Jump to content

Search the Community

Showing results for tags 'Offer'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 10,000 results

  1. Dump not tested, please report whether it's valid. [hide][Hidden Content]] The guy that gave it to me claims he passed with it but who knows.
  2. Current MD IOS for Cisco Routers 3900 Series [Hidden Content]
  3. HCNP-STORAGE English | Size: 604.77 MB Category: Networking HCNP-Storage Certification validates the knowledge and skills required to construct and manage the storage system. HCNP-Storage covers but is not limited to: Basic configuration of the storage system Basic and advanced features of storage system Storage system operations and maintenance troubleshooting of the storage system HCNP-Storage certification shows proven thorough understanding of Huawei's storage technologies and ability to independently deliver Huawei storage. With HCNP-Storage certified engineers, enterprises gain a good grasp of Huawei's storage systems of all series, including software functionality, software module architecture, interface operations, daily maintenance and fault diagnosis of the storage system. Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [Hidden Content]
  4. hi Viptela lovers, Due to licence/serial file issue, some of our friends are unable to implement the Viptela practice lab. This is for them. I have created my own Lab for practice and uploading the same of the needy friends. "SPECIAL THANKS ROOT FOR THE IMAGES" Download all the files. Below are mega links - vManage part-1 [hide][Hidden Content]] vManage Part-2 [hide][Hidden Content]] vbond [hide][Hidden Content]] vsmart [hide][Hidden Content]] vedge-1 [hide][Hidden Content]] vEdge-2 [hide][Hidden Content]] vEdge-3 [hide][Hidden Content]] Procedure: 1. to extract use 7zip 2. Extract vmanage 2 files in same folder 3.. when power on, use version 18.xx 4. before power on, create one LAN interface as per the snapshot [Hidden Content] Output: vSmart# show omp routes | tab Code: C -> chosen I -> installed Red -> redistributed Rej -> rejected L -> looped R -> resolved S -> stale Ext -> extranet Inv -> invalid Stg -> staged U -> TLOC unresolved PATH ATTRIBUTE VPN PREFIX FROM PEER ID LABEL STATUS TYPE TLOC IP COLOR ENCAP PREFERENCE -------------------------------------------------------------------------------------------------------------------------------------- 1 199.1.1.0/24 100.1.1.100 66 1003 C,R installed 100.1.1.100 mpls ipsec - 1 199.1.2.0/24 100.1.1.101 66 1003 C,R installed 100.1.1.101 mpls ipsec - vSmart# show clock Thanks
  5. The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco CCNP Collaboration and CCIE Collaboration certifications, and advanced-level roles focused on implementation and operation of Cisco collaboration solutions.You will gain the knowledge and skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco IOS XE gateway and media resources, call control, quality of service (QoS), and additional Cisco collaboration applications. These are just videos which Cisco is providing as study material... many topics have not been covered in these videos.Those are just writeups and will be uploaded later. Labs & Writeup's are not covered in below mega link. import then download [hide][Hidden Content]]
  6. Livelessons - CCNA 200-301 Complete Video Course and Practice Test By Kevin Wallace Published Dec 5, 2019 by Pearson IT Certification. Part of the LiveLessons series. [Hidden Content]
  7. I do not own the link, or claim the content. Original source: [Hidden Content] Compressed lite version re-uploaded to Mega cloud. Password of rar file: cciedc Download link: [hide][Hidden Content]]
  8. Contents:- A+. CASP. LINUX+. N+. S+. [Hidden Content]
  9. 1TB of InfoSec Resources Ranging from SANS to Blackhat to Conference to Tools Thanks @ anonymous Download Link: [Hidden Content]
  10. English | Size: 7.99 GB Category: Tutorial SEC501: Advanced Security Essentials – Enterprise Defender builds on a solid foundation of core policies and practices to enable security teams to defend their enterprise. List all the files in this ISO file : [Hidden Content] Download : [hide][Hidden Content]]
  11. CHFI Live Training Videos Part 1+2+3 English | Size: 18 GB Category: E-learning | HACKING | Security Computer Hacking Forensic Investigator Certification Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered in EC-Council’s CHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery. The purpose of the CHFI credential is to: Validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.! Download : [hide][Hidden Content]]
  12. Palo Alto software thread! I have access to all software images for all platforms and can upload any release you need. Request them here and I will deliver. This is for software only, I cannot provide licences, support, or activation codes etc.
