Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Trusted

Seeders:
Leechers:
Info Hash:
38EB962F3F3C77541AD062366FBDE605E633E45D
  1. 1/1. Course Overview/1. Course Overview.mp4 3.0 MB
  2. 1/1. Course Overview/1. Course Overview.srt 2.3 KB
  3. 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp4 11.9 MB
  4. 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt 12.6 KB
  5. 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp4 4.9 MB
  6. 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt 6.1 KB
  7. 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp4 8.9 MB
  8. 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt 10.6 KB
  9. 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp4 11.5 MB
  10. 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt 7.1 KB
  11. 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp4 9.8 MB
  12. 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt 10.0 KB
  13. 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp4 4.0 MB
  14. 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt 5.2 KB
  15. 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp4 11.9 MB
  16. 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt 10.0 KB
  17. 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp4 23.7 MB
  18. 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt 15.9 KB
  19. 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp4 19.5 MB
  20. 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt 14.0 KB
  21. 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp4 13.9 MB
  22. 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt 11.1 KB
  23. 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp4 9.5 MB
  24. 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt 8.0 KB
  25. 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp4 8.2 MB
  26. 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt 6.0 KB
  27. 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp4 4.6 MB
  28. 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt 6.7 KB
  29. 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp4 18.0 MB
  30. 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt 14.2 KB
  31. 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp4 9.4 MB
  32. 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt 5.5 KB
  33. 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp4 7.8 MB
  34. 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt 4.9 KB
  35. 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp4 8.3 MB
  36. 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt 9.2 KB
  37. 1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp4 23.0 MB
  38. 1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt 13.8 KB
  39. 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp4 30.2 MB
  40. 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt 14.1 KB
  41. 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp4 12.2 MB
  42. 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt 11.2 KB
  43. 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp4 27.3 MB
  44. 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt 19.2 KB
  45. 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp4 20.8 MB
  46. 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt 14.5 KB
  47. 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp4 7.7 MB
  48. 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt 6.1 KB
  49. 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp4 13.4 MB
  50. 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt 9.4 KB
  51. 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp4 16.1 MB
  52. 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt 9.7 KB
  53. 1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp4 9.0 MB
  54. 1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt 8.5 KB
  55. 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp4 28.1 MB
  56. 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt 17.5 KB
  57. 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp4 12.4 MB
  58. 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt 10.5 KB
  59. 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp4 23.6 MB
  60. 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt 15.0 KB
  61. 1/7. Understand App-ID and Other Objects/5. Tags.mp4 12.2 MB
  62. 1/7. Understand App-ID and Other Objects/5. Tags.srt 8.5 KB
  63. 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp4 13.7 MB
  64. 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt 11.1 KB
  65. 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp4 5.7 MB
  66. 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt 5.8 KB
  67. 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp4 22.1 MB
  68. 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt 16.4 KB
  69. 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp4 21.5 MB
  70. 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt 11.5 KB
  71. 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp4 19.1 MB
  72. 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt 11.7 KB
  73. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp4 31.6 MB
  74. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt 21.3 KB
  75. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp4 24.4 MB
  76. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt 16.8 KB
  77. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp4 19.0 MB
  78. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt 10.8 KB
  79. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp4 6.7 MB
  80. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt 8.1 KB
  81. 2/1. Course Overview/1. Course Overview.mp4 3.6 MB
  82. 2/1. Course Overview/1. Course Overview.srt 2.4 KB
  83. 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp4 3.8 MB
  84. 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt 4.8 KB
  85. 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp4 5.0 MB
  86. 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt 6.8 KB
  87. 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp4 10.2 MB
  88. 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt 13.0 KB
  89. 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp4 9.6 MB
  90. 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt 9.1 KB
  91. 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp4 6.9 MB
  92. 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt 8.2 KB
  93. 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp4 18.0 MB
  94. 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt 15.3 KB
