Dell Canada Inc Dell Canada Inc Dell Canada Inc Dell Canada Inc Dell Canada Inc

Thursday, September 18, 2008

Oracle Certifications (Newbies)


Oracle is a leading provider of Relational Database Management (RDBMS) solutions to organizations worldwide. Oracle Database 11g is Oracle’s largest introduction of new functionality and is Oracle’s most innovative release, leading the database industry into new ground in clustering, automation, high availability and more. Oracle Database 11g extends Oracle's unique ability to deliver the benefits of grid computing with more self-management and automation. Oracle Database 11g Administrator Certification combines training, experience, and testing to ensure that you have a strong foundation and expertise in the industry’s most advanced database management system.

Benefits of Oracle Certifications


Oracle certifications demonstrates a solid understanding of the skills required for a given job role related to Oracle technologies. 
An Oracle certified professional gets more opportunity for career growth and higher pay.
An Oracle certified professional can use the Oracle Certified Professional logo for endorsement of his skills. 
Oracle certified professionals have access to technical and other information from the OCP members-only web site. 
Oracle certified professionals get special discounts and offers from selected companies.

Oracle Certifications
In Database Oracle offers three levels of certifications 
Associate (Oracle 11g DBA OCA)
Professional (Oracle 11g DBA OCP)
Master (Oracle 11g DBA OCM)


In Middleware Oracle Offers two level of certifications 
Associate (Oracle 10g AS Administrator OCA) 
Professional (Oracle 10g AS Administrator OCP)




In Linux Oracle offers Specialization Expert (Oracle 10g: Managing Oracle on Linux Certified Expert)

Novell Certifications (Newbies)


Novell Inc. is an American software corporation specializing in network operating systems such as Novell NetWare and SUSE Linux, secure identity management products, and application integration and collaboration solutions. Novell is one of the first computer companies to provide certification to its products. Novell Certifications identify a specific skill set and provide an employment edge for individuals entering the computer and networking industries.

Benefits of Novell Certifications
With Novell Certification, you will be equipped with the skills to perform technical tasks such as:
Integrating diverse network clients
Designing an internetwork using TCP/IP protocol
Changing a LAN to an intranet
Centrally distributing software upgrades to servers and clients
Using a protocol analyzer to troubleshoot network problems
Configuring and troubleshooting printing in a complex multi-platform printing environment
Designing, analyzing, and integrating a Novell Directory Services implementation

Novell Certifications

Following are the Novell certifications, which used to be known as NetWare Certifications.

CNA (Certified Novell Administrator): CNA Certification indicates that an individual has the skills and knowledge needed to handle the day-to-day administration of an installed Novell networking product such as NetWare 5.X or GroupWise. CNAs are certified by Novell to provide on-site administrative support for software users in a variety of work environments, including professional offices and small business workgroups, departments, and corporate information services (IS). There are two learning paths for the CNA certification i.e. 1) Novell Open Enterprise Server for NetWare and 2) NetWare 6

CNE (Certified Novell Engineer): CNE Certification, which is more advanced than CNA Certification, qualifies an individual to manage network environments and solve company-wide support problems. There are two learning paths for CNE certification i.e. 1)Novell Open Enterprise Server for NetWare 2) NetWare 6

CDE (Certified Directory Engineer): CDE Certification provides a standard level of training in directory services technologies across all platforms.

CNI (Certified Novell Instructor): CNI certification indicates that an individual is qualified to teach authorized Novell Certification courses. To ensure that Novell official curriculum is taught by the best technical trainers in the industry, Novell Training Services has set the following requirements for participating as a CNI: 1) Technical requirement (complete one of the following): NetWare CNE (OES for NetWare or NetWare 6 or Novell CLP (10 or 9). 2) Didactical requirement (complete one of the following): Novell Instructor Performance Evaluation (IPE), CTT+, RHCX or MCT. Please fax a copy of the non-Novell certificates listed previously to 801.861.3900, Attn: CNI requirements or send it as a scanned image to eddata@novell.com 3) CNI Application: Found in the Certification Database. In order to sign the CNI agreement you must first complete one of the technical requirements listed above.

CLE (Certified Linux Engineer): There are two learning paths for the Novell CLE certification i.e. 1) Novell Certified Linux Engineer 10 2) Novell Certified Linux Engineer 9

CLP (Certified Linux Professional): There are two learning paths for the Novell CLP certification i.e. 1) Novell Certified Linux Professional 10, based on SUSE Linux Enterprise Server 10 2) Novell Certified Linux Professional, based on SUSE Linux Enterprise Server 9

NAI (Novell Academic Instructor): In order to become an NAI, please complete the following steps in order:
1) Course Authorization: Earn a minimum of one Course authorization before applying to be an NAI. Review the Course Authorization Chart to confirm course authorization requirements. 2) Academic Employment: Be employed by or contract with a Novell Academic Training Partner. Once you have verified your school's partner status, e-mail your Silver PartnerNet number to eddata@novell.com 3) NAI Application: To access the NAI application, please login to the Certification Database via Novell Login. Then on left navigator select Tools; complete agreement/application; submit NAI application. 4) Novell Training Services Certification Agreement: If you missed signing the agreement when you took your certification exam, you may sign it online

Adobe Certification



Adobe is a world leader in developing different type of graphic designing and authoring software. Graphic designers, Web designers, system integrators, and developers use the Adobe software worldwide. Adobe certification prove your expertise in Adobe products and provide the employers and clients a medium to recognize it. Adobe certifications are designed for students who design and produce print, web and video solutions using Adobe design software.

Benefits of Adobe Certifications   

For individuals: Getting Adobe certified gives you a powerful way to communicate your skills to the world. Whether you are a consultant, instructor, job seeker, or employee, Adobe certification is a strong validation of your knowledge. With an Adobe certification 
Leverage the power of the Adobe brand and resources
Differentiate yourself or your business
Get the inside track on Adobe’s latest offerings

For employers: If you are an employer looking to fill a position, simplify your search by looking for candidates who are Adobe certified. Using Adobe certification as a benchmark allows you to:
Find the right person for the job
Quickly assess candidate skill level
Increase productivity and efficiency

About Adobe Certifications

An Adobe Certified Expert (ACE) is a person who has demonstrated proficiency with one or more Adobe software products. ACE is a worldwide standard of excellence in Adobe software knowledge. To become an ACE, you must pass one or more product-specific proficiency exams and agree to the ACE terms and conditions. The exams are computer-delivered, closed-book tests consisting of 60 to 90 multiple-choice questions. Each exam takes approximately one to two hours to complete.

An Adobe Certified Instructor (ACI) is an ACE who has taken his or her skills to the next level, and provides instruction on Adobe products. In order to become an ACI, you must show you have an instructor qualification (a teaching credential, passed the CompTIA CTT+, or equivalent), and have passed one or more ACE exams.

