ITProTV - Outlook On The Web

Personal information management application12 H 14 M
Learn all about Microsoft Outlook for the Web. Master managing emails, contacts, tasks, calendars, and other tools to get the most out of your email.
Whether using for personal email or work email as large business organization, this course covers everything one needs to become a skilled and informed user of Microsoft Outlook on the Web. Our hosts start with explaining the basic terminology and setup of email accounts and continue on to all areas of Outlook including managing email, contacts, calendars, and tasks. This course is specifically for using Outlook through a web browser with either a paid subscription to Office 365 or a free mail account with Outlook.com.

DOWNLOAD LINK

RAR password if asked would be whocares

ITProTV - MTA Security Fundamentals 98-367 (2018)

You can’t afford to not have a plan. Prep your Business Continuity Disaster Recovery plan with tips from 10+ year cybersecurity pro Rob Carson.
In this episode, Rob and Mike discuss what topics will be covered in the rest of the series. They do a high level overview of the who, what, when, where and why of business continuity disaster recovery.

DOWNLOAD LINK

sBDcb28cvWh-fJiP7OILpA

RAR password if asked would be whocares

ITProTV - Linux Shell Scripting Basics

In this course, take a look at some basic scripting practices in Linux like script file formats, working with variables, loops, script control, and more.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.

DOWNLOAD LINK

Qp1TPKKW4ft6XjS2iBIDUQ

RAR password if asked would be whocares

ITProTV - Linux Security Techniques

Security features found in modern Linux distributions10 H 47 M
This course covers various Linux security techniques like data encryption, firewall configuration, auditing access, pen testing tools, and more.

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.

DOWNLOAD LINK

dyt2iLJKuq9nmI7tnBfkkA

RAR password if asked would be whocares

ITProTV - Network Troubleshooting

Command Line Tools for Diagnosing Network Issues1 H 57 M
Every IT technician will have to deal with network issues from time to time. In this course, learn how to assess and resolve common network problems.
In this episode, Daniel and Wes show you how to troubleshoot common network issues using command line tools. Specific tools covered include ipconfig, ping, and tracert.

DOWNLOAD LINK

GtqBfHyIR7XNgHL2d-wEvg

RAR password if asked would be whocares

  • qazi replied to this.

    ITProTV - Owasp 2017 Top 10

    Web Application Security 7H 9M
    In this series, Justin and Daniel explore the 2017 edition of the OWASP Top Ten Vulnerabilities. For each vulnerability, a scenario and application is created that demonstrates the vulnerability at hand, Daniel demonstrates and explains exploiting the vulnerability, Justin shows fixing the vulnerability, then take time to discuss how that vulnerability may manifest in different ways. If you are looking to get a foundation in web application security, then join Justin and Daniel for the OWASP Top Ten.

    DOWNLOAD LINK

    txc8RH2PdYf1HiPpdP3c7g

    RAR password if asked would be whocares

    ITProTV - System Center 2012 Configuration Manager 70-243

    A member of the Microsoft System Center suite of management solutions, System Center 2012 R2 Configuration Manager increases IT productivity and efficiency by reducing manual tasks and letting you focus on high-value projects, maximize hardware and software investments, and empower end-user productivity by providing the right software at the right time.
    Configuration Manager helps you deliver more effective IT services by enabling secure and scalable software deployment, compliance settings management, and comprehensive asset management of servers, desktops, laptops, and mobile devices. In addition, Configuration Manager can integrate with Windows Server Update Services (WSUS), Network Access Protection (NAP), Certificate Services, Exchange Server and Exchange Online, Group Policy, the DNS Server role, Windows Automated Installation Kit (Windows AIK) and the User State Migration Tool (USMT), Windows Deployment Services (WDS), and Remote Desktop and Remote Assistance.

    DOWNLOAD LINK

    sszHD08yACYqcDRm26jwZA

    RAR password if asked would be whocares

    ITProTV - Nmap

    Network Mapper, a Security Scanner 7H 6M
    Learn the basic concepts of the Nmap tool like Host Discovery, Port Scanning, Service/OS/Version Detection, and the Nmap Scripting Engine(NSE) for security.
    In this episode, Wes and Dan explore the administrative utility known as Nmap. They discuss what the Nmap software is and might use this software. They demonstrate how to obtain the software as well the types of operating systems that support Nmap and their associated installer types. They will show how to install Nmap in the major operating systems such as Windows, Ubuntu and CentOS.