  13. Cybrary - Computer and Hacking Forensics English | mp4 | H264 1280x720 | AAC 2 ch | 7 hrs 8 min | 2.24 GB eLearning Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can't pinpoint it-the eyes and expertise of a trained professional is necessary. Our free online Computer and Hacking Forensics training teaches you how to become that professional. Love the idea of digital investigation? That's what computer forensics is all about. You'll learn how to determine potential online criminal activity at its inception, how to gather legal evidence, how to search and how to investigate wireless attacks. Additional topics include unlocking passwords, the establishment and maintenance of a physical "chain of custody" and recovering lost and deleted data. At the conclusion, you will have been taught the concepts included in the industry leading EC-Council CHFI certification exam. Progress is a nice word. But change is its motivator. And change has its enemies." - Robert Kennedy Undoubtedly, moving to change Cyber Security training from paid-to-free will bring forth enemies, but it is a right that the world should share. Learning and knowledge should be free and we're serious about progress, and we're serious about change. Cyber crime is one the fastest-growing criminal activities today, and the world needs more people who are capable of solving digital crimes. Learn how to do so with this completely free, in-depth self-paced, computer forensics training course. Online Computer and Hacking Forensics Training Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can't pinpoint it-the eyes and expertise of a trained professional is necessary. Our free online Computer and Hacking Forensics training teaches you how to become that professional. Love the idea of digital investigation? That's what computer forensics is all about. You'll learn how to determine potential online criminal activity at its inception, how to gather legal evidence, how to search and how to investigate wireless attacks. Additional topics include unlocking passwords, the establishment and maintenance of a physical "chain of custody" and recovering lost and deleted data. At the conclusion, you will have been taught the concepts included in the industry leading EC-Council CHFI certification exam. CHFI Course Specs: - CEU / CPE: 10 - Total Clock Hours: 7 hrs, 8 mins - Get a Certificate of Completion Materials Used: - VMWare Player (or other Virtual App) - Generic Windows OS - CEH toolkits - Kali OS Get Started with this Class: 1) Download any relevant course materials from the "Recommended Additional Study Materials" section. 2) Watch the videos below, in order. 3) Blend the online videos with one or more of the recommended study materials on the right hand side of this page. 4) Take notes and study hard. Introduction Contents: Module 1 - Modern Forensics Module 2 - Investigative Process Module 3 - Searching and Seizing Module 4 - Digital Evidence Module 5 - First Responder Module 6 - Computer Forensics Labs Module 7 - Hard Disks and File Systems Module 8 - Windows Forensics Module 9 - Data Acquisition Module 10 - Recovering and Deleting Files Module 11 - Access Data Module 12 - Image Files Module 13 - Steganography Module 14 - Application Password Checkers Module 15 -Log Capturing and Event Correlation Exam Module Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content]
