Jump to content

Search the Community

Showing results for tags 'Offer'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 10,000 results

  1. Programming for Network Engineers(PRNE)v1.0 [hide][Hidden Content]]
  2. INE - CCNP Routing & Switching v2 Bootcamp (Compressed/MKV) Instructor: Keith Bogart, CCIE #4923 Format: MKV Size: 2.0GB The CCNP R&S online bootcamp assumes that learners have already completed INE’s CCNP Routing-and-Switching video series. The bootcamp will consist of verbal explanations of the operations of networking protocols and their interactions through the use of lab demonstrations. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor. During the process, the instructor will intentionally demonstrate the effects of misconfigurations and hardware failures. More Info: [Hidden Content] Table of Contents: 0.Course Introduction.mkv 1.Core vs. Non-Core -- Understanding interface outputs.mkv 2.Switch - Initial Preparation & Configuration.mkv 3.Inter-Switch Links Preparation & Configuration -- Part 1.mkv 4.Inter-Switch Links Preparation & Configuration -- Part 2.mkv 5.Inter-Switch Links Preparation & Configuration -- Part 3.mkv 6.Spanning-Tree -- Part 1.mkv 7.Spanning-Tree -- Part 2.mkv 8.Spanning-Tree Enhancements.mkv 9.Switch Packet Capture.mkv 10.Switching Security Overview -- Part 1.mkv 11.Switching Security Overview -- Part 2.mkv 12.Switching Security Overview -- Part 3.mkv 13.Switching Security Overview -- Part 4.mkv 14.Switching Security (IP Spoofing Protection).mkv 15.Switching Security (ARP Spoofing Protection).mkv 16.Switching Security (Private VLANs).mkv 17.Switching Security (VLAN Access-Lists).mkv 18Switching Security (Storm Control).mkv 19.First Hop Redundancy Protocols (HSRP) -- Part 1.mkv 20.First Hop Redundancy Protocols (HSRP) -- Part 2.mkv 21.First Hop Redundancy Protocols (VRRP).mkv 22.First Hop Redundancy Protocols (GLBP).mkv 23.EIGRP (Preliminary Configuration) -- Part 1.mkv 24.EIGRP (Preliminary Configuration) -- Part 2.mkv 25.EIGRP (Summarization).mkv 26.EIGRP (Load-Balancing).mkv 27.EIGRP (Filtering).mkv 28.EIGRP (Limiting Query Propagation).mkv 29.OSPF (Preliminary Configuration) -- Part 1.mkv 30.OSPF (Preliminary Configuration) -- Part 2.mkv 31.OSPF (Path Manipulation) -- Part 1.mkv 32.OSPF (Path Manipulation) -- Part 2.mkv 33.OSPF (Summarization).mkv 34.OSPF (Filtering).mkv 35.OSPF (Default Routes).mkv 36.OSPF (Area Types).mkv 37.BGP (Preliminary Configuration).mkv 38.BGP (iBGP Configuration).mkv 39.BGP (IPv4 Prefix Generation).mkv 40.BGP (IPv6 Peers & Networks) -- Part 1.mkv 41.BGP (IPv6 Peers & Networks) -- Part 1.mkv 42.BGP (IPv6 Peers & Networks) -- Part 3.mkv 43.BGP (Path Attributes) -- Part 1.mkv 44.BGP (Path Attributes) -- Part 2.mkv 45.BGP (Path Attributes) -- Part 3.mkv 46.BGP (Filtering).mkv 47.IGP Redistribution -- Part 1.mkv 48.IGP Redistribution -- Part 2.mkv 49.VRF-Lite.mkv 50.uRPF.mkv Course Duration: 17hrs 28min [Hidden Content]
  3. Copyright 2013 Dimensions: 7-3/8" x 9-1/8" Pages: 752 Edition: 1st Book ISBN-10: 1-58714-325-9 ISBN-13: 978-1-58714-325-0 Type:PDF Size:19 mb more info Download From MediaFire [Hidden Content] mirror (thanks to npatel007) [hide][Hidden Content]] Note: password and rar is for not to be deleted by Mediafire audit
  4. Hi Cisco Firepower Configuration & Troubleshooting with best practices Book [Hidden Content]
  5. DOWNLOAD LINK: [hide][Hidden Content]]
  6. Visual RF Planner Scalable Wlan Design & Implementation Aruba ClearPass Guest Aruba ClearPass Policy Manager [Hidden Content]
  7. Direct link. [hide][Hidden Content]]
  8. Featuring a new foreword by Dameon D. Welch-Abernathy a.k.a. PhoneBoy Typical causes of performance-related issues on Check Point ® firewalls are explored in this book through a process of discovery, analysis, and remediation. This Third Edition has been fully updated for version R80.30 and Gaia kernel 3.10, and you will learn about: Common OSI Layer 1-3 Performance Issues Gaia OS Optimization ClusterXL Health Assessment CoreXL & SecureXL Tuning Access Control Policy Optimization IPSec VPN Performance Enhancement Threat Prevention Policy Optimization Active Streaming & HTTPS Inspection Elephant Flows/Heavy Connections & DoS Attack Mitigation Diagnosing Intermittent Performance Issues Setting Up Proactive Performance-Related Alerting Includes an index of all CLI commands referenced in the text. This book has everything you need to ensure top performance from your Check Point firewall. [hide][Hidden Content]]
