Jump to content

Search the Community

Showing results for tags 'Course'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 5 results

  1. INE - Certified Wireless Network Administrator (CWNA) Technology Course Course Description In this course you learn about the basics of radio frequency (RF) as it applies to Wi-Fi. You will also learn about the 802.11 MAC architecture along with the layers of the OSI model that Wi-Fi operates in. We will cover 802.11 network framework and WLAN typologies. Next, we will learn about the different 802.11 modulation schemes and methods to mitigate wireless contention. We will also cover antenna concepts and different spectrum technologies. This is followed by WLAN site surveys along with its different approaches and tools. Next, we will cover WLAN troubleshooting and the various tools used for it. Finally, we will cover WLAN security and the various security approaches. Course Outline: Course (RF) Radio Frequency Technologies 802.11 802.11 MAC Architecture 802.11 Network Framework 802.11 Modulation and Access Antenna Concepts and Spectrum Technologies Antenna Concepts and Spectrum Technologies WLAN WLAN Site Surveys WLAN Troubleshooting WLAN Security DOWNLOAD LINK 1:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] DOWNLOAD LINK 2:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  2. INE - OSCP Security Technology Prep Course Course Description This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course. Course Overview Course Introduction Introduction to Kali Linux Installing Kali Linux Command Line Refresher Kali Linux Services Bash Scripting in Kali Linux Information Gathering Information Gathering Scanning TCP vs UDP Scanning with Nmap Scanning with Nessus Scanning with Metasploit Enumeration Installing Kioptrix: Level 1 SSH Enumeration HTTP Enumeration SMB Enumeration DNS Enumeration Other Enumeration Netcat Introduction to Netcat Buffer Overflows Introduction to Buffer Overflows Fuzzing Finding the Offset Overwriting the EIP Finding Bad Characters Finding the Right Module Generating Shellcode & Gaining Root Exploitation Gaining Root with Metasploit Compiling an Exploit Modifying Shellcode Client Side Attacks Java Applet Attacks Antivirus Bypassing Pre-Exploit Password Attacks WebApp Exploitation Installing XSS & MySQL FILE Cross-Site Scripting (XSS) SQL Injection (SQLi) Local File Inclusion (LFI) Remote File Inclusion (RFI) File Transfers Introduction to File Transfers Privilege Escalation Introduction to Privilege Escalation Post Exploitation Linux Post Exploitation Windows Post Exploitation Post-Exploit Password Attacks Pivoting Capstone Kioptrix Level 1.1 Walkthrough BTRSys 2.1 Walkthrough DroopyCTF Walkthrough SickOS 1.2 Walkthrough Summary Course Conclusion [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  3. Hello there, Please would some one share INE CCIE Routing and Switching v5.0 Course Slides, as i am missing VPN Technologies , Infrastructure Services , Infrastructure Security tracks slides , thanks in advance
  4. Take this Training & Quiz for some new features of Oracle Solaris 11 Oracle Solaris 11 has some new features. Learn them and Play the Quiz ! [Hidden Content]
  5. BOOKS: ====== [Hidden Content] Dumps & Exam Questions ====================== [Hidden Content] CYBRARY Course (up-4ever Server) ============== [Hidden Content]
×
×
  • Create New...