ITProTV - Version Control
In this episode, Justin and Aubri discuss keeping sensitive information and junk files out of your git repository using a .
l9M06nYsbJQ277270o2wRw
RAR password if asked would be whocares
In this episode, Justin and Aubri discuss keeping sensitive information and junk files out of your git repository using a .
l9M06nYsbJQ277270o2wRw
RAR password if asked would be whocares
Where’s the data?
Express to the rescue In this series, we creates a RESTful API using the Express web application framework. Justin review the process of setting up a Node-based project as well as installing the Express Node module. After that, Justin discusses important concepts and processes that are key in developing a RESTful API such as creating routes that correspond to data resources, data modeling of those resources, use of middleware to make the API a little more robust, and adding a persistence layer to the API. RESTful APIs are abound when developing software, so if that sounds like something interesting to you, then join us!
zLMvdZDjC6An68R1PjoSbA
RAR password if asked would be whocares
In the fast-paced world of web development, particularly in the realm of jаvascript rich applications, the need for build tools have become commonplace.
Modern build processes
Webpack is a newer build tool that has moved into the spotlight with the use of React and other jаvascript frameworks. In this series, we will show you how to take ownership of your webpack configuration and setup to manage the transpilation of new jаvascript features to more compatible versions, manage static assets such as images, and add the use of CSS with and without preprocessing. If you want to remove the magic of Webpack, then join us!
Laying the First Lines
The Big Idea
A Big Word, Transpilation
Production Builds
Development Builds
Leaving with Style
SH5OO-1Ft9Exhu8pdJZzGg
RAR password if asked would be whocares
This course introduces basic concepts for building web pages using HTML which gives structure to the content such as defining paragraphs and images and CSS which defines the appearance of the content such as colors and fonts.
Course Subtitle:Responsive Web Design
It also introduces bootstrap which is a collection of tools and templates for use with HTML and CSS.
mUnSVEnh2G_Mbfli7onh3g
RAR password if asked would be whocares
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification. It will help you to learn about the core Cisco platforms used, Cisco Programmability strategies, working with applications and working with APIs. Though there are no formal prerequisites for the exam, it is recommended that you have one or more years of hands-on experience in developing and maintaining applications.
AStVtVofBt8ySWgq5MXFbw
RAR password if asked would be whocares
The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field.
Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification
BD_-QpyoOu4VC10EqgqKOQ
RAR password if asked would be whocares
The Linux Essentials certification from the Linux Professional Institue is designed to showcase your foundational skills in working with the Linux operating system.
Upon completing the course you will be familiarized with open source software, the Linux operating system and executing commands from the Linux command line. You will also gain foundational skills in Linux networking, security and administration. This course serves as a stepping stone to the LPIC-1 Linux Administrator certification.
2dB1Nh803Fh20fZ6fRMfjQ
RAR password if asked would be whocares
ITProTV’s Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam-Implementing Cisco Enterprise Network Core Technologies v1.
0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation. Though the show is exam oriented, the ultimate outcome of the show will be to fill you with the core knowledge and skillset you need to be successful in implementing cisco technologies while working in an Enterprise Network Environment. The show will be lead by Anthony Sequeira (CCIE #15626) and Ronnie Wong. They will bring their knowledge, experience and personalities to help you to learn the topics in a relaxed interactive format that is both engaging and filled with knowledge.
WUgHaT-NF8SUOMEfL_zeOA
RAR password if asked would be whocares
This course is designed for Azure Security Eeers who want to implement security controls, maintain the security posture, manage identity and access, and protect data, applications, and networks.
You will be focusing on how to identify and remediate vulnerabilities by using a variety of security tools, implement threat protection, and respond to security incident escalations. To be successful on the AZ-500 exam, you should have a strong understanding of core Azure services, Azure workloads, security, and governance, as well as having experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.
RveDLUwMXYysR29XzoJo-Q
pEBpZSFthnbEi54SIonIZg
RAR password if asked would be whocares
Vendor-neutral networking - Official CompTIA online IT training. The Network+ course goes over all you need to know about managing devices on a network for the IT certification exam.
