Jump to content


Honorary members
  • Content Count

  • Joined

  • Last visited

  • Days Won


delideli12345 last won the day on December 24 2019

delideli12345 had the most liked content!

Community Reputation

7,220 Excellent

1 Follower

About delideli12345

  • Rank
    Advanced Member
  • Birthday December 22

Profile Information

  • Gender

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I have not got the downloaded material. technet24 wae once a free site providing direct links. bun for some 12 months or more, it is a paid site. I looked for the materials in tu t 4 d l but could not find any links related to this course.
  2. Russ White, Jeff (Evgeny) Tantsura - Navigating Network Complexity_ Next-generation routing with SDN, service virtualization, and service chaining-Addison-Wesley Professional (2015) epub edition [hide][Hidden Content]]
  3. Containers In Cisco IOS-XE, IOS-XR, And NX-OS epub rough cuts [hide][Hidden Content]]
  4. here is the rough cuts version, epub CCNP Enterprise Design ENSLD 300-420 Official Cert Guide [hide][Hidden Content]]
  5. epub is more flexible to read and easy to convert to mobi format.
  6. Copyright 2017 Edition: 1st Premium Edition Video ISBN-10: 0-13-464678-9 ISBN-13: 978-0-13-464678-7 9+ Hours of Video Instruction Overview More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECFND 210-250 certification exam. Description CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst. CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Course Premium Edition also comes with: · Lesson quizzes to help you test yourself on concepts and commands · Interactive exercises so you can put your knowledge to the test · A full practice exam delivered in the Pearson Test Prep Engine Major topics include: Networking Concepts Security Concepts Cryptography Host-Based Analysis Security Monitoring Attack Methods Skill Level Beginning to intermediate What You Will Learn Presentation on key Cyber Security solutions Covers all of the objectives in the CCNA Cyber Ops exam Easy to follow demonstrations of cybersecurity tools, products, and solutions Scenarios offered to help learners understand real-world applications Who Should Take This Course Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course. [hide][Hidden Content]] Course Requirements The video course assumes that the learner has the skills to navigate the user interface of a PC running on Microsoft Window, Mac or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It is also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients. About LiveLessons Video Training LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at: [Hidden Content]
  7. Welcome to the Early Access edition of the as yet unpublished Black Hat Go by Tom Steele, Chris Patten, and Dan Kottmann! As a prepublication title, this book may be incomplete and some chapters may not have been proofread.Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: • Make performant tools that can be used for your own security projects • Create usable tools that interact with remote APIs • Scrape arbitrary HTML data • Use Go's standard package, net/http, for building HTTP servers • Write your own DNS server and proxy • Use DNS tunneling to establish a C2 channel out of a restrictive network • Create a vulnerability fuzzer to discover an application's security weaknesses • Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer • Implant data within a Portable Network Graphics (PNG) image. [hide][Hidden Content]]
  8. I have a slow internet connection. I can not upload. If i can find any direct links i will share.
  9. 71mb, epub format, mega link [Hide][Hidden Content]]
  • Create New...