Network Engineer ေတြ၊ System Admin၊ NOC နဲ ့network/system ေလ့လာလိုက္စားသူတို ့အဖို ့ ေအာက္ Free Network Monitoring Tools ေတြ ကို သိထားသင့္ ေလ့လာထားသင့္ပါတယ္။
1. Microsoft Network Monitor
2. Nagios
3. OpenNMS
4. Advanced IP Scanner
5. Capsa Free
6. Fiddler
7. NetworkMiner
8. Pandora FMS
9. Zenoss Core
10. PRTG Network Monitor Freeware
11. The Dude
12 Splunk
13. Angry IP Scanner
14 Icinga 2
15. Total Network Monitor
16. NetXMS
17. Xymon
18. WirelessNetView
19. Xirrus Wi-Fi Inspector
20. WireShark
From
http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/
IT, Networking , Server ႏွင့္ပတ္သက္သည္မ်ားကို တစ္ေနရာတည္းတြင္ေလ့လာႏိုင္ေအာင္စုစည္းေပးထားပါသည္။
Sunday, October 30, 2016
Saturday, October 29, 2016
Ubuntu Installing, administering, and maintaining Ubuntu Server
Course Outline
1.
Ubuntu Server Course Introduction
(2 min)
2.
Ubuntu's Unique Underbelly
(16 min)
|
3.
Hard Drives & Partitions
(31 min)
|
4.
The Installation Process
(31 min)
|
5.
Initial Setup Considerations
(30 min)
|
6.
Package Management
(30 min)
|
7.
Networking!
(22 min)
|
8.
Udev and Upstart and UFW, Oh My...
(27 min)
|
9.
Services: DNS & DHCP
(30 min)
|
10.
Services: Web & Databases
(28 min)
|
11.
Services: Mail & POP3/IMAP
(30 min)
|
12.
Services: File & Print
(37 min)
|
13.
Services: SSH
(36 min)
|
14.
Services: LTSP
(19 min)
|
15.
Security
(25 min)
|
16.
Monitoring
(29 min)
|
17.
Virtualization
(19 min)
|
18.
Clouds & Containers
(24 min)
|
19.
Recovery Tools
(21 min)
|
20.
Getting Help!
(20 min)
Download Link
Copyright Policy
|
Linux LPI LPIC-2: Exam 201
Course Outline
1.
Intro
(1 min)
2.
Monitor CPU & Memory Usage
(15 min)
|
3.
Monitor Disk I/O
(15 min)
|
4.
Monitoring Network I/O
(12 min)
|
5.
Measuring Bandwidth
(9 min)
|
6.
Monitoring Data Trends
(7 min)
|
7.
Kernel Components
(10 min)
|
8.
Manipulating Kernel Modules
(15 min)
|
9.
Kernel Automation and Configuration
(15 min)
|
10.
Custom Kernel Compile: The Tools
(9 min)
|
11.
Custom Kernel Compile: Compilation and Installation
(19 min)
|
12.
SystemV Runlevels
(9 min)
|
13.
SystemV Init Scripts
(15 min)
|
14.
Upstart
(8 min)
|
15.
Systemd
(7 min)
|
16.
Recovering Legacy GRUB Installation
(7 min)
|
17.
GRUB2 Recovery
(8 min)
|
18.
Alternate Boot Loaders
(9 min)
|
19.
PXE Bootloader
(10 min)
|
20.
Managing Linux Swap
(8 min)
|
21.
Permanently Mounting Partitions
(14 min)
|
22.
Maintaining EXT Filesystems
(13 min)
|
23.
Fixing Corrupt EXT Filesystems
(10 min)
|
24.
XFS Filesystems
(6 min)
|
25.
S.M.A.R.T.
(11 min)
|
26.
AutoFS
(10 min)
|
27.
CDROM Filesystems
(9 min)
|
28.
Using RAID
(15 min)
|
29.
Tuning Hard Drives
(14 min)
|
30.
iSCSI
(17 min)
|
31.
LVM
(13 min)
|
32.
Configuring a Wired Network Device
(9 min)
|
33.
Configuring Wireless Network Devices
(6 min)
|
34.
Network Troubleshooting
(12 min)
|
35.
Compile and Install from Source
(8 min)
|
36.
Backing Up Servers
(11 min)
|
37.
System Notifications
(8 min)
Download Link
Copyright Policy
|
LPI Linux LPIC-1 101 and CompTIA Linux+Full Notes
Subtitle ပါ တြဲျပီးထည့္ထားပါတယ္။ Linux + exam အတြက္ အမ်ားၾကီး အေထာက္အကူျပဳမွာပါ။
Course Outline
Course Outline
1.
LPIC1 & CompTIA Linux+ Intro
(2 min)
2.
Hardware Settings
(34 min)
|
3.
Boot the System
(15 min)
|
4.
Change Runlevels and Reboot or Shutdown the System
(29 min)
|
5.
