دسته: موسسه های دیگر

The course includes hands on demonstrations using both Cumulus VX and physical switches. The best part is you can practice using GNS3 and Cumulus VX locally on your laptop. Cumulus Linux combines the power of Open Networking with a network operating system that runs on top of industry standard networking hardware from vendors such as Dell, HP, Quanta and others. Founded by veteran networking engineers from Cisco and VMware, Cumulus Networks makes the first Linux operating system for networking hardware and fills a critical gap in realizing the true promise of the software-defined data center. Just as Linux completely transformed the economics and innovation on the server side of the data center, Cumulus Linux is doing the same for the network. It is radically reducing the costs and complexities of operating modern data center networks for service providers and businesses of all sizes.

ادامه مطلب

Learn how to hack web applications, automate your exploits in python and defend web applications against real world attacks! For each vulnerability type, we dive into the technical details and then gain hands-on experience by solving labs that model real-world vulnerabilities.

ادامه مطلب

Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course is your complete study toolkit to get exam ready for the RHCSA RHEL 9 exam. This course is also a great resource for anyone who wants to enhance their Linux skills to grow their career. Expert trainer and author Sander van Vugt provides topic-focused coverage of all objectives in the exam, drilling down on important concepts like Bash Shell, storage, containers, and advanced system administration tasks. You will also get real-world labs in each lesson so you can practice your skills; along with video solutions so you can assess your progress as you move through the course. The course ends with a practice exam so you can fully prepare for the test day.

ادامه مطلب

Mastering Windows Forensics empowers cybersecurity professionals and digital investigators to uncover compelling evidence on Windows systems. Curated by Grzegorz Tworek, this course delivers targeted instruction on interpreting attack vectors, enhancing forensic analysis, and strengthening endpoint defenses—making it ideal for learners eager to go beyond surface-level insights and take their forensic skills to the next level.

ادامه مطلب

In cybersecurity, most training only scratches the surface—teaching which buttons to press, but not whywhen, or how to adapt when the situation changes. This leaves a critical gap between basic tool familiarity and the deep operational mastery required for real-world engagements. Solo Purple Teaming closes that gap. It trains you to think and operate as both an attacker and a defender, where your limits aren’t dictated by step-by-step lab manuals, but by your creativity, problem-solving skills, and willingness to push beyond your comfort zone and explore new tactics.

ادامه مطلب

Throughout this hands-on learning experience, you’ll delve into the core principles of SIP, building a robust foundation for SIP and VoIP development. Kamailio, renowned for its versatility as a SIP proxy, will be our guiding tool as we navigate through the intricacies of SIP traffic management. From configuring Kamailio to seamlessly handle SIP requests to integrating RTP Engine for optimal media stream handling, you’ll acquire practical skills essential for modern VoIP infrastructure.

ادامه مطلب