Jump to content

Search the Community

Showing results for tags 'Offer'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 10,000 results

  1. Sorry I'm delelted link for reason: This courses and inform that such materials are confidential/copyright-protected materials belonging to Hakin9
  2. Guys, Even thought it says Avaya training, a lot of the SIP essential stuff is the same for Cisco or Avaya. Also check out The SIP school or Alta3 research SIP Essentials by SIP guru Stuart Fesser. Avaya-SIP Essentials English | Size: 613.53 MB Category: Tutorial This course provides a general introduction to the Session Initiation Protocol (SIP), an emerging IP communications protocol. The course discusses the characteristics, features, and benefits of SIP, as well as the SIP architectural components and their functions. This course also provides a detailed description of the Avaya SIP solution, including the Avaya SIP Enablement Services (SES) and the two Avaya SIP endpoints, the SIP IP Phones and SIP-enabled Avaya IP Softphone. The course concludes with a discussion of Avaya’s SIP marketing strategy in the context of the Reach Success sales program. This course is designed for Avaya associates, business partners, and customers with sales, design, implement, and maintain responsibilities. Upon completion of this course, the learner will be able to: Define SIP as it applies to the IP marketplace. Describe how SIP works. Describe SIP and its components as they apply to specific customer situations using Avaya SIP solutions. Connect the value SIP offers to the customer’s business needs. There are no student materials for this course. There are no specific knowledge requirements for this course. There are no mandatory prerequisites for this course. [hide][Hidden Content]]
  3. Khawar-Butt-Implementing-a-Cisco-ASA-Firewall-9.X-All-in-One download only this because others may be incomplete [hide][Hidden Content]]
  4. asav951-201.zip asav951-201.vhdx asav951-201.qcow2 asa951-201-smp-k8.bin [Hidden Content] asav951-200.zip asav951-200.vhdx asav951-200.qcow2 asa951-200-smp-k8.bin [Hidden Content] asa951-smp-k8.bin asdm-751-90.bin [Hidden Content] anyconnect-all-packages-4.2.00096-k9.zip anyconnect-all-packages-4.1.08005-k9.zip [Hidden Content]
  5. [Hidden Content] Stay Safe... Stay Home [hide][Hidden Content]] OR [hide][Hidden Content]]
  6. Offensive Security - OSCP [PWK] v2020 [PDF Version and Videos] [Download links] PWK is the foundational penetration testing course here at Offensive Security, and the only official training for the industry-leading OSCP exam. The original version of the course has enabled thousands of information security professionals to build their careers. Updating PWK to integrate the latest technology, tools and processes is critical to continuing to support our students. Our teams have worked hard to not only develop new additions to the content, but also to completely revise all the modules for a better experience. INDEX OF VIDEOS(capital letters): With the full chapter name: 02 Getting Comfortable with Kali Linux.avi 03 Command Line Fun.avi 04 Practical Tools.avi 05 Bash Scripting.avi 06 Passive Information Gathering.avi 07 Active Information Gathering.avi 08 Vulnerability Scanning.avi 09 Web Application Attacks.avi 10 Intruduction to Buffer Overflows.avi 11 Windows Buffer Overflows.avi 12 Linux Buffer Overflows.avi 13 Client-Side Attacks.avi 14 Locating Public Exploits.avi 15 Fixing Exploits.avi 16 File Transfers.avi 17 Antivirus Evasion.avi 18 Privilege Escalation.avi 19 Password Attacks.avi 20 Port Redirection and Tunneling.avi 21 Active Directory Attacks.mp4 22 The Metasploit Framework.avi 23 PowerShell Empire.avi 24 Assembling the Pieces-Penetration Test Breakdown.avi [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  7. AWS Certified Solutions Architect - Associate 2019 TORRENT [Hidden Content]
  8. Duration: 22:29:26 | Video: h264,1920×1080 | Audio: AAC,48000 Hz, 2 Ch 145 Lectures | 4.41 GB | Genre: eLearning | Language: English Supercharge your career by becoming a NetApp SAN and NAS Storage Ninja What Will I Learn? Design, configure and maintain NetApp storage systems in real world environments. Pass the NCDA exam and work as a NetApp storage systems professional. Requirements A basic general knowledge of IT is assumed but no previous storage experience is necessary. The course teaches from a complete beginner level in storage through to advanced knowledge of and configuration skills on NetApp systems. The course is laid out in such a way that experienced storage engineers can skip the beginner sections. Information in these sections is generic to all vendors so no NetApp specific knowledge will be missed. Description NetApp Storage Clustered Data ONTAP Complete NetApp Training Course. Supercharge your career by becoming a NetApp SAN and NAS Storage Ninja. Taking this NetApp Storage training course will give you the advanced level knowledge and hands-on skills you need to configure, manage and maintain NetApp Clustered Data ONTAP, the ‘Number One Storage Operating System in the world’ as listed by IDC. The course provides a structured approach which shortcuts your path to learning NetApp storage to an expert level. The course is designed to give you a deep understanding of the theory of storage and all its functions and features. You’ll gain the best practice knowledge of how to implement NetApp storage in a real world environment, and the hands-on skills to configure your system. I am a full-time professional NetApp instructor who