  95. 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp4 9.4 MB
  96. 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt 6.0 KB
  97. 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp4 12.0 MB
  98. 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt 9.7 KB
  99. 2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp4 23.4 MB
  100. 2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.srt 16.7 KB
  101. 2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.mp4 13.5 MB
  102. 2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.srt 8.1 KB
  103. 2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.mp4 20.8 MB
  104. 2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.srt 12.2 KB
  105. 2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.mp4 4.5 MB
  106. 2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.srt 5.4 KB
  107. 2/4. Understanding the Concepts of VPNs/1. Introduction.mp4 960.4 KB
  108. 2/4. Understanding the Concepts of VPNs/1. Introduction.srt 1.4 KB
  109. 2/4. Understanding the Concepts of VPNs/2. VPN Basics.mp4 2.7 MB
  110. 2/4. Understanding the Concepts of VPNs/2. VPN Basics.srt 4.3 KB
  111. 2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.mp4 8.3 MB
  112. 2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.srt 12.9 KB
  113. 2/4. Understanding the Concepts of VPNs/4. SSL VPNs.mp4 3.1 MB
  114. 2/4. Understanding the Concepts of VPNs/4. SSL VPNs.srt 5.9 KB
  115. 2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.mp4 3.7 MB
  116. 2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.srt 5.9 KB
  117. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.mp4 1.3 MB
  118. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.srt 2.0 KB
  119. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.mp4 2.4 MB
  120. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.srt 3.0 KB
  121. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.mp4 21.6 MB
  122. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.srt 15.2 KB
  123. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.mp4 9.5 MB
  124. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.srt 7.2 KB
  125. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.mp4 15.5 MB
  126. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.srt 9.2 KB
  127. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.mp4 21.7 MB
  128. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.srt 13.1 KB
  129. 2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.mp4 1.6 MB
  130. 2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.srt 2.2 KB
  131. 2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.mp4 5.3 MB
  132. 2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.srt 7.6 KB
  133. 2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.mp4 8.9 MB
  134. 2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.srt 8.4 KB
  135. 2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.mp4 21.5 MB
  136. 2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.srt 16.9 KB
  137. 2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.mp4 11.8 MB
  138. 2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.srt 9.8 KB
  139. 2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.mp4 7.1 MB
  140. 2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.srt 4.3 KB
  141. 2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.mp4 16.1 MB
  142. 2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.srt 9.5 KB
  143. 3/1. Course Overview/1. Course Overview.mp4 3.4 MB
  144. 3/1. Course Overview/1. Course Overview.srt 2.3 KB
  145. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.mp4 4.5 MB
  146. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.srt 6.0 KB
  147. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.mp4 8.0 MB
  148. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.srt 10.8 KB
  149. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.mp4 36.5 MB
  150. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.srt 20.6 KB
  151. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.mp4 11.7 MB
  152. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.srt 9.0 KB
  153. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.mp4 14.7 MB
  154. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.srt 8.3 KB
  155. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.mp4 21.1 MB
  156. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.srt 17.1 KB
  157. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.mp4 17.0 MB
  158. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.srt 14.7 KB
  159. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.mp4 21.5 MB
  160. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.srt 18.8 KB
  161. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.mp4 14.8 MB
  162. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.srt 15.8 KB
  163. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.mp4 20.1 MB
  164. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.srt 17.0 KB
  165. 3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.mp4 2.4 MB
  166. 3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.srt 3.2 KB
  167. 3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.mp4 11.0 MB
  168. 3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.srt 16.6 KB
  169. 3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.mp4 20.3 MB
  170. 3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.srt 13.1 KB
  171. 3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.mp4 28.4 MB
  172. 3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.srt 19.2 KB
  173. 3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.mp4 14.6 MB
  174. 3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.srt 9.3 KB
  175. 3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.mp4 10.5 MB
  176. 3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.srt 8.9 KB
  177. 3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.mp4 4.3 MB
  178. 3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.srt 5.8 KB
  179. 3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.mp4 1.4 MB
  180. 3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.srt 1.9 KB
  181. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).mp4 6.2 MB
  182. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).srt 7.6 KB
  183. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.mp4 6.2 MB
  184. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.srt 7.6 KB
