• Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 37
Professor Messer's CompTIA N10-006 Network+ Training Course
Professor Messer's CompTIA N10-006 Network+ Training Course
English | mp4 | H264 1280x720 | AAC 2 ch | 14 hrs 53 min | 11.3 Gb
Genre: eLearning

Section 1: Network Architecture

1.1 - Network Devices
Common Network Devices (8:53)
Intrusion Detection and Prevention Systems (5:13)
Content Filters (4:52) | Load Balancers (2:45)
Packet Shapers (2:32) | VPN Concentrators (2:50)

1.2 - Remote Access
VPN Connections (3:23) | VPN Protocols (5:44)
TACACS and RADIUS (3:54) | Remote Access Services (2:31)
Web Services (3:09) | Unified Voice Services (3:04)
Wireless LAN Controllers (2:38)

1.3 - Network Services
DHCP Addressing Overview (5:15) | DHCP Reservations (3:16)
DHCP Scopes (2:11) | DHCP Leases (4:10) | DHCP Options (2:47)
An Overview of DNS (6:29) | DNS Records (5:54) | Dynamic DNS (3:16)
Proxy Servers (3:47) | Understanding Network Address Translation (7:21)

1.4 - WAN Technologies
SONET, DWDM, and CWDM (4:11) | ATM, Frame Relay, and MPLS (4:52)
Satellite, ISDN, Cable, DSL, and Dialup (8:54) | PPP and Multilink PPP (2:30)
GSM, CDMA, and WiMAX (3:37) | Leased Lines and Metro Ethernet (4:07)
Circuit Switching and Packet Switching (3:21)

1.5 - Cable Types
Copper Connectors (8:05) | Copper Cabling (9:28)
Straight-Through, Crossover, and Rollover Cables (7:42)
Fiber Connectors (3:51) | Fiber Cables (7:37)
Media Converters (3:19) | Network Cabling Tools (8:13)

1.6 - Network Topologies
Common Network Topologies (7:15)

1.7 - Network Infrastructures
Network Infrastructures (6:20)

1.8 - Network Addressing
Binary Math (8:20) | An Overview of IPv6 (7:25)
IPv6 Address Configuration (5:40) | IPv6 Interoperability (3:09)
IPv4 Classes (8:12) | Classless Inter-Domain Routing (8:12)
IPv4 Addresses and Subnetting (17:13) | APIPA (3:35)
Unicast, Multicast, and Broadcast (3:40)
Broadcast Domains and Collision Domains (6:18)

1.9 - Routing
Routing Tables (13:58) | Route Aggregation and Distribution (5:22)
Routing Metrics (2:47) | Static and Dynamic Routing (4:48)
Link State, Distance Vector, and Hybrid Routing (3:39)
IGP and EGP (5:31) | High Availability (5:09)

1.10 - Unified Communications
Unified Communication Technologies (7:12)

1.11 - Cloud and Virtualization Technologies
Virtualization (8:30) | Storage Area Networks (7:09)
Cloud Technologies (5:22)

1.12 - Implementing Networks
Implementing a Basic Network (8:51)

Section 2: Network Operations

2.1 - Monitoring the Network
Using Protocol Analyzers (2:58) | Network Monitoring Tools (8:08)
SIEM (3:28) | Environmental Monitoring Tools (2:20)
Wireless Tools (3:37)

2.2 - Metrics and Reporting
Baselines and Bottlenecks (7:32) | Log Management and Graphing (5:32)
Utilization Statistics (5:57) | Interface Monitoring (4:48)

2.3 - Configuration Management
Configuration Management (4:51)
On-Boarding and Off-Boarding Mobile Devices (7:13)
Network Access Control (4:41) | Documenting the Network (7:38)

2.4 - Network Segmentation
Segmenting the Network (5:17)

2.5 - Patches and Updates
Patches and Updates (5:51)

2.6 - Switch Configuration
Configuring VLANs (7:11) | Spanning Tree Protocol (7:06)
Switch Interface Configuration (4:23) | Power Over Ethernet (3:04)
Switch Management (5:01)

2.7 - Wireless Networks
Wireless Network Devices (5:47) | Wireless Connections (11:05)
Wireless Antenna Technologies (4:13) | Using Wireless Networks (3:42)

Section 3: Network Security

3.1 - Risk
Business Risk (8:52) | Single Point of Failure (2:45)
Vulnerability Scanning (6:31) | Penetration Testing (5:41)