There are three levels of Adobe certification.
Single product certification: Recognizes your proficiency in a single Adobe product. To qualify as an ACE/ACI, you must pass one product-specific exam. Example: ACE/ACI, Adobe InDesign® CS
 

Specialist certification: Recognizes your proficiency in a specific medium: Print, Web or Video. To become certified as a Specialist, you must pass the exams on the required products listed below. Example: ACE/ACI Print Specialist (with passing marks on the tests for Adobe InDesign, Adobe Acrobat®,and either Adobe Photoshop® or Adobe Illustrator®)

Master certification: Recognizes your skills in terms of how they align with the Adobe product suites. To become certified as a Master, you must pass the exam for each of the products in the suite. Example: ACE/ACI, Creative Suite Master (with passing marks on the tests for Adobe Acrobat, Adobe GoLive, Adobe Illustrator, Adobe InDesign, and Adobe Photshop)



Oracle Enterprise Manager Advanced Configuration 10g


DOWNLOAD HERE

OCP: Oracle 10g Administration II Study Guide (1Z0-043)


Here’s the book you need to prepare for the Oracle Database 10g Administration II exam, 1Z0-043. This Study Guide was developed to meet the exacting requirements of today’s Oracle certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the “Best Study Guide” selection in CertCities Readers’ Choice Awards for two consecutive years, this book provides:
Clear and concise information on advanced database administration with Oracle 10g
Practical examples and insights drawn from the authors’ real-world experiences
Leading-edge exam preparation software, including a test engine and electronic flashcards

You’ll also find authoritative coverage of key exam topics, including:
Configuring Recovery Manager
Understanding the Flashback Database
Recovering from User Errors
Working with Globalization Support
Using the Scheduler to Automate Tasks
Monitoring and Managing Storage
Securing the Oracle Listener

Look to Sybex for the knowledge and skills needed to succeed in today’s competitive IT marketplace.
Table of Contents

Introduction
Assessment Test

Chapter 1: Configuring Recovery Manager
Chapter 2: Using Recovery Manager
Chapter 3: Recovering From Non-Critical Losses
Chapter 4: Database Recovery
Chapter 5: Understanding the Flashback Database
Chapter 6: Recovering from User Errors
Chapter 7: Handling Block Corruption
Chapter 8: Understanding Automatic Database Management
Chapter 9: Understanding Automatic Storage Management
Chapter 10: Understanding Globalization Support
Chapter 11: Managing Resources
Chapter 12: Using the Scheduler to Automate Tasks
Chapter 13: Monitoring and Managing Storage
Chapter 14: Securing the Oracle Listener, Diagnostic Sources, and Memory
Glossary

MCSE 2003 Core Objectives Bundle Training


Title: MCSE 2003 Core Objectives Bundle
Author: Bill Ferguson/Certified Instructor
SKU: 33652
ISBN:
Release Date: 2005-10-06
Price: Single User: US$ 279.95
Duration: 34 hrs / 427 lessons
Compatibility: Win Vista, XP, 2000, 98SE, Mac OS X, OS 9, Linux
Work Files: No

Download:

http://rapidshare.com/files/143563725/VTC.70-270.www.network-ebooks.com.rar
http://rapidshare.com/files/143566467/VTC.70-290.www.network-ebooks.com.part1.rar
http://rapidshare.com/files/143568356/VTC.70-290.www.network-ebooks.com.part2.rar
http://rapidshare.com/files/143568801/VTC.70-290.www.network-ebooks.com.part3.rar
http://rapidshare.com/files/143570589/VTC.70-291.www.network-ebooks.com.part1.rar
http://rapidshare.com/files/143571174/VTC.70-291.www.network-ebooks.com.part2.rar
http://rapidshare.com/files/143573509/VTC.70-293.www.network-ebooks.com.part1.rar
http://rapidshare.com/files/143576066/VTC.70-293.www.network-ebooks.com.part2.rar
http://rapidshare.com/files/142992703/VTC.70-293.www.network-ebooks.com.part3.rar
http://rapidshare.com/files/142995649/VTC.70-293.www.network-ebooks.com.part4.rar
http://rapidshare.com/files/143560111/VTC.70-293.www.network-ebooks.com.part5.rar
http://rapidshare.com/files/143562449/VTC.70-294.www.network-ebooks.com.rar
http://rapidshare.com/files/143587669/VTC.70-297.www.network-ebooks.com.part1.rar
http://rapidshare.com/files/143589787/VTC.70-297.www.network-ebooks.com.part2.rar
http://rapidshare.com/files/143578942/VTC.70-297.www.network-ebooks.com.part3.rar
http://rapidshare.com/files/143581265/VTC.70-297.www.network-ebooks.com.part4.rar
http://rapidshare.com/files/143583385/VTC.70-298.www.network-ebooks.com.part1.rar
http://rapidshare.com/files/143584928/VTC.70-298.www.network-ebooks.com.part2.rar

Red Hat Certified Technician Tutorials


System & Service Initialization 
Understanding the Boot Process
Troubleshooting GRUB
Loading Kernels & Modules
Running the First Process & inittab
More on /etc/inittab
Controlling how Services Start
Shutdown & Reboot

Configuring Kernel Services & Modules 
Managing Modules
Configuring with /proc & sysctl.conf
Finding Detected Hardware
Controlling & Monitoring Processes

Managing Filesystems 
Partition Management
Creating Filesystems with Journals & More
Filesystem Attributes
Mounting in /etc/fstab
Automounting
Filesystem Management Commands

Configuring Network Devices 
Detecting Network Devices
Working with Network Status Commands
Running Network Configuration Commands
Deciphering Network Configuration Files - Lesson 1
Deciphering Network Configuration Files - Lesson 2
Network Client Tools (DHCP/route/DNS)

Package Management & Kickstart 
Understanding The Red Hat Package Manager
Understanding yum & Dependency Resolution
Correctly Upgrading Kernels
Using RPM Command Features
Setting up Kickstart

User Administration 
Creating New Users
Managing Password Aging
Using Login Shells
Managing Groups
Configuring a Special Group
Running sudo & su
Understanding Network User Databases
Managing File Permissions
Managing File Ownership
Understanding Access Control Lists
Troubleshooting Security Enhanced Linux

Printing & Administration Tools 
Understanding CUPS
Controlling cron & crontab
Making syslog help your Logs
Backing Up Locally & Remotely - Lesson 1
Backing Up Locally & Remotely - Lesson 2

The X Window System 
Understanding X Server/X Client Relationship
Using X Clients & Remote X Sessions
Configuring the X Window Graphically
Configuring X With Text Commands
Understanding the X Configuration File

Advanced Filesystem Management 
Configuring Software RAID
Recovering a Software RAID Volume
Creating Logical Volumes
Converting LVM1 to LVM2 & Resizing
Limiting Users by Quota

Troubleshooting 
Reviewing the Scientific Method
Troubleshooting the X Window
Troubleshooting Networking
Booting Differently
Using the Rescue Environment

Troubleshooting & System Maintenance 
Boot Systems Into Different Runlevels
Solve Network Configuration Problems
Work Through Hostname Resolution Problems
Set up the X Window
Configure a Desktop Environment
Add New Partitions/Filesystems & Swap
Troubleshooting at the Command Line

Installation & Configuration 
Install over a Network
Set up your own Partitions
Install & Configure Printers
Schedule Tasks Using cron & at
Connect to a Network Directory Service
Work with the Automounter
Users/Groups/Quotas & File Access Control Lists
Configuring Permissions for Collaboration
Install & Update RPMs
Properly Update the Kernel Package
Remote Repositories Using yum or pup
Modify the System Bootloader
Implement Software RAID
Managing Kernel Run-time Parameters
Scripting to Automate System Maintenance

DOWNLOAD

Part 1         Part 2

Exam-Pack 70-089: Planning, Deploying, and Managing Microsoft SMS 2003

                                              Microsoft Systems Management Server (SMS) 2003
                                                                             Includes 15 Videos

For network admins, Microsoft’s Systems Management Server (SMS) is one of those things that you don’t know you need until you get it… and then you can’t live without it.

SMS makes it easy to survey and inventory the software and hardware on your network. Then you can deploy and update software on client machines, offer remote assistance, monitor the health of your network, even install operating systems, and a whole lot more. And it all integrates with the Microsoft Windows Server 2003 infrastructure.

But it takes more than a snap of your fingers to get it all right. Previous versions of SMS had a reputation that it can be difficult to do things right, and sometimes it’s way too easy to do things wrong. While SMS 2003 is an improvement on what was there before, there’s still a learning curve to using SMS successfully. Lucky for you, this training shortens your learning curve tremendously.

Instructor Greg Shields has years of experience working with SMS, on every version since 2.0. He knows all the fundamentals plus the expert tips, tricks, and secrets to getting SMS to purr like a kitten.

In this series, Greg takes you through the same process you’ll follow from not having an SMS infrastructure up to having a fully-managed SMS infrastructure–including what you need to know along the way to get the biggest benefits from the core SMS components plus useful add-on feature packs.