  14. Pentester Academy - Network-Pentesting (2013) [hide][Hidden Content]] Pentester Academy - Offensive Internet of Things (IoT) Exploitation [hide][Hidden Content]] Pentester Academy - OSINT Fun with Open Source Intelligence [hide][Hidden Content]] Pentester Academy - Pandas for Pentesting [hide][Hidden Content]] Pentester Academy - Pentesting iOS Applications [hide][Hidden Content]] Pentester Academy - Javascript for Pentesters [hide][Hidden Content]] Pentester Academy - Javascript for Pentesters (2013), by Vivek Ramachandran [hide][Hidden Content]] Pentester Academy - Linux Forensics [hide][Hidden Content]] Pentester Academy - Linux Rootkits for Red-Blue Teams [hide][Hidden Content]] Pentester Academy - Log File Analysis [hide][Hidden Content]] Pentester Academy - loT Hacker Project. SMS Controlled Pentest Bot [hide][Hidden Content]] Pentester Academy - Make your own Hacker Gadget, by Vivek Ramachandran [hide][Hidden Content]] Pentester Academy - Abusing SQL Server Trusts in a Windows Domain [hide][Hidden Content]] Pentester Academy - Android Security and Exploitation, by Aditya Gupta [hide][Hidden Content]] Pentester Academy - Assembly Language and Shellcoding on Linux x86_64 (2013) [hide][Hidden Content]] Pentester Academy - Exploiting Simple Buffer Overflows on Win32 (2014) [hide][Hidden Content]] Pentester Academy - GCB Cyber Range Course, by Nikhil Mittal [hide][Hidden Content]] SANS - SEC401 v2019 PDF [hide][Hidden Content]] SANS - SEC401 v2017 Audio.rar [hide][Hidden Content]] SANS - SEC401 v2017 USB.part1.rar [hide][Hidden Content]] SANS - SEC401 v2017 USB.part2.rar [hide][Hidden Content]] SANS - SEC401 v2017 Video.part1.rar [hide][Hidden Content]] SANS - SEC401 v2017 Video.part2.rar [hide][Hidden Content]] SANS - SEC401 v2017 Video.part3.rar [hide][Hidden Content]] SANS - SEC505 v2020 Audio [hide][Hidden Content]] SANS - SEC505 v2020 PDF [hide][Hidden Content]] SANS - SEC505 v2020 USB [hide][Hidden Content]] SANS - SEC505 v2020 Videos.part1 [hide][Hidden Content]] SANS - SEC505 v2020 Videos.part2 [hide][Hidden Content]] SANS - SEC505 v2020 Videos.part3 [hide][Hidden Content]] SANS - SEC504 v2015 Audio [hide][Hidden Content]] SANS - SEC504 v2016 Video.part1 [hide][Hidden Content]] SANS - SEC504 v2016 Video.part2 [hide][Hidden Content]] SANS - SEC504 v2019 PDF [hide][Hidden Content]] SANS - SEC503 v2015 Audio [hide][Hidden Content]] SANS - SEC503 v2015 PDF [hide][Hidden Content]] SANS - SEC503 v2015 USB [hide][Hidden Content]] SANS - SEC502 ISO [hide][Hidden Content]] SANS - SEC502 Audio [hide][Hidden Content]] SANS - SEC501 v2016 PDF [hide][Hidden Content]] SANS - SEC501 v2016 Audio [hide][Hidden Content]] SANS - SEC561 v2015 PDF [hide][Hidden Content]] SANS - SEC555 v2017 PDF [hide][Hidden Content]] SANS - SEC550 v2016 PDF [hide][Hidden Content]] SANS - SEC545 v2017 PDF [hide][Hidden Content]] SANS - SEC542 v2016 PDF [hide][Hidden Content]] SANS - SEC542 v2016 Audio [hide][Hidden Content]] SANS - SEC542 v2017 Video.part1 [hide][Hidden Content]] SANS - SEC542 v2017 Video.part2 [hide][Hidden Content]] SANS - SEC542 v2017 Video.part3 [hide][Hidden Content]] SANS - SEC540 v2017 PDF [hide][Hidden Content]] SANS - SEC531 v2009 PDF [hide][Hidden Content]] SANS - SEC531 v2009 Audio [hide][Hidden Content]] SANS - SEC524 v2012 PDF [hide][Hidden Content]] SANS - SEC517 v2012 Audio [hide][Hidden Content]] SANS - SEC517 v2010 PDF [hide][Hidden Content]] SANS - SEC511 v2016 PDF [hide][Hidden Content]] SANS - SEC511 v2015 USB [hide][Hidden Content]] SANS - SEC511 v2015 Audio [hide][Hidden Content]] SANS - SEC509 v2008 PDF [hide][Hidden Content]] SANS - SEC506 v2017 PDF [hide][Hidden Content]] SANS - SEC506 v2011 Video.part1 [hide][Hidden Content]] SANS - SEC506 v2011 Video.part2 [hide][Hidden Content]] SANS - SEC564 v2017 PDF.rar [hide][Hidden Content]] SANS - SEC564 v2020 Video.rar [hide][Hidden Content]] SANS - SEC564 v2017 PDF.rar [hide][Hidden Content]] SANS - SEC564 v2020 Video.rar [hide][Hidden Content]] SANS - SEC566 v2016 PDF [hide][Hidden Content]] cheat sheets [hide][Hidden Content]] SANS - SEC560 v2018 PDF [hide][Hidden Content]] SANS - SEC560 v2018 USB.part1 [hide][Hidden Content]] SANS - SEC560 v2018 USB.part2 [hide][Hidden Content]] SANS - SEC560 v2018 USB.part3 [hide][Hidden Content]] SANS - SEC560 v2018 USB.part4 [hide][Hidden Content]] SANS - SEC560 v2018 USB.part5 [hide][Hidden Content]] SANS - SEC560 v2018 USB.part6 [hide][Hidden Content]] SANS - SEC560 v2018 Video.part1 [hide][Hidden Content]] SANS - SEC560 v2018 Video.part2 [hide][Hidden Content]] SANS - SEC560 v2018 Video.part3 [hide][Hidden Content]] SANS - SEC573 v2017 PDF [hide][Hidden Content]] SANS - SEC573 v2017 USB.part1 [hide][Hidden Content]] SANS - SEC573 v2017 USB.part2 [hide][Hidden Content]] SANS - SEC575 v2017 Video.part1 [hide][Hidden Content]] SANS - SEC575 v2017 Video.part2 [hide][Hidden Content]] SANS - SEC575 v2017 Video.part3 [hide][Hidden Content]] SANS - SEC575 v2017 Video.part4 [hide][Hidden Content]] SANS - SEC575 v2017 Video.part5 [hide][Hidden Content]] SANS - SEC577 v2011 PDF [hide][Hidden Content]] SANS - SEC579 v2016 PDF [hide][Hidden Content]] SANS - SEC580 v2016 PDF [hide][Hidden Content]] SANS - SEC580 v2016 Video [hide][Hidden Content]] SANS - SEC580 v2016 USB [hide][Hidden Content]] SANS - SEC599 v2019 PDF [hide][Hidden Content]] SANS - SEC599 v2019 USB.z01 [hide][Hidden Content]] SANS - SEC599 v2019 USB.z02 [hide][Hidden Content]] SANS - SEC599 v2019 USB [hide][Hidden Content]] SANS - SEC599 v2019 Video.z01 [hide][Hidden Content]] SANS - SEC599 v2019 Video [hide][Hidden Content]] SANS - SEC617 v2020 Video [hide][Hidden Content]] SANS - SEC617 v2020 PDF [hide][Hidden Content]] SANS - SEC617 v2020 Audio [hide][Hidden Content]] SANS - SEC642 v2017 Video [hide][Hidden Content]] SANS - SEC642 v2017 USB [hide][Hidden Content]] SANS - SEC642 v2017 PDF [hide][Hidden Content]] SANS - SEC660 v2020 PDF [hide][Hidden Content]] SANS - SEC660 v2020 Audio [hide][Hidden Content]] SANS - SEC660 v2020 Video [hide][Hidden Content]] SANS - SEC660 v2020 Video.z01 [hide][Hidden Content]] SANS - SEC660 v2020 Video.z02 [hide][Hidden Content]] SANS - SEC660 v2020 Video.z03 [hide][Hidden Content]] SANS - SEC660 v2018 USB.zip [hide][Hidden Content]] SANS - SEC660 v2018 USB.z01 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z02 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z03 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z04 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z05 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z06 [hide][Hidden Content]] SANS - SEC660 v2018 USB.z07 [hide][Hidden Content]] SANS - SEC710 v2011 PDF [hide][Hidden Content]] SANS - SEC710 v2011 USB [hide][Hidden Content]] SANS - SEC760 v2019 PDF [hide][Hidden Content]] SANS - SEC760 v2019 USB.part1 [hide][Hidden Content]] SANS - SEC760 v2019 USB.part2 [hide][Hidden Content]] SANS - SEC760 v2019 USB.part3 [hide][Hidden Content]] Udemy - Windows Privilege Escalation for OSCP & Beyond! [hide][Hidden Content]] Udemy - Windows Privilege Escalation for Beginners, by Heath Adams [hide][Hidden Content]] Udemy - Linux Privilege Escalation for Beginners, by Heath Adams [hide][Hidden Content]]
