Jump to content

Search the Community

Showing results for tags 'Offer'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 10,000 results

  1. ITProTV - Citrix XenServer 6.2 Size: 1.40 GB | Duration: 4 hrs 50 mins | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 44KHz 2ch Genre: eLearning | Language: English Citrix XenServer is the free virtualization software from Citrix. It is a commercially backed implementation of the open source Xen virtualization platform. The low cost of entry makes XenServer an attractive option for small and medium businesses looking for advanced hypervisor functions (clustering, live migration, centralized management) without the large price tag associated with competing products. [Hidden Content]
  2. Check this out: CISSP Video Boot Camp - Thor Pedersen [Hidden Content]
  3. Which secure VPN technology is used for hybrid cloud connectivity over the public Internet? Selected Answer IPsec VPN Correct IPsec VPN Juniper Networks supports which two alternatives to Layer 2 loop prevention protocols, such as STP, in an underlay network? (Choose two.) Selected Answer LACP MC-LAG Correct LACP MC-LAG Which protocol establishes VXLAN tunnels? Selected Answer EVPN Correct EVPN Which type of service would allow you to provision five servers with Windows Server 2016 installed? Selected Answer PaaS Correct PaaS What are two characteristics of a data center underlay network? (Choose two.) Selected Answer spine network device redundancy fast failover Correct spine network device redundancy fast failover What are two concepts of a private cloud? (Choose two.) Selected Answer Resources are dedicated to your organization. Resources are accessed through a private connection. Correct Resources are dedicated to your organization. Resources are accessed through a private connection. According to Juniper Networks, what is the recommended external routing protocol for the underlay network? Selected Answer BGP Correct BGP What are three software suites that contribute to cloud architectures? (Choose three.) Selected Answer OpenStack Kubernetes vSphere Correct OpenStack Kubernetes vSphere What information does an underlay network use to route data? Selected Answer IP address Correct IP address A customer wants to deploy a website that can scale as needed. Which type of service should the customer purchase in this scenario? Selected Answer SaaS Correct SaaS Which two statements are true regarding private cloud services? (Choose two.) Selected Answer A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Correct A private cloud can be deployed in a service provider network. A private cloud has dedicated resources for individual customers. Which platform is certified to interoperate with VMware NSX? Selected Answer QFX Series Correct QFX Series What are two reasons to deploy a private cloud? (Choose two.) Selected Answer to protect sensitive data to provide cloud-based services within an organization Correct to protect sensitive data to provide cloud-based services within an organization Which two platforms share the same automation scripts? (Choose two.) Selected Answer MX Series vMX Series Correct MX Series vMX Series What are two components of the ETSI Management and Orchestration (MANO) framework? (Choose two.) Selected Answer virtualized network function manager (VNFM) Network Functions Virtualization (NFV) orchestrator Correct virtualized network function manager (VNFM) Network Functions Virtualization (NFV) orchestrator Your engineering team has identified a problem. Whenever an application becomes popular, the resulting high-traffic load on the VNFs leads to user dissatisfaction. Which Contrail feature would be used to solve this problem? Selected Answer service scaling Correct service scaling Which Juniper product is used to remotely provision the NFX250 platform for Network Functions Virtualization? Selected Answer Network Service Activator Correct Network Service Activator Which statement is correct about a VNF? Selected Answer A VNF is a virtual entity that can be launched and managed. Correct A VNF is a virtual entity that can be launched and managed. The vMX Series provides which two benefits? (Choose two.) Selected Answer The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. Correct The vMX Series uses carrier-grade routing optimized for the x86 environment. The vMX Series requires a license for production environments. What are two different