has been entrusted by NetApp since 2007 to develop and deliver training courses for their own engineers and partners. I have also designed multiple training courses for the largest service providers in Asia Pacific such as Verizon, Telstra, and the Australian National Broadband Network. I provide mentoring and support for my company’s systems engineers as they deploy NetApp storage systems and I worked in the field for over ten years before focusing on passing my knowledge on to others. The format of the course lessons is a full explanation of the topic theory, then a live demonstration in the lab where I show you the complete configuration using first the NetApp System Manager GUI and then the Command Line Interface. We’re going to go through the complete configuration of the system in a logical manner, from taking it out of the box to the final tweaks to ensure best performance and availability, and covering off all the NetApp features as we go. At over 20 hours long taking the course can seem daunting, but because it’s laid out in a logical manner you can pick and choose the parts which are important to you. If you’re a professional storage engineer who’s going to be working on NetApp systems day to day, then skip the beginner sections and watch the rest. If you’re new to storage, then just watch the theory part of the lessons and the GUI configuration sections you need. If later you need to know the best practice to configure a feature in your environment and want to see a step-by-step configuration example, you know it’s all here. The course focuses on Clustered Data ONTAP 8.3, which is currently the most commonly deployed version. The topics covered apply to all versions of the operating system. A verifiable course certificate stating you have completed this advanced level NetApp Data ONTAP training will be provided at the end of the course. This will prove to potential future employers that you have the knowledge and skills necessary to be a real asset to their company. And if NetApp certification is your goal, you will find everything you need and more here to attain the NCDA NetApp Certified Data Administrator in Clustered Data ONTAP, the de facto standard in NetApp Storage certification. As a student in this course, you will get an answer to every question you ask in the Ask Question section. I love interaction with my students- anything you want to know, please ask. All of the slides shown in the course are included in the supplemental material. The course comes with an unconditional risk-free 30 day money-back guarantee – that’s my personal promise of your success. Thank you for taking the time to read about the course. I hope you now have enough motivation to get into the learning right away. If so, click the button at the top of the page to enroll and get started! Who is the target audience? IT professionals or enthusiasts who want to develop a full understanding of and practical skills in SAN and NAS storage. Systems engineers who want an advanced level knowledge of and hands-on management skills on NetApp Data ONTAP systems. Students who want to pass the NetApp Certified Data Administrator (NCDA) exam. [hide]Download Rapidgator [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] Download nitroflare [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  9. denis9991

    IPV6

    [hide][Hidden Content]]
  10. FOR508 - Video On Demand 2015-16 [hide][Hidden Content]]
  11. Application Security Engineer – Mid Level English | Size: 22.54 GB Genre: eLearning In this mid level learning path, you’ll prepare for a role as an application security engineer, focusing on penetration testing and other offensive security topics. You’ll start by learning compliance and security within a professional business context, before moving into software development with Python, one of the most popular programming languages in the industry. Once you’ve built those foundations, you’ll gain the skills you need to effectively analyze, exploit, and mitigate vulnerabilities in applications, as well as how to use the tools you’ll need to succeed in this career. As an application security engineer, you’ll provide design and implementation input throughout the development lifecycle, workin with developers and engineers to demonstrate attack vectors as well as their potential impact on the organization. You will perform manual pentests, as well as tests using industry frameworks and custom developed tools. Your job responsibilities will include extensive penetration testing of business applications. You may also be asked to develop your own custom tools, reverse engineer existing applications, and provide mitigation options based on your findings. Throughout the pentesting process, you will be responsible for communicating with various engineering teams to ensure that exploits can be reduced or eliminated before they reach production. Ideal candidates for security engineering and pentesting positions should have at least 2-4 years experience as a junior security engineer or junior security analyst. [Hidden Content] [Hidden Content]
  12. Just download ASA-5500-x Next-Generation Firewalls others are incomplete [Hidden Content]
  13. LIVE LESSONS CCNP 300-715 [hide][Hidden Content]]
  14. CERTCOLLECTION SANS & Offensive-Security Torrent is brought to you by a community of people who upload, share, and repost their s%it. Thanks for making this possible everyone! I feel that the privileged people who have this material have a moral obligation to share it with the less privileged.