Design Hard Disk Layout
(20 min)
|
6.
Install a Boot Manager
(19 min)
|
7.
Manage Shared Libraries
(8 min)
|
8.
Debian Package Management
(25 min)
|
9.
RPM & YUM Package Management
(23 min)
|
10.
Work on the Command Line
(24 min)
|
11.
Process Text Streams Using Filters
(49 min)
|
12.
Perform Basic File Management
(58 min)
|
13.
Use Streams, Pipes, and Redirects
(19 min)
|
14.
Create, Monitor, and Kill Processes
(22 min)
|
15.
Process Priorities
(22 min)
|
16.
Search Text Files with Regular Expressions
(22 min)
|
17.
Perform Basic File Editing Operations Using vi
(25 min)
|
18.
Create Partitions and Filesystems
(22 min)
|
19.
Maintain the Integrity of Filesystems
(36 min)
|
20.
Control Mounting and Unmounting of Filesystems
(16 min)
|
21.
Manage Disk Quotas
(16 min)
|
22.
Manage File Permissions and Ownership
(50 min)
|
23.
Create and Change Hard and Symbolic Links
(15 min)
|
24.
Find System Files and Place Files in the Correct Location
(21 min)
Download Link
Copyright Policy
|
Transcript -2 For Video Training
Blog မွာ တင္ထားတဲ ့CCNP Video Training ေတြ အတြက္ Subtitle ေတြပါ။ အဲဒီ subtitle ေတြထဲ မွာ Time နဲ ့ခ်ိန္ျပီး တြဲျပီးၾကည့္ပါ။
Cisco CCNP ROUTE 300101 Handson Labs Exam Prep
Cisco CCNP RoutingSwitching 300101 ROUTE
Cisco CCNP RoutingSwitching 300115 SWITCH
Cisco CCNP RoutingSwitching 300135 TSHOOT
Cisco CCNP SWITCH 300115 Handson Labs Exam Prep
Cisco CCNP TSHOOT 300135 Handson Labs
Download Link
http://pc.cd/W2FotalK
Cisco CCNP ROUTE 300101 Handson Labs Exam Prep
Cisco CCNP RoutingSwitching 300101 ROUTE
Cisco CCNP RoutingSwitching 300115 SWITCH
Cisco CCNP RoutingSwitching 300135 TSHOOT
Cisco CCNP SWITCH 300115 Handson Labs Exam Prep
Cisco CCNP TSHOOT 300135 Handson Labs
Download Link
http://pc.cd/W2FotalK
Tuesday, October 25, 2016
Microsoft Windows Server 2012 70-412
Course Outline
1.
Course Introduction
(20 min)
2.
Configuring Network Load Balancing (NLB)
(45 min)
|
3.
Configuring Failover Clustering
(57 min)
|
4.
Managing Virtual Machine Movement
(45 min)
|
5.
Configuring and Optimizing Storage
(39 min)
|
6.
Configuring Advanced File Services
(45 min)
|
7.
Implementing Dynamic Access Control
(45 min)
|
8.
Configuring and Managing Backups
(46 min)
|
9.
Recovering Servers
(30 min)
|
10.
Implementing an Advanced DHCP Solution
(44 min)
|
11.
Implementing an Advanced DNS Solution
(37 min)
|
12.
Deploying and Managing IPAM
(35 min)
|
13.
Configuring Active Directory Forests and Domains
(38 min)
|
14.
Configuring Trust Relationships
(32 min)
|
15.
Administering Active Directory Sites
(38 min)
|
16.
Managing Active Directory and SYSVOL Replication
(40 min)
|
17.
Configuring AD CS: Planning and Implementation
(43 min)
|
18.
Configuring AD CS: Day-to-Day Administration
(44 min)
|
19.
Configuring AD RMS
(44 min)
|
20.
Implementing AD FS
(30 min)
Copyright Policy
|
EC Council Certified Ethical Hacker v9.0
Course Outline
1.
Welcome
(4 min)
2.
Building a LAB: Concepts
(6 min)
|
3.
Building a LAB: Networking
(9 min)
|
4.
Deploy a Kali Linux VM
(14 min)
|
5.
Adding Metasploitable to Your Lab
(11 min)
|
6.
Adding Windows to Your Lab
(14 min)
|
7.
Configure a Static IP on Kali
(5 min)
|
8.
Windows Evaluations
(7 min)
|
9.
Deploy Windows 8.1
(15 min)
|
10.
Deploy Windows 2012
(11 min)
|
11.
Deploy Windows 10
(7 min)
|
12.
Deploy Windows 2016
(7 min)
|
13.
Ethics and Hacking
(10 min)
|
14.
Hacking Vocabulary
(6 min)
|
15.
InfoSec Concepts
(5 min)
|
16.
Attack Categories, Types, and Vectors
(5 min)
|
17.
Five Phases of Hacking
(5 min)
|
18.
Footprinting and Reconnaissance Concepts
(11 min)
|
19.