Here’s what you’ll learn in the videos:
Get a quick overview of the reasons why SMS makes your life as a network admin easier, plus get a primer for what you’ll be expected to know on the SMS 2003 70-089 exam. (Video 1)
Planning is the most important aspect of your SMS installation–go through all the factors to consider before you even think about installation, including hardware and software requirements. Then install SMS to your Windows Server, walking along with Greg through the important installation decisions. Finally, make Active Directory ready for SMS by extending the schema. (Video 2)
Even once you’ve installed SMS you’re not quite ready to go. It’s time to configure site system roles, sites (including parent, child, primary, secondary, and central sites), boundaries, and roaming in SMS before you can actually get in and start working. (Video 3)
Configure SMS to discover fundamental information about everything connected to your network, using one or more of the seven types of discovery SMS allows. Plus understand the difference between discovery and inventory, and what types of information each gets you. (Video 4)
Install SMS clients to workstations on your network–know which types of clients to use, which functions are available from the different client agents, when and why to use the different installation executables that are available, and methods you can use to install clients across your network, plus interact with clients from your server once they are installed. (Video 5)
Learn exactly what hardware and software are installed on client machines by collecting custom inventory information. Then view this information, uncovering useful data such as which clients have a specific network adapter or un-patched version of software. Finally, configure metering and understand the difference between the information you get from metering and the information you get from inventory. (Video 6)
Make management of multiple clients easier by grouping clients into collections based on parameters you define–including defining collections in a way that they update automatically as your network resources change. Then use queries, reports, and dashboards to interact with, view, and share this information. (Video 7)
Learn the “art” of creating good software packages to distribute software to clients. Learn how packages, programs, and advertisements all factor in to getting the software installed on the client machines–and how they all work together in SMS to make software deployment extremely flexible. (Video 8)
Secure your SMS deployment using class and instance rights. Also, configure and use remote assistance to troubleshoot client computers from your desktop. (Video 9)
Control software updates and patching through SMS, including agent-based and agent-less patching tools, plus compliance-based patching processes. Then, set up software updates using the Security Update Inventory Tool (SUIT) and go through the four-step process of actually doing a software update: synching, scanning, patching, and reporting. (Video 10)
Keeping clients healthy may be the most difficult part of managing your SMS infrastructure. Understand client health, the client health service, and the client health database. Then install the client health tool, and use the ping and pulse tools to identify which clients are “healthy” and which clients are not–plus generate reports on client health network-wide. (Video 11)
Speed up the deployment of operating systems using the OSD feature pack. This video takes you through all the steps: create an image capture CD, capture an operating system image, create the image deployment CD, and then deploy the image. Plus, learn what actions you can take after the deployment to get the deployed system up and running as quick as possible. (Video 12)
Use SMS’s inventory and software deployment features on Windows Mobile devices, with the help up the Device Management Feature Pack (DMFP). (Video 13)
Maintain your SMS database to keep your infrastructure healthy using SQL commands and built-in tasks. Backup your data to protect against disaster, and understand the purpose of both the smsbkup.log and smsbkup.ctl files. If disaster strikes, learn how to restore a site using the Recovery Expert and the Site Repair Wizard. (Video 14)
Wrap up your SMS knowledge with miscellaneous topics you need to know, including which SMS logs and inboxes are important, understanding System Status and Status Message Queries, a review of SMS Toolkit 2 and some of the useful tools it contains, plus a final exam review to get you ready to certify your SMS skills. (Video 15)

On-the-job skills for Systems Management Server plus exam prep for MCP, MCSE

Exam-Pack 70-089: Planning, Deploying, and Managing Microsoft SMS 2003 shows you how to use SMS 2003 to make your job as a network admin easier. It also maps to exam objectives for Microsoft exam 70-089, which earns you Microsoft Certified Professional (MCP) certification on SMS 2003 and gives you elective credit toward Microsoft Certified Systems Engineer (MCSE) certification on Windows Server 2003.

Prerequisites

Experience with the Microsoft Windows operating system is recommended before viewing these videos. For in-depth instruction on using Microsoft Windows, check out Exam-Pack 70-270: Windows XP.

Exam-Pack 70-089: Planning, Deploying, and Managing Microsoft SMS 2003 contains:

- Introduction to SMS & the 70-089 Exam
- SMS Planning, Prerequisites, Installation, & Schema Extensions
- Roles, Sites, Boundaries, & Roaming
- Configuring Discovery & Discovering Resources
- SMS Clients & Client Installation
- Collecting Inventory & Metering Data (free video!)
- Collections, Querying & Reporting
- Distributing Software
- Applying Security & Implementing Remote Tools
- Managing Software Updates
- Monitoring Client Health
- Using the OSD Feature Pack
- Using the Device Management Feature Pack
- Backup, Recovery, & Database Maintenance Tasks
- SMS Logs, System Status, External Tools, & Exam Review
Video Technical Specifications

1. Introduction to SMS & the 70-089 Exam - This nugget introduces the 70-089 exam, where it fits in with other components of Microsoft certification, and the topics to discuss to prepare the observer for the SMS exam.

2. SMS Planning, Prerequisites, Installation, & Schema Extensions - Discusses the planning, prerequisites, installation, and Active Directory schema extensions necessary for SMS installation. Includes an SMS installation and schema extension demonstration.

3. Roles, Sites, Boundaries, & Roaming - Discusses SMS roles, SMS sites, SMS boundaries, and SMS client roaming. Configuring SMS site components like parent, child, primary, secondary, and child sites. Creating secondary sites, sender addresses, site boundaries, and roaming boundaries.

4. Configuring Discovery & Discovering Resources - Configuring SMS discovery and discussing the difference between discovery and inventory information. The concept of the SMS GUID and DDR are discussed. Types of discovery like windows user account discovery, windows user group discovery, network discovery, heartbeat discovery, AD system discovery, AD user discovery, and AD system group discovery.

5. SMS Clients & Client Installation - Types of clients and client agents are discussed. SMS installation executables and installation methods. Five client agents like Advertised Programs, Hardware Inventory, Software Inventory, Remote Tools, and Software Metering.

6. Collecting Inventory & Metering Data - Configuring inventory and viewing inventory. Customizing inventory with IDMIF and NOIDMIF files as well as the SMS_DEF.MOF file. SMS Metering is discussed and SMS metering reporting.

7. Collections, Querying & Reporting - SMS Collections, SMS Querying, and SMS Reporting are discussed. Using direct membership and query membership for collections. Creating custom queries using SQL queries and WQL queries. Creating SMS reports and SMS dashboards.

8. Distributing Software - Distributing software and creating software packages. Discussing the software packaging process. SMS packages, SMS distribution points, SMS advertisements are all discussed.

9. Applying Security & Implementing Remote Tools - SMS Security and SMS remote tools are discussed. Windows security vs. SMS security. Creating class rights and creating instance rights. Configuring remote tools and remote assistance settings.

10. Managing Software Updates - Managing software updates and software patching process. Agent-based vs. agentless patching tools. Compliance-based patching processes. Setting up SUIT feature pack, downloading inventory scanning programs, synchronizing mssecure.cab and its compressed mssecure.xml file to update.microsoft.com. Completing client patch scans and pushing patches to clients.

11. Monitoring Client Health - Monitoring client health using Client Health Monitoring Tool. Installing the client health tool. Discussing healthy client, unhealthy client, offline client, obsolete client, and suspected unhealthy client, ping tool, and pulse tool. Reporting using Client Health Summary Report and Client Health Pivot Table Report.

12. Using the OSD Feature Pack - Operating System Deployment Feature Pack. Creating an image capture CD, capturing an operating system image. Creating an image deployment CD. Deploying an operating system image. Deployment actions. Using sysprep and Windows PE. Discussing actions and phases.

13. Using the Device Management Feature Pack - Using the Device Management Feature Pack to manage Windows Mobile, Windows CE, Windows Mobile for Pocket PC solid-state devices. Discussing Device Client Agent and Device Management Point. Distributing software and configurations using the Device Settings Manager.