3.2 - Vulnerabilities and Threats
Denial of Service (8:55) | Wireless Network Attacks (8:13)
Wireless Protocol Attacks (7:37) | Brute Force Attacks (6:04)
Session Hijacking (5:11) | Social Engineering (5:14)
Man in the Middle Attacks (4:05) | VLAN Hopping (5:47)
Compromised Systems (4:19) | Insider Threats (4:05)
Zero-Day Attacks (4:12) | Operating System Vulnerabilities (10:57)

3.3 - Network Hardening
Anti-Malware Software (4:23) | Switch Port Security (5:17)
Security Policies (2:00) | Disabling Unneeded Services (4:03)
Using Secure Protocols (4:18) | Access Lists (5:43)
Wireless Security (5:48) | User Authentication (8:44)
Hashing (4:17)

3.4 - Physical Security Controls
Physical Security Controls (5:55)

3.5 - Firewalls
Firewalls (6:52) | Firewall Configurations (6:35)

3.6 - Network Access Control
Network Access Control Models (5:03)

3.7 - Forensics
Basic Forensic Concepts (5:03)

Section 4: Troubleshooting

4.1 - Network Troubleshooting Methodology
Network Troubleshooting Methodology (5:59)

4.2 - Troubleshooting Tools
Command Line Tools (19:47) | Physical Testing Tools (4:09)
Web-based Troubleshooting Tools (3:25) | Protocol Analyzers (2:36)

4.3 - Wireless Issues
Troubleshooting Wireless Signals (6:03) | Troubleshooting Wireless Configurations (6:54)

4.4 - Copper Cable Issues
Troubleshooting Copper Cables (6:19) | Troubleshooting Signal Loss (6:15)
Troubleshooting Network Cabling (4:27)

4.5 - Fiber Issues
Troubleshooting Fiber Issues (5:11)

4.6 - Network Issues
Troubleshooting IP Configurations (4:46)
Troubleshooting DNS and DHCP (3:44)
Troubleshooting Broadcast Storms and Switching Loops (4:30)
Troubleshooting Interface Configurations (4:12)
Troubleshooting VLAN Assignments (2:53)
Troubleshooting Network Connectivity (5:22)
Troubleshooting Mismatched MTUs (4:28)
Troubleshooting NIC Teaming (2:48)

4.7 - Security Issues
Troubleshooting Firewall Security Issues (4:34)
Troubleshooting Operating System Security Issues (6:18)
Troubleshooting Denial of Service (4:34)
Troubleshooting ICMP and ARP Issues (3:28)
Troubleshooting Malicious User Activities (3:14)
Troubleshooting Authentication Issues (4:59)

4.8 - WAN Issues
Troubleshooting WAN Interfaces (4:03)
Troubleshooting Customer Premise Equipment (5:21)
Company Security Policies (3:08)

Section 5: Industry Standards, Practices, and Network Theory

5.1 - The OSI Model
Understanding the OSI Model (8:29)

5.2 - Network Theory and Concepts
Network Fundamentals (6:19) | Modulation Techniques (3:05)
Hexadecimal Math (5:48) | Octal Math (3:25)
CSMA/CD and CSMA/CA (2:36) | The TCP/IP Suite (2:27)

5.3 - Wireless Network Standards
802.11 Wireless Standards (6:12)

5.4 - Wired Network Standards
Ethernet Standards (7:46)

5.5 - Policies and Procedures
Security and Network Policies (3:26)

5.6 - Safety Practices
Safety Practices (4:31) | Understanding Electrostatic Discharge (3:00)
Emergency Procedures (2:53)

5.7 - Installation and Configuration
MDF and IDF (2:54) | Cable and Power Management (3:45)
Rack Systems (3:45) | Labeling and Documentation (3:57)

5.8 - Change Management
Change Management Procedures (3:37)

5.9 - Network Ports and Protocols
Common TCP and UDP Ports (10:58)

5.10 - Application Ports and Protocols
Application Ports and Protocols (6:53)

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 37
Digital Tutors - Creating a Steampunk Concept Vehicle in Photoshop
Digital Tutors - Creating a Steampunk Concept Vehicle in Photoshop
English | 1h 27m | AVC (.mp4) 1280x720 15fps | AAC 32KHz 2ch | 432 Mb
Genre: eLearning

In this Photoshop tutorial we'll be using basic techniques to create a thematic concept vehicle.
We'll learn several simple tips and tricks to choose photos and we'll also learn how to merge them all together to create an original concept vehicle. By the end of this Photoshop training you'll be able to find, match, and merge source photos to achieve a unique concept vehicle and complete the presentation layout using the basic principles of perspective and surface lighting.

