Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH
English | Size: 223.38 MB
Category: Tutorial

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking password cracking, privilege escalation, spyware installation, and keylogging and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools

PacktPub – Master Deep Learning with TensorFlow 2.0 in Python [2019]

PacktPub – Master Deep Learning with TensorFlow 2.0 in Python [2019] [Video]
English | Size: 2.3 GB
Category: Programming | Cloud-Comp | E-learning

Build deep learning algorithms with TensorFlow 2.0, dive into neural networks, and apply your skills in a business case.

Cisco Learning Library – Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0

Cisco Learning Library – Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0
English | Size: 2.99 GB
Category: Tutorial

Official Cisco Learning Library — Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0
The Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 course gives you deep-dive training about how to design, deploy, configure, and manage your Cisco® Software-Defined WAN (SD-WAN) solution in a large-scale live network, including how to migrate from legacy WAN to SD-WAN. You will learn best practices for configuring routing protocols in the data center and the branch, as well as how to implement advanced control, data, and application-aware policies. The course also covers SD-WAN deployment and migration options, placement of controllers, how to deploy and replace edge devices, and how to configure Direct Internet Access (DIA) breakout.

Linkedin Learning – Ethical Hacking Social Engineering

Linkedin Learning – Ethical Hacking Social Engineering-ZH
English | Size: 284.79 MB
Category: tUTORIAL

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.

Linkedin Learning – Azure Security Technologies Manage Identity and Access

Linkedin Learning – Azure Security Technologies Manage Identity and Access-ZH
English | Size: 139.54 MB
Category: Tutorial

Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security Technologies exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional and advanced auth controls, and implementing Privileged Identity Management for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security