In Backup Exec 16 Administration Course we will learn the Installation for Backup Exec Software and...
Ratings: 4.08/5.00 Lectures: 11 Subscribers: 543
Welcome to the Surviving Digital Forensics series. This class is focused on helping...
Ratings: 4.53/5.00 Lectures: 18 Subscribers: 540
Neste curso você aprenderá:Regras que regem a comunicaçãoO que é um protocolo de redes de computa...
Ratings: 4.34/5.00 Lectures: 24 Subscribers: 540
SSH Es la herramienta más utilizada por todos los administradores de sistemas Linux para poder gesti...
Ratings: 4.61/5.00 Lectures: 25 Subscribers: 539
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledg...
Ratings: 4.40/5.00 Lectures: 85 Subscribers: 539
This course will help professionals to implement Splunk Enterprise into their organizations’ environ...
Ratings: 3.81/5.00 Lectures: 27 Subscribers: 539
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Pr...
Ratings: 4.57/5.00 Lectures: 85 Subscribers: 538
Starting by a complete clarification for the DNS System going through the Recursion and the resoluti...
Ratings: 3.06/5.00 Lectures: 26 Subscribers: 538
Kegiatan penetration testing (pentest) adalah melakukan penetrasi kedalam jaringan ataupun sistem op...
Ratings: 4.82/5.00 Lectures: 13 Subscribers: 535
Pada kursus ini, kita akan belajar mulai dari sangat dasar sampai kamu bisa kerja menjadi Network En...
Ratings: 4.83/5.00 Lectures: 25 Subscribers: 531
Squid proxy server is used for internet sharing. It is one of the most widely used, very robust and...
Ratings: 4.57/5.00 Lectures: 37 Subscribers: 531
Le SIP est un protocole de signalisation pour la voix qui est implémenté dans la plupart des réseaux...
Ratings: 5.00/5.00 Lectures: 8 Subscribers: 530
这门课可以让你成为使用最强大和灵活的网络扫描工具Nmap的专家。你将从头开始学习直到完全会使用它。本课程...
Ratings: 4.80/5.00 Lectures: 54 Subscribers: 530
In this comprehensive course, you will learn how to implement Cisco IOS XR Segment Routing (SR/SR-TE...
Ratings: 4.86/5.00 Lectures: 68 Subscribers: 527
Como muitas das ameaças direcionadas a corporações, a intrusão pode começar com um e-mail. Por esse...
Ratings: 4.70/5.00 Lectures: 107 Subscribers: 527