14. Backup, Recovery, & Database Maintenance Tasks - SMS Backup, SMS Recovery, and SMS SQL database maintenance tasks. Discussing site maintenance, SQL commands, and SQL tasks. SMS site backup and the smsbkup.log and smsbkup.ctl backup control file. Site restore using the Recovery Expert and Site Repair Wizard.

15. SMS Logs, System Status, External Tools, & Exam Review - SMS Logs, SMS System Status Summarizers, SMS Toolkit 2, and 70-089 exam review. Discussion of SMS logs and SMS inboxes. Discussion of System Status and Status Message Queries

DOWNLOAD

Part 1             Part2

The Real MCITP Exam 70-647 Prep Kit Windows Server 2008 Enterprise Administrator


Configuring Network Access, Configure Remote Access, Configure Network Access Protection (NAP) components, Configure Network Authentication, Configure data transmission protocols, Configure wireless access, Configure certificate services, Configure DHCP, Configure IPv4 and IPv6 addressing, Configure routing

Configuring the Domain Name System (DNS), Configure zones, Configure zone resolution, Configure DNS client settings, Configure DHCP and WINS for DNS

Deploying Servers, Configure Windows Deployment Services (WDS), Capture WDS images, Deploy WDS images, Configure Windows activation, Create virtual machines, Configure Virtual Server settings, Install Windows Server Enterprise, Install server core

Configuring Server Roles, Implement server roles by using Server Manager, Configure ADLDS, Configure ADRMS, Configure the AD server core, Configure the read-only domain controller (RODC), Configure AD Certificate Services and PKI, Configure Active Directory Federation Services (ADFS)

Maintaining the Active Directory Environment, Configure backup and recovery, Perform offline maintenance, Configure custom application directory partitions, Configure AD DS auditing, Configure audit policy by using GPOs, Monitor Active Directory

Configuring the Active Directory Infrastructure, Configure communication security for Active Directory, Configure authentication

DOWNLOAD HERE

The Real MCTS/MCITP Exam 70-643 Prep Kit


                                                       Table of Contents

Configuring Network Access, Configure Remote Access, Configure Network Access Protection (NAP) components, Configure Network Authentication, Configure data transmission protocols, Configure wireless access, Configure certificate services, Configure DHCP, Configure IPv4 and IPv6 addressing, Configure routing

Configuring the Domain Name System (DNS), Configure zones, Configure zone resolution, Configure DNS client settings, Configure DHCP and WINS for DNS

Deploying Servers, Configure Windows Deployment Services (WDS), Capture WDS images, Deploy WDS images, Configure Windows activation, Create virtual machines, Configure Virtual Server settings, Install Windows Server Enterprise, Install server core

Configuring Server Roles, Implement server roles by using Server Manager, Configure ADLDS, Configure ADRMS, Configure the AD server core, Configure the read-only domain controller (RODC), Configure AD Certificate Services and PKI, Configure Active Directory Federation Services (ADFS)

Maintaining the Active Directory Environment, Configure backup and recovery, Perform offline maintenance, Configure custom application directory partitions, Configure AD DS auditing, Configure audit policy by using GPOs, Monitor Active Directory

Configuring the Active Directory Infrastructure, Configure communication security for Active Directory, Configure authentication

DOWNLOAD HERE

The Real MCTS/MCITP Exam 70-642 Prep Kit


                                                     Table of Contents

Configuring Network Access, Configure Remote Access, Configure Network Access Protection (NAP) components, Configure Network Authentication, Configure data transmission protocols, Configure wireless access, Configure certificate services, Configure DHCP, Configure IPv4 and IPv6 addressing, Configure routing

Configuring the Domain Name System (DNS), Configure zones, Configure zone resolution, Configure DNS client settings, Configure DHCP and WINS for DNS

Deploying Servers, Configure Windows Deployment Services (WDS), Capture WDS images, Deploy WDS images, Configure Windows activation, Create virtual machines, Configure Virtual Server settings, Install Windows Server Enterprise, Install server core

Configuring Server Roles, Implement server roles by using Server Manager, Configure ADLDS, Configure ADRMS, Configure the AD server core, Configure the read-only domain controller (RODC), Configure AD Certificate Services and PKI, Configure Active Directory Federation Services (ADFS)

Maintaining the Active Directory Environment, Configure backup and recovery, Perform offline maintenance, Configure custom application directory partitions, Configure AD DS auditing, Configure audit policy by using GPOs, Monitor Active Directory

Configuring the Active Directory Infrastructure, Configure communication security for Active Directory, Configure authentication

Download HERE

The Real MCTS/MCITP Exam 70-640 Prep Kit


                                                        Table of Contents

Configuring Network Access, Configure Remote Access, Configure Network Access Protection (NAP) components, Configure Network Authentication, Configure data transmission protocols, Configure wireless access, Configure certificate services, Configure DHCP, Configure IPv4 and IPv6 addressing, Configure routing

Configuring the Domain Name System (DNS), Configure zones, Configure zone resolution, Configure DNS client settings, Configure DHCP and WINS for DNS

Deploying Servers, Configure Windows Deployment Services (WDS), Capture WDS images, Deploy WDS images, Configure Windows activation, Create virtual machines, Configure Virtual Server settings, Install Windows Server Enterprise, Install server core

Configuring Server Roles, Implement server roles by using Server Manager, Configure ADLDS, Configure ADRMS, Configure the AD server core, Configure the read-only domain controller (RODC), Configure AD Certificate Services and PKI, Configure Active Directory Federation Services (ADFS)

Maintaining the Active Directory Environment, Configure backup and recovery, Perform offline maintenance, Configure custom application directory partitions, Configure AD DS auditing, Configure audit policy by using GPOs, Monitor Active Directory

Configuring the Active Directory Infrastructure, Configure communication security for Active Directory, Configure authentication

Download HERE

Wednesday, September 17, 2008

Exam-Pack 70-547: .NET 2.0 Web Application Design

Includes 20 Videos

Isn’t it time you boosted your specialist skills to the next level? This is the one exam beyond MCTS that you need to turn youself into a Microsoft Certified Professional Developer (MCPD).

It’s no secret that Web application development is a booming industry. After all, data-driven traffic and multimedia are everywhere on the Internet these days and each requires significant customization.

The big secret is that painstaking design lies behind all successful Web app development. Garth Schulte’s .NET 2.0 video series shows you how to design terrific Web applications step by step without knocking yourself out.

With his help your Web apps will become powerful business successes. Ones that both you and your boss will be proud of.

Aspiring programmers at every skill level will glean valuable information from this training series. Garth’s demonstrations and sample applications make learning .NET simple and enjoyable.

Dynamic Web Development Tools
In this powerful series, Garth shows you how monitoring and logging improve performance. He explains how to analyze data and evaluate existing controls and user environments. And he introduces you to evaluation-testing strategies, such as:
unit testing
integration testing
load, stress & performance testing

Garth’s instruction removes the confusion from application design. You’ll learn when to keep your design blueprints simple and when to make them complex.

Soon, you’ll be designing Web applications that serve everyone’s best interests. Your business partners will see their visions come to life. Your users will experience a trouble-free Web interface. And you’ll appreciate the internal consistency and ease it brings to your programming.

This training teaches you the skills needed to pass the .NET certification exams and become an MCPD — while you’re getting a job as a .NET programmer or advancing in your current position. Once you’ve mastered programming in the .NET world, you can master anything.

Contents: .NET 2.0 Web Application Design Series - Exam-Pack: 70-547
Intro to Designing and Developing Web-based Applications
Defining Application Requirements
Defining Application Specifications I
Defining Application Specifications II
Evaluating the Application Design
Designing User Interfaces
Evaluating and Designing Controls
Evaluating Data Validation and User Assistance Mechanisms
Designing and Developing Multimedia Delivery
Designing Components
Developing Components I (free video!)
Developing Components II
Creating and Consuming Reusable Components
Designing the Application Logic Layer
Logging and Monitoring
Application Configuration
Designing a Testing Strategy
Implementing Development Tests
Deploying Applications

Supporting Applications

DOWNLOAD

PART 1   PART 2      PART 3

 PART 4  PART 5    PART 6             

PART 7


VTC Ethical Hacking & Penetration Testing


Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing.

Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Duration: 7 hrs / 82 lessons
Compatibility: Win Vista, XP, 2000, Mac OS X, Linux

Introduction 
Course Overview (04:54)
Ethical Hacking & Penetration Testing 
What is Ethical Hacking? (04:58)
Types of Ethical Hacking (05:31)
Responsibilities of the Ethical Hacker (03:12)
Customer Expectations (04:04)
Skills of the Hacker (04:16)
Relevant Laws (04:54)
Preparation (04:46)
Types of Attacks (02:12)
Methodology Overview 
Your Goals (02:34)
Reconnaissance [passive, active] (05:11)
Scanning (03:42)
Service Enumeration (03:05)
Vulnerability Assessment (03:35)
Vulnerability Exploitation (02:52)
Penetration & Access (03:24)
Privilege Escalation & Owning the Box (02:40)
Evading Defenses & Erasing Tracks (04:01)
Maintaining & Expanding Access (03:22)
Reconnaissance (Footprinting) 
Passive Reconnaissance (05:03)
Using WHOIS & Other Tools (03:03)
Active Reconnaissance (04:10)
Active Reconnaissance Tools & Methods (04:55)
Putting It All Together (03:09)
Reconnaissance Demo (07:04)
Scanning 
Scanning For Hosts (02:20)
TCP Connection Basics (04:14)
TCP Scan Types (07:18)
UDP & ICMP Scanning (03:44)
Scanning Demonstration using NMAP (05:19)
Port & Service Enumeration 
Identifying Ports & Services (03:06)
OS Fingerprinting (02:57)
Popular Scanners (01:54)
Demonstration (05:15)
Data Enumeration 
Data Enumeration (05:12)
SNMP Enumeration (07:14)
DNS Zone Transfers (06:36)
Windows Null Sessions (05:03)
NetBIOS Enumeration (06:44)
Active Directory Extraction (03:02)
Vulnerability Assessment 
Vulnerabilities & Exploits (06:07)
OS Vulnerabilities (05:59)
Web Server Vulnerabilities (06:54)
Database Vulnerabilities (05:25)
TCP Stack Vulnerabilities (04:13)
Application Vulnerabilities (03:05)
Vulnerability Assesment (07:21)
Penetration/Access/Compromise Pt.1 
Penetrating the System Pt.1 (05:28)
Penetrating the System Pt.2 (03:11)
Bypassing Access Controls (06:34)
Password Cracking Pt.1 (04:58)
Password Cracking Pt.2 (03:52)
Social Engineering (06:28)
Penetration/Access/Compromise Pt.2 
Session Hijacking Pt.1 (05:46)
Session Hijacking Pt.2 (04:01)
Privilege Escalation (04:45)
Maintaining & Expanding Access (07:01)
System Compromise (04:40)
Evading Defenses & Erasing Tracks 
Where Your Actions Recorded Pt.1 (02:04)
Where Your Actions Recorded Pt.2 (06:50)
Deleting Log Files & Other Evidence Pt.1 (03:16)
Deleting Log Files & Other Evidence Pt.2 (04:26)
Rootkits (05:21)
Steganography (06:58)
Evading IDS & Firewalls (04:29)
Introduction to Hacking Techniques Pt.1 
Encryption (06:07)
Sniffers (04:15)
Wireless hacking (06:29)
SQL Injection (04:18)
Introduction to Hacking Techniques Pt.2 
Buffer Overflows (05:19)
Rootkits (03:52)
Spoofing (04:33)
Denial of Service Attacks (03:59)
Web Hacking (07:00)
Popular Tools 
nmap Pt.1 (06:38)
nmap Pt.2 (02:14)
SuperScan (04:30)
Nessus (06:27)
Penetration Test Demo 
Penetration Test Demo Pt.1 (01:41)
Penetration Test Demo Pt.2 (00:59)
Penetration Test Demo Pt.3 (01:05)
Credits 
About the Authors (01:37)

Thursday, September 4, 2008

Mastering Microsoft Exchange Server 2007


Discover How to Customize Exchange Server 2007 for Your Environment

By utilizing the latest features of Microsoft Exchange Server 2007, you’ll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.

Now with this comprehensive guide, you’ll find out how to effectively install, configure, and manage Microsoft’s powerful messaging and collaboration server. From reducing the amount of spam your company receives to ensuring you have the right disaster recovery strategy, authors Barry Gerber and Jim McBee share their extensive real-world experience as they walk you step-by-step through each process. You’ll learn the essential techniques for planning and design, deployment, administration, maintenance, and troubleshooting.

Fully updated for Exchange Server 2007 and Windows Server 2003 R2, this book also covers new capabilities, including wireless access, security, customized e-mail forms for Outlook, and more.

Coverage includes:

•Installing, configuring, and scaling a new Exchange 2007 system

•Utilizing the admin console to delegate permissions

•Managing e-mail recipients, address lists, and folder content

•Ensuring Exchange Server reliability and availability

•Accessing Outlook email using Windows Mobile and ActiveSync devices

•Configuring wireless access to Exchange Server 2007

•Securing Exchange Server against hackers, spam, and viruses

•Supporting Outlook 2007 and configuring it on the Exchange Server

•Learn How to Successfully Design a New Exchange 2007 System

•Create, Deploy, and Administer a Collaborative Messaging Solution

•Take Advantage of Enhanced Security and Wireless Access Features

•Build Redundancy and Availability into Your System

•Log, Audit, and Monitor All Activities to Keep Unwanted Content Out
Table of Contents

Introduction.

Chapter 1. Introducing Exchange Server 2007.

Chapter 2. Exchange Server 2007 Architecture.

Chapter 3. Designing a New Exchange 2007 System.

Chapter 4. Installing Exchange Server 2007.

Chapter 5. Migrating to Exchange Server 2007.

Chapter 6. Scaling Upward.

Chapter 7. Administering Exchange 2007.

Chapter 8. Organization Wide Settings.

Chapter 9. Imposing Limits and Why.

Chapter 10. Managing Recipients.

Chapter 11. Managing Address Lists.

Chapter 12. Managing Folder Content.

Chapter 13. Managing Messages In Transit.

Chapter 14. Public Folder Administration.

Chapter 15. Reliability and Availability 101.

Chapter 16. Backup and Disaster Recovery.

Chapter 17. Supporting the Outlook 2007.

Chapter 18. Delivering E-mail.

Chapter 19. Anywhere Access.

Chapter 20. Securing Exchange Server.

Chapter 21. Logging, Auditing, and Monitoring.

Appendix. Cool Third Party Applications for Exchange Server and Outlook Clients.

Index.

DOWNLOAD

Microsoft Exchange Server 2007: A Beginner’s Guide


Support a Seamless Microsoft Exchange Server 2007 Messaging Environment

Get started using Microsoft Exchange Server 2007 quickly with help from this easy-to-follow resource. Using screenshots and step-by-step instructions, Microsoft Exchange Server 2007: A Beginner’s Guide shows you how to set up Exchange Server, migrate from earlier releases, manage recipients, and administer storage. You’ll learn how to integrate with Outlook, support mobile users, handle backup and recovery, and implement security measures. The latest monitoring and reporting tools, performance enhancement techniques, and regulatory compliance procedures are also covered.
Install and configure Microsoft Exchange Server 2007 or migrate from earlier versions
Create and manage recipients, mailboxes, and public folders
Administer storage groups and databases
Integrate seamlessly with Outlook 2007
Support remote users with Outlook Web Access, Outlook Anywhere, Outlook Voice Access, and Active Sync
Monitor, administer, and optimize your system using the Exchange Management Console
Back up and recover Exchange databases
Take advantage of the Exchange Management Shell capabilities

DOWNLOAD

Microsoft Exchange Server 2007 Unleashed


Product Description

This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations both large and small have found to be the important components in Exchange 2007, including the new Outlook Web Access mail, functions that better support mobile devices, server-to-server mailbox replication for better data recovery, and integrated voicemail unified messaging.