    DOWNLOAD LINK

    fVZEezq3eXIrN5hfKTf67g

    RAR password if asked would be whocares

    ITProTV – Citrix XenServer 6.2

    Citrix XenServer is the free virtualization software from Citrix. It is a commercially supported implementation of the open source Xen virtualization platform. The low cost of entry makes XenServer an attractive option for small and medium businesses looking for advanced hypervisor functions (clustering, live migration, centralized management) without the large price tag associated with competing products.

    DOWNLOAD LINK

    9eTf8we9OEXgFA8a5ndFZQ

    RAR password if asked would be whocares

    ITProTV – Citrix XenServer 7.0

    DOWNLOAD LINK

    SWIgRh_1d6RZAUYTmw3m4Q

    RAR password if asked would be whocares

    ITProTV - Project Management VS Service Management

    What’s the difference between project management and service management? In this course, Jo Peacock gives an in-depth explanation.
    You’ve heard the terms “service management” and “project management”, but do you really understand what they are? In this episode Jo briefly explains the concepts to Justin and they explore the difference between the two.

    DOWNLOAD LINK

    axsq96VOoYeAnYosokuGhQ

    RAR password if asked would be whocares

    All appreciate Author for this post great upload 👍

    • XDJ likes this.

    ITProTV - Security Awareness Onboarding

    Increasing a new-hire’s onboarding IT security awareness 39 M
    This course is designed to help new employees understand the IT security issues they may face in the workplace. Get up-to-speed with security awareness training.
    This course is designed to help bring new employees up to speed on the various IT security issues facing companies to day. Its primary use is intended to be as an instructional video shown during the new-hire on-boarding process. By increasing a new-hire’s IT security awareness, companies can help to avoid security incidents before they happen.

    DOWNLOAD LINK

    C477TpAlCIIL6jGM-SDX7g

    RAR password if asked would be whocares

    ITProTV - Salesforce Administrator

    DOWNLOAD LINK

    gQ5OjW_BSymmKh0lcKA9FA

    RAR password if asked would be whocares

    ITProTV - Top 5 Tips to Win with AWS

    AWS rules the cloud. Are you getting the most out of it? Join this webinar to learn how to win with AWS. We’ll cover the top tools for:

    Serverless computing at scale
    Real-time data collection/analysis
    Hosted integrated dev environment
    and more!

    DOWNLOAD LINK

    qIzG7Hwy3W_n3n30_ccgPA

    RAR password if asked would be whocares

    ITProTV - VMware Certified Professional 5 VCP5 DCV

    Take a deep dive into advanced VMware vSphere management skills. Explore the features to build a scalable infrastructure, and discuss when they have the greatest effect.
    This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 6.⅚.7, which includes VMware ESXi 6.⅚.7 and VMware vCenter Server 6.⅚.7.

    DOWNLOAD LINK

    hOmZ7q12uVX6tsB5H1sScA

    RAR password if asked would be whocares

    ITProTV - What Does Hacking Look Like

    Watch a live network attack from both sides
    How do you know if you’ve been hacked? Watch this live demonstration where Daniel will hack into Don’s network and you’ll see the action firsthand.

    Tune in to this webinar to learn:
    The 5 phases of an attack
    How to recognize IOCs (indicators of compromise)
    Red team/Blue team perspectives
    Watch on demand now. Principles of both CompTIA PenTest+ and CySA+ will be employed.

    DOWNLOAD LINK

    VaBlLkvaMKY2Hc16WApd9g

    RAR password if asked would be whocares

    ITProTV - Wireshark 2.2.4 (4.4GB)

    Wireshark 2.2.4 is a free and open source network packet sniffer and protocol analyzer developed as a first response tool. It is the most widely-used network protocol analyzer. I can be used to examine all network traffic because it’s a mini swiss army knife to network administrators who needs detailed visibility into the traffic on their network. It displays the raw data obtained by the sniffer and turns it into readable and meaningful data so that the user will be able to spot issues as well as correct network problems. It’s power lies in the ability to help an analyst find the proverbial “needle in a haystack” when the user is up to speed on what to look for and how to do it. This show helps the network professional get started with Wireshark!

    DOWNLOAD LINK

    6BLcDDfZiZYm8pE8JwcZ-g

    RAR password if asked would be whocares