Jump to content

Search the Community

Showing results for tags 'Offer'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 10,000 results

  1. The Implementing Automation for Cisco Security Solutions (SAUI) v1.0 course teaches you how to design advanced automated security solutions for your network. [Hidden Content] Import then Download [hide][Hidden Content]] Stay Home.. Stay Safe
  2. Make sure you import to your mega drive and share when this link goes down [hide][Hidden Content]] or torrent shared now [hide]magnet:?xt=urn:btih:Y52QAUEOA6JGCCQSWCBYDJQ2Y7MV543P Trackers: [Hidden Content]]
  3. Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA) [Hidden Content] Import then Download [hide][Hidden Content]] Stay Home.. Stay Safe
  4. vCenter 5.6 [Hidden Content]
  5. FirePOWER_Management_Center_Collection [Hidden Content]
  6. Course at a glance: Learn from a world renown professional reverse engineer Start from the basics up to highly technical chapters Learn about IA-32 CPU Architecture Learn about functions, stack frames, heaps, exceptions, important Ring3 ShiChuang internal structures, PE file format Master ImmunityDBG Learn about important Ring3 ShiChuang Internal Structures Learn different methods to locate the important algorithms Understand and bypass Anti-Reversing techniques Perform full manual unpacking on packed executables Practice based course with dozens of guided exercises Challenge your mind with hardcore technical topics After obtaining the eCRE certification qualifies you for 40 CPE Section: Theoretical Module 1 : The necessary theory Part 1 Module 2 : The necessary theory Part 2 Module 3 : The necessary theory Part 3 Module 4 : VA/RVA/OFFSET and PE file format Section: Technical (Videos) Module 5 : String references and basic patching Module 6 : Exploring the Stack Module 7 : Algorithm reversing Module 8 : ShiChuang Registry manipulation Module 9 : File manipulation Module 10 : Anti-Reversing tricks Part 1 Module 11 : Anti-Reversing tricks Part 2 Module 12 : Anti-Reversing tricks Part 3 Module 13 : Code obfuscation Module 14 : Analyzing Packers and Manual Unpacking Module 15 : Debugging Multi-thread applications [hide][Hidden Content] [Hidden Content]] [hide]source: [Hidden Content]] mega / torrent here: [Hidden Content]
  7. Stone River eLearning – Certified Professional Ethical Hacker (CPEH) English | Size: 10.50 GB Genre: eLearning The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. [Hidden Content]
  8. Transforming Campus Networks to Intent-Based Networking [Hidden Content]
  9. Official Training - VMware vCloud - Student Guide [Hidden Content] Problem with unrar or link die , please request here [Hidden Content] Password for Unrar (if have) ucsexadatacloud.blogspot.com
  10. Palo Alto software thread! I have access to all software images for all platforms and can upload any release you need. Request them here and I will deliver. This is for software only, I cannot provide licences, support, or activation codes etc.
  11. all the 426 Videos from Cbt Nuggets All courses list is included on the link Cisco Certification Training | 200-301 | Cisco CCNA Networking, IP connectivity, network security, and network automation are some of the topics you'll cover as you prepare for the 200-301 CCNA, the one exam you need to pass to earn the new Cisco Certified Network Associate v2.0 certification. Cover a broad range of networking fundamentals you'll need for your career in IT technologies: Understand routers, L2 and L3 switches, next-generation firewalls (NGFWs), and wireless access points (WAPs) Implement static routing and dynamic routing protocols, such as OSPF (Open Shortest Path First) Explain and configure IP services, including NAT, NTP, DHCP, DNS, SNMP, QoS, and SSH Understanding Spanning Tree Protocol (STP), trunk ports, 802.1Q, and Native VLAN Configure and verify IPv4 and IPv6 Internet Protocol addressing Define security concepts, such as threats, vulnerabilities, and multi-factor authentication (MFA) Implement site-to-site VPN, access control lists (ACLs), and Layer 2 security features Understand wireless LAN (WLAN) and wireless security protocols, such as WPA, WPA2, and WPA3 Configure the Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and EtherChannel (LACP) Describe controller-based networks, software-defined networks (SDN), network programmability, Cisco DNA Center, Puppet, Chef, and Ansible Start this series today to prepare for the new CCNA certification, which goes live on February 24, 2020. [Hidden Content] All Files Link [hide][Hidden Content]]