modes available for the vMX on KVM that are based on CPU and memory availability? (Choose two.) Selected Answer performance lite Correct performance lite Which two statements are true about the Juniper Networks implementation of VNFs and NFV? (Choose two.) Selected Answer NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. Correct NFV incorporates cloud and virtualization technologies to drive new network services with elastic scale and automation. VNFs include all virtual entities that can be launched and managed from the Juniper Device Manager. Which statement is true about NFV containers? Selected Answer NFV containers usually provide fewer functions than VM-based VNFs. Correct NFV containers usually provide fewer functions than VM-based VNFs. Which two Juniper Networks virtualized products are available for use in the public cloud? (Choose two.) Selected Answer vSRX vMX Correct vSRX vMX Which OpenStack component is responsible for user authentication and authorization? Selected Answer Keystone Correct Keystone Which two statements are true regarding an SDN controller? (Choose two.) Selected Answer An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Correct An SDN controller centralizes control and configuration of a network. An SDN controller automates repetitive tasks in a network. Which statement is true regarding an OpenFlow controller-based software defined network? Selected Answer The forwarding plane of each device in the network is programmed by the controller. Correct The forwarding plane of each device in the network is programmed by the controller. Which protocol is used to communicate management information between a VMware NSX controller and a Junos Layer 2 gateway? Selected Answer OVSDB Correct OVSDB Which statement is true about the vSRX Series and VMware NSX integration? Selected Answer You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Correct You can add the vSRX virtual firewall as a security element in the VMware NSX environment. Which Junos Space application integrates with both VMware vSphere and VMware NSX solutions to automate the movement of VLANs between physical and virtual servers? Selected Answer Network Director Correct Network Director Which two compute hypervisors are supported for Contrail? (Choose two.) Selected Answer ESXi KVM Correct ESXi KVM Which open source management framework does VMware NSX use to manage VXLANs on a Junos device? Selected Answer OVSDB Correct OVSDB Which two products are required when deploying vSRX as a partner security service in VMware NSX? (Choose two.) Selected Answer Junos Space Security Director VMware NSX Manager Correct Junos Space Security Director VMware NSX Manager Which type of SDN is referred to as the original form of SDN? Selected Answer OpenFlow-based SDN Correct OpenFlow-based SDN In which two scenarios is Contrail used? (Choose two.) Selected Answer Network Functions Virtualization private cloud networking Correct Network Functions Virtualization private cloud networking Which protocol is used to communicate LSP and status information between the NorthStar Controller and label edge routers? Selected Answer PCEP Correct PCEP Which protocol is required for NorthStar to establish paths between PE devices? Selected Answer RSVP-TE Correct RSVP-TE What are two ways that WANDL constructs topologies? (Choose two.) Selected Answer Imports configuration files. Enters data manually. Correct Imports configuration files. Enters data manually. What are two major components of the NorthStar Controller system? (Choose two.) Selected Answer PCE PCC Correct PCE PCC Which statement describes the role of the NorthStar Controller? Selected Answer It is an SDN WAN controller. Correct It is an SDN WAN controller. Which two statements are true regarding SDN WAN implementations? (Choose two.) Selected Answer SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Correct SDN WAN uses a centralized control plane. SDN WAN uses MPLS tunnels to connect POPs. Which method does WANDL use to collect live network information? Selected Answer SNMP Correct SNMP Which SDN product is used to manage and optimize MPLS WAN connections? Selected Answer NorthStar Correct NorthStar What is a supported data model for the Juniper Telemetry Interface? Selected Answer OpenConfig data model Correct OpenConfig data model Which product in the Juniper Networks portfolio provides accounting and planning information for users by