Jump to content

Search the Community

Showing results for tags 'Offer'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 10,000 results

  1. Hy guys, Surfing on the net, found another piece of SANS archive content : ._ICS410 Student Instructions.pdf 410.1.pdf 410.2.pdf 410.3.pdf 410.4.pdf 410.5.pdf Cheat Sheets Defense Use Cases ICS410 Student Instructions.pdf Lab & Exercise Suppliments Posters Cheat Sheets\._Windows IR Cheat Sheet.pdf Cheat Sheets\Linux IR Cheat Sheet.pdf Cheat Sheets\Linux Shell Survival Guide.pdf Cheat Sheets\TCP-IP Cheat Sheet.pdf Cheat Sheets\Windows Commandline Cheat Sheet.pdf Cheat Sheets\Windows IR Cheat Sheet.pdf Defense Use Cases\DUC1 - Baku-Tbilisi-Ceyhan (BTC) pipeline Cyber Attack.pdf Defense Use Cases\DUC2 - German Steel Mill Cyber Attack.pdf Defense Use Cases\DUC4 - Attacks on US Infrastructure.pdf Defense Use Cases\DUC5 - Cyber Attack on the Ukrainian Power Grid.pdf Lab & Exercise Suppliments\Day 1 - Poorly Designed DCS.pdf Lab & Exercise Suppliments\Day 5 - MSELv5.pdf Lab & Exercise Suppliments\Day 5 - NERC CRPA Incident Response Exercise KIT.pdf Lab & Exercise Suppliments\Day 5 - SecurITree Example.pdf Posters\._Poster - 2013 Control Systems are a Target.pdf Posters\._Poster - 2014 Securing an Automated World.pdf Posters\._Poster - 2015 ICS Sliding Scale of Cyber Security.pdf Posters\Brochure - SANS ICS 2016.pdf Posters\Poster - 2013 Control Systems are a Target.pdf Posters\Poster - 2014 Securing an Automated World.pdf Posters\Poster - 2015 ICS Job Role to Copmpentency Level.pdf Posters\Poster - 2015 ICS Sliding Scale of Cyber Security.pdf 5 parts ~ 2 Gb Links available 1 week [Hidden Content] Enjoy
  2. The attached zip file contains: Splunk Fundamentals 1 Official Slides PDF. Splunk Fundamentals 2 Official Slides PDF. Splunk Fundamentals 2 Lab Guide PDF. Splunk Fundamentals 2 Lab Solutions PDF. All material is from 2019. Enjoy! The zip file password is my username with capitalization and everything. Anonfiles link: [hide][Hidden Content]] GoFile link: [hide][Hidden Content]]
  3. Preface A: Introduction Section A.1: RHCSA Rapid Track Section A.2: Orientation to the Classroom Environment Chapter 1: Accessing Systems and Obtaining Support Section 1.1: Accessing the Command Line Section 1.2: Quiz: Accessing the Command Line Section 1.3: Configuring SSH Key-based Authentication Section 1.4: Guided Exercise: Configuring SSH Key-based Authentication Section 1.5: Getting Help From Red Hat Customer Portal Section 1.6: Guided Exercise: Getting Help from Red Hat Customer Portal Section 1.7: Detecting and Resolving Issues with Red Hat Insights Section 1.8: Quiz: Detecting and Resolving Issues with Red Hat Insights Section 1.9: Summary Chapter 2: Navigating File Systems Section 2.1: Describing Linux File System Hierarchy Concepts Section 2.2: Quiz: Describing Linux File System Hierarchy Concepts Section 2.3: Managing Files Using Command-line Tools Section 2.4: Guided Exercise: Managing Files Using Command-line Tools Section 2.5: Making Links Between Files Section 2.6: Guided Exercise: Making Links Between Files Section 2.7: Summary Chapter 3: Managing Local Users and Groups Section 3.1: Describing User and Group Concepts Section 3.2: Quiz: Describing User and Group Concepts Section 3.3: Gaining Superuser Access Section 3.4: Guided Exercise: Gaining Superuser Access Section 3.5: Managing Local User Accounts Section 3.6: Guided Exercise: Managing Local User Accounts Section 3.7: Managing Local Group Accounts Section 3.8: Guided Exercise: Managing Local Group Accounts Section 3.9: Managing User Passwords Section 3.10: Guided Exercise: Managing User Passwords Section 3.11: Lab: Managing Local Users and Groups Section 3.12: Summary Chapter 4: Controlling Access to Files Section 4.1: Managing File System Permissions from the Command Line Section 4.2: Guided Exercise: Managing File System Permissions from the Command Line Section 4.3: Managing Default Permissions and File Access Section 4.4: Guided Exercise: Managing Default Permissions and File Access Section 4.5: Lab: Controlling Access to Files Section 4.6: Summary Chapter 5: Managing SELinux Security Section 5.1: Changing the SELinux Enforcement Mode Section 5.2: Guided Exercise: Changing the SELinux Enforcement Mode Section 5.3: Controlling