Course Length: 37.5 hours
Quote:
The Network+ certification was introduced by CompTIA in 1999 and was designed to do for Network Technicians what the A+ certification did for Computer Technicians. Obtaining Network+ certification shows that the holder possess the same knowledge and skills of someone who has worked for nine months as a Network Technician. The Network+ exam covers topics ranging from theory (terminology, topology and design) to hardware (routers, switches and cabling) and provides users with a broad, vendor neutral perspective on the topics required to work in the field of Network Administration.
Contents:
Networking Concepts
Overview
Ports and Protocols
Ports and Protocols Part 2
OSI Model
OSI Model Part 2
Network Traffic Properties
Network Traffic Properties Part 2
Switching Technologies
Routing Technologies
Routing Technologies Part 2
Network Performance Concepts
IP Addressing
IP Addressing Part 2
IP Addressing Part 3
IP Addressing Part 4
Classless IPv4 Addressing
Classless IPv4 Addressing Part 2
Classless IPv4 Addressing Part 3
Classless IPv4 Addressing Part 4
IP Address Assignments
IPv6 Addressing
IPv6 Addressing Part 2
Network Topologies
Network Topologies Part 2
Wireless Technologies
Cloud Concepts
Network Service Functions
Network Service Functions Part 2
Network Service Functions Part 3
TCP/IP Model
TCP/IP Model Part 2
Infrastructure
Cabling Solutions-Copper
Cabling Solutions-Copper Part 2
Cabling Solutions-Copper Part 3
Cabling Solutions-Fiber
Cabling Solutions-Fiber Part 2
Network Devices
Advanced Networking Devices
Advanced Networking Devices Part 2
Virtualization and Network Storage
Virtualization and Network Storage Part 2
WAN Technologies
WAN Technologies Part 2
WAN Technologies Part 3
Network Operations
Network Diagrams and Documentation
Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery Part 2
Scanning, Monitoring and Patching
Remote Access Methods
Remote Access Methods Part 2
Remote Access Methods Part 3
Policies and Best Practices
Policies and Best Practices Part 2
Network Security
Physical Security Devices
Authentication and Access Control
Authentication and Access Control Part 2
Basic Wireless Network Security
Common Networking Attacks
Common Networking Attacks Part 2
Network Device Hardening
Network Device Hardening Part 2
Common Mitigation Techniques
Common Mitigation Techniques Part 2
Common Mitigation Techniques Part 3
Network Troubleshooting and Tools
Network Troubleshooting Method
Network Troubleshooting Tools
Network Troubleshooting Tools Part 2
Network Troubleshooting Tools Part 3
Network Troubleshooting Tools Part 4
Network Troubleshooting Tools Part 5
Common Wired Network Issues
Common Wireless Network Issues
Common Network Service Issues
Common Network Service Issues Part 2
Common Network Service Issues Part 3
Subnetting
Subnetting Step-by-Step
Subnetting Step-by-Step Part 2
Subnetting Step-by-Step Part 3
Subnetting Step-by-Step Part 4
Subnetting Step-by-Step Part 5
Subnetting Step-by-Step Part 6
Subnetting Step-by-Step Part 7
Subnetting Step-by-Step Part 8
Subnetting Step-by-Step Part 9
Subnetting Step-by-Step Part 10
9RFudTfimdsbY2_sz3SyvQ
RAR password if asked would be whocares
In this series, you will learn how to write a PowerShell script. We will cover the different components that make up a PowerShell script. We look at variables, arrays and hash tables. We look at comparison operators, logical operators, assignment and arithmetic operators. We look at and constructs, including if, switch, for, foreach, do and while. We will also look at creating a script module.
Nq_c3Q6dHAHr8M9b19rOHg
RAR password if asked would be whocares
The Power of Python Part of the power of Python is the array of tools that come built into the language, known as the Python Standard Library. In this series, we take a look at the Standard Library, import from the Standard Library, as well as take a view of some of the more common modules, or parts, of the Standard Library. If you want to dive a little deeper, then we will see you there.