  15. [hide][Hidden Content]] and the vm [hide][Hidden Content]]
  16. JUST UPLOAD INE ENARSI 300-410 COURSE [hide][Hidden Content]]
  17. Offensive Internet of Things (IoT) Exploitation English | Size: 5.02 GB Genre: eLearning <!--more--> Offensive Internet of Things (IoT) Exploitation is an in-depth course in IoT security and teaches you how to pentest and exploit the so-called "smart" devices. This online class is taught using practical, real world examples on how to to analyze and pentest hardware, firmware, software components, network communication, mobile apps used to control devices and their radio communication protocols. IoT is one of the hottest trends in technology right now! There seems to be an arms race between both consumer and industrial vendors to connect almost everything to the Internet - your fridge, thermostat, coffee machine, watch, shoes, dog's collar and toaster are all included! This new frenzy to connect "everything" to the Internet is here to stay and we are already seeing millions of these "smart" devices in homes, offices and public areas. During the previous "Mobile Application" age, security took a backseat and almost every other app was insecure to the most basic and embarrassing of vulnerabilities. Unfortunately, to our horror, this golden age of "IoT - smart devices" is no different! The key challenge in learning how to pentest and secure IoT devices is understanding the complex interaction between hardware and firmware. This includes being able to find debug ports to connect to or even having the ability to read/write directly to a chip! This course will take you through this complex yet extremely interesting and exciting journey. This course is beginner friendly and starts from the very basics of IoT devices and their security - how to get started? Hardware? Software? Tools? Techniques? Will all be answered. This training is ideal for penetration testers, security engineers, managers, bug bounty hunters and anyone interested in uncovering how "smart" these devices really are Smiliey A non-exhaustive list of topics to be covered include: Introduction to Offensive IoT Exploitation Mapping attack surface of an IoT device Firmware analysis - identifying hardcoded secrets Emulating firmware binary Backdooring a firmware Firmware emulation using FAT Web application security for IoT devices Burp 101 Exploiting command injection CSRF and firmware diffing Conventional attack vectors - Password cracking Conventional attack vectors intro Analyzing smart plugs Controlling smart plug by defeating encryption ARM 101 Buffer overflow on ARM Exploit writing on ARM Using radare2 for MIPS binary analysis Exploitation using GDB remote debugging on MIPS Introduction to UART Serial interfacing over UART NAND Glitching attack SPI and I2c - Getting started Dumping EEPROM data Identifying JTAG pinouts using Arduino Identifying pins using JTAGulator JTAG - Introduction and Getting started JTAG debugging Introduction to SDR and basic radio components Getting started with GNU Radio companion Decoding an AM signal Capturing FM signals using RTL-SDR Analyzing wireless doorbells using RTL-SDR Sensitive information extraction from Signal Introduction to Zigbee Sniffing and replaying data using Zigbee Conclusion [Hidden Content]
  18. INE - CCIE Routing & Switching Deep Dive Implementing IP Multicast Training | 2.12Gb The Implementing IP Multicast Deep Dive is the best way to learn, polish, and refine your multicast skills. This course consists of more than 14 hours of instructor-led videos designed to give you the knowledge you need to prepare for the latest CCIE lab exam and help with your everyday job. Course Outline Module 1 Lesson 1 - Introduction Lesson 2 - IPv4 Multicast Overview Lesson 3 - IP Multicast Components Lesson 4 - PIM Dense Mode Lesson 5 - PIM Dense Configuration Examples Lesson 6 - PIM Sparse Mode Lesson 7 - PIM Sparse Mode Configuration Module 2 Lesson 1 - Advanced PIM - Auto-RP Lesson 2 - Advanced PIM - Auto-RP Configuration Lesson 3 - Advanced PIM - BSR Lesson 4 - Advanced PIM - PIM over NBMA Lesson 5 - Advanced PIM - Bidirectional PIM Lesson 6 - Advanced PIM - SSM Module 3 Lesson 1 - Inter-AS Multicast - MSDP Lesson 2 - Inter-AS Multicast - MBGP Lesson 3 - Anycast RP Lesson 4 - Multicast Features - Multicast over GRE & RPF Failure Lesson 5 - Multicast Features Lesson 6 - Layer 2 Multicast Lesson 7 - IPv6 Multicast [Hidden Content]