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 28
LinuxCBT PackCapAnal Edition 2012
LinuxCBT PackCapAnal Edition 2012
English | .MOV | aac, 44100 Hz, mono | h264, yuv420p, 800x600, 5.00 fps | 856MB

Introduction - Topology - Features Discuss course outline
Explore system configuration
Identify key network interfaces to be used for captures
Identify connected interfaces on Cisco Switch
Explore network topology - IPv4 & IPv6
Identify Ethereal installation
Enumerate and discuss key Ethereal features

EtherealŪ Graphical User Interface (GUI) Identify installation footprint
Differentiate between promiscuous and non-promiscuous modes
Configure to permit non-privileged user to write output to screen
Launch Ethereal GUI
Identify the primary GUI components /Packet List | Packet Details | Packet Bytes/
Discuss defaults
Explore key menu items

TCPDump | WinDump - Packet Capturing for /Linux|Unix|Windows/ Discuss defaults, features and applications
Use TCPDump on Linux to capture packets
Log traffic using default PCAP/TCPDump format
Discuss Berkeley Packet Filters (BPFs)
Capture and log specific packets using BPFs for analysis with Ethereal
Connect to Windows 2003 Server using Remote Desktop (RDesktop) utility
Install WinDump and WinPCAP on Windows 2003 Server
Identify available network interfaces using WinDump
Capture and log packets using WinDump
Capture and log specific packets using BPFs with WinDump for analysis with Ethereal
Upload captures to Linux system for analysis in Ethereal

SnortŪ NIDS Packet Capturing & Logging Discuss Snort NIDS's features
Confirm prerequisites - /PCRE|LibPCAP|GCC|Make/
Download and Import Snort G/PGP key and MD5SUM for Snort NIDS
Download, verify, compile and install Snort NIDS
Discuss BPF directional, type, and protocol qualifiers
Identify clear-text based network applications and define appropriate BPFs
Execute Snort NIDS in sniffer mode with BPFs enabled to match interesting traffic
Log to the active pseudo-terminal console and examine the packet flows
Combine BPF qualifiers to increase packet-matching capabilities
Use logical operators to define more flexible BPFs
Create captures for further analysis with Ethereal

Sun Snoop Packet Capturing & Logging Connect to Solaris 10 system and prepare to use Snoop
Draw parallels to TCPDump
Enumerate key features
Sniff and log generic traffic
Sniff and log specific traffic using filters
Sniff using Snoop, HTTP and FTP traffic
Save filters for analysis by Ethereal
Snoop various Solaris interfaces for interesting traffic

Layer-2 & Internet Control Messaging Protocol (ICMP) Captures Launch Ethereal
Identify sniffing interfaces
Capture Address Resolution Protocol (ARP) Packets using Capture Filters
Discuss and Identify Protocol Data Units (PDUs)
Identify default Ethereal capture file
Peruse packet capture statistics
Identify Cisco VOIP router generating ARP requests
Peruse time precision features - deci - nano-seconds
Discuss time manipulations - relative to first packet - actual time
Reveal protocol information from layer-1 through 7
Identify network broadcasts in the packet stream
Generate Layer-2 ARP traffic using PING and capture and analyze results
Sniff traffic based on MAC addresses using Ethereal and Capture FIlters

User Datagram Protocol (UDP) Captures & Analyses Discuss UDP Characteristics
Focus on Network Time Protocol (NTP)
Setup NTP strata for testing between multiple systems
Analyze NTP - UDP traffic using Ethereal
Focus on Domain Name Service (DNS)
Install a BIND DNS Caching-Only Server
Analyze DIG queries
Analyze 'nslookup' queries


LinuxCBT PackCapAnal Edition 2012

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 35
Gumroad - Anthony Jones - How to Finish a Painting 2
Gum road - Anthony Jones - How to Finish a Painting 2