Detailed information on how to…
Plan your implementation and migration to Exchange 2007
Confirm that your architecture of Exchange 2007 meets best practices
Build a lab environment to test that your migration, implementation, and support processes are valid
Implement Cluster Continuous Replication for effective disaster recovery of a failed Exchange server or site
Integrate Exchange 2007 Unified Messaging into an existing telephony environment
Optimize Exchange 2007 for a scalable enterprise environment
Administer and support Exchange on an ongoing basis


Introduction

Part I Microsoft Exchange Server 2007 Overview

1 Exchange Server 2007 Technology Primer

2 Best Practices at Planning, Prototyping, Migrating, and Deploying Exchange Server 2007

Part II Planning and Designing an Exchange Server 2007 Environment

3 Understanding Core Exchange Server 2007 Design Plans

4 Architecting an Enterprise-Level Exchange Environment

5 Integrating Exchange Server 2007 in a Non-Windows Environment

6 Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2007

Part III Implementing Exchange Server 2007 Services

7 Installing Exchange Server 2007

8 Implementing Edge Services for an Exchange Server 2007 Environment

9 Using the Windows PowerShell in an Exchange Server 2007 Environment

Part IV Securing an Exchange Server 2007 Environment

10 Client-Level Secured Messaging

11 Server and Transport-Level Security

12 Encrypting Email Communications with Exchange Server 2007

13 Securing Exchange Server 2007 with ISA Server

14 Understanding Enterprise Policy Enforcement Security

Part V Migrations and Coexistence with Exchange Server 2007

15 Migrating from Windows 2000 Server to Windows Server 2003

16 Migrating to Exchange Server 2007

17 Implementing Client Access and Hub Transport Servers

18 Administering an Exchange Server 2007 Environment

19 Exchange Server 2007 Management and Maintenance Practices

20 Using Microsoft Operations Manager to Monitor Exchange Server 2007

21 Using Terminal Services to Manage Exchange Servers

22 Documenting an Exchange Server 2007 Environment

Part VII Unified Communications in an Exchange Server 2007 Environment

23 Designing and Implementing Mobility in Exchange Server 2007

24 Designing and Configuring Unified Messaging in Exchange Server 2007

25 Collaborating Within an Exchange Environment Using Microsoft Office SharePoint Server 2007

26 Extending the Real-Time Communications Functionality of Exchange Server 2007

Part VIII Client Access to Exchange Server 2007

27 Getting the Most Out of the Microsoft Outlook Client

28 Leveraging the Capabilities of the Outlook Web Access (OWA) Client

29 Using Non-Windows Systems to Access Exchange Server 2007

30 Deploying the Client for Microsoft Exchange

Part IX Data Protection and Disaster Recovery of Exchange Server 2007

31 Continuous Backups, Clustering, and Network Load Balancing in Exchange Server 2007

32 Backing Up the Exchange Server 2007 Environment

33 Recovering from a Disaster in an Exchange Server 2007 Environment

Part X Optimizing Exchange Server 2007 Environments

34 Optimizing an Exchange Server 2007 Environment

35 Designing and Optimizing Storage (SAN/NAS) in an Exchange Server 2007 Environment

Index

DOWNLOAD

MCITP_70_640_642_643_647


Companion CD Readme
for
MCITP Self-Paced Training Kit (Exams 70-640, 70-642, 70-643, 70-647):
Windows Server(R) 2008 Enterprise Administrator Core Requirements

by
Dan Holme, Nelson Ruest, Danielle Ruest, Tony Northrup,
J.C. Mackin, Anil Desai, Orin Thomas, John Policelli,
Ian McLean, P. Mancuso, and D.R. Miller

Copyright 2008 by Microsoft Corporation

Portions copyright (c) 2008 by Anil Desai, Dan Holme,
GrandMasters, J.C. Mackin, and Tony Northrup
All Rights Reserved

___________________________________________________________________

HOW TO USE THIS CD
==================
Insert this CD into your CD-ROM drive.

If AutoRun is not enabled, run StartCD.exe at the root of the CD
to display a start menu. This menu provides you with links to all
the resources available on the CD.

WHAT IS ON THIS CD?
==================
This CD contains the following items:

————————————–
Practice tests
————————————–
The Microsoft Press Training Kit exam prep suite,
which include practice tests for Exams 70-640, 70-642, 70-643, and
70-647, is contained on this CD in the \Practice Tests folder. To
install the practice tests to your hard disk, open the Practice Tests
folder, open the folder for the suite you want to install, run
the Setup program for that suite, and follow the instructions
that appear.

To uninstall a Training Kit exam prep suite, make the appropriate
selection from Add Or Remove Programs in Control Panel.

——————————————
Sample Chapters from Microsoft Press Books
——————————————
Additional sample chapter eBooks from Microsoft Press(R) are
contained on this CD in the Sample Chapters folder.

Note: The eBooks are in Portable Document Format (PDF). To view
these files you will need Adobe Acrobat or Adobe Reader. For more
information about these products or to download Adobe Reader,
visit the Adobe Web site at http://www.adobe.com.

————————————–
Electronic Books (eBooks)
————————————–

The complete text of the print books are contained on this CD in
searchable PDF eBooks. To view the eBooks, click eBooks on the start
menu, and click the link for the eBook you want to view.

Note: The eBooks are in Portable Document Format (PDF). To view these
files, you will need Adobe Acrobat or Adobe Reader. For more
information about these products or to download Adobe Reader,
visit the Adobe Web site at http://www.adobe.com.

————————————–
Webcasts
————————————–

The webcasts referenced in the text of MCTS Self-Paced Training Kit
(Exam 70-642): Configuring Windows Server 2008 Network Infrastructure and
in MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server®
2008 Applications Infrastructure are contained on this CD. To view these
Webcasts, click Webcasts on the start menu, and click the link for a book.
A folder will open displaying the available Webcast files for that book.

Note: The Webcast included on this CD is provided as a Windows Media Video
(.wmv) file. To view this file you will need Windows Media (R) Player.
For more information about this product or to download Windows Media Player,
visit http://www.microsoft.com/windows/windowsmedia/default.mspx.

————————————–
Links to References
————————————–

Links to additional resources for MCTS Self-Paced Training Kit (Exam 70-640):
Configuring Windows Server 2008 Active Directory(R) are contained on this CD
To view these references, click Links to References on the start menu.

SUPPORT INFORMATION
===================

————————————–
Microsoft Learning Technical Support information
————————————–
Every effort has been made to ensure the accuracy of the book
and the contents of this CD. As corrections or changes are collected,
they will be added to a Microsoft Knowledge Base article.

Microsoft Press provides support for books and companion CDs at
the following Web site:

http://www.microsoft.com/learning/support/books/

If you have comments, questions, or ideas regarding the book or this
CD, or questions that are not answered by visiting the site above,
please send them to Microsoft Press via e-mail to:

TKinput@microsoft.com

Please note that Microsoft software product support is not offered through
the above addresses.

DOWNLOAD:

PART 1

PART 2

PART 3

Citrix Presentation Server 4 CCA Certification Package


Exam-Pack 256: Citrix Presentation Server 4 - Administration

Includes 15 Videos

Provide easy, secure access to applications and documents from anywhere - no VPN required. That’s what you can do with Citrix Presentation Server. Plus, maintain central control over user experience. No dealing with the hassle of installing software on every computer in the company. Less headaches from botched settings on locally-installed client software. The list of Citrix’s benefits goes on.

In this training, CBT Nuggets Instructor Greg Shields teaches you how to administer Citrix Presentation Server, including setup, policy control, program deployment, enabling client access, catering the user experience, and much more.

