Engineering Toolkit Evading Countermeasures to Mimic Sophisticated Attackers scripting Up the Meterpreter to Customize Your Own Attacks Attacking Target Databases to Demonstrate Business Risk Effectively metasploit's Myriad of Wireless Features for Attacking Access Points and Clients metasploit and the Web: Integration and Astonishing Automation via metasploit, MySQL, and More! General : SANS SEC580 - metasploit Kung Fu for Enterprise Pen Testing\1.mp4 Format : MPEG-4 at 244 kb/s Length : 264 MiB for 2 h 30 min 53 s 276 ms Video #0 : AVC at 200 kb/s Aspect : 1280 x 720 (1.778) at 30.000 fps Audio #0 : AAC at 41.2 kb/s Infos : 2 channels, 44.1 kHz Language : en General : SANS SEC580 - metasploit Kung Fu for Enterprise Pen Testing\2.mp4 Format : MPEG-4 at 265 kb/s Length : 69.2 MiB for 36 min 29 s 497 ms Video #0 : AVC at 204 kb/s Aspect : 1280 x 720 (1.778) at 30.000 fps Audio #0 : AAC at 41.5 kb/s Infos : 2 channels, 44.1 kHz Language : en General : SANS SEC580 - metasploit Kung Fu for Enterprise Pen Testing\3.mp4 Format : MPEG-4 at 205 kb/s Length : 113 MiB for 1 h 17 min 5 s 149 ms Video #0 : AVC at 166 kb/s Aspect : 1280 x 720 (1.778) at 30.000 fps Audio #0 : AAC at 36.3 kb/s Infos : 2 channels, 44.1 kHz Language : en General : SANS SEC580 - metasploit Kung Fu for Enterprise Pen Testing\4.mp4 Format : MPEG-4 at 181 kb/s Length : 207 MiB for 2 h 39 min 48 s 286 ms Video #0 : AVC at 137 kb/s Aspect : 1280 x 720 (1.778) at 30.000 fps Audio #0 : AAC at 27.9 kb/s Infos : 2 channels, 44.1 kHz Language : en General : SANS SEC580 - metasploit Kung Fu for Enterprise Pen Testing\5.mp4 Format : MPEG-4 at 186 kb/s Length : 54.0 MiB for 40 min 40 s 667 ms Video #0 : AVC at 138 kb/s Aspect : 1280 x 720 (1.778) at 30.000 fps Audio #0 : AAC at 31.6 kb/s Infos : 2 channels, 44.1 kHz Language : en [Hidden Content]
  11. This malware analysis course prepares forensic investigators, incident responders, and malware specialists to reverse-engineer malicious software using practical tools and techniques. This popular malware analysis course has helped forensic investigators, malware specialists, incident responders, and IT administrators assess malware threats. The course teaches a practical approach to examining malicious programs-spyware, bots, trojans, etc.-that target or run on Microsoft Windows. This training also looks at reversing Web-based malware, such as javascript and Flash files, as well as malicious document files. By the end of the course, you'll learn how to reverse-engineer malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and other tools for turning malware inside-out! Learn Malware Analysis to Improve Incident Response and Forensics Skills This unique course provides a rounded approach to reverse-engineering by covering both behavioral and code phases of the analysis process. As a result, the course makes malware analysis accessible even to individuals with a limited exposure to programming concepts. The materials do not assume that the students are familiar with malware analysis; however, the complexity of concepts and techniques increases as the course progresses. The malware analysis process taught in this class helps incident responders assess the severity and repercussions of a situation that involves malicious software. It also assists in determining how to contain the incident and plan recovery steps. Forensics investigators also learn how to understand key characteristics of malware present on compromised systems, including how to establish indicators of compromise (IOCs) for scoping and containing the intrusion. A Methodical Approach to Reverse-Engineering The course begins by covering fundamental aspects of malware analysis. You'll learn how to set up an inexpensive and flexible laboratory for understanding the inner-workings of malicious software and will understand how to use the lab for exploring characteristics of real-world malware. Then you'll learn to examine the program's behavioral patterns and code. Afterwards, you'll experiment with reverse-engineering compiled Windows executables and browser-based malware. The course continues by discussing essential x86 assembly language concepts. You'll examine malicious code to understand the program's key components and execution flow. Additionally, you'll learn to identify common malware characteristics by looking at Windows API patterns and will examine excerpts from bots, rootkits, keyloggers, and downloaders. You'll understand how to work with PE headers and handle DLL interactions. Furthermore, you'll learn tools and techniques for bypassing anti-analysis capabilities of armored malware, experimenting with packed executables and obfuscated browser scripts. Towards the end of the course, you'll learn to analyze malicious document files that take the form of Microsoft Office and Adobe PDF documents. Such documents act as a common infection vector and need to be understood by enterprises