Author Archives: jdoss
Author Archives: jdoss
Get ready to explore the different methods of automating technical and business challenges with Azure in James Rudley’s new course; Automation With Microsoft Azure.
In this course you will learn a range of azure features including:
Ready to master Azure? You can buy this course in streaming or downloadable format here.
Our bootcamps are a great study resource for CCIE candidates. No matter whether you’re just starting out on your CCIE training journey, or have been studying for months, an INE bootcamp can help you gauge where you’re at in the study process and what you need to focus on before attempting your CCIE Exams.
Bootcamps are intensive, live classes that typically last from 5-7 days. Bootcamps allow you to dive further into your study path in a small classroom environment with an in-person, expert INE instructor leading the way. Each bootcamp class will cover a specific list of topics tailored to the Cisco track and certification level you are studying. Our instructors will customize the training to focus on certain topics and technologies that best meet the individual requests of the students in your bootcamp.
In our Written Routing and Switching Bootcamp you will learn about Switching, RIP & EIGRP, OSPF, BGP, MPLS, Redistribution and Evolving Technologies. Our 7 time CCIE, expert-instructor, Rohit Pardasani, will not only help you understand all of the essential R&S topics for this exam, he will also share study techniques and prepare you for Continue reading
Hello! My name is Miles Karabas. I would like to tell you about my new course, AWS Certified SysOps Administrator, that just got released. The primary objective of this course is to teach the core components and services, and the basic concepts of AWS platform, and prepare you for the Certified SysOps Administrator – Associate level exam.
Amazon is the world leader in web services, and it’s services are used by thousands of companies around the world. AWS certifications show a potential employer that you have the skills to design, deploy and manage secure, highly available, cost efficient, scalable and fault tolerant systems on the AWS Platform. An AWS certification also puts you in an elite group of cloud engineers. These certifications are highly valued by employers. Last, AWS Certified engineers are among the highest paid IT professionals.
The Certified AWS SysOps Administrator Exam focuses on specific processes of implementation, monitoring and managing of AWS services.
The course will cover the following topics:
AWS exams are experience based, this course includes several hours Continue reading
Module 9 is here! Tune into Josue Vargas’s newest video – Certified Ethical Hacking: Denial of Service to learn about DoS and DDoS attacks and how to prevent them.
DoS and DDoS are disruptive attacks meant to bring a server or network out of operation. You might have seen some of this in the news, especially as related to hacktivism (people who hack for a cause). A DDoS attack can be a big financial hit on an organization. In this module you will learn how this type of attack is accomplished and even how it can be done stealthily. As an ethical hacker you will get the point of view of the attacker, as usual, but you will also learn how to protect your organization from this type of event using the right tools and strategies.
We’ve just added a new ISC2 course, The Systems Security Certified Practitioner.
The broad spectrum of topics included in the SSCP Common Body of Knowledge ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following 7 domains:
The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
Hi, my name is Gilad Gressel and I’d like to tell you about my new course: Deep Learning with Python.
Deep learning is an old technology that has recently been sweeping through the field of machine learning and artificial intelligence. Deep learning powers many of the cutting edge technologies that appear to be “magic” in the world today. Voice recognition, image detection, facial recognition, AI game playing agents (Dota, Chess, and Go), all of these are examples of deep learning in action.
You might be interested in studying deep learning simply because you want to know what the “magic” is, what the hype is all about. That’s a fine reason to take this course, but I urge you to dig a bit deeper. If you have ever stared at a bunch of data and known “there is a pattern here, but I can’t find it,” then this is the course for you!
In this course you will learn what is going on in a deep learning program, what it can do and what it’s limitations are. If you are wondering if you can apply deep learning to your field Continue reading
Tune into Gabe Rivas’s most recent course release, Network Foundation Protection: Management Plane, the second in a series of eight CCNA security courses.
Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data plane. In this Course we will focus on the management plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the Pros and Cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs.
If this was a single course covering the entire CCNA Security blueprint, the pre-requisite would have been the CCENT Certification or equivalent knowledge. Since this is Continue reading
Tune into Joseph Holbrook’s Associate GCP Cloud Engineer Course to learn about the requirements of the GCP Cloud Engineer Associate Exam.