SELinux File Contexts Section 5.4: Guided Exercise: Controlling SELinux File Contexts Section 5.5: Adjusting SELinux Policy with Booleans Section 5.6: Guided Exercise: Adjusting SELinux Policy with Booleans Section 5.7: Investigating and Resolving SELinux Issues Section 5.8: Guided Exercise: Investigating and Resolving SELinux Issues Section 5.9: Lab: Managing SELinux Security Section 5.10: Summary Chapter 6: Tuning System Performance Section 6.1: Killing Processes Section 6.2: Guided Exercise: Killing Processes Section 6.3: Monitoring Process Activity Section 6.4: Guided Exercise: Monitoring Process Activity Section 6.5: Adjusting Tuning Profiles Section 6.6: Guided Exercise: Adjusting Tuning Profiles Section 6.7: Influencing Process Scheduling Section 6.8: Guided Exercise: Influencing Process Scheduling Section 6.9: Lab: Tuning System Performance Section 6.10: Summary Chapter 7: Installing and Updating Software Packages Section 7.1: Registering Systems for Red Hat Support Section 7.2: Quiz: Registering Systems for Red Hat Support Section 7.3: Installing and Updating Software Packages with Yum Section 7.4: Guided Exercise: Installing and Updating Software Packages with Yum Section 7.5: Enabling Yum Software Repositories Section 7.6: Guided Exercise: Enabling Yum Software Repositories Section 7.7: Managing Package Module Streams Section 7.8: Guided Exercise: Managing Package Module Streams Section 7.9: Lab: Installing and Updating Software Packages Section 7.10: Summary Chapter 8: Managing Basic Storage Section 8.1: Mounting and Unmounting File Systems Section 8.2: Guided Exercise: Mounting and Unmounting File Systems Section 8.3: Adding Partitions, File Systems, and Persistent Mounts Section 8.4: Guided Exercise: Adding Partitions, File Systems, and Persistent Mounts Section 8.5: Managing Swap Space Section 8.6: Guided Exercise: Managing Swap Space Section 8.7: Lab: Managing Basic Storage Section 8.8: Summary Chapter 9: Controlling Services and the Boot Process Section 9.1: Identifying Automatically Started System Processes Section 9.2: Guided Exercise: Identifying Automatically Started System Processes Section 9.3: Controlling System Services Section 9.4: Guided Exercise: Controlling System Services Section 9.5: Selecting the Boot Target Section 9.6: Guided Exercise: Selecting the Boot Target Section 9.7: Resetting the Root Password Section 9.8: Guided Exercise: Resetting the Root Password Section 9.9: Repairing File System Issues at Boot Section 9.10: Guided Exercise: Repairing File System Issues at Boot Section 9.11: Lab: Controlling Services and Daemons Section 9.12: Summary Chapter 10: Managing Networking Section 10.1: Validating Network Configuration Section 10.2: Guided Exercise: Validating Network Configuration Section 10.3: Configuring Networking from the Command Line Section 10.4: Guided Exercise: Configuring Networking from the Command Line Section 10.5: Editing Network Configuration Files Section 10.6: Guided Exercise: Editing Network Configuration Files Section 10.7: Configuring Host Names and Name Resolution Section 10.8: Guided Exercise: Configuring Host Names and Name Resolution Section 10.9: Lab: Managing Networking Section 10.10: Summary Chapter 11: Analyzing and Storing Logs Section 11.1: Describing System Log Architecture Section 11.2: Quiz: Describing System Log Architecture Section 11.3: Reviewing Syslog Files Section 11.4: Guided Exercise: Reviewing Syslog Files Section 11.5: Reviewing System Journal Entries Section 11.6: Guided Exercise: Reviewing System Journal Entries Section 11.7: Preserving the System Journal Section 11.8: Guided Exercise: Preserving the System Journal Section 11.9: Maintaining Accurate Time Section 11.10: Guided Exercise: Maintaining Accurate Time Section 11.11: Lab: Analyzing and Storing Logs Section 11.12: Summary Chapter 12: Implementing Advanced Storage Features Section 12.1: Creating Logical Volumes Section 12.2: Guided Exercise: Creating Logical Volumes Section 12.3: Extending Logical Volumes Section 12.4: Guided Exercise: Extending Logical Volumes Section 12.5: Managing Layered Storage with Stratis Section 12.6: Guided Exercise: Managing Layered Storage with Stratis Section 12.7: Compressing and Deduplicating Storage with VDO Section 12.8: Guided Exercise: Compressing