  19. The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. [Hidden Content] Import then Download [hide][Hidden Content]] Stay Home.. Stay Safe
  20. google drive links Part1 [hide][Hidden Content]] Part2 [hide][Hidden Content]]
  21. Data Science and Machine Learning for Infosec- COURSE INTRODUCTION Lab Setup and Installation 1 - Module 1: Course Introduction and Pandas : 1.1 - Module 1- Pandas Part 1 1.2 - Module 1- Pandas Part 2 1.3 - Module 1- Pandas Part 3 1.4 - Module 1 Pandas Part 4 2 - Module 2: Introduction to machine learning / KNN : 2.1 - Module 2- K Nearest Neighbors (KNN) Part 1 2.2 - Module 2- K Nearest Neighbors (KNN) Part 2 2.3 - Module 2- K Nearest Neighbors (KNN) Part 3 2.4 - Module 2- K Nearest Neighbors (KNN) Part 4 3 - Module 3: Linear Regression / Model Evaluation : 3.1 - Module 3- Model Evaluation and Linear Regression Part 1 3.2 - Module 3- Model Evaluation and Linear Regression Part 2 3.3 - Module 3- Model Evaluation and Linear Regression Part 3 3.4 - Module 3- Model Evaluation and Linear Regression Part 4 4 - Module 4: Logistic Regression : 4.1 - Module 4- Logistic Regression Part 1 4.2 - Module 4- Logistic Regression Part 2 4.3 - Module 4- Logistic Regression Part 3 4.4 - Module 4- Logistic Regression Part 4 5 - Module 5: Natural Language Processing : 5.1 - Module 5- Natural Language Processing Part 1 5.2 - Module 5- Natural Language Processing Part 2 5.3 - Module 5- Natural Language Processing Part 3 5.4 - Module 5- Natural Language Processing Part 4 6 - Module 6: Naïve Bayes Classification : 6.1 - Module 6- Naive Bayes Classification Part 1 6.2 - Module 6- Naive Bayes Classification Part 2 6.3 - Module 6- Naive Bayes Classification Part 3 6.4 - Module 6- Naive Bayes Classification Part 4 7 - Module 7: Feature Unions / Pipelines : 7.1 - Module 7- Advanced Scikit Learn Part 1 7.2 - Module 7- Advanced Scikit Learn Part 2 8 - Module 8: Decision Trees : 8.1 - Module 8- Decision Trees Part 1 8.2 - Module 8- Decision Trees Part 2 8.3 - Module 8- Decision Trees Part 3 9 - Module 9: Ensembling Techniques : 9.1 - Module 9- Ensembling Techniques Part 1 9.2 - Module 9- Ensembling Techniques Part 2 9.3 - Module 9- Ensembling Techniques Part 3 9.4 - Module 9- Ensembling Techniques Part 4 10 - Module 10: Dimension Methods : 10.1 - Module 10- Dimension Reduction Part 1 10.2 - Module 10- Dimension Reduction Part 2 10.3 - Module 10- Dimension Reduction Part 3 11 - Module 11: Clustering Methods : 11.1 - Module 11- Clustering Part 1 11.2 - Module 11- Clustering Part 2 11.3 - Module 11- Clustering Part 3 12 - Module 12: Stochastic Gradient Descent : 12.1 - Module 12- Stochastic Gradient Descent Part 1 12.2 - Module 12- Stochastic Gradient Descent Part 2 12.3 - Module 12- Stochastic Gradient Descent Part 3 13 - Module 13: Deep Learning / Neural Networks : 13.1 - Module 13- Neural Networks - Deep Learning Part 1 13.2 - Module 13- Neural Networks - Deep Learning Part 2 13.3 - Module 13- Neural Networks - Deep Learning Part 3 14 - Module 14: Recommendation Engines 14.1 - Module 14- Recommendations Engine Part 1 14.2 - Module 14- Recommendations Engine Part 2 Case Study- Detecting Malicious URLs + Code Files + Data Files + Url File [Hidden Content]
  22. Certified Security Analyst Training (CSAT) Cyber Security Advanced Persistent Threat Defender (CAPTD) Cyber Security Malicious Software Defender (CSMD) ‪Cyber Security Source Code Defender (CSCD) Cyber Security Threat Intelligence Research (CTIR) Cyber Security Web Application Defender (CWAD) ‪CyberTraining365 Certified Ethical Hacker (CEH) v9 Training‬ ‪CyberTraining365 Computer Hacker and Forensic Investigator (CHFI) ‪CyberTraining365 Kali 101‬ 36 GB Import > Download [Hidden Content] Some of the courses are taught by the lead author of Gray Hat Hacking 4th edition, Daniel Regalado.
