ITProTV - Linux Shell Scripting Basics

In this course, take a look at some basic scripting practices in Linux like script file formats, working with variables, loops, script control, and more.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.

DOWNLOAD LINK

Qp1TPKKW4ft6XjS2iBIDUQ

RAR password if asked would be whocares

ITProTV - Linux Security Techniques

Security features found in modern Linux distributions10 H 47 M
This course covers various Linux security techniques like data encryption, firewall configuration, auditing access, pen testing tools, and more.

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.

DOWNLOAD LINK

dyt2iLJKuq9nmI7tnBfkkA

RAR password if asked would be whocares

ITProTV - Network Troubleshooting

Command Line Tools for Diagnosing Network Issues1 H 57 M
Every IT technician will have to deal with network issues from time to time. In this course, learn how to assess and resolve common network problems.
In this episode, Daniel and Wes show you how to troubleshoot common network issues using command line tools. Specific tools covered include ipconfig, ping, and tracert.

DOWNLOAD LINK

GtqBfHyIR7XNgHL2d-wEvg

RAR password if asked would be whocares

  • qazi replied to this.

    ITProTV - Owasp 2017 Top 10

    Web Application Security 7H 9M
    In this series, Justin and Daniel explore the 2017 edition of the OWASP Top Ten Vulnerabilities. For each vulnerability, a scenario and application is created that demonstrates the vulnerability at hand, Daniel demonstrates and explains exploiting the vulnerability, Justin shows fixing the vulnerability, then take time to discuss how that vulnerability may manifest in different ways. If you are looking to get a foundation in web application security, then join Justin and Daniel for the OWASP Top Ten.

    DOWNLOAD LINK

    txc8RH2PdYf1HiPpdP3c7g

    RAR password if asked would be whocares

    ITProTV - System Center 2012 Configuration Manager 70-243

    A member of the Microsoft System Center suite of management solutions, System Center 2012 R2 Configuration Manager increases IT productivity and efficiency by reducing manual tasks and letting you focus on high-value projects, maximize hardware and software investments, and empower end-user productivity by providing the right software at the right time.
    Configuration Manager helps you deliver more effective IT services by enabling secure and scalable software deployment, compliance settings management, and comprehensive asset management of servers, desktops, laptops, and mobile devices. In addition, Configuration Manager can integrate with Windows Server Update Services (WSUS), Network Access Protection (NAP), Certificate Services, Exchange Server and Exchange Online, Group Policy, the DNS Server role, Windows Automated Installation Kit (Windows AIK) and the User State Migration Tool (USMT), Windows Deployment Services (WDS), and Remote Desktop and Remote Assistance.

    DOWNLOAD LINK

    sszHD08yACYqcDRm26jwZA

    RAR password if asked would be whocares

    ITProTV - Nmap

    Network Mapper, a Security Scanner 7H 6M
    Learn the basic concepts of the Nmap tool like Host Discovery, Port Scanning, Service/OS/Version Detection, and the Nmap Scripting Engine(NSE) for security.
    In this episode, Wes and Dan explore the administrative utility known as Nmap. They discuss what the Nmap software is and might use this software. They demonstrate how to obtain the software as well the types of operating systems that support Nmap and their associated installer types. They will show how to install Nmap in the major operating systems such as Windows, Ubuntu and CentOS.

    DOWNLOAD LINK

    fVZEezq3eXIrN5hfKTf67g

    RAR password if asked would be whocares

    ITProTV – Citrix XenServer 6.2

    Citrix XenServer is the free virtualization software from Citrix. It is a commercially supported implementation of the open source Xen virtualization platform. The low cost of entry makes XenServer an attractive option for small and medium businesses looking for advanced hypervisor functions (clustering, live migration, centralized management) without the large price tag associated with competing products.

    DOWNLOAD LINK

    9eTf8we9OEXgFA8a5ndFZQ

    RAR password if asked would be whocares

    ITProTV – Citrix XenServer 7.0

    DOWNLOAD LINK

    SWIgRh_1d6RZAUYTmw3m4Q

    RAR password if asked would be whocares

    ITProTV - Project Management VS Service Management

    What’s the difference between project management and service management? In this course, Jo Peacock gives an in-depth explanation.
    You’ve heard the terms “service management” and “project management”, but do you really understand what they are? In this episode Jo briefly explains the concepts to Justin and they explore the difference between the two.

    DOWNLOAD LINK

    axsq96VOoYeAnYosokuGhQ

    RAR password if asked would be whocares

    All appreciate Author for this post great upload 👍

    • XDJ likes this.