using big data analytics and machine learning? Selected Answer AppFormix Correct AppFormix Which protocol is used to transport monitoring data in Juniper's open and extensible data model? Selected Answer UDP Correct UDP Which two features does the Junos Telemetry Interface (JTI) support? (Choose two.) Selected Answer JTI provides real-time reporting. JTI can stream in multiple message formats. Correct JTI provides real-time reporting. JTI can stream in multiple message formats. Which two tasks do Contrail analytic nodes perform? (Choose two.) Selected Answer Collects system state information. Raises rule-based alerts. Correct Collects system state information. Raises rule-based alerts. From where does AppFormix gather performance metrics in a network? Selected Answer from an agent on a host or system Correct from an agent on a host or system AppFormix alarm notifications are sent to an HTTP server using which format? Selected Answer JSON Correct JSON Which statement is true about CSO? Selected Answer CSO is ETSI compliant. Correct CSO is ETSI compliant. Which statement is correct when describing a centralized cloud CPE model? Selected Answer Physical CPE devices are not required at the customer's office. Correct Physical CPE devices are not required at the customer's office. Which statement is true about Juniper Networks distributed Cloud CPE deployment model?" Selected Answer VNFs are stored as VMs at a centralized data center. Correct VNFs are stored on CPEs at the customer branch offices. Which statement is true about the Juniper Networks centralized Cloud CPE deployment model? Selected Answer VNFs are stored as VMs at a centralized data center. Correct VNFs are stored as VMs at a centralized data center. Which CSO component enables ISPs to set up and manage the virtual network and customers? Selected Answer Administration Portal Correct Administration Portal Which CSO component enables customers to manage sites and services for their organizations? Selected Answer Customer Portal Correct Customer Portal Which CSO component enables ISPs to design, create, manage, and configure network services that are stored in the network service catalog? Selected Answer Visual Designer Tools Correct Visual Designer Tools Which CSO component enables the monitoring of the CSO system to provide real-time data about the Cloud CPE solution? Selected Answer Service and Infrastructure Monitor Correct Service and Infrastructure Monitor Which feature set of the vSRX allows you to monitor application usage to identify highrisk applications and analyze traffic patterns? Selected Answer AppTrack Correct AppTrack Which two pricing models are available from AWS Marketplace for vSRX consumption? (Choose two.)" Selected Answer pay as you go bring your own license Correct pay as you go bring your own license What are two goals of Software-Defined Secure Network architectures? (Choose two.) Selected Answer to centrally manage security policies to automate responses to detected security threats Correct to centrally manage security policies to automate responses to detected security threats What are two roles of sandboxing in Sky ATP? (Choose two.) Selected Answer to analyze the behavior of potential security threats to store infected files for further analysis Correct to analyze the behavior of potential security threats to store infected files for further analysis Which two actions would Policy Enforcer take when it determines a user has downloaded a file containing malware? (Choose two.) Selected Answer Block the user from accessing the network. Put the user in a quarantine VLAN. Correct Block the user from accessing the network. Put the user in a quarantine VLAN. What are two components of the Juniper Networks SDSN solution? (Choose two.) Selected Answer centralized management enforcement everywhere on the network Correct centralized management enforcement everywhere on the network Which statement is true about Junos Space Security Director? Selected Answer Security Director is a centralized security policy manager. Correct Security Director is a centralized security policy manager. Which Juniper product provides insight into the underlay and overlay network at the same time? Selected Answer Contrail Analytics Correct Contrail Analytics
  4. Not Mine, found them on internet USB for SEC555_17_4 Size: 7.87 GB [Hidden Content] if someone can download them and repload them to mega would be great.
