This course will cover what the terms Continuous Integration and Continuous Delivery mean within the software development practice and the configuration and usage of both a Continuous Integration pipeline and Continuous Delivery pipeline using Microsoft Visual Studio in conjunction with Microsoft VSTS and Azure Cloud.
Stackdriver monitoring collects metrics, events, and metadata from Google Cloud Platform, Amazon Web Services (AWS), hosted uptime probes, application instrumentation, and a variety of common application components including Cassandra, Nginx, Apache Web Server, Elasticsearch and many others. Stackdriver ingests that data and generates insights via dashboards, charts, and alerts. We will cover monitoring on both GCP and AWS clouds.
This Routing Protocol Security course was created by Piotr Kaluzny and is 1 hour and 45 minutes long. It consists of multiple videos in which the instructor discusses all relevant theoretical concepts and technologies, (in-depth explanations, whiteboarding) and demonstrates how to implement them on the current CCIE Security v5 lab exam hardware.
Why You Should Watch
Security is no longer just an “important” component of an organization. A constantly increasing number of aggressive cyber criminals launch their attacks not only from the outside, but also inside organizations, making security an inherent component of any modern network/system design.
This course, like all other courses that are part of the “CCIE Security v5 Technologies” series, is meant to teach you Cisco security technologies and solutions using the latest industry best-practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.
Who Should Watch
This course is intended for students preparing for their CCNA/CCNP/CCIE security exams. It is also great for experienced Network (Security) Engineers, or Administrators, looking to refresh their knowledge of important network security concepts before moving forward with other certifications.
What You’ll Learn
This course will help you understand the different methods used to secure routing protocols in a network infrastructure. The course focuses on EIGRP, OSPF & BGP for IPv4 and IPv6 and includes a discussion on the newest routing security features recently added to the IOS code.
About The Instructor
Piotr Kaluzny has been in the IT field since 2002 when he was exposed to networking and programming during his studies. His career in production networks began in 2007, right after graduating with MSc in Computer Science. Piotr quickly progressed his career by working for multiple enterprise and non-enterprise companies in different routing & switching and security roles, with his responsibilities ranging from operations and engineering, to consulting and management.
Since the beginning, Piotr has been heavily focused on the Security track to finally prove his skills in 2009 by passing the CCIE security certification exam (#25565) on the first attempt (he also holds R&S and Security CCNP and CCNA certifications).
Piotr already has an extensive background as a Senior Technical Instructor. For the past several years he has been solely responsible for designing, developing and conducting CCNA, CCNP and CCIE training courses for one of the largest and most respected Cisco training companies in the world.
This video series is jam packed with real world BIG-IP DNS designs, issues, and latest BIG-IP DNS features. We will go over the BIG-IP DNS F5 blueprint in detail and follow all examples listed within it. This video series will be in four sections covering: Design and Architect, Implement, Test and Troubleshoot, and Operations and Support. We will cover this exam blueprint from A to Z as we talk in depth about all BIG-IP DNS features and designs, including DNS Express, Zone Runner, DNS64, DNSSEC, DNS Cache, DNS LB Methods, DNS Persistence, iQuery, F5 iApp Analytics, SNMP Polling, and more. This is content you won’t find anywhere else!
This BIP-IP DNS Specialist course we will cover the Design, Architecture, Implementation, and Troubleshooting of BIG-IP DNS and will provide you with the advanced troubleshooting tools and industry knowledge needed to be a BIG-IP DNS expert.
Why You Should Watch
This course is designed to provide you with everything needed to pass the F5 DNS Exam - Whether that is explanations of various designs of F5 DNS, hands-on demos, or any other additional resources, this course has it all, making it the best place to start your training journey.
Not only will this course help you earn your F5 DNS certification, boost your resume, and increase your earning potential, it will also help you take things to a higher level and provide real 'value' to any business you work for, or with. As customers are moving from on-premise solutions to hybrid cloud solutions, F5 DNS is vital to assuring availability needs for your application. Applications start with DNS, and DNS will always play a vital role in a network, regardless of which and what infrastructure is supporting the application, making knowledge of F5 DNS highly valuable. The goal throughout this course is to give you just that, value that you can bring to any organization you work with.
Who Should Watch
This course is specifically designed for Network Admins, Pre and Post-Sales Network Consultants, CIO, Network Solution Architects and Application Architects, but is also a great resource for anyone interested in learning about F5 DNS.
What You'll Learn
The following topics will be covered:
Location Based Routing
Monitoring and Automated Failover
DNS Firewall Services
Global Server Load Balancing
Superior DNS Performance
Advanced SNMP Polling/Traps
Analytics F5 iApp/Splunk
F5 DNS Express
F5 DNS Zonerunner
F5 DNS Caching Solutions
F5 Load Balancing Methods
F5 DNS Persistence
About The Instructor
My name is TJ Vreugdenhil. I am a Network Consultant that helps customers design, scale, implement, and secure their network in a way that makes the most sense to their business. I am a F5 Certified Solution Expert in Security, which is currently the highest offered certification by F5. I obtained my CCIE R/S in 2015. I greatly enjoy solving complex problems, (who doesn’t?) you know the ones I am talking about! My focus has been in Network Security starting with CheckPoint Firewalls in R65. F5 BIG-IP is a product I spend quite a bit of time with, but as you know, in this industry you must keep learning and growing. My next focus areas are Palo Alto Networks, Ansible automation, F5 Cloud and Automation, and Cisco Firepower. I love what I do, and I am blessed with the many opportunities I have to work with many different clients and networks. I grew up in Northwest Iowa and later moved to the Kansas City area where I lived for 9 years. I decided to get back to my roots and am now living in Northwest Iowa again with my wife and our two boys. Outside of work, I enjoy racquetball, guitar, BBQ, and living with purpose.