  9. Digital Forensics and Cyber Crime with Kali Linux Fundamentals MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 13.5 Hours | 24.6 GB Genre: eLearning | Language: English Why is digital forensics so important? In today's digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and how a breach occurred and also how to properly respond. Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don't need to be an IT expert to follow most of the concepts. Learn when a breach occurs, what actions you can take, and how to learn from the breach to prevent future attacks. This video course focuses on using open source technology available in the Kali Linux framework along with other tools to simplify forensic tasks. You will master the basics of digital forensics, learn best practices, and explore legal and forensic service concepts. Coverage includes: Lesson 1: Introduction to Digital Forensics Lesson 2: Digital Forensic Investigations Lesson 3: Getting Started with a Forensic Linux Workstation Lesson 4: Data Duplication and Data Protection Lesson 5: Collecting and Preserving Evidence Lesson 6: Cracking Passwords Lesson 7: Windows Forensics Lesson 8: Network Forensics Lesson 9: Email Forensics Lesson 10: Reverse Malware Engineering Lesson 11: Forensic Case Studies Download [hide][Hidden Content]] - List of IT Training Courses : [Hidden Content]
  10. Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition by Mark Collier and David Endler English | 2013 | ISBN: 0071798765 | ISBN-13: 9780071798761 | 560 pages | PDF + EPUB | 22 + 29 MB The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. • See how hackers target vulnerable UC devices and entire networks • Defend against TDoS, toll fraud, and service abuse • Block calling number hacks and calling number spoofing • Thwart voice social engineering and phishing exploits • Employ voice spam mitigation products and filters • Fortify Cisco Unified Communications Manager • Use encryption to prevent eavesdropping and MITM attacks • Avoid injection of malicious audio, video, and media files • Use fuzzers to test and buttress your VoIP applications • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC “This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast “The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” —Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious “Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” —Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class “After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” —J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies “Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” —Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy “This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” —Shane Green, Senior Voice Security Analyst Download: [hide][Hidden Content]]
  11. Palo Alto Firewalls Configuration By Example - PCNSE Prep udemy.com/palofirewalls/learn/v4/overview PaloAlto firewalls are true Next Generation firewalls built from the ground up to address legacy firewalls issues. It is the first firewall platform to make decisions based on applications not just ports and protocols. The PCNSE exam requires deep understanding of the topics. Exam dumps is not the way to go. You need to practice the concepts and be clear on how to configure this feature rich firewall platform. You need to study the concepts. This class guide you through the configuration of different features and how to practice on AWS and Unetlab. This class covers many topics required for PCNSE7 or PCNSE8 and new topics are added frequently. This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, IPv6 configuration, High Availability configuration, QoS and other real world configuration examples. This is an original upload by me, no mirrors please I request you stick with upw.io Direct link download: [hide][Hidden Content]]
  12. LinuxCBT – Postfix Edition | Size: 1.34GB Course Contents Module II Postfix – Installation Identify a geographically close Postfix mirror location Discuss Postfix nomenclature Download Postfix Import PGP-compatible key to verify downloaded source archive Verify Postfix source archive against imported signature Extract Postfix source archive Identify existing system MTA configuration Explore Postfix source tree Discuss pre-requisites Identify Sendmail-compatible binaries to backup Add required Postfix user and groups Compile & install Postfix Identify key directories and binaries Alter key Postfix configuration files for basic operation Postfix – Local Mail & Queueing Define local domains in main configuration file Define Fully Qualified Domain Name (FQDN) of Postfix Host Confirm running Postfix TCP (super server) Manager Explore current running directives with postconf Alter configuration to enable local aliases Use sendmail-compatible binary to inject messages into the local queue Confirm delivery via default Syslog location Identify default mbox-based mailstore Use MUA mutt to verify delivery of local mail Discuss & explore various Postfix queues Explain how Postfix implements local injection Explain how Postfix handles SMTP-based mail Postfix – Aliases Discuss concepts and applications for aliases Identify required aliases Describe Sendmail-compatible alias types Define 1-to-1 aliases Define list-based aliases Test aliases delivery Discuss per-user aliases (.forward) file Define per-user .forward file with redirection to vacation