Jump to content

Search the Community

Showing results for tags 'Offer'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 10,000 results

  1. Linux Privilege Escalation for Beginners by TheCyberMentor [mega] [Hidden Content]
  2. Cisco FirePOWER 1100 Series Collection Change Log new builds added: Cisco_FTD_SSP_FP1K_Patch- License.nfo and more... [Hidden Content]
  3. [Hidden Content] Nitro is slow but free link Use premium leech sites for rapidgator
  4. hey, saw this link and wanted to share to help other people here learning this course. the materials were shared already by seanway (hope i didn't misspell his nick). please upload it to mega/gdrive/similar so that other people could enjoy this course as well this is the usb from the 2019 version of the course [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]] enjoy people
  5. SEC573: Automating Information Security with Python [hide][Hidden Content]] MOVED TOPIC Topic is moved to proper section. Kindly open topic in appropriate section with suitable prefix.
  6. [Hidden Content] Download more at [Hidden Content]
  7. Dear All, Check out the below link for the complete course of 300-410-ENARSI from CBT...enjoy.. [hide][Hidden Content]]
  8. Hi All, I passed Devnet exam today, The dumps shared has all questions which are more than enough to clear exam though there are 10 to 12 new questions. I exactly do not remember questions but some are here: 1. complete the fill in the blank in code line to rename cert to sha256 hash 2. drag drop for ucs director, ucs manager, intersight 3, scenario: engineer setup 5 servers and 50 client and assigned different subnet to both. what are benefits to have them in separate subnet? **in dumps attached, highlighted options are right answers [7Core]: no need of using the hide tag, as you don't hide download links real-revised-1.0 (1).pdf
  9. SANS Sec660 2018 ( PDF , Video , VM) MEGA..import then download [Hidden Content]
  10. Cisco Modeling Labs 2.0 Collection Change Log new builds added: cml2_controller-2.0.0-13.el8.x86_64-93.ova refplat-20200409-fcs.iso License.nfo and more... [Hidden Content]
  11. Many of these courses had been shared here in certcollection by our generous members. Credit to them. Download what you don't have. If you want updated and new courses, do consider buying subscription at www.pentesteracademy.com/. I think Vivek and SecurityTube are making great contribution in the field of infosec education. He deserves some of your love ($) Do visit www.securitytube.net/ for some FREE infosec video courses and other awesome videos. Happy Learning. dead link removed Mega fans, Import it to your mega account. Like, Share & Subscribe. [hide][Hidden Content] [Hidden Content]] MIRROR. Thanks to lalamakerg post #43. 1st Link updated. Courtesy: jacky223 Kindly import to your mega and re-share when link goes down.
  12. [Hidden Content] By: Sari Greene Publisher: Pearson IT Certification Release Date: June 2018 ISBN: 9780135180488 Topics: Security
  13. Hello , anyone has the videos for Larry Greenblatt for the CISSP course ? thanks
  14. Guys, Even thought it says Avaya training, a lot of the SIP essential stuff is the same for Cisco or Avaya. Also check out The SIP school or Alta3 research SIP Essentials by SIP guru Stuart Fesser. Avaya-SIP Essentials English | Size: 613.53 MB Category: Tutorial This course provides a general introduction to the Session Initiation Protocol (SIP), an emerging IP communications protocol. The course discusses the characteristics, features, and benefits of SIP, as well as the SIP architectural components and their functions. This course also provides a detailed description of the Avaya SIP solution, including the Avaya SIP Enablement Services (SES) and the two Avaya SIP endpoints, the SIP IP Phones and SIP-enabled Avaya IP Softphone. The course concludes with a discussion of Avaya’s SIP marketing strategy in the context of the Reach Success sales program. This course is designed for Avaya associates, business partners, and customers with sales, design, implement, and maintain responsibilities. Upon completion of this course, the learner will be able to: Define SIP as it applies to the IP marketplace. Describe how SIP works. Describe SIP and its components as they apply to specific customer situations using Avaya SIP solutions. Connect the value SIP offers to the customer’s business needs. There are no student materials for this course. There are no specific knowledge requirements for this course. There are no mandatory prerequisites for this course. [hide][Hidden Content]]
  15. INE Firepower Threat Defense - Part II Enjoy !!! [hide][Hidden Content]]
  16. CCNP - Ebooks. [hide][Hidden Content]] Make use of Hide Tag while posting download links. Usage: [ hide ] link [ /hide ] (without spaces). Read the Board Rules or get banned. MOVED TOPIC Topic is moved to proper section. Kindly open topic in appropriate section with suitable prefix.