  15. Python For Beginners Course In-Depth [hide][Hidden Content]]
  16. filedropper Download Link: [Hidden Content] Password: [Hidden Content] WORKING LINK ED. 12 [Hidden Content]
  17. AZ-900 Prep - Azure Virtual Machines (VMs) Master Class [hide][Hidden Content]]
  18. This is the latest 130 questions dumb. more than enough to pass and score in the 9xx range. [Hidden Content]
  19. Hacking and Securing Docker Containers v2.0 (Updated) [hide][Hidden Content]]
  20. conductor-xc4_0_0.ova s42800xc4_0_0.tar.gz [Hidden Content] Cisco_ts_VirtualMachine_4.2_4.18.ova Cisco_ts_VirtualMachine_4.2_4.18.gz [Hidden Content] Cisco_ts_VirtualMachine_4.2_4.23.ova Cisco_ts_VirtualMachine_4.2_4.23.gz [Hidden Content] s42700x8_6_1.ova s42700x8_6_1.tar.gz [Hidden Content]
  21. JNCDA JNO-1101 EXAM QUESTIONS
  22. All, These are the INE CCNP Enterprise Track videos for ENCOR 350-401. I am currently grabbing the ENARSI 300-410 videos. I have added the Labs/Workbooks to Mega and created a new torrent. Mega Link for CCNP Enterprise (ENCOR/ENARSI +Lab/Workbooks) [Hidden Content] ENARSI Magnet: [Hidden Content] Labs/Workbooks Magnet: [Hidden Content]
  23. Hi everybody, JL2V – Juniper L2 VPNs Course- Jun 2016 Release English | Size: 397.93 MB Category: E-learning | Networking JL2V (Course 6) is two-day instructor led course and designed to provide students with MPLS-based Layer 2 virtual private network (VPN) knowledge and configuration examples. The JL2V study guide includes an overview of MPLS Layer 2 VPN concepts, such as BGP Layer 2 VPNs, LDP Layer 2 circuits, FEC 129 BGP autodiscovery, virtual private LAN service (VPLS), Ethernet VPN (EVPN), and Inter-AS Layer 2 VPNs. The JL2V course also covers Junos operating system-specific implementations of Layer 2 VPN instances, VPLS, and EVPNs. This JL2V course is based on the Junos OS Release 15.1R2.9. Through reading and practicing on vMX virtual hands-on home lab (ESXi or KVM), students will gain experience in configuring and monitoring the Junos OS for Layer 3 VPNs and in device operations. Download vMX after creating a guest account. Guest account takes 3 business days to be approved. Few Instructional Video’s of BGP, VPLS, RSVP, BFD, MPLS Ping etc are provided as a bonus download. Prerequisites Students should have intermediate-level networking knowledge and an understanding of OSPF, IS-IS, BGP, and Junos policy. Students should have experience configuring MPLS label-switched paths using Junos. Students should also attend Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), Junos Service Provider Switching (JSPX), Junos Intermediate Routing (JIR) and Junos MPLS Fundamentals (JMF) courses prior to attending this class. Bonus prerequisite courses are provided for an entry-level student to start with IJOS, JRE and ramp up to JSPX, JIR, JMF before reading JL2V. Here is the link: [Hidden Content] Good luck.
  24. [Hidden Content]
×
×
  • Create New...