8FYoqI703n3DxcsewiKPwg
RAR password if asked would be whocares
In this episode, Daniel and Justin start a new project that will use Python to help us format our RAW packet data into a readable .pcap file. Here you’ll see how to format the data and then send that data to a .pcap file which you can then view using a standard tool like Wireshark or TCPdump.
1-EkC63CgEOHoEaFi-YAEw
RAR password if asked would be whocares
In this episode, we look at a brief history of PHP and what it is used for.
Getting started with PHP
We then get our environment set up to b working on our first PHP file.
S-M4Xh61j5SZlrZu9adJoQ
RAR password if asked would be whocares
Contents:
Server Architecture
Overview
Server Form Factors
Server Components
Server Components Part 2
Power and Cooling
Power and Cooling Part 2
Server Administration
Installing a Server OS
Installing a Server OS Part 2
Installing a Server OS Part 3
Installing a Server OS Part 4
Server Roles and Requirements
Administering a Server
Server Maintenance
Server Maintenance Part 2
Server Maintenance Part 3
Server Maintenance Part 4
Asset Management and Documentation
Asset Management and Documentation Part 2
Virtualization
Storage
Primary Storage Devices
Configuring RAID
Configuring RAID Part 2
Storage Technologies
Storage Capacity
Security
Physical Security
Server Hardening
Network Security
Network Security Part 2
Secure Storage Disposal
Logical Access Control
Logical Access Control Part 2
Environmental Controls
Environmental Controls Part 2
Environmental Controls Part 3
Networking
IP Addressing and Services
IP Addressing and Services Part 2
Ports and Protocols
Cable Management
Cable Management Part 2
Disaster Recovery
Disaster Recovery Principles
Backup Techniques
Troubleshooting
Troubleshooting Methodologies
Troubleshooting Hardware
Troubleshooting Software
Troubleshooting Software Part 2
Troubleshooting Software Part 3
Troubleshooting Networking
Troubleshooting Networking Part 2
Troubleshooting Networking Part 3
Troubleshooting Storage
Troubleshooting Security
Troubleshooting Security Part 2
Troubleshooting Security Part 3
ztiIBa9DJS8DjyNp4MIpiA
RAR password if asked would be whocares
What does that data look like?
In this series, we take a look at common formats for saving, reading, and shuffling data around such as Comma Separated Values (CSV), jаvascript Object Notation (JSON), YAML Ain’t Markup Language (YAML), and eXtensible Markup Language (XML). If you want to know more about these data formats as well as how to interact with these different data representation using Python, then we will see you there!
h6pfiw_UWyE2uit_bwf1Fg
RAR password if asked would be whocares
Overview
Are You Ready For CML2
CML2 INSTALLATION
Install CML2 On Windows 10
Install CML2 On MacOS Catalina
Install CML2 On VMware ESXi
CML2 OPERATIONS
Get To Know CML2
Build And Configure A Simple Lab (GUI)
Build And Configure A Simple Lab (API)
Access The CML2 Using Telnet
Access The CML2 Using SSH
CML2 ENHANCED OPERATIONS
Connect A Lab To The Outside World
Add VIRL 1.X Images To A CML2 Lab
2ACD-dpKmWXaC56aI1rfmQ
RAR password if asked would be whocares
The Palo Alto Networks Certified Cybersecurity Associate show is produced for anyone who want to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. They will be introduced to the context of cybersecurity knowledge and the Palo Alto technologies that can stop those attacks. There is no pre-requisite required only a desire to learn more about cybersecurity and Palo Alto Security solutions.
wBuHzl7L9Icw603qaI9wkw
RAR password if asked would be whocares
Learn the easy way for getting new and recycled devices configured to your company’s needs with Windows Autopilot
Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices. This solution enables an IT department to achieve the above with little to no infrastructure to manage, with a process that’s easy and simple.
oSMbhfjwO1IuWSgTEIgiKw
RAR password if asked would be whocares
This is your go-to guide for the practical application of DNS, the Domain Naming System. Explore topics on supporting websites, mail servers, and more.
3pr5bzBuUlVJMLGCCcNJYQ
RAR password if asked would be whocares