program Test delivery and auto-response Discuss how mail is routed into the file system (maildrop) while Postfix is up/down Identify binaries responsible for local mail injection (pickup/cleanup) Postfix – Simple Mail Transfer Protocol (SMTP) Confirm the existence of remote recipients Inject mail for delivery to remote Linux Host Review Postfix delivery report generated upon invocation of verbose mode Confirm delivery of remote mail to remote Linux Host Use MUA mutt to reveal and explore the headers of SMTP-based mail Explore name resolution order file & discuss logic Configure Postfix to receive mail to second-level domain plus FQDN Simulate Postfix name resolution process at delivery-time Expose current Mail Exchanger (MX) Host for the second-level domain Postfix – Rewriting Features – Canonical Maps – BCC Maps Discuss default configuration Examine envelope headers Configure Postfix to masquerade outbound messages Test masqueraded envelope by generating new mail Discuss canonical maps concepts & applications Explain corresponding rewrite binaries Define canonical maps in Ascii format Use Postmap to generate DB-formatted canonical maps Instruct main.cf to employ canonical maps database Test address rewriting using canonical maps Confirm message delivery via Syslog-generated logs Examine the headers of delivered message altered using canonical maps & myorigin Define & test sender canonical maps Define & test recipient canonical maps Configure Postfix to BCC all messages to specified recipients Test messages between various users to ensure BCC functionality Configure Postfix to BCC messages based on specific senders Define Sender BCC maps using editor and Postmap to generate Hashed DB Postfix – Relay Control Explore & discuss default relay behavior Identify key relay-related directives Connect to remote Windows 2003 Host and attempt to relay Confirm DNS resolution of Postfix relay host Attempt relay to recipient on relay host & confirm path via logs Attempt relay to recipient on foreign host & confirm delivery Tighten default Postfix relay policy to restrict relaying to local subnet Attempt local subnet and Internet-based relays & confirm results Use SMTP commands to expose features supported by Postfix MTA Discuss SMTP Auth pre-requisites Recompile Postfix to support SMTP Auth Configure Postfix with SMTP Auth to restrict relaying by users vs. IP or hostname Confirm support of SMTP Auth using standard STMP commands Configure Outlook Express client to support SMTP Auth Attempt to relay based on SMTP Auth support Permit relaying of non-local domains based on relay domains Define additional second-level domain for relaying Configure relaying of non-local domains using hashed Berkeley DB maps Discuss Postfix transport maps concepts and applications Define transport maps for domains to bypass DNS MX lookups Update receiving Postfix host to support transport maps Confirm delivery of messages to additional domains defined in transport maps Configure Postfix as a Backup Mail Exchanger (MX) host and confirm delivery during failure Postfix – Smart Host & Null Client configuration Discuss Smart Host concepts and applications Define the Postfix Smart Host Define the Postfix Smart Host client Test local delivery and confirm delivery Test delivery of Internet-based message which requires Smart Host Confirm delivery via logs and remote SSH session Discuss Null client concepts and applications Internet -> DMZ -> Corporate Backbone Mail Repository Disable local mail delivery on Postfix host Configure Postfix to function as a null client Test results of null client delivery Postfix – Virtual Domains Discuss default domains handled by Postfix Attempt IP-address based delivery Explore the mydestination parameter Alter BIND configuration to route messages for basic virtual domain Configure Postfix to map individual users to domains Define individual virtual domains hash Define virtual domains user hash Generate hashed virtual domains and virtual user databases Confirm routing of messages to appropriate users Define catchall addresses for non-matching users and/or aliases Use Postmap to query virtual users and determine delivery path Postfix – Mailbox Formats Explore default mbox configuration location and permissions Describe mbox format Explore environment configuration variables related to mail delivery Test delivery of mbox-bound messages using mutt & Postfix Discuss Maildir message storage format Configure Postfix to deliver messages using Maildir message format Examine Postfix-created Maildir structure after mail delivery Alter shell environment to support Maildir format with desired MUA Postfix – Network-based Mail Retrieval Discuss Courier IMAP framework Identify and install pre-requisites Download, compile, and install Courier Authentication Library Daemon Identify Courier Authentication key directories, binaries and configuration file Download and install Courier IMAP Daemon Explore Courier IMAP binary