  23. Keith Barker + Jacob Moran (New Files) 1.27 GB New Files | Intermediate | 23 hours | 102 Videos [Hidden Content] New Files (28 Files + 1 welcome to vsphere 6.7) [Hidden Content]
  24. Red Hat Certified Engineer (RHCE) Complete Video Course , 2/e Hint : videos only without virtual machines by Sander van Vugt Publisher: Pearson IT Certification Release Date: May 2017 ISBN: 9780134755823 Video Description 13 hours of Video Instruction with hands-on labs and practice exam content What You Will Learn Key concepts for all the objectives on the Red Hat Certified Administrator (RHCSA) exam Information on the new RHEL 7 exam More info : [Hidden Content] compressed size : 27.8 GB & after extract : 31.53 GB [Hidden Content] Kind regards
  25. /* changelog */ ############################################################################ March 28, 2020 --!!! the links from this post was removed, so I will upload all again somewhere else, please be patient until I finished to do so, after that I will update the links accordingly !!!-- December 1, 2019 -- added Oracle Data Integrator 12c Integration and Administration (D82167GC10) [Java and Middleware] December 1, 2019 -- added Oracle Data Integrator 12c Advanced Integration and Development (D87557GC10) [Java and Middleware] October 5, 2019 -- added Oracle Big Data Fundamentals (D86898GC10) [Miscellaneous] October 5, 2019 -- added Oracle Cloud Overview (D83566GC10) [Miscellaneous] October 5, 2019 -- added Oracle Database Cloud for Oracle DBAs (D96069GC10) [Miscellaneous] August 3, 2019 -- added Oracle Database 12c RAC Administration (D81250GC10) [Oracle Database High Availability] August 3, 2019 -- added Oracle Database 12c Clusterware Administration (D81246GC10) [Oracle Database High Availability] August 3, 2019 -- added Oracle Database 12c Data Guard Administration (D79232GC10) [Oracle Database High Availability] August 3, 2019 -- added Oracle Database 12c Oracle ASM Administration (D81242GC10) [Oracle Database High Availability] July 23, 2019 -- added Oracle SOA Suite 12c: New Features and Capabilities (D93509GC10) [Java and Middleware] July 22, 2019 -- added Java SE 8 Fundamentals (D83527GC10) [Java and Middleware] July 22, 2019 -- added Java SE 8 Programming (D84838GC10) [Java and Middleware] July 22, 2019 -- added Oracle GoldenGate 12c. Fundamentals for Oracle (D84357GC10) [Java and Middleware] July 22, 2019 -- added Oracle GoldenGate 12c. Advanced Configuration (D89113GC10) [Java and Middleware] July 22, 2019 -- added Oracle SOA Suite 12c. Build Composite Applications (D84361GC10) [Java and Middleware] July 22, 2019 -- added Oracle WebLogic Server 12c Administration I (D80149GC11) [Java and Middleware] July 22, 2019 -- added Oracle WebLogic Server 12c Administration II (D80153GC11) [Java and Middleware] May 28, 2019 -- added MySQL for Database Administrators Ed 3.1 (D61762GC31) including [Miscellaneous] May 28, 2019 -- added MySQL Performance Tuning Guide (D61820GC20) [Miscellaneous] ############################################################################ /*the titles of the courses updated or added in the current month will be bold*/ /* if I missed something or do you have any problem with links please pm me or request here */ ==================================================== Oracle Database 12c for new DBAs --CORE PATH-- ==================================================== Oracle Database 12c: Admin, Install and Upgrade Accelerated (D79027GC10) Oracle Database 12c: Backup and Recovery Workshop Ed 2 (D78850GC20) Oracle Database 12c: Global Data Services (D79244GC10) Oracle Database 12c: Implement Partitioning Ed 1 (D85572GC10) Oracle Database 12c: Install and Upgrade Workshop (D77766GC10) Oracle Database 12c: Managing Multitenant Architecture (D79128GC10) Oracle Database 12c: Performance Management and Tuning (D79236GC10) Parallel Processing in Oracle Database 12c Ed 1 (D87438GC10) ==================================================== Enterprise Manager Cloud Control for 12c DBAs --SPECIALTY PATH-- ==================================================== Oracle Enterprise Manager Cloud