How to Finish a Painting 2
By Anthony Jones
Anthony Jones
Affordable Video Tutorials for aspiring digital artists.
Clients include: Blizzard, Sony, Paramount, Fox, Disney, Marvel,Hasbro, Cryptozoic, Wi...
Video Tutorial covering my latest
-Build the theme of the concept before detailing
-Refine in stages
For more details watch the video description or email
For updates visit or

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 43
ENGLISH COURSE   Magic Happy English 38   BOOK with CD-ROM (2015)
ENGLISH COURSE * Magic Happy English 38 * BOOK with CD
2015 | English/Polish/Czech/Slovak | EXE, PDF 24 pages | 156.6 MB

A video course for children aged 3-15. With "Magic Happy English" children can play with funny characters of BBC movies while learning English words and phrases. Nursery rhymes, poems and songs make learning the language even easier, and at the same time enjoyable.

Additional info:
Program languages: English, Polish, Czech, Slovak
Book languages: English, Polish
Program minimum requirements: CPU 1.6 GHz or faster, OS Win XP/7 32 bit, CD-ROM x32 or faster, Screen resolution 1280 x 960 or higher

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 60
Humor in the Workplace
Lynda - Humor in the Workplace
364MB | Duration: 0h 45m | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Appropriate for all | Language: English

Humor can change lives and relationships. In this course, organizational consultant and former standup comedian Izzy Gesell helps us better understand why we laugh and how we use humor in our everyday lives: to protect, attack, connect, and distract.

He goes on to explain how humor can be used strategically in the workplace to help relieve tension, shift perspectives, bring people together, and work more effectively and provides tips and tricks for both evaluating and expanding your humor skill set.

Topics include:
* Understanding why we laugh
* Using humor as a weapon or connection
* Shifting perspectives through humor
* Releasing tension with humor
* Expanding your humor skill set

Humor in the Workplace

I recommends Buy premimum account for High speed+parallel downloads!

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 46
Digital Tutors - Replayable Game Design Using Blueprint in Unreal Engine

Digital Tutors - Replayable Game Design Using Blueprint in Unreal Engine
English | Size: 1.3GB

In this Unreal Engine tutorial we'll apply design principles of replayability, structured unpredictability and rapid iteration in creating a Blueprint system that can populate game levels of any size with randomly located interactive player objects (pickups).
We'll also exploit the usefulness of arrays and actor classes to organize our system within a placeable actor class that can be quickly and easily modified to suit the needs of many kinds of games.

By the end of this Unreal Engine training you'll understand the value of creating a system that will save you work in building your game, allowing you to more quickly begin a phase of development where you can finely tune the player experience.

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 27
Packtpub - Kali Linux Web App Testing
Packtpub - Kali Linux Web App Testing
English | .FLV | h264, yuv420p, 1280x720, 25.00 fps(r) | aac, 44100 Hz, stereo | 481 Mb
Genre: eLearning

Leverage the true power of Kali Linux with the help of its tools and take your app security to the next level
About This Video
Grasp how attacks such as SQL and XSS injections function and ward them off
Guard your applications against threats such as File inclusion, Bruteforcing, and Remote command executions by understanding how they work
Scan your application for vulnerabilities with dynamic tools such as w3af and OWASP Zap to resolve them on time
In Detail
With an ever-changing online environment, security is a constantly growing concern. It's hard for web developers to keep up with new and emerging techniques that attackers may use to hack into a site. In such a scenario, Kali Linux emerges as a powerful package to penetration test your website or application.
Kali Linux Web App Testing will help you prevent different cyber attacks from basic vulnerabilities to ones less spoken of. Firstly, you will be introduced to injection techniques such as SQL injection along with SQLMap. After that, you'll learn what XSS injection is and how to use XSSER against it. Then you'll walk through local and remote file inclusions and ways to counteract them. You'll also learn other cyber invasions such as Remote Command Execution and Cross Site Request Forgery. Furthermore, you'll see what Open Redirects and Open Proxies are and how to tackle them. Finally, you'll learn the concept of Clickjacking and how to avoid it. Towards the end of this course, you'll not only be familiar with various cyber attacks and vulnerabilities, but also know different approaches to deal with them.