concerned about both large-scale and targeted attacks. The course also explores memory forensics approaches to examining rootkits. Memory-based analysis techniques also help understand the context of an incident involving malicious software. Hands-On Training for Malware Analysis and Reversing Hands-on workshop exercises are a critical aspect of this course and allow you to apply reverse-engineering techniques by examining malware in a controlled environment. When performing the exercises, you'll study the supplied specimen's behavioral patterns and examine key portions of its code. You'll examine malware on a Windows virtual machine that you'll infect during the course and will use the supplied Linux virtual machine (REMnux) that includes tools for examining and interacting with malware. Complexity of the Course: Formalizing and Expanding Your Malware Analysis Skills While the field of reverse-engineering malware is in itself advanced, the course begins by covering this topic from an introductory level and quickly progresses to discuss malware analysis tools and techniques of intermediate complexity. Neither programming experience nor the knowledge of assembly is required to benefit from the course. However, you should have a general idea about core programming concepts, such as variables, loops, and functions. The course spends some time discussing essential aspects of x86 assembly to allow malware analysts navigate through malicious executables using a debugger and a disassembler. [Hidden Content]
  12. English | Size: 1.03 GB Category: Video Training “Hack Yourself First” is all about developers building up cyber-offense skills and proactively seeking out security vulnerabilities in their own websites before an attacker does. The prevalence of online attacks against websites has accelerated quickly in recent years and the same risks continue to be readily exploited. However, these are very often easily identified directly within the browser; it’s just a matter of understanding the vulnerable patterns to look for. This course comes at security from the view of the attacker in that their entry point is typically the browser. They have a website they want to probe for security risks – this is how they go about it. This approach is more reflective of the real online threat than reviewing source code is and it empowers developers to begin immediately assessing their applications even when they’re running in a live environment without access to the source. After all, that’s what online attackers are doing. Table of contents: Introduction25m 58s Transport Layer Protection1h 8m Cross Site Scripting (XSS)57m 23s Cookies45m 14s Internal Implementation Disclosure1h 9m Parameter Tampering1h 31m SQL Injection1h 16m Cross Site Attacks1h 0m Account Management1h 10m [Hidden Content]
  13. Lynda is an online education company offering thousands of video courses in software, creative, and business skills. Founded in 1995, the company produces video tutorials taught by industry experts. Customer service: 00 44 330 822 0330 Founded: 1995 Revenue: 100 million USD (2013) Headquarters: Carpinteria, California, United States CEO: Eric Robison (Jan 2008–) Founders: Lynda Weinman, Bruce Heavin Parent organization: LinkedIn Corporation [Hidden Content]
  14. SQL Server Training and Tutorials Learn how to use a Microsoft SQL Server to install, build, and design databases. Our SQL Server tutorials can help you understand database administration, including creating indexes and backing up and restoring the database. [Hidden Content]
  15. Python from Scratch LiveLessons by Brian Ray Publisher: Addison-Wesley Professional Release Date: March 2017 Python from Scratch LiveLessons is a gentler, more entertaining, and more practical starting point to learning the Python programming language. Unlike the typical approach to teaching a programming language that covers each feature section by section, this course is structured more like a cooking class. You can follow along and execute all the code being demonstrated in an interactive notebook as you watch the video, much the same way you would watch a cooking video in your kitchen. What You Will Learn • How to use the interactive Jupyter notebook platform to execute simple commands • How to use the import statement to use external code and read input from an external source • How to work with strings and how to use indexing operators How to write program controls • How to use built-in types and write/use user-defined types How to access elements in dictionaries • How to use if and elif control structures • How to take advantage of dictionaries and tuples • How to write complex functions • How to use keyword arguments in functions • How to write classes and use inheritance • How to read data in and push data out to other programs • How to create callbacks and mock classes • How to use third-party libraries [Hidden Content]
×
×
  • Create New...