and Deduplicating Storage with VDO Section 12.9: Lab: Implementing Advanced Storage Features Section 12.10: Summary Chapter 13: Scheduling Future Tasks Section 13.1: Scheduling Recurring System Jobs Section 13.2: Guided Exercise: Scheduling Recurring System Jobs Section 13.3: Managing Temporary Files Section 13.4: Guided Exercise: Managing Temporary Files Section 13.5: Quiz: Scheduling Future Tasks Section 13.6: Summary Chapter 14: Accessing Network-Attached Storage Section 14.1: Mounting Network-Attached Storage with NFS Section 14.2: Guided Exercise: Managing Network-Attached Storage with NFS Section 14.3: Automounting Network-Attached Storage Section 14.4: Guided Exercise: Automounting Network-Attached Storage Section 14.5: Lab: Accessing Network-Attached Storage Section 14.6: Summary Chapter 15: Managing Network Security Section 15.1: Managing Server Firewalls Section 15.2: Guided Exercise: Managing Server Firewalls Section 15.3: Lab: Managing Network Security Section 15.4: Summary Chapter 16: Comprehensive Review Section 16.1: Comprehensive Review Section 16.2: Lab: Fixing Boot Issues and Maintaining Servers Section 16.3: Lab: Configuring and Managing File Systems and Storage Section 16.4: Lab: Configuring and Managing Server Security [hide][Hidden Content]] link is working fine no mega lovers it´s NOT an ebook so dont ask for true pdf
  4. Only SANS text and video materials. PDF: Video: [Hidden Content] Last magnet update: 2020/06/12.
  5. hey guys I took this few days back enough to pass AZ-303 enjoy [hide] [Hidden Content]] enjoy
  6. This course is from David Bombal, A Sequeira and Network Chuck. I'm not fan of them but I'll give it a try. If it is not worth it I don't care because it is free (just for two days) [hide][Hidden Content]]
  7. udemy [2021] Data Science: A-Z Bootcamp + Real Cases (Version 8.1) Enroll and get Free Certification after completion(only one Day Left) [hide][Hidden Content]]
  8. Python For Absolute Beginners | Hands-on Approach (Free certification after completion) [hide][Hidden Content]]
  9. Camtasia 2020.Record and edit online courses. Professional editing for YouTube ,promotional videos, Facebook ads (Free certification after completion(UDEMY)) [hide][Hidden Content]]
  10. CCIE Data Center v3.0: PRACTICE LAB 1.0 [Hidden Content]
  11. Cisco Modeling Labs 2.0 Collection Change Log new builds added: cml2_controller-2.0.0-13.el8.x86_64-93.ova refplat-20200409-fcs.iso License.nfo and more... [Hidden Content]
  12. implement-cisco-meraki-networks [hide][Hidden Content]]
  13. Hi All, I hope you guys are doing good. I've passed CCNP Security SISE 300-715 exam with score of 88X , it was easy. There were some wrong answers in Old dump's file. i have corrected some after reading official documents. Old dumps file was having 80 questions, i have added 22 more and those 22 appeared in my exam. you can make correction if there is something missing or has been marked wrong. i'll keep updating the file accordingly. Total 102 questions, all the exam questions were from the updated file i have attached in this post. Here is the updated file, Enjoy! CCNP 300-715 Dumps Dec 2020.pdf
  14. The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. These are just videos which Cisco is providing as study material... many topics have not been covered in these videos.Those are just writeups and will be uploaded later. Labs & Writeup's are not covered in below mega link. import then download [hide][Hidden Content]]
  15. Grab it quick and re upload it [Hidden Content] ill try to upload it to mega next week EDIT: kk here is the mega link [hide][Hidden Content]]
  16. Open-Source Intelligence (OSINT) Fundamentals By HEATH ADAMS [Hidden Content] [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  17. Here is the course: Offensive Security - AWAE (Advanced Web Attacks and Exploitation PDF+VIDEO) 2019 [Hidden Content] enjoy it
  18. AZ-104 QUESTIONS [ hide ][Hidden Content][ /hide ] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned.
  19. JN0-211 Valid Dumps - One of the source confirmed that he cleared the JN0-211 exam with 89% today as in 29th July 2020 Using below dumps. He confirmed below dumps is still valid. [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces).
×
×
  • Create New...