*The Postings on this site are my own and don't necessarily represent Sirius's positions, strategies, or opinions
Security in the cloud is much like security in your on-premise data centers - only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment, and in this course we will cover them.
Hello! My name is Miles Karabas. I would like to tell you about my new course, AWS Certified SysOps Administrator, that just got released. The primary objective of this course is to teach the core components and services, and the basic concepts of AWS platform, and prepare you for the Certified SysOps Administrator – Associate level exam.
Why Get AWS Certified?
Amazon is the world leader in web services, and it's services are used by thousands of companies around the world. AWS certifications show a potential employer that you have the skills to design, deploy and manage secure, highly available, cost efficient, scalable and fault tolerant systems on the AWS Platform. An AWS certification also puts you in an elite group of cloud engineers. These certifications are highly valued by employers. Last, AWS Certified engineers are among the highest paid IT professionals.
About the Course
The Certified AWS SysOps Administrator Exam focuses on specific processes of implementation, monitoring and managing of AWS services.
The course will cover the following topics:
Load Balancing & Auto Scaling
Security & Identity
Networking & Content Delivery
AWS exams are experience based, this course includes several hours of detailed walkthroughs covering these topics.
There are no required prerequisites for this course or the exam. Even if a candidate does not have a lot of experience in System Administration, Networking, or Databases, this course is a very good starting point for learning cloud computing and Amazon Web Services
I am a cloud and database architect with extensive experience in on-premises and cloud environments. I have my AWS Solutions Architect, DevOps Engineer and SysOps Administrator Certifications. I am really excited about this course and I hope you will join me, I look forward to helping you get AWS Certified!
DoS and DDoS are disruptive attacks meant to bring a server or network out of operation. You might have seen some of this in the news, especially as related to hacktivism (people who hack for a cause). A DDoS attack can be a big financial hit on an organization. In this module you will learn how this type of attack is accomplished and even how it can be done stealthily. As an ethical hacker you will get the point of view of the attacker, as usual, but you will also learn how to protect your organization from this type of event using the right tools and strategies.
The broad spectrum of topics included in the SSCP Common Body of Knowledge ensure its relevancy across all disciplines in the field of information security. Successful candidates are competent in the following 7 domains:
Security Operations and Administration
Risk Identification, Monitoring, and Analysis
Incident Response and Recovery
Network and Communications Security
Systems and Application Security
About the Course
The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner's ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
Deep learning is an old technology that has recently been sweeping through the field of machine learning and artificial intelligence. Deep learning powers many of the cutting edge technologies that appear to be “magic” in the world today. Voice recognition, image detection, facial recognition, AI game playing agents (Dota, Chess, and Go), all of these are examples of deep learning in action.
Why Would You Be Interested in Deep Learning?
You might be interested in studying deep learning simply because you want to know what the “magic” is, what the hype is all about. That’s a fine reason to take this course, but I urge you to dig a bit deeper. If you have ever stared at a bunch of data and known “there is a pattern here, but I can’t find it,” then this is the course for you!
About The Course
In this course you will learn what is going on in a deep learning program, what it can do and what it’s limitations are. If you are wondering if you can apply deep learning to your field of expertise – the chances are that yes you can. If you simply watch the introductory trailer you will know what is required to make this work (hint: data).
This course is an introduction to deep learning. It assumes zero prior knowledge and has no prerequisites aside from the ability to code comfortably in any language. That said, we will be coding in Python, so you will either need to learn it (it’s easy) or already know it. I won’t assume you know much of any math, except what you would have learned in high school.
This is a practical course, although the course runtime is listed at 3 hours and 30 minutes, there is another 3 hours of additional video just going through code with you! To be clear – these are not boring “here is how you code this” videos, there are detailed experiments that will reveal what the different levers and knobs of a deep learning network actually do. All that extra course video is to help you learn how deep learning works.
In this course you will code your own image recognition model (for handwritten digits), predict housing prices and perform sentiment analysis on the IMDB movie database dataset. During all these exercises I will be helping you understand how your decisions will affect the performance of your deep learning models. I am going to help you understand what affects what when you build your deep learning models, and we’ll do this all in practical coding sessions.
A Bit About Me
I’m a mostly self-taught machine learning practitioner. I have published papers in machine learning applied to security topics, both in Europe and the U.S. My passion is to understand a topic deeply enough that I can explain it to my mother.
I sincerely invite you to join me in this course, we’ll explore this fun topic together and rest assured that you will succeed and have a great time.