  17. Total of 155 Information and Cyber Security Courses by Pluralsight. [61GB] Courses included are: Advanced Malware Analysis - Combating Exploit Kits Advanced Persistent Threats - The Big Picture Advanced Web Application Penetration Testing with Burp Suite ASP.NET Security Secrets Revealed Assessing and Mitigating Security Risks Auditing AWS Environments for Security and Best Practices Check Point Certified Security Administrator - Backup and Updating Check Point Certified Security Administrator - Install & Deploy CISSP - Asset Security CISSP - Communications and Network Security CISSP - Identity and Access Management CISSP - Security and Risk Management CISSP - Security Assessment and Testing CISSP - Security Engineering CISSP - Security Operations CISSP - Software Development Security Claims-based Identity for Windows - The Big Picture CompTIA Security+ (SY0-401) Access Control and Identity Management CompTIA Security+ (SY0-401) Application, Data, and Host Security CompTIA Security+ (SY0-401) Compliance and Operational Security CompTIA Security+ (SY0-401) Cryptography CompTIA Security+ (SY0-401) Network Security CompTIA Security+ (SY0-401) Threats and Vulnerabilities Computing, Communication, and Business Integration for CASP (CAS-002) Conducting Network Vulnerability Analysis Cryptography - The Big Picture Cryptography Fundamentals for Developers and Security Professionals CSSLPr - Secure Software Concepts CSSLPr - Secure Software Requirements Cybersecurity Threats - Ransomware Designing and Implementing Security Policies Digital Forensics - Getting Started with File Systems Digital Forensics Tools in Kali Linux - Imaging and Hashing Enterprise Security - Policies, Practices, and Procedures Enterprise Security for CASP (CAS-002) Enterprise Strength Mobile Device Security Ethical Hacking - Buffer Overflow Ethical Hacking - Cloud Computing Ethical Hacking - Cryptography Ethical Hacking - Denial of Service Ethical Hacking - Enumeration Ethical Hacking - Evading IDS, Firewalls, and Honeypots Ethical Hacking - Hacking Mobile Platforms Ethical Hacking - Hacking Web Applications Ethical Hacking - Hacking Web Servers Ethical Hacking - Hacking Wireless Networks Ethical Hacking - Malware Threats Ethical Hacking - Penetration Testing Ethical Hacking - Reconnaissance_Footprinting Ethical Hacking - Scanning Networks Ethical Hacking - Session Hijacking Ethical Hacking - Sniffing Ethical Hacking - Social Engineering Ethical Hacking - SQL Injection Ethical Hacking - System Hacking Ethical Hacking - Understanding Ethical Hacking Exploit Development and Execution with the Metasploit Framework Exploitation - Evading Detection and Bypassing Countermeasures External Footprinting - Reconnaissance and Mapping Getting Started Analyzing Malware Infections Getting Started with CloudFlareT Security Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing Hack Your API First Hack Yourself First - How to go on the Cyber-Offense Hands-On Incident Response Fundamentals How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps Implementing a Security Assessment and Authorization Process Implementing Physical Security Information Security Manager - Information Security Governance Information Systems Auditing - The Big Picture Information Systems Auditor - Acquisition and Development Information Systems Auditor - Governance and Management Information Systems Auditor - Operations, Maintenance, and Service Information Systems Auditor - Protection of Information Assets Information Systems Auditor - The Process of Auditing Introduction to Browser Security Headers Introduction to Penetration Testing Using Metasploit ISO_IEC 27001 Information Security - The Big Picture Malware Analysis - The Big Picture Malware Analysis Fundamentals Managing Information Security Incidents (ISO_IEC 27002) Managing Information Security Threats & Risks (ISO_IEC 27002) Metasploit Basics for Protecting SharePoint Network Fundamentals and Protocols Network Penetration Testing Using Python and Kali Linux Network Security Testing With NMAP Network Vulnerability Scanning with OpenVAS OPSEC for Penetration Testers OWASP Top 10 Web Application Security Risks for ASP.NET Payment Card Security, Processing, and the PCI Standards PCI DSS - The Big Picture Penetration Testing - Setting the Scope and Rules of Engagement Penetration Testing and Ethical Hacking with Kali Linux Penetration Testing Automation Using Python and Kali Linux Penetration Testing Life Cycle Explained Penetration Testing OSINT Gathering with Recon-ng Penetration Testing SharePoint Performing and Analyzing Network