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 31
Outlook 2010 - Curso Completo con Profesor Certificado
Outlook 2010 - Curso Completo con Profesor Certificado
3 Hours | Video: AVC (.MP4) 1280x720 30fps | Audio: AAC 44.1KHz 2ch | 416MB
Genre: eLearning | Languages Spanish

Aprende a gestionar eficientemente tus correos, tareas y contactos con los distintos módulos y comandos de Outlook.
* Lectures 102
Descubre todas las funcionalidades de Outlook de la mano de un profesor certificado por Microsoft como Microsoft Office Master Specialist.
** Parte central de la interfaz
* Parte inferior de la interfaz
* La vista backstage
* Las opciones de Outlook - Correo
* Las opciones de Outlook - Calendario
* Las opciones de Outlook - Avanzado
* Las otras opciones de Outlook
* Personalizar la cinta de opciones
* Personalizar la barra de herramientas de acceso rápido
* Agregar una cuenta Outlook (Ex Hotmail)
* Configurar manualmente las opciones del servidor
* Configuración de la cuenta
* Cambiar a la vista lista
* Organizar las listas
* Crear vistas personalizadas
* Otras herramientas de búsqueda y ayuda
* Carpetas de búsqueda
* Estado de la carpeta
* Obtener más ayuda
* Marcar elementos
* Nivel de confidencialidad e importancia del mensaje
* Cambiar el estado de lectura
* Aplicar estilos
* Temas
* Insertar elementos gráficos
* Hipervínculos
* Opciones de votación y seguimiento
* Más opciones
* Adjuntar un archivo
* La ficha Revisar
* Firmas
* Pasos rápidos
* Gestionar el tamaño del buzón
* Gestionar Conversaciones
* Guardar los mensajes y los documentos adjuntos
* Crear una regla
* Gestionar reglas
* Gestionar el correo no deseado
* Más opciones para la creación de contactos
* Gestionar contactos
* Editar una tarjeta de presentación
* Crear y gestionar grupos de contactos
* Crear nuevos calendarios y grupos de calendarios
* Cambiar la apariencia de mis calendarios
* Programar citas
* Crear eventos
* Configurar la periodicidad
* Privacidad y otras opciones de citas y eventos
* Crear Reuniones
* Aceptar o rechazar la convocatoria
* Otras opciones
* Establecer una periodicidad
* Acceder a nuestras tareas
* Crear una carpeta de tareas
* Asignar y recibir tareas
* Finalizar tareas
* Organizar, asignar y reenviar notas
* Guardar entradas manualmente
* Imprimir elementos de Outlook

I recommends Buy premimum account for High speed+parallel downloads!



  • Author: rai10
  • |
  • Comments: 0
  • |
  • Views: 50
Persuasive Presentation System
Udemy - Persuasive Presentation System
MP4 | Video: 1280x720 | 59 kbps | 48 KHz | Duration: 00:46:17 | 223 MB
Genre: eLearning | Language: English

Having great ideas is not enough to influence and change the world from the way it is. Great ideas only exist in your own minds. To influence and make changes, I like to think that we need to create bridges between our brains to our audiences' brains. The connecting bridge is persuasive presentation.

Over the years, I extensively read and research on the different techniques regarding persuasive presentations. Through trial and error, I experimented different techniques and came up with a set of the best techniques to use that worked beautifully for me. I came up with a step-by-step system that ANYONE can use to greatly enhance their persuasive presentation skills: The Presentation Sensational System. You can think of the Presentation Sensational System as a one-stop shortcut that brings you instant results once you have mastered it. It's easy to follow as it guides you step-by-step along the way.

When you are done with this course, you will have the skills to create, on your own, and give a persuasive presentation that stands out from the rest and leaves a long lasting impression for your audience.
What are the requirements?

A pen and paper to take notes
An open mind to absorb as much knowledge as possible
Motivation to implement the techniques learnt and see results

What am I going to get from this course?

Over 18 lectures and 1 hour of content!
Create persuasive and engaging content on their own
Give presentations that stand out and leave lasting impressions
Display confidence immediately during the presentation
Gain genuine confidence over time with the skills learnt
Use their voices to show power and authority and make the presentation alive
Understand how different proven tonal patterns work for their presentations
Use visual aids in a way that is only customised for their presentations
Show empathy towards the audience, making them feel like the star of the presentation
Identify with their audiences
Show that they are credible and trustworthy experts who genuinely care for their audiences

What is the target audience?

People who are always giving business presentations to individuals or groups
People who are required to do public speaking
Students who give presentations for their modules
Extroverts and introverts
Anyone who has interest in persuasion, presentation or public speaking

Persuasive Presentation System

I recommends Buy premimum account for High speed+parallel downloads!