An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. This individual is able to use Google Cloud Console and the command-line interface to perform common platform-based tasks to maintain one or more deployed solutions that leverage Google-managed or self-managed services on Google Cloud. The GCP Cloud Engineer Associate is one of Google’s newest certifications, this course will walk you through everything you need to know to ace your certification exam.
Tune into our newest addition to our course library: Ubuntu Server (18.04): Installing and Managing openLDAP Directories, with Andrew Mallet to learn the basics of Ubuntu server.
OpenLDAP is a directory service that predates many proprietary systems and provides a universal authentication mechanism for client system to authenticate to and white pages system to search. In this course we will take you through the basics of openLDAP Leading to an install. From there you will learn how to develop your system further by adding and searching entries. Next we will move on to authentication to openLDAP from other Linux clients and services such as Apache HTTPD. Finally we will look at scaling out our system by including replication to add failover and fault-tolerance to the Directly.
In this course, you’ll learn the technologies behind Docker, while following the requirements for the Docker Certified Associate exam. This Course is taught by Andrew Crouthamel and is 3hours and 17 minutes long.
In this training series, you will learn how Docker works, and how it compares to existing virtualization technologies. You will learn how to install and configure Docker, retrieve and create containers, as well as their required pieces, such as virtual networks, data volumes, and repositories. Lastly, you will learn how to orchestrate numerous dockers in clusters, and create your own container registries.
DevOpsDays is a technical conference for developers, system administrators and anyone else, whether expert or beginner, involved in technology. With technology and responsibilities crossing over spaces, DevOps is a movement that has rapidly spread through the technical community along with the adoption of agile techniques. DevOps Days take place all over the world as self-organized events which community members who are passionate about their work attend. The format of presentations, Ignites and Open Spaces is unique to this event. It is highly interactive and invigorating for attendees.
We’d love to get feedback from you, our customers, on what courses you’d like to see next. We’re constantly working to create new content which caters to a variety of technical certifications. We need your help deciding the best topics to add to our ever-exanding DevOps course library. As a token of appreciation, everyone who visits our booth and assists us by suggesting DevOps course topics will be entered into a contest to win a Nintendo Switch.
Interested in working with us? We’re looking for Continue reading
Considering Windows Server 2016 MCSA Certification? In this helpful course, get the details about Windows Server 2016 70-741 exam, in the MCSA certification.
In this course we will perform tasks related to the networking features and functionalities available in Windows Server 2016. Students should have familiarity with implementing and managing DNS, DHCP, and IPAM, as well as deploying remote access solutions such as VPN and RADIUS, managing DFS and branch cache solutions, configuring high performance network features and functionality, and implementing Software Defined Networking (SDN) solutions, such as Hyper-V Network Virtualization (HNV) and Network Controller.
This course will cover the following exam topics:
Melissa Hallock has been in the IT field since 1996 when she first began working with hardware. While working on a Bachelor of Applied Science in Networking, she landed her first IT job in a Forbe’s top 100 growing companies as a LAN Technician and worked with all things Microsoft. Later she migrated to Linux and Mac operating systems. Having always worked in an Continue reading
This course is a deep dive in ASA and features of ASA firewall, and is a primary study resource for the CCIE Security v5 Lab Exam. Students looking for a thorough and well-structured learning tool will benefit from these videos, which help create a solid foundation of the concepts covered in the CCIE Security v5 Lab Exam.
In this course, we will walk you through the basics of ASA and help you dive into more practical and advanced topics. We will start by helping you understand the security levels in ASA and understand the Adaptive Security Algorithm. Then we will break down the ACL’s and objects and object-groups. We will further look at differences between ASA in router mode vs ASA in transparent mode. We will also focus on deep inspection of packets and later move on to creating virtual firewalls and running ASA in active/standby or active/active mode. Lastly, but not the least, we would focus on clustering.
Basic understanding of firewalls and basic Continue reading
Cisco just rolled out the Evolving Technologies v1.1 update, which will affect anyone taking their CCIE certification exams on, or after, August 30, 2018. Fortunately, the v1.1 updates are fairly minor. The CCIE/CCDE Evolving Technologies section still includes three overall categories; Cloud, Network Programmability and Internet of things, and still makes up 10% of all CCIE/CCDE written exams. However, changes can be found in the specific topics tested in each of the evolving technologies categories.