  5. [hide][Hidden Content]] FileName : DNAC-SW-2.1.1.3.iso Size : 23008.35 MB ( 24126003200 bytes) MD5 Checksum : 14165c90b8ad33c17522ada558ea2158 SHA512 Checksum : eaa484793742be320f41d175c12f2af5c719a47dcad15d34fb05643224a52fac60d5362e0019be7b5f21862ecf2b90f05d92736cb3eeecc976c233dd8b75faee
  6. CBTNuggets - Ansible course [hide][Hidden Content]]
  7. Designing Data Centers with Cisco's ACI LiveLessons Networking Talks EngLish | .FLV | Audio: aac, 44100 Hz, stereo | Video: h264, yuv420p, 1280x720, 29.97 fps | 1.74GB Genre: E-Learning <!--more--> 1+ Hour of Video Instruction Designing Data Centers with Cisco's Application Centric Infrastructure (ACI) LiveLessons Networking Talk helps you understand how to build effective data center network designs with Cisco's Application Centric Infrastructure (ACI). Lucien Avramov, CCIE and data center expert at Cisco, starts by explaining key considerations to have when building a data center design. Lucien then goes on to explain data center switch architectures and presents a new way to look at data centers using the policy model. The video concludes by introducing ACI network fabrics and showing you how ACI fits into the OpenStack solution and demonstrating how the integration is done. Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  8. CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide (Aug, 2020) Final English version | ISBN: 9780136160366 | 1690 pages | Aug 2020 | PDF | 41.6 MB CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide focuses specifically on the objectives for the Cisco CCNP/CCIE CLCOR 350-801 exam. Collaboration expert Jason Ball shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. This complete study package includes * A test-preparation routine proven to help you pass the exams * Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section * Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly * Practice exercises that help you enhance your knowledge * More than 60 minutes of video mentoring from the author * An online interactive Flash Cards application to help you drill on Key Terms by chapter * A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies * Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. The official study guide helps you master all the topics on the CCNP/CCIE Collaboration Core CLCOR 350-801 exam, including * Infrastructure and Design* Protocols, Codecs, and Endpoints * Cisco IOS XE Gateway and Media Resources * Call Control * QoS * Collaboration Applications PDF [hide][Hidden Content]]
  9. The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. These are just videos which Cisco is providing as study material... many topics have not been covered in these videos.Those are just writeups and will be uploaded later. Labs & Writeup's are not covered in below mega link. import then download [hide][Hidden Content]]
  10. Ciscopress - CCNP Security Identity Management SISE 300-715 Official Cert Guide (Rough Cuts), by Katherine McNamara, Aaron Woland PDF [hide][Hidden Content]] Epub [hide][Hidden Content]]
  11. Merry Christmas to my brothers happy learning 1- Web Application Penetration Testing eXtreme (eWPTX ) ---------------------------------------------------- 03. Website_cloning.mp4 03. From_An_XSS_To_A_SQL_Injection.mp4 03. Keylogging.mp4 09. Advanced XXE Exploitation.MP4 07. Advanced_SecondOrder_SQL_Injection_Exploitation.mp4 05. Advanced_XSRF_Exploitation_part_i.mp4 06. Advanced_XSRF_Exploitation_part_ii.mp4 09. Advanced_Xpath_Exploitation.mp4 WAPTx sec 9.pdf WAPTx sec 8.pdf WAPTx sec 2.pdf WAPTx sec 3.pdf WAPTx sec 5.pdf WAPTx sec 6.pdf WAPTx sec 4.pdf WAPTx sec 7.pdf WAPTx sec 1.pdf 2- Penetration Testing Professional (ePTPv3) 3- Web Application Penetration Testing (eWAPT v2) ---------------------------------------------------- Penetration Testing Process Introduction Information Gathering Cross Site Scripting SQL Injection Authentication and Authorization Session Security HTML5 File and Resources Attacks Other Attacks Web Services XPath [Hidden Content]
  12. [hide][Hidden Content]]
  13. Packt - Electron from Scratch Build Desktop Applications with JavaScript, by Brad Traversy. [hide][Hidden Content]] kEY: 5j8lwyi_4ZPYcKU2B7wXBA
  14. [Hidden Content] ------------------------------ # Hide Tag while posting download links Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). ------------------------------
  15. Hi folks, this is CCSE R80, not r7x , I will be posting ccse questions on other post later as well, enjoy [hide][Hidden Content]]
  16. Hi, As always certcollection have the best content, today I share with you Cybrary Owasp over torrent, seed as much as you can plz, don't be selfish and share with others. [Hidden Content] Cheers and enjoy. PS: Don't ask for mega links, mega links die fast, accounts get reported and owners loose their accounts and money.