Control 12c: Install & Upgrade (D73067GC10) Using Oracle Enterprise Manager Cloud Control 12c Ed 2 (D73244GC20) [Hidden Content] ==================================================== Oracle Database 12c for 11g and Prior DBAs --CORE PATH-- ==================================================== Oracle Database 12c R1: New Features for Administrators Ed 2 (D77758GC20) Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 (D93517GC10) Oracle Database 12c SQL and PLSQL New Features (D90165GC10) [Hidden Content] ==================================================== Oracle Database High Availability --SPECIALTY PATH-- ==================================================== Oracle Database 12c RAC Administration (D81250GC10) Oracle Database 12c Clusterware Administration (D81246GC10) Oracle Database 12c Data Guard Administration (D79232GC10) Oracle Database 12c Oracle Automatic Storage Management Administration (D81242GC10) [Hidden Content] ==================================================== Oracle Database Security --SPECIALTY PATH-- ==================================================== Oracle Database 12c: Security (D81599GC10) Oracle Audit Vault and Database Firewall: Install & Configure (D86587GC10) Using Oracle Database Vault with Oracle Database 12c (D86597GC10) Oracle Database 12c Using Oracle Key Vault (D88454GC10) ==================================================== [Hidden Content] ==================================================== Oracle Database Application Development ==================================================== Oracle Database: SQL Workshop I (D80190GC20) Oracle Database: SQL Workshop II (D80194GC20) Oracle Database 12c: SQL Tuning for Developers (D79995GC10) Oracle Database 12c: Analytic SQL for Data Warehousing (D79991GC10) Oracle Database 12c: PLSQL Fundamentals (D80182GC10) Oracle Database 12c: Developing PL-SQL Unit(D80170GC10) Oracle Database 12c: Advanced PLSQL (D80343GC10) Oracle Database 12c: Program with PLSQL Ed 1 (D80170GC10) Oracle Application Express Workshop I (D79653GC20) Oracle Application Express Workshop II (D79657GC20) Oracle Application Express: Administration (D56361GC10) [Hidden Content] ==================================================== Operating Systems--Server Virtualization--Engineered Systems ==================================================== Unix and Linux Essentials (D76989GC10) Oracle Linux 7 System Administration Ed 1 (D88168GC10) Oracle Linux 7 Advanced Administration Ed 1 (D90758GC10) Oracle Solaris 11 System Administration Ed 2.1 (D72896GC21) Oracle Solaris 11 Advanced System Administration Ed 3 Oracle Solaris Cluster 4.x Administration (D74942GC10) Oracle Solaris 11 ZFS Administration (D75915GC10) Shell Programming for System Administrators (D61776GC21) What's New in Oracle Solaris 11 (D73819GC10) Transition to Oracle Solaris 11 ag (D73488GC11) sg (D73488GC30) Oracle Exalogic Elastic Cloud Administration (D71299GC10) Exadata Database Machine: 12c Administration Workshop Ed 2 (D92887GC20) [Hidden Content] ==================================================== Java and Middleware ==================================================== Java SE 8 Fundamentals (D83527GC10) Java SE 8 Programming (D84838GC10) Oracle GoldenGate 12c. Fundamentals for Oracle (D84357GC10) Oracle GoldenGate 12c. Advanced Configuration (D89113GC10) Oracle SOA Suite 12c. Build Composite Applications (D84361GC10) Oracle SOA Suite 12c: New Features and Capabilities (D93509GC10) Oracle WebLogic Server 12c Administration I (D80149GC11) Oracle WebLogic Server 12c Administration II (D80153GC11) Oracle Data Integrator 12c Integration and Administration (D82167GC10) Oracle Data Integrator 12c Advanced Integration and Development (D87557GC10) [Hidden Content] ==================================================== Miscellaneous ==================================================== MySQL for Database Administrators Ed 3.1 (D61762GC31) MySQL Performance Tuning Guide (D61820GC20) Oracle Big Data Fundamentals (D86898GC10) Oracle Cloud Overview (D83566GC10) Oracle Database Cloud for Oracle DBAs (D96069GC10) [Hidden Content]
×
×
  • Create New...