directory tree Discuss Courier framework Configure Courier for POP3 mail retrieval Confirm retrieval using Windows 2003 – Outlook Express client Identify POP3 Secure configuration files Generate self-signed certificate for use with POP3 Secure communications Confirm retrieval of messages using Outlook Expres and POP3 Secure Establish run-level symbolic links for POP3 & POP3S services Configure Courier for IMAP mail retrieval Confirm retrieval using Windows 2003 – Outlook Express client Generate self-signed certificate for use with IMAP Secure communications Establish run-level symbolic links for IMAP & IMAPS services Postfix – Web-based Mail Retrieval Discuss Web-based SquirrelMail pre-requisites Enable Apache web server Download and Install SquirrelMail into web-accessible location Secure data and attachments directories Configure SquirrelMail for initial use with Courier IMAP Address PHP session-related issues Explore SquirrelMail from the browser as various Linux users Confirm deliver using multiple clients – (mutt/Outlook Express/SquirrelMail/Local Injection) Postfix – Malware Framework Dowload MailScanner Download Clam Anti-Virus (ClamAV) Download SpamAssAssin Download, compile & install zlib Clam Anti-Virus (ClamAV) Implementation Create required user and group Compile & install ClamAV Identify key ClamAV binaries Update ClamAV configuration files for basic operation Update ClamAV definitions Configure system Crontab to update virus definitions every hour Confirm scheduled virus definition updates 24 hours later SpamAssAssin Implementation Illustrate message flow from remote SMTP system through our Malware Framework Download SpamAssAssin from Apache Foundation Extract & discuss SpamAssAssin source tree Compile and install Perl-based SpamAssAssin MailScanner Implementation Download, compile and install the current MailScanner malware engine Explore MailScanner source and binary trees Explore MailScanner.conf configuration file – discuss important directives Update MailScanner to support Postfix MTA Configure Postfix MTA to route inbound messages into temporary queue for processing Invoke MailScanner malware engine and confirm Debug incidentals related to invalid configuration directives and missing components Malware Framework – MUA -> MTA -> MailScanner -> ClamAV -> SpamAassAssin -> MTA -> Maildir/Mailbox Send sample malware through the malware framework & confirm detection Send sample spam through the malware framework & confirm detection Configure MailScanner to affix outbound Corporate Signatures – Legalise – to all messages based trusted configuration Postfix – Log Analysis Download AWStats log analysis application Configure AWStats to function in current Apache Web Server environment Discuss AWStats features and applications Configure AWStats to process Postfix MTA Logs Explore AWStats’ web-based interface Postfix – Transport Layer Security (TLS) Discuss benefits Obtain latest sources Configure TLS support Confirm secure message delivery Evaluate results Postfix – SMTP AUTH – Dovecot Discuss benefits Configure SMTP Auth & TLSsupport Authenticate client requests Confirm secure message delivery Evaluate results [Hidden Content]
  13. CCNP and CCIE Enterprise Core & CCNP Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) April 10, 2020 | ISBN: 978-0135768167 | English | 416 pages | PDF & EPUB | 14.6 MB & 9.67 MB All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource Use this fully updated quick reference resource to help memorize commands and concepts as you earn your CCNP or CCIE certification. Filled with valuable, easy-to-access information, it’s portable enough to use anywhere. This guide summarizes all Cisco IOS software commands, keywords, command arguments, and associated prompts associated with the CCNP and CCIE Enterprise Core (ENCOR 350-401) and CCNP Enterprise Advanced Routing and Services (ENARSI 300-410) certification exams. Tips and examples help you apply commands to real-world scenarios, and configuration samples show their use in network designs. Coverage includes: Layer 2: VLANs, STP, Inter-VLAN Routing Layer 3: EIGRP, OSPF, Redistribution, Path Control, BGP Infrastructure Services and Management Infrastructure Security Network Assurance Wireless Security and Troubleshooting Overlays and Virtualization This Portable Command Guide provides: Logical how-to topic groupings for a one-stop resource Great for review before your ENCOR 350-401 and ENARSI 300-410 certification exams Compact size makes it easy to carry with you wherever you go “Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. (PDF) [hide][Hidden Content]] (EPUB) [hide][Hidden Content]]
  14. LAB 6 Questions & Solutions [hide] Recommended Link [Hidden Content] [Hidden Content] Mirror [Hidden Content] [Hidden Content]]
  15. Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition [Hidden Content] MOVED TOPIC Topic is moved to proper section. Open topic in appropriate section with suitable prefix.