  12. This class will cover a wide variety of the publicly available exploit tools and how they can be used specifically against a Cisco infrastructure. A majority of the class time will be spent doing practical labs. Therefore, a certain level of Cisco expertise will be expected. The training will also cover the possible defenses against these attacks. Students will be using 2651 routers, and 1900 switches for their labs. The lab core will consist of 3600s, 2900s, 2500s and servers of various flavors. Students will be required to bring their own laptops to (with appropriate caution) attach to the labs. This class will focus on Cisco Router and Switch vulnerabilities and will not be covering PIX firewalls, VPN concentrators, or IDS tools. Here is a list of some of the topics that will be covered: Ways of Password Nabbing Sniffing traffic on a switch VLAN Hopping and 802.1Q issues Root Bridge Takeovers Local and remote HSRP attacks Routing manipulation/injection with RIP, IGRP, EIGRP, OSPF BGP attacks SNMP Exploits Tunneling attacks DoS and DDoS issues and preventive methods [Hidden Content]
  13. 2019 lastest JNCIP-SEC JN0-634 written, vaild to pass, if you have any questions, please keep me posted [hide][Hidden Content]]
  14. Cisco FirePOWER 1100 Series Collection Change Log new builds added: Cisco_FTD_SSP_FP1K_Patch- License.nfo and more... [Hidden Content]
  15. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist – Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Securing Networks with Cisco Firepower Next-Generation Intrusion Prevention System (SSFIPS). You can take these courses in any order. The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting. The Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 course shows you how to deploy and use Cisco Firepower® Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort® rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. Import then Download [hide][Hidden Content]] Stay Home.. Stay Safe
  16. by Firas Ahmed, Somit Maloo Publisher: Cisco Press Release Date: March 2020 ISBN: 9780136555735 Topic: CCNP Book Description This is Cisco’s official, comprehensive self-study resource for preparing for the DCCOR 300-601 exam, part of Cisco’s modern pathways towards CCNP and CCIE certification. Cisco technology experts cover every objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You’ll find: Pre-chapter quizzes to assess knowledge upfront and focus study more efficiently Foundation topics sections that explain concepts and configurations, and link theory to actual configuration commands Key topics sections calling attention to every figure, table, and list that candidates must know Exam Preparation sections with additional chapter review features Final preparation chapter providing tools and a complete final study plan Customizable online practice tests This guide’s comprehensive, current coverage covers implementation of all these core data center technologies: Network Compute Storage network Automation Security [hide][Hidden Content]]
  17. Saw this in another forum, hence posting the content. 1 SD-WAN (Viptela) - basic & advanced 2. SD-ACCESS (DNAC) [Hidden Content] Slides [Hidden Content]
  18. Download Book Deploying ACI The complete guide to planning, configuring, and managing Application Centric Infrastructure [hide][Hidden Content]]
  19. I am presenting One-Stop for all Offensive Security materials. I don't have anything else, so don't ask. It is just collection of other shares from this forum, so nothing new. Please mirror it as soon as possible, otherwise links would be dead. Here is a list of files in the archives: Offensive Security - Advanced Web Attacks and Exploitation (AWAE): 0_Syllabus_Advanced_Web_Attacks_and_Exploitation.pdf AWAE_2016_BlackHat.pdf Hints_Server Offensive Security - Advanced Windows Exploitation (AWE): 0_Syllabus_Advanced_Windows_Exploitation.pdf 1.1_2009_BlackHat 2.0_2010 Offensive Security - Advanced Windows Exploitation (AWE)/1.1_2009_BlackHat: AWE-1.pdf AWE-2.pdf AWE-3.pdf AWE-4.pdf Offensive Security - Advanced Windows Exploitation (AWE)/2.0_2010: AWE-PRES.pdf Module 0x01 Egghunters.pdf Module 0x02a Bypassing NX.pdf Module 0x02b (Update) Bypassing DEP AlwaysOn Policy.pdf Module 0x03 Custom Shellcode Creation.pdf Module 0x04 Venetian Shellcode.pdf Module 0x05 Kernel Drivers Exploitation.pdf Module 0x06 Heap Spraying.pdf Offensive Security - Cracking the Perimeter (CTP): 0_Syllabus_Cracking_the_Perimeter.pdf CTP_2008_BlackHat.pdf video Offensive Security - Lab Exercises: Offensive Security Lab Exercises_2007.pdf Offensive Security - Penetration Testing with Kali Linux (PWK): 0_Syllabus_Penetration_Testing_with_Kali_Linux.pdf PWK_2014.pdf video Offensive Security - Wireless Attacks (WiFu): 0_Syllabus_Wireless_Attacks_-_WiFu.pdf BackTrack WiFu 2.0_2009.pdf BackTrack WiFu 3.0_2012.pdf video [Hidden Content]