Reconnaissance Performing OSINT Gathering on Corporate Targets Play by Play - Ethical Hacking - Deconstructing the Hack Play by Play - Ethical Hacking with Troy Hunt Play by Play - Exploring the Internet of Vulnerabilities Play by Play - Social Engineering with Troy Hunt and Lars Klint Play by Play - Website Security Review with Troy Hunt and Lars Klint Pluralsight - Cybersecurity Threats Insider Threats Pluralsight - Information Systems Auditor Path Pluralsight - Troubleshooting Processes and Registry with Sysinternals Process Monitor Post Exploitation - Performing Infrastructure Analysis Research and Analysis for CASP (CAS-002) Risk Management Risk Management and Incident Response for CASP (CAS-002) Risk Management and Information Systems Control - Introduction to Risk Risk Management and Information Systems Control - IT Risk Assessment Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting Risk Management and Information Systems Control - Risk Identification Risk Management and Information Systems Control - Risk Response and Mitigation Risks, Vulnerabilities, and Threats Secure Account Management Fundamentals Securing Your Node.js Web App Security for Hackers and Developers - Code Auditing Security for Hackers and Developers - Fuzzing Security for Hackers and Developers - Overview Security for Hackers and Developers - Reverse Engineering Security Management - The Big Picture SSCP - Access Controls SSCP - Cryptography SSCP - Incident Response and Recovery SSCP - Introduction and the Exam Requirements SSCP - Network and Communications Security SSCP - Risk Identification, Monitoring, and Analysis SSCP - Security Operations and Administration SSCP - Systems and Application Security Technical Integration of Enterprise Components for CASP (CAS-002) The Information Security Big Picture The Issues of Identity and Access Management (IAM) Threat Intelligence - The Big Picture Threat Modeling - The Big Picture Threat Modeling Fundamentals Understanding the Java Virtual Machine - Security Understanding the Shellshock Bash Bug USB Forensics - Duplication USB Forensics - Fundamentals USB Forensics - Writeblocking and Impersonation Web App Hacking - Caching Problems Web App Hacking - Cookie Attacks Web App Hacking - Hacking Authentication Web App Hacking - Hacking Password Reset Functionality Web App Hacking - Sensitive Data Exposure Web Application Penetration Testing Fundamentals Web Application Penetration Testing with Burp Suite Web Security and the OWASP Top 10 - The Big Picture What's New in the OWASP Top 10 for 2013 Windows - How It's Hacked, How to Protect It Wireless Network Penetration Testing Wireless Network Penetration Testing Advanced Technique [Hidden Content] Mega fans, Import it to your mega account as there will be no re-up. Like, Share & Subscribe. MIRROR. Thanks to jacky223 post #26 [Hidden Content]
  18. Hi friends, Thanks to kr34 for the contribution Enjoy [Hidden Content]
  19. Silver Peak, the global provider in broadband and hybrid WAN solutions, has announced a partnership agreement with Masergy to offer Silver Peak Unity EdgeConnect and Unity Boost managed SD-WAN services to its enterprise customers. The agreement expands Masergy’s Managed Network f(n) solution portfolio with high-performance Managed SD-WAN solutions. Silver Peak SD-WAN solutions enable distributed enterprises to build a better WAN, securely connecting users to applications without compromising application performance Geographically distributed enterprises are embracing Software Defined Wide Area Networks at an accelerating pace. Why? Because SD-WANs not only save money, they help businesses make money by increasing business productivity. As more and more enterprise applications migrate to the cloud, backhauling that traffic from the branch to headquarters doesn’t make sense. End users often find their business apps run faster over their home Internet service or even on their mobile device. Silver Peak SD-WAN Videos [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] NEW LINKS UPDATED [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  20. Saw this was requested here and cloned it(not copied the link) from the repo posted on raidforums.com. Enjoy. [Hidden Content]
  21. [Hidden Content] [Hidden Content] [Hidden Content]
  22. VMware vSphere 7.0 Release Candidate Collection for tests only Change Log new builds added: VMware-VCSA-all-7.0.0-14896550.iso VMware-VMvisor-Installer-7.0.0-14896552.x86_64.iso and more... [Hidden Content]
  23. Juniper JN0-103 Exam Dump JN0-103.vce JNCIA - New dumps.pdf JNCIA-Junos-2.docx
  • Create New...