31 Days Before Your CCNA 200-301 Exam

فهرست مطالب:

Introduction

Day 31: Networking Models, Devices, and Components

Day 30: Ethernet Switching

Day 29: Switch Configuration Basics

Day 28: IPv4 Addressing

Day 27: IPv6 Addressing

Day 26: VLAN and Trunking Concepts and Configurations

Day 25: STP

Day 24: EtherChannel and HSRP

Day 23: DHCP and DNS

Day 22: Wireless Concepts

Day 21: WLAN Configuration

Day 20: LAN Security and Device Hardening

Day 19: Basic Routing Concepts

Day 18: Basic Router Configuration

Day 17: The Routing Table

Day 16: Inter-VLAN Routing

Day 15: Static and Default Route Configuration

Day 14: OSPF Operation

Day 13: Single-Area OSPF Implementation

Day 12: Fine-Tuning and Troubleshooting OSPF

Day 11: Network Security Concepts

Day 10: ACL Concepts

Day 9: ACL Implementation

Day 8: NAT

Day 7: WAN, VPN, and IPsec

Day 6: QoS

Day 5: CDP and LLDP

Day 4: Device Monitoring, Management, and Maintenance

Day 3: Cloud, Virtualization, and SDN

Day 2: SDA and Cisco DNA Center

Day 1: Network Automation

Exam Day

Post-Exam Information

CCNA Countdown Calendar (tear card content)

Exam Checklist (tear card content)

31 Days Before Your CCNA Routing & Switching Exam

فهرست مطالب:

Introduction

Digital Study Guide

Day 31: Networking Models, Devices, and Components

Day 30: Ethernet Switching

Day 29: Switch Configuration Basics

Day 28: VLAN and Trunking Concepts and Configurations

Day 27: IPv4 Addressing

Day 26: IPv6 Addressing

Day 25: Basic Routing Concepts

Day 24: Basic Router Configuration

Day 23: Static and Default Route Configuration

Day 22: RIPv2 Implementation

Day 21: VTP and Inter-VLAN Routing Configuration

Day 20: OSPF Operation

Day 19: Single-Area OSPF Implementation

Day 18: Multiarea OSPF Implementation

Day 17: Fine-Tuning and Troubleshooting OSPF

Day 16: EIGRP Operation

Day 15: EIGRP Implementation

Day 14: Fine-Tuning and Troubleshooting EIGRP

Day 13: CDP and LLDP

Day 12: LAN Security and Device Hardening

Day 11: STP

viii 31 Days Before Your CCNA Routing & Switching Exam

Day 10: EtherChannel and HSRP

Day 9: ACL Concepts

Day 8: ACL Implementation

Day 7: DHCP and DNS

Day 6: NAT

Day 5: WAN Overview

Day 4: WAN Implementation

Day 3: QoS, Cloud, and SDN

Day 2: Device Monitoring, Management, and Maintenance

Day 1: Troubleshooting Methodologies and Tools

Exam Day

Post-Exam Information

Index

51 Tips for Social Selling on LinkedIn and Beyond

فهرست مطالب:

Introduction to Social Selling

Social Selling Tips to Drive Sales for Your Business

LinkedIn Spotlight: Top Tips to Drive Sales on the #1 Social Selling Platform

The Power of Your Social Selling Index Score

Tips for Using Sales Navigator

Instagram: Not Just a Personal Social Platform

Taking Your Social Selling Efforts to TikTok

Conclusion

Active Directory Administration Cookbook

فهرست مطالب:

Preface

Chapter 2: Managing Domain Controllers

Chapter 3: Managing Active Directory Roles and Features

Chapter 4: Managing Containers and Organizational Units

Chapter 5: Managing Active Directory Sites and Troubleshooting Replication

Chapter 6: Managing Active Directory Users

Chapter 8: Managing Active Directory Computers

Chapter 9: Getting the Most Out of Group Policy

Chapter 10: Securing Active Directory

Chapter 11: Managing Federation

Chapter 12: Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and 3SO)

Chapter 13: Handling Synchronization in a Hybrid World (Azure AD Connect)

Chapter 14: Hardening Azure AD

Other Books You May Enjoy

Index

Active Directory Administration Cookbook (Second Edition)

فهرست مطالب:

Preface

1 Optimizing Forests, Domains, and Trusts

2 Managing Domain Controllers

3 Managing Active Directory Roles and Features

4 Managing Containers and Organizational Units

5 Managing Active Directory Sites and Troubleshooting Replication

6 Managing Active Directory Users

7 Managing Active Directory Groups

8 Managing Active Directory Computers

9 Managing DNS

10 Getting the Most Out of Group Policy

11 Securing Active Directory

12 Managing Certificates

13 Managing Federation

14 Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and DSSO)

15 Handling Synchronization in a Hybrid World (Azure AD Connect)

16 Hardening Azure AD

Index

AlmaLinux 9 Essentials

فهرست مطالب:

Introduction

A Brief History of AlmaLinux

Installing AlmaLinux 9 on a Clean Disk Drive

Dual Booting AlmaLinux 9 with Windows

Allocating Windows Disk Partitions to AlmaLinux 9

A Guided Tour of the GNOME 40 Desktop

An Overview of the Cockpit Web Interface

Using the Bash Shell on AlmaLinux 9

Managing AlmaLinux 9 Users and Groups

AlmaLinux 9 Software Installation and AppStreams

Managing AlmaLinux 9 systemd Units

AlmaLinux 9 Network Management

AlmaLinux 9 Firewall Basics

AlmaLinux 9 Firewall Configuration with firewalld

Configuring SSH Key-based Authentication on AlmaLinux 9

AlmaLinux 9 Remote Desktop Access with VNC

Displaying AlmaLinux 9 Applications Remotely (X11 Forwarding)

Using NFS on AlmaLinux 9 to Share Files with Remote Systems

Sharing Files between AlmaLinux 9 and Windows with Samba

An Overview of Virtualization Techniques

Installing KVM Virtualization on Creating KVM Virtual Machines on AlmaLinux 9 using Cockpit AlmaLinux 9

Creating KVM Virtual Machines on AlmaLinux 9 using virt-manager

Creating KVM Virtual Machines with virt-install and virsh

Creating an AlmaLinux 9 KVM Networked Bridge Interface

Managing KVM using the virsh Command-Line Tool

An Introduction to Linux Containers

Working with Containers on AlmaLinux 9

Setting Up an AlmaLinux 9 Web Server

Configuring an AlmaLinux 9 Postfix Email Server

Adding a New Disk Drive to an AlmaLinux 9 System

Adding a New Disk to an AlmaLinux 9 Volume Group and Logical Volume

Adding and Managing AlmaLinux 9 Swap Space

AlmaLinux 9 System and Process Monitoring

Index

Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation

فهرست مطالب:

Part 1: Attack Preparation

Mindset and Methodologies

Toolset for Web Attacks and Exploitation

Part 2: Evergreen Attacks

Attacking the Authentication Layer – a SAML Use Case

Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress

Attacking IoT Devices – Command Injection and Path Traversal

Part 3: Novel Attacks

Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)

Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic

Continuing the Journey of Vulnerability Discovery

Index

Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence

فهرست مطالب:

About the Author

About the Technical Reviewer

Foreword

Acknowledgments

CHAPTER 1 Introduction to DAX

CHAPTER 2 Variables

CHAPTER 3 Context

CHAPTER 4 Summarizing and Aggregating

CHAPTER 5 Joins

CHAPTER 6 Filtering

CHAPTER 8 Debugging and Optimizing

CHAPTER 9 Practical DAX

Index

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

فهرست مطالب:

About the Author

About the Technical Reviewer

Acknowledgments

Introduction

Chapter 1: Security Trends

Chapter 2: Setting Up a Penetration Testing and Network Security Lab

Chapter 3: Elementary Linux Commands

Chapter 4: Know Your Network

Chapter 5: How to Build a Kali Web Server

Chapter 6: Kali Linux from the Inside Out

Chapter 7: Kali Linux and Python

Chapter 8: Information Gathering

Chapter 9: SQL Mapping

Chapter 10: Vulnerability Analysis

Chapter 11: Information Assurance Model

Chapter 12: Introducing Metasploit in Kali Linux

Chapter 13: Hashes and Passwords

Chapter 14: Classic and Modern Encryption

Chapter 15: Exploiting Targets

Index

Beginning Python: From Novice to Professional – Third Edition

فهرست مطالب:

About the Author

About the Technical Reviewer

Preface

Introduction

Chapter 1: Instant Hacking: The Basics

Chapter 2: Lists and Tuples

Chapter 3: Working with Strings

Chapter 4: Dictionaries: When Indices Won’t Do

Chapter 5: Conditionals, Loops, and Some Other Statements

Chapter 6: Abstraction

Chapter 7: More Abstraction

Chapter 8: Exceptions

Chapter 9: Magic Methods, Properties, and Iterators

Chapter 10: Batteries Included

Chapter 11: Files and Stuff

Chapter 12: Graphical User Interfaces

Chapter 13: Database Support

Chapter 14: Network Programming

Chapter 15: Python and the Web

Chapter 16: Testing, 1-2-3

Chapter 17: Extending Python

Chapter 18: Packaging Your Programs

Chapter 19: Playful Programming

Chapter 20: Project 1: Instant Markup

Chapter 21: Project 2: Painting a Pretty Picture

Chapter 22: Project 3: XML for All Occasions

Chapter 23: Project 4: In the News

Chapter 24: Project 5: A Virtual Tea Party

Chapter 25: Project 6: Remote Editing with CGI

Chapter 26: Project 7: Your Own Bulletin Board

Chapter 27: Project 8: File Sharing with XML-RPC

Chapter 28: Project 9: File Sharing II—Now with GUI!

Chapter 29: Project 10: Do-It-Yourself Arcade Game

Appendix A: The Short Version

Appendix B: Python Reference

Index

Black Hat Bash: Bash Scripting for Hackers and Pentesters

فهرست مطالب:

Chapter 1: Bash Basics

Chapter 2: Advanced Bash Concepts

Chapter 3: Setting Up a Hacking Lab

Chapter 4: Reconnaissance

Chapter 5: Vulnerability Scanning and Fuzzing

Chapter 6: Gaining a Web Shell

Chapter 7: Reverse Shells

Chapter 8: Local Information Gathering

Chapter 9: Privilege Escalation

Chapter 10: Persistence

Chapter 11: Network Probing and Lateral Movement

Chapter 12: Defense Evasion

Chapter 13: Exfiltration and Counter-Forensics