Search Engine Tools
(8 min)
|
20.
Hacking using Google
(12 min)
|
21.
Website Recon Tools
(13 min)
|
22.
Metagoofil Metadata Tool
(3 min)
|
23.
Email Headers for Footprinting
(5 min)
|
24.
Using WHOIS for Recon
(4 min)
|
25.
DNS Tools
(12 min)
|
26.
Network Scanning Overview
(3 min)
|
27.
Network Scanning Methodology
(9 min)
|
28.
Port Discovery
(11 min)
|
29.
Network Scanning Tools
(3 min)
|
30.
Stealth Idle Scanning
(10 min)
|
31.
OS and Application Fingerprinting
(10 min)
|
32.
Vulnerability Scanning
(8 min)
|
33.
Network Mapping Tools
(5 min)
|
34.
Proxy Servers
(8 min)
|
35.
Using Public Proxy Services
(6 min)
|
36.
Enumeration Concepts
(5 min)
|
37.
NetBIOS Enumeration
(11 min)
|
38.
SNMP Enumeration Concepts
(10 min)
|
39.
SNMP Enumeration Tools
(10 min)
|
40.
LDAP Enumeration Concepts
(5 min)
|
41.
LDAP Enumeration Example
(7 min)
|
42.
NTP Enumeration
(7 min)
|
43.
SMTP Enumeration
(8 min)
|
44.
System Hacking Overview
(9 min)
|
45.
Password Cracking Concepts
(10 min)
|
46.
Password Attack Example: MITM and Sniffing
(13 min)
|
47.
Rainbow Crack Lab Setup
(8 min)
|
48.
Rainbow Crack Demonstration
(8 min)
|
49.
Password Reset Hacking
(8 min)
|
50.
DHCP Starvation
(10 min)
|
51.
Remote Access
(15 min)
|
52.
Spyware
(9 min)
|
53.
NTFS Alternate Data Streams Exploit
(9 min)
|
54.
Steganography with OpenPuff
(7 min)
|
55.
Steganography with SNOW
(5 min)
|
56.
Covering Tracks
(7 min)
|
57.
Malware Overview
(10 min)
|
58.
Trojan Overview
(10 min)
|
59.
Creating a Trojan
(11 min)
|
60.
Virus Overview
(13 min)
|
61.
Virus Creation
(8 min)
|
62.
Detecting Malware
(17 min)
|
63.
Malware Analysis
(10 min)
|
64.
Hash File Verification
(8 min)
|
65.
Sniffing Overview
(12 min)
|
66.
CAM Table Attack and Port Security
(10 min)
|
67.
DHCP Snooping
(14 min)
|
68.
Dynamic ARP Inspection (DAI)
(14 min)
|
69.
Social Engineering
(15 min)
|
70.
Denial of Service (DoS) Attacks
(19 min)
|
71.
Session Hijacking
(18 min)
|
72.
Hacking Web Servers
(10 min)
|
73.
Buffer Overflow
(13 min)
|
74.
OWASP Broken Web Application Project
(13 min)
|
75.
Shellshock
(6 min)
|
76.
SQL Introduction
(9 min)
|
77.
SQL Injection
(16 min)
|
78.
Web App Vulnerabilities: WordPress
(10 min)
|
79.
Wireless Hacking
(18 min)
|
80.
Using an Android VM
(4 min)
|
81.
Malware for Mobile
(11 min)
|
82.
Mobile Device Risks and Best Practices
(13 min)
|
83.
Firewall Evasion
(19 min)
|
84.
Firewall ACL Example
(15 min)
|
85.
NAT and PAT fundamentals
(11 min)
|
86.
IDS/IPS Evasion
(17 min)
|
87.
Honeypots
(12 min)
|
88.
Cloud Computing
(23 min)
|
89.
CIA: Confidentiality, Integrity, and Availability
(3 min)
|
90.
Policies
(9 min)
|
91.
Quantifying Risk
(6 min)
|
92.
Separation of Duties
(13 min)
|
93.
Symmetrical Encryption Concepts
(14 min)
|
94.
Asymmetrical Encryption Concepts
(16 min)
|
95.
Control Types
(11 min)
|
96.
Multifactor Authentication
(12 min)
|
97.
Centralized Identity Management
(13 min)
|
98.
Kerberos and Single Sign On (SSO)
(17 min)
|
99.
Backups and Media Management
(9 min)
|
100.
Operations Security Controls
(14 min)
|
101.
Physical Security Controls
(11 min)
|
102.
Incident Response
(12 min)
|
103.
VPNs
(21 min)
|
104.
Disaster Recovery Planning
(13 min)
|
105.
Pen Testing Tips
(10 min)
|
106.
Useful Tools
(11 min)
|
107.
Case Study
(21 min)
|
108.
Additional Resources and Exam Prep
(8 min)
Download Link
Copyright Policy
|
Subscribe to:
Posts (Atom)