  20. Red Hat Certified Engineer (RHCE) EX294 RHEL 8 Complete Video Course: Red Hat Ansible Automation, 3rd Edition [Hidden Content] Here is the torrent link [Hidden Content]
  21. Hello! This is a sync share that contains only SANS text and video materials. All I could find across the universe. PDF: ICS410 - ICS/SCADA Security Essentials 2016 [*]AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2008 2016 [*]DEV540 - Secure DevOps and Cloud Application Security 2017 [*]FOR500 - Windows Forensic Analysis 2011 2014 2017 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2015 2016 2019 [*]FOR518 - Mac and iOS Forensic Analysis and Incident Response 2015 [*]FOR526 - Memory Forensics In-Depth 2013 2015 [*]FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response 2014 2017 [*]FOR585 - Advanced Smartphone Forensics 2017 [*]FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques 2010 2015 2016 2017 [*]MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression 2011 [*]MGT514 - Security Strategic Planning, Policy, and Leadership 2016 [*]MGT517 - Managing Security Operations Detection, Response, and Intelligence 2010 2018 [*]SEC201 - Computing & Technology Essentials 2017 [*]SEC401 - Security Essentials Bootcamp Style 2004 2011 2016 2017 [*]SEC460 - Enterprise Threat and Vulnerability Assessment 2018 [*]SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis 2018 [*]SEC501 - Advanced Security Essentials - Enterprise Defender 2016 [*]SEC503 - Intrusion Detection In-Depth 2003 2010 2015 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2010 2016 [*]SEC505 - Securing Windows and PowerShell Automation 2010 2017 [*]SEC506 - Securing Linux-Unix 2000 2009 2017 [*]SEC511 - Continuous Monitoring and Security Operations 2015 2016 [*]SEC524 - Cloud Security Fundamentals 2012 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2010 2011 2012 2016 [*]SEC545 - Cloud Security Architecture and Operations 2017 [*]SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception 2016 [*]SEC555 - SIEM with Tactical Analytics 2017 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2009 2012 2015 2016 2017 2018 [*]SEC561 - Immersive Hands-On Hacking Techniques 2015 [*]SEC564 - Red Team Operations and Threat Emulation 2017 [*]SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth 2013 2016 [*]SEC573 - Automating Information Security with Python 2017 [*]SEC579 - Virtualization and Software-Defined Security 2016 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2011 2015 2016 [*]SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses 2017 2019 [*]SEC617 - Wireless Penetration Testing and Ethical Hacking 2007 2010 2015 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2013 2016 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2012 2014 2017 2018 [*]SEC760 - Advanced Exploit Development for Penetration Testers 2014 2016 Video: AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2008 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2011 2012 2015 [*]FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques 2015 [*]MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression 2011 [*]SEC401 - Security Essentials Bootcamp Style 2017 [*]SEC503 - Network Intrusion Detection 2018 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2017 [*]SEC505 - Securing Windows and PowerShell Automation 2017 [*]SEC506 - Securing Linux-Unix 2011 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2017 2018 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2017 2018 [*]SEC575 - Mobile Device Security and Ethical Hacking 2017 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2011 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2015 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2011 2018 [Hidden Content] If you have any new stuff, just PM me. I will add it to the share. Stay synchronised and seed. There will be updates! Kudos to @LFNTHNTR for the baseline.
  22. INE JNCIE SEC Advanced Technology Course JPR 932|2.38 GB JNCIE-SEC Advanced Technology Course: JPR-932 The Juniper Networks Certified Expert Security (JNCIE-SEC) Advanced Technology Course is the first step toward understanding JNCIE Security technologies and is an extensive hands-on and theory course designed for candidates with basic JunOS Security knowledge to excel in the JNCIE-SEC Lab exam. Each technology you need to know for the JNCIE-Security Lab is described in detail in an instructor-led demonstration with real-world scenarios. [Hidden Content]
  23. Heres the MASPTv2 if anyone is interested. Enjoy [Hidden Content] forgot key [Hidden Content]
  • Create New...