Here’s what you learn in this series:
Understand how Citrix functions as a business solution, plus makes your life in IT easier.
Define the components of a Citrix Presentation Server farm, plus learn how they interact with each other and with clients.
Prepare your server for installing Citrix (sounds simple - but it’s very important!), then install Citrix Presentation Server and Citrix licensing.
Manage licensing both when you set Citrix up initially, then when you add licenses later.
Configure farm settings using the Citrix Metaframe Console - and learn when it’s better to configure settings at the farm level, and when it’s better to configure settings at the server level.
Use policies for granular control over the user experience - create, filter, and prioritize policies, plus create policy exceptions.
Adjust protocol settings for both ICA and RDP protocols, including timeouts, security settings, and mapping overrides.
Install and configure each of the four types of Citrix client - plus understand when each client type should be deployed.
Add programs to your server, including both Citrix-friendly applications and applications that don’t automatically work well in a Citrix environment - plus create isolation environments to prevent applications from conflicting with each other.
Publish applications and desktops for client use - and know when it’s better to make applications available for users versus making the entire desktop available.
Package software for quick deployment to multiple Citrix servers - and use Installation Manager to only go through the installation process once, no matter how many servers you’re deploying the software to.
Manage traffic load and perform load balancing across the servers in your farm - learn how and when to use the default and advanced load evaluators, plus create and assign custom load balancers for more advanced load balancing needs.
Use Resource Manager to track usage of servers in your server farm - including both real-time and historical data.
Configure Citrix printing (a historical problem spot), including using client, local, and network printing, interfacing with network print servers, plus managing drivers and printers.
Enable web access to the applications installed on your Citrix servers - then configure a web interface site, paying attention to authentication, workspace control, setting up client proxies, and the different interfaces clients can use to access your web-enabled applications.
Secure communication to and from your Citrix servers by using more secure architectures, ICA encryption, SSL relay technology, and Citrix’s Web Interface with Secure Gateway.
Learn which Citrix command line tools are really important to know for the exam and for using Citrix on the job - plus which tools probably won’t show up on the exam but will make your life as a Citrix admin easier.
Understand how everything you learn in this training applies to taking the Citrix CCA exam.

Real world skills plus exam prep

The Citrix CCA for Presentation Server 4 video series goes in detail with all this information and more, teaching you how to implement Citrix servers and server farms. In addition to giving you real world skills and implementation strategies, it maps to exam objectives for Citrix Exam 256 - Citrix Presentation Server 4: Administration.

Prerequisites

A basic understanding of Windows networking such as a MCSA or MCSE certification or equivalent knowledge is recommended before viewing these videos.
Citrix CCA for Presentation Server 4 contains:

- Introduction to Citrix and the CCA
- Applied and Architectural Concepts for Presentation Server
- Installing Presentation Server
- Configuring Licensing & Farm Settings
- Configuring Policies & Citrix Connection Configuration
- Installing & Configuring the Citrix Client
- Installing Applications to Presentation Server
- Publishing Applications and Content (free video!)
- Deploying Applications with Installation Manager
- Managing Loads and Load Balancing
- Managing Resources with Resource Manager
- Configuring Printing
- Enabling Web Access
- Securing Citrix Communication
- Command Line Tools & Exam Review

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50


Publisher: Sybex

Language: English
ISBN: 0782144373
Paperback: 238 pages
Data: February 27, 2007
Format: PDF
Description: * The EC-Council’s Certified Ethical Hacker has emerged as one of today’s most sought-after certifications.
* This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
* Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.

Ethical Hacking (EC-Council Exam 312-50): Student Courseware


By explaining computer security and outlining methods to test computer 
systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures. 

If you are reading this courseware, it is quite possible that you realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one, and what you can gain from this course.

You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single courseware that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover it at one go.

This doesn’t mean that this course is inadequate in any way.

We have tried to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time; as well as gain insight into the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom, supplemented with tools that the reader can readily access and obtain a hands-on experience. The emphasis is on gaining the know-how, and this explains the leaning towards free and accessible tools. You will read about some of the most widespread attacks seen; the popular tools used by attackers and how attacks have been carried out from ordinary resources.

You may also want to know “After this course, what?” This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no ONE template that will meet all your needs. Your testing strategy will vary with client, basic information enumeration, firewall penetration or other domains, you will find something in this courseware that you can definitely use.

Finally, this is not the end! This courseware is to be considered as a ‘work-in-progress’, because we will be adding value to this courseware over time. You may find some aspects detailed, while others may find it brief. The yardstick that we have used in this respect is simple - “does the content help explain the point at hand?” This doesn’t mean that we would not love to hear from you regarding your viewpoints and suggestions. Do send us your feedback so that we can make this course a more useful one.

TABLE OF CONTENT:
Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans and Backdoors
Module 07 - Sniffers
Module 08 - Denial of Service
Module 09 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web Based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Viruses
Module 17 - Novell Hacking
Module 18 - Linux Hacking
Module 19 - Evading IDS, Firewalls and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography

DOWNLOAD

LPIC 1 Certification Bible

As Linux continues its rapid expansion into Corporate America, the demand for qualified administrators has grown. As the Cisco, Microsoft, A+ and other certifications have shown, professional certifications are often a deciding factor when an individual is considered for a job. The Linux Professional Institute Certification 1 offers the validation of skill level beyond the power-user and helpdesk level, at an entry-level admin base.

LPIC 1 Certification Bible is organized around the exam objectives.It includes self-assessment questions with each chapter as well as an inclusive practice exam at the end of the book. Plus, you’ll find plenty of exam-taking tips and hints based on the live exams.

About the Authors


Angie Nash is an IT Consultant for her own firm, Tarheel Solutions. She works primarily with Linux and Microsoft operating systems to provide solutions for small businesses. Her free time is spent adding new products to her arsenal.
Jason Nash currently lives in Raleigh, North Carolina, with his wife Angie (Another CNE and MCSE!) and works for Advanced Paradigms, Inc. Advanced Paradigms is one of the top Microsoft Solution Providers in the country. His certifications include MCSEx2, MCT, Novell CNE, and CNP (Certified Network Professional). He is currently finishing his MCSD and working on a Bachelors of Computer Science.
Table of Contents
Preface.
Acknowledgments.
Part I: Installing Linux and Getting Started.
Chapter 1: Installing Linux.
Chapter 2: Using the Shell.
Chapter 3: Installing Software.
Part II: Getting Around in Linux. 
Chapter 4: Processing Text.
Chapter 5: Using Partitions and File Systems.
Chapter 6: Managing Files.
Chapter 7: Using Documentation.
Chapter 8: Understanding the Boot Process.
Chapter 9: Using X.
Part III: Administering Linux.
Chapter 10: Managing Users and Groups.
Chapter 11: Administering the System.
Chapter 12: Printing.
Chapter 13: Working with the Kernel.
Chapter 14: Using Shells and Scripts.
Part IV: Managing the Network.
Chapter 15: Networking Fundamentals.
Chapter 16: Managing Network Services.
Chapter 17: Managing Security.
Appendix A: What’s on the CD-ROM.
Appendix B: Practice Exams.
Appendix C: Objective Mapping. 
Appendix D: Exam Tips. 
Glossary. 

Index.

DOWNLOAD

LPI Linux Certification in a Nutshell, 2nd Edition


PI Linux Certification in a Nutshell, Second Edition is an invaluable resource for determining what you need to practice to pass the Linux Professional Institute exams. This book will help you determine when you’re ready to take the exams, which are technically challenging and designed to reflect the skills that administrators need in real working environments.

As more corporations adopt Linux as the networking backbone for their IT systems, the demand for certified technicians will become even greater. Passing the LPI exams will broaden your career options because the LPIC is the most widely known and respected Linux certification program in the world. Linux Journal recognized the LPI as the best Training and Certification Program. The exams were developed by the Linux Professional Institute, an international, volunteer-driven organization with affiliates in a dozen countries.