Compare and contrast public, private, hybrid, and multi-cloud design considerations
Describe cloud infrastructure and operations
Describe architectural and operational Considerations for a programmable network
Interested in AWS? You’re in luck, this week we added not one, but TWO Amazon Courses to our streaming library!
AWS Certified Solution Architect – Professional
Instructor: Ankush Kilam
Duration: 5hrs 25min
This course provides you with advanced technical skills needed to pass the AWS CSA Pro exam. With the AWS CSA Pro certification under your belt, you will join an exclusive club of certified professionals who are in high demand by employers worldwide. The training course is made up of 5-20 minute videos. The video lessons keep-it-simple and explain things clearly and succinctly. Together I’ll walk you through each of the major domains of Amazon Web Services, step by step.
Instructor: Robert Kulagowski
Duration: 7hrs 7min
This course will help you study for the AWS Certified Developer – Associate exam. Through a combination of lectures, quizzes and practical exercises, you’ll get the information necessary to earn your certification. You will learn CloudFormation, Cloudfront, DynamoDB, EBS, EC2, Elastic Beanstalk, IAM, S3, SNS, SQS, SWF and more
You Can watch both of these courses by logging into your INE Members Account
Learn in-depth information about social engineering techniques and countermeasures in the course Certified Ethical Hacker: Social Engineering, available as a stand alone download or with your INE.com All Access Pass!
When we think of hacking, we often picture a grim fellow opening a laptop, typing really fast and bam! he’s infiltrated the Pentagon. Watching those films when you know one or two things about system and network security is a hilarious experience! If you have been following the Certified Ethical Hacker series, you would know better by now. Hacking is not for the faint-hearted, not just because of the technical difficulty (indeed there are several needed skills to be developed), but because of the resilience needed. I’m talking about the fact that a successful hack comes after many failed attempts in most scenarios.
Because hacking into systems as an outsider is so difficult there’s a key toolkit that every hacker needs to master as much as they master sniffing, session hijacking, application hacking, or any other technical specialty- I’m talking about Social Engineering.
A highly empathetic person might have a hard time with the concept of Social Engineering. It’s pretty Continue reading
Do you want to obtain your CCNP Collaboration or perhaps enhance your Cisco Collaboration skills for the real world? The CCNP Advanced Technologies v1 course from INE is targeted at network and voice professionals who want to take their Cisco Collaboration knowledge to the next level.
This course is intended for network and voice professionals looking to further improve their knowledge or prepare themselves for the CIPTV1 exam. In this course we will be looking at CUCM and VCS Dial Plan, Voice + Video Calling, IOS Gateway, Conferencing, QoS, On Cluster Calling with CUCM and Media Resources. This course will be delivered in lecture based format with plenty of hands on practical demonstrations.
CIPTV1 – Implementing Cisco IP Telephony & Video’ will cover professional to advanced level concepts and demonstrations around a large portion of the Cisco Unified Communications portfolio, including some of the below products and topics:
Dean Babbage is a Voice and Network Professional actively working in the Cisco Partner community. He carries Continue reading
Security Concepts is an introductory security course, meant for those at the CCNA level. This 5 hour course is taught by Gabe Rivas and is a great prep course for those who are studying for the 210-260 IINS Exam.
This course is the first of an 8 course CCNA Security Certification Curriculum.At INE, We believe that breaking the course up into smaller topics makes it easier to manage and digest your learning experience.
In this introductory course, we will walk you through basic security concepts that are meant to build a solid network security foundation and help you dive into more practical and advanced topics. We will start by helping you understand the meaning of Asset, Vulnerability, Threat, Risk, and Countermeasure terms. Then we will break down the CIA triad and show how it helps organizations develop sound security policies. We will also cover monitoring tools that assist in detecting events in real-time as well as cover concepts about common security zones. As we move forward, we will cover social engineering topics, network attacks, different kinds of malware found in today’s networks, data loss, cryptography and hashing, and finally we will go over common network topologies Continue reading