  16. RH124-RHEL8.0 RH134-RHEL8.0 [Hidden Content]
  17. Current MD IOS for Cisco Routers 3900 Series [Hidden Content]
  18. Cisco CCNA in 60 Days - 3rd Edition (2017) / [pdf] / [Mega] [hide][Hidden Content]]
  19. Cisco Adaptive Security Virtual Appliance (ASAv) - 83,3MB Use Vmware Workstation (tested with version 10) to open the .vmx, answer I copied it. At first boot the VM detects that its a clone and reboots. Ignore the "ovf environment unavailable" error. This ASAv is unlicensed and unconfigured (configure it through console)! VM configuration: 1 vCPU, 2GB RAM, 4 Network adapter (Host only) Adjust the parameters of the VM for your needs. Enjoy! Password for Unzip : CiscoASAv2014 [hide][Hidden Content]]
  20. eLearnSecurity courses at one place eLearnSecurity – Advanced Reverse Engineering of Software(ARES) [hide][Hidden Content]] eLearnSecurity – Mobile Application Security and Penetration Testing (MASPT v2) [hide][Hidden Content]] eLearnSecurity – PNDv1 [hide][Hidden Content]] eLearnSecurity – Penetration Testing Professional v4 [hide][Hidden Content]] eLearnSecurity – eWPTX, ePTPv3, eWAPTv2 [hide][Hidden Content]] Credit goes to bvn63 Do not use RED color font in your posts, red color is meant for moderators only. MOVED TOPIC Topic is moved to proper section. Open topic in appropriate section with suitable prefix.
  21. [Hidden Content] [hide][Hidden Content]]
  22. A major rework of my Server-2008-Lite. Expanded HDD size is about 3.0GB, and you can get by with 512MB RAM per node. Being a more complete Server 2008 build, adding your own apps should be easier. But as this is a highly trimmed version of Server 2008 x32, some things may not work.This makes for a simple Server endpoint. Its setup to clear the wallpaper on boot, and then update by running BGInfo 60 seconds later (via Task Scheduler). You can also manually refresh BGInfo from the Start Menu. Have included NetSetMan for managing multiple IP profiles and the WinPCap driver is installed. As we are all time poor, if suggested additions come in I'll try to make any updates quarterly. Have only done limited testing due to time for this build, but as its an incremental build all should work. The below Rolls/Features install without error and Exchange Server 2007 will also install (I'm not a server guy). If there are any bugs found, I'll see what I can do to fix them, time permitting. Created accounts are: Administrator / SYSadmin0 (boots to the desktop with this default account via userpasswords2) [Hidden Content] Built with vLite and WinToolkit. Update 0 (30 Apr 2016): Initial release Update 1 (19 Feb 2017): added lite weigh web servers. BabyWeb configured with a default home page. Update 5 (25 Apr 2017): major rework to bring the build method inline with Win7 lite (updates 2-4 skipped) Base Tools Internet Explorer 10, 7-Zip, BGInfo, DirectoryOpus, CCleaner, Defragler, Recuva, Notepad++, NetSetMan, WinPCap Driver, PowerShell Java and/or .Net Framework have NOT been added (too much bloat). If you need them, they are on the companion CD for your own installs. Network Tools SecureCRT, WinSCP Network Tools (server daemons) TFTPd, SyslogWatcher, NTPd, freeFTPd, BabyWeb Server, HFS Network Tools (CLI) pingb (ping bandwidth), tcping (TCP ping), iperf3, arp-ping, mturoute (finds max mtu), tracetcp (TCP traceroute), watchroute (watch wof changes) Companion CD Wireshark v1.12, FireFox/ThunderBird, Opera/Opera Mail, Cisco AnyConnect 3.1/4.3, Cicso VPN Client, FortiClient, JuniperVPN, Barracuda Client, Java 6/7/8, Python 2.7/3.6 Tested Server Roles: AD Domain Services (dcpromo), DHCP & DNS Server, IIS Tested Server Features: .NET 3.0, Desktop Experience, Group Policy Management, Telnet Client/Server, TFTP Client, PowerShell Tested Apps: Exchange 2007
  23. LFCE-Exam-v3.18-Revised-Jan-2019 [Hidden Content] LFCS-LFCE-Book-June-2018 [Hidden Content]
  • Create New...