  17. CCIE Data Center v2 :: Cisco Programmable Fabric with VXLAN Course Overview Introduction 14min VXLAN Overview 15min VXLAN Terminology 9min VXLAN Encapsulation 14min Basic VXLAN Workflow 8min Total Duration: 1hrs 2min BGP EVPN VXLAN w/ BGP EVPN Control Plane Example :: Part 1 31min VXLAN w/ BGP EVPN Control Plane Example :: Part 2 19min Total Duration: 50min Underlay Routing VXLAN Underlay Routing w/ Open Shortest Path First (OSPF) :: Part 1 23min VXLAN Underlay Routing w/ Open Shortest Path First (OSPF) :: Part 2 26min VXLAN Underlay Routing w/ Open Shortest Path First (OSPF) :: Part 3 26min VXLAN Underlay Routing w/ IS-IS :: Part 1 23min VXLAN Underlay Routing w/ IS-IS :: Part 2 23min VXLAN Underlay Routing w/ IS-IS :: Part 3 21min VXLAN Underlay Routing w/ IS-IS :: Part 4 11min VXLAN Underlay Routing w/ Protocol Independent Multicast (PIM) :: Part 1 29min VXLAN Underlay Routing w/ Protocol Independent Multicast (PIM) :: Part 2 27min VXLAN Underlay Routing w/ Protocol Independent Multicast (PIM) :: Part 3 23min VXLAN Underlay Routing w/ Border Gateway Protocol (BGP) :: Part 1 28min VXLAN Underlay Routing w/ Border Gateway Protocol (BGP) :: Part 2 24min Total Duration: 4hrs 48min Overlay Routing VXLAN Overlay Routing w/ BGP L2VPN EVPN Control Plane :: Part 1 21min VXLAN Overlay Routing w/ BGP L2VPN EVPN Control Plane :: Part 2 19min VXLAN Overlay Routing w/ BGP L2VPN EVPN Control Plane :: Part 3 26min VXLAN Overlay w/ BGP L2VPN EVPN :: Part 1 29min VXLAN Overlay w/ BGP L2VPN EVPN :: Part 2 30min VXLAN Overlay w/ BGP L2VPN EVPN :: Part 3 9min Total Duration: 2hrs 17min Anycast vPC VXLAN w/ Anycast vPC :: Part 1 27min VXLAN w/ Anycast vPC :: Part 2 27min Total Duration: 55min duration 9hrs link to download [Hidden Content]
  18. In this real-world training module, Jeremy Cioara provides the practical guidance you need when migrating your company to the cloud. Follow along as Jeremy teaches you how to prepare and deploy a hybrid Office 365 Exchange environment. Recommended Experience A knowledge of networking and cloud fundamentals is recommended, but not required. Recommended Equipment None Related Certifications This course is not associated with any formal certifications; however, the knowledge gained by completing it can contribute to your success on some entry-level Microsoft Office 365 certifications. [Hidden Content] [hide][Hidden Content]]
  19. CompTIA A+ Networking, virtualization, cloud computing, and security are some of the topics you’ll cover as you prepare for the two exams you must pass to earn the CompTIA A+ 2019 certification: CompTIA A+ Core 1 (220-1001) CompTIA A+ Core 2 (220-1002) Cover the topics entry-level IT professionals should know about: Change management, disaster prevention, disaster recovery, and incident response TCP and UDP protocols, such as SSH, HTTP, HTTPS, DHCP, and DNS Hardware components and devices, such as motherboards, printers, and keyboards Cloud computing concepts, such as IaaS, SaaS, and PaaS Troubleshooting RAM, CPUs, hard drives, and RAID arrays Microsoft Windows versions, such as Windows 7 and Windows 10 Malware, social engineering, threats, and vulnerabilities Features and tools of the Mac OS and Linux client/desktop operating systems Laptops, tablets, smartphones, mobile device network connectivity, and mobile device synchronization Bitrate (FPS) isnt the best but they are watchable. CompTIA A+ (Core 220-1001) [hide][Hidden Content]] CompTIA A+ (Core 220-1002) [hide][Hidden Content]]
  20. [Hidden Content] [Hidden Content] Thank you.
×
×
  • Create New...