Lynda – Software Design From Requirements to Release

Lynda – Software Design From Requirements to Release-APoLLo
English | Size: 246.25 MB
Category: Tutorial


Follow along with the full life-cycle implementation of a software project. This course takes you from requirements development to modeling, design, coding, and testing. It features a small-scale web application project that realistically depicts the workflow and challenges of a typical software development project. Instructor Neelam Dwivedi brings together the most important concepts, tools, and techniques that developers need to know, including requirements elicitation and validation, proof of concept modeling, best practices for beta deployment, and refactoring. By the end of the course, you’ll understand the reality of software engineering-beyond writing code-and know how to effectively structure and manage projects as a team.

PluralSight – Advanced Network Security on AWS

PluralSight – Advanced Network Security on AWS-ELOHiM
English | Size: 132.93 MB
Category: Tutorial


There are many different layers where you can introduce network security on AWS. In this course, Advanced Network Security on AWS, you ll learn the best practices of setting up a secure network on AWS. First, you ll explore the VPC and the necessary features used and skills required to set up a more secure network. Next, you ll discover the Elastic Load Balancer s different security features and how it can be used as a point of protection. Finally, you ll see how to configure a CloudFront distribution and implement restrictive security controls on CloudFront. When you re finished with this course, you ll have the skills and knowledge of AWS services and features needed to implement network security on AWS

INE – IOS XR Overview

INE – IOS XR Overview
English | Size: 756.6 MB
Category: Cisco | Networking


IOS XR Overview by Brian McGahan

INE – Network Foundation Protection Control Plane

INE – Network Foundation Protection Control Plane
English | Size:2.08 GB
Category: Networking


Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Control Plane functionality and we will look at topics such as MAC address table, CAM table overflow, VTP, CDP, routing protocol authentication (RIP, OSPF, EIGRP, BGP), BGP TTL-Security, FHRP, passive interface, control plane policing, and control plane protection.