The core LPI exams cover two levels. Level 1 tests a basic knowledge of Linux installation, configuration, and command-line skills. Level 2 goes into much more depth regarding system troubleshooting and network services such as email and the Web. The second edition of LPI Linux Certification in a Nutshell is a thoroughly researched reference to these exams. The book is divided into four parts, one for each of the LPI exams. Each part features not only a summary of the core skills you need, but sample exercises and test questions, along with helpful hints to let you focus your energies.

Major topics include:
GNU and Unix commands
Linux installation and package management
Devices, filesystems, and kernel configuration
Text editing, processing, and printing
The X Window System
Networking fundamentals and troubleshooting
Security, including intrusion detection, SSH, Kerberos, and more
DNS, DHCP, file sharing, and other networking infrastructure
Email, FTP, and Web services

DOWNLOAD

Linux LPIC-2 Series


                                       Linux Professional Institute Level 2 Exam Packs 201 & 202
                                                                           Includes 15 Videos

Linux servers continue to be deployed at a rapid rate. Companies see Linux systems as a great alternative to other server operating systems because of their performance, stability and low cost. When companies deploy Linux, they want to make sure that the network will be administered by professionals who really know their stuff. One of the best ways to prove your knowledge as a Linux system administrator is through vendor-neutral certification from the Linux Professional Institute.

The Linux LPIC-2 Series builds on the Linux knowledge from the LPIC-1 Certification Package by showing how to administer Linux-only and Linux-mixed networks. The videos start with advanced instruction on the Linux kernel, then go on to include samba and NFS servers, mail management, news serving, DNS, web and FTP servers, Linux security and more.

Instructor Perry Fizzano has years of experience teaching Linux and working with the Linux operating system, and in his words, he “Really loves Linux.” His experience and enthusiasm make these videos an excellent resource for learning all about using Linux servers. On top of covering all exam objectives for the LPIC-2 exams 201 and 202, Perry gives you helpful tips and tricks he’s picked up through his years of running Linux systems.

A basic understanding of the Linux operating system, such as the material covered in the Linux LPIC-1 Series is recommended before viewing this training.

Linux LPI Series: LPIC-2 Contents:

- LPIC-2 Series Intro
- The Linux Kernel: Customizing and Compiling
- Boot Loaders and the Boot Process
- Linux Filesystems
- Samba and NFS: Sharing Files across the Network
- RAID
- System Maintenance
- PERL Scripting
- Troubleshooting Problems in Linux
- Networking in Linux
- The Apache Web Server
- DNS and BIND
- Mail and News

- Network Management

- SSH: Client and Serve

DOWNLOAD:

PART 1

PART 2

Linux LPIC-1 Series


                                                                 Linux LPIC-1 Series
                               Linux Professional Institute Level 1 Exam Packs 101 & 102
                                                                 Includes 19 Videos

The Linux Operating system continues to grow in popularity and acceptance world-wide and the Linux Professional Institute (LPI) has designed a certification program to certify the competency of system administration using the Linux operating system and its associated tools.

This training maps to the LPIC-1 exams 101 and 102 and teaches you how to work at the Linux command line, perform simple maintenance, support users, and carry out backup, restore, shutdown and reboot commands. You’ll also gain the skills to install and configure a workstation and connect it to a LAN, or a stand-alone PC via modem to the Internet.

Instructor Perry Fizzano covers all the topics in a series of easy to comprehend videos that are great for the beginner and expert alike. He even shares his own Linux experiences along the way to give you a better understanding of what using Linux is all about.

There are 19 videos providing more than 9 hours of instruction. A basic understanding of computers and networking is suggested prior to viewing this training.

LPI Series: LPIC-1 Contents:

- LPIC-1 Series Intro
- Using the Command Line
- More Command Line Skills
- Command Line Skills Part 3
- Processes
- Configuration
- Installation Issues
- File Systems
- Package Management
- X windows
- Kernel Modules
- Printing
- Administrative Tasks 1
- Administrative Tasks 2
- Shell Scripting
- Basic Networking
- Network Services 1
- Network Services 2
- Basic Security
Download: 

Part 1

Part 2

Part 3

Linux RedHat Video Tutorial


CBT Linux - 10CDs Including:

CD01 - Linux Basic
CD02 - Client Install
CD03 - Linux RedHat Desktop
CD04 - Linux RedHat Client Admin
CD05 - Linux RedHat Server Install
CD06 - Linux RedHat System Management
CD07 - Linux RedHat Network Admin
CD08 - Linux RedHat Web Services
CD09 - Linux RedHat Messaging
CD10 - Linux RedHat Web Secirity
Download:

http://rapidshare.com/files/140242550/LinuxCD1.rar.001
http://rapidshare.com/files/140244314/LinuxCD1.rar.002
http://rapidshare.com/files/140247806/LinuxCD2.rar.001
http://rapidshare.com/files/140250706/LinuxCD2.rar.002
http://rapidshare.com/files/140253138/LinuxCD2.rar.003
http://rapidshare.com/files/140255838/LinuxCD2.rar.004
http://rapidshare.com/files/140257124/LinuxCD2.rar.005
http://rapidshare.com/files/140259992/LinuxCD3.rar.001
http://rapidshare.com/files/140264644/LinuxCD3.rar.002
http://rapidshare.com/files/140268860/LinuxCD3.rar.003
http://rapidshare.com/files/140269733/LinuxCD3.rar.004
http://rapidshare.com/files/140274599/LinuxCD4.rar.001
http://rapidshare.com/files/140279415/LinuxCD4.rar.002
http://rapidshare.com/files/140282315/LinuxCD4.rar.003
http://rapidshare.com/files/140285461/LinuxCD5.rar.001
http://rapidshare.com/files/140290183/LinuxCD5.rar.002
http://rapidshare.com/files/140295390/LinuxCD5.rar.003
http://rapidshare.com/files/140296701/LinuxCD5.rar.004
http://rapidshare.com/files/140212874/LinuxCD6.rar.001
http://rapidshare.com/files/140214353/LinuxCD6.rar.002
http://rapidshare.com/files/140216614/LinuxCD7.rar.001
http://rapidshare.com/files/140219055/LinuxCD7.rar.002
http://rapidshare.com/files/140220102/LinuxCD7.rar.003
http://rapidshare.com/files/140222630/LinuxCD8.rar.001
http://rapidshare.com/files/140224937/LinuxCD8.rar.002
http://rapidshare.com/files/140226387/LinuxCD8.rar.003
http://rapidshare.com/files/140229108/LinuxCD9.rar.001
http://rapidshare.com/files/140229620/LinuxCD9.rar.002
http://rapidshare.com/files/140232462/LinuxCD10.rar.001
http://rapidshare.com/files/140235703/LinuxCD10.rar.002
http://rapidshare.com/files/140239276/LinuxCD10.rar.003
http://rapidshare.com/files/140239653/LinuxCD10.rar.004

RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fifth Edition


McGraw-Hill/Osborne 2007 (896 pages)

ISBN:9780072264548

With hundreds of practice questions and hands-on exercises, this authoritative guide covers what you need to know–and shows you how to prepare–for the challenging RHCE exam (RH302).
Table of Contents
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fifth Edition
Preface
Introduction
Chapter 1 - RHCE Prerequisites
Chapter 2 - Hardware and Installation
Chapter 3 - The Boot Process
Chapter 4 - Linux Filesystem Administration
Chapter 5 - Package Management
Chapter 6 - User Administration
Chapter 7 - System Administration Tools
Chapter 8 - Kernel Services and Configuration
Chapter 9 - Apache and Squid
Chapter 10 - Network File-Sharing Services
Chapter 11 - Domain Name Service
Chapter 12 - Electronic Mail
Chapter 13 - Other Networking Services
Chapter 14 - The X Window System
Chapter 15 - Securing Services
Chapter 16 - Troubleshooting
Appendix A - Sample Exam 1
Appendix B - Sample Exam 2
Glossary
Index
List of Figures
List of Tables
List of Exercises


DOWNLOAD

RHCT and RHCE Videos tutorials


Download this Video tutorial for ur prepration of RHCT/RHCE.

DOWNLOAD

Wednesday, September 3, 2008

ad world


icon