    ITProTV - Security Awareness Onboarding

    Increasing a new-hire’s onboarding IT security awareness 39 M
    This course is designed to help new employees understand the IT security issues they may face in the workplace. Get up-to-speed with security awareness training.
    This course is designed to help bring new employees up to speed on the various IT security issues facing companies to day. Its primary use is intended to be as an instructional video shown during the new-hire on-boarding process. By increasing a new-hire’s IT security awareness, companies can help to avoid security incidents before they happen.

    DOWNLOAD LINK

    C477TpAlCIIL6jGM-SDX7g

    RAR password if asked would be whocares

    ITProTV - Salesforce Administrator

    DOWNLOAD LINK

    gQ5OjW_BSymmKh0lcKA9FA

    RAR password if asked would be whocares

    ITProTV - Top 5 Tips to Win with AWS

    AWS rules the cloud. Are you getting the most out of it? Join this webinar to learn how to win with AWS. We’ll cover the top tools for:

    Serverless computing at scale
    Real-time data collection/analysis
    Hosted integrated dev environment
    and more!

    DOWNLOAD LINK

    qIzG7Hwy3W_n3n30_ccgPA

    RAR password if asked would be whocares

    ITProTV - VMware Certified Professional 5 VCP5 DCV

    Take a deep dive into advanced VMware vSphere management skills. Explore the features to build a scalable infrastructure, and discuss when they have the greatest effect.
    This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 6.⅚.7, which includes VMware ESXi 6.⅚.7 and VMware vCenter Server 6.⅚.7.

    DOWNLOAD LINK

    hOmZ7q12uVX6tsB5H1sScA

    RAR password if asked would be whocares

    ITProTV - What Does Hacking Look Like

    Watch a live network attack from both sides
    How do you know if you’ve been hacked? Watch this live demonstration where Daniel will hack into Don’s network and you’ll see the action firsthand.

    Tune in to this webinar to learn:
    The 5 phases of an attack
    How to recognize IOCs (indicators of compromise)
    Red team/Blue team perspectives
    Watch on demand now. Principles of both CompTIA PenTest+ and CySA+ will be employed.

    DOWNLOAD LINK

    VaBlLkvaMKY2Hc16WApd9g

    RAR password if asked would be whocares

    ITProTV - Wireshark 2.2.4 (4.4GB)

    Wireshark 2.2.4 is a free and open source network packet sniffer and protocol analyzer developed as a first response tool. It is the most widely-used network protocol analyzer. I can be used to examine all network traffic because it’s a mini swiss army knife to network administrators who needs detailed visibility into the traffic on their network. It displays the raw data obtained by the sniffer and turns it into readable and meaningful data so that the user will be able to spot issues as well as correct network problems. It’s power lies in the ability to help an analyst find the proverbial “needle in a haystack” when the user is up to speed on what to look for and how to do it. This show helps the network professional get started with Wireshark!

    DOWNLOAD LINK

    6BLcDDfZiZYm8pE8JwcZ-g

    RAR password if asked would be whocares

    ITProTV - Windows Configuration Designer

    Windows Configuration Designer 56 M
    Windows Configuration Designer can create provisioning packages for Windows 10 desktop and mobile editions. In this course, you’ll learn how to configure it.
    In this epsode, Aubri and Mike take a look at using the Windows Configuration Designer (WCD). They look at installing WCD Using the Widows ADK as well as the Microsoft Store version. Once installed, they explore the interface and discuss the difference between the wizards and the advanced mode. They then create packages, using both methods.

    DOWNLOAD LINK

    IOYGWxihruwf5JX_js311w

    RAR password if asked would be whocares

    ITProTV - CCNP Security Senss (300-206)

    DOWNLOAD LINK

    j2UZipsJTSnvrEmYvDwe5w

    RAR password if asked would be whocares

    ITProTV - Security Weeklys Jeffrey Man

    DOWNLOAD LINK

    WMSIlv3boXw7z-tS-yqKoA

    RAR password if asked would be whocares

    ITProTV - Cisco ASA Firewalls

    The Cisco ASA (Adaptive Security Appliance) is one of the most implemented security solutions found in enterprise networks. Cisco offers an entire series of firewalls that range from small office solutions to very large enterprise solutions. It is because of its commonality that in many businesses an IT Professional would do well to be familiar with the product and some of the most essential configurations. This series is designed to help an IT Professional to see how to configure many of the features in the ASA through the GUI interface, the ASDM. This will provide an introduction to the appliance and guidance on some of most used features for any environment.

    DOWNLOAD LINK

    TiKUSc4iWDG5Nntq1kANMg

    RAR password if asked would be whocares