  185. 3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.mp4 16.3 MB
  186. 3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.srt 10.8 KB
  187. 3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.mp4 7.5 MB
  188. 3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.srt 6.7 KB
  189. 3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.mp4 3.1 MB
  190. 3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.srt 3.5 KB
  191. 3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.mp4 5.1 MB
  192. 3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.srt 8.3 KB
  193. 3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.mp4 6.8 MB
  194. 3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.srt 11.1 KB
  195. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).mp4 18.3 MB
  196. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).srt 14.2 KB
  197. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.mp4 18.3 MB
  198. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.srt 14.2 KB
  199. 3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.mp4 5.7 MB
  200. 3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.srt 4.4 KB
  201. 3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.mp4 21.7 MB
  202. 3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.srt 14.6 KB
  203. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).mp4 11.4 MB
  204. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).srt 7.2 KB
  205. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.mp4 11.4 MB
  206. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.srt 7.2 KB
  207. 3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.mp4 5.6 MB
  208. 3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.srt 8.2 KB
  209. 3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.mp4 3.1 MB
  210. 3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.srt 5.2 KB
  211. 4/1. Course Overview/1. Course Overview.mp4 2.9 MB
  212. 4/1. Course Overview/1. Course Overview.srt 2.1 KB
  213. 4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.mp4 13.8 MB
  214. 4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.srt 14.2 KB
  215. 4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.mp4 11.5 MB
  216. 4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.srt 10.9 KB
  217. 4/2. Implement High Availability/3. Globomantics HA Deployment.mp4 8.3 MB
  218. 4/2. Implement High Availability/3. Globomantics HA Deployment.srt 8.5 KB
  219. 4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.mp4 19.1 MB
  220. 4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.srt 12.0 KB
  221. 4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.mp4 14.1 MB
  222. 4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.srt 7.8 KB
  223. 4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.mp4 13.7 MB
  224. 4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.srt 6.8 KB
  225. 4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.mp4 23.2 MB
  226. 4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.srt 13.2 KB
  227. 4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.mp4 13.8 MB
  228. 4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.srt 12.6 KB
  229. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.mp4 10.9 MB
  230. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.srt 10.1 KB
  231. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.mp4 12.6 MB
  232. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.srt 8.3 KB
  233. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.mp4 10.5 MB
  234. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.srt 13.3 KB
  235. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.mp4 9.0 MB
  236. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.srt 6.1 KB
  237. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.mp4 13.4 MB
  238. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.srt 7.4 KB
  239. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.mp4 16.4 MB
  240. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.srt 9.8 KB
  241. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.mp4 7.3 MB
  242. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.srt 5.5 KB
  243. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.mp4 18.5 MB
  244. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.srt 13.0 KB
  245. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.mp4 22.4 MB
  246. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.srt 16.4 KB
  247. 4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.mp4 12.1 MB
  248. 4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.srt 9.7 KB
  249. 4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.mp4 19.0 MB
  250. 4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.srt 13.8 KB
  251. 4/4. Implement Panorama Device Groups/3. Panorama Objects.mp4 4.2 MB
  252. 4/4. Implement Panorama Device Groups/3. Panorama Objects.srt 4.8 KB
  253. 4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.mp4 19.0 MB
  254. 4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.srt 13.3 KB
  255. 4/4. Implement Panorama Device Groups/5. Panorama Policies.mp4 2.9 MB
  256. 4/4. Implement Panorama Device Groups/5. Panorama Policies.srt 3.0 KB
  257. 4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.mp4 20.1 MB
  258. 4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.srt 14.5 KB
  259. 4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.mp4 21.3 MB
  260. 4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.srt 11.6 KB
  261. 4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.mp4 20.5 MB
  262. 4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.srt 13.8 KB
  263. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.mp4 5.0 MB
  264. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.srt 4.0 KB
  265. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.mp4 11.3 MB
  266. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.srt 8.9 KB
  267. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.mp4 17.7 MB
  268. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.srt 10.1 KB
  269. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.mp4 30.2 MB
  270. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.srt 11.8 KB
  271. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.mp4 17.0 MB
  272. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.srt 9.4 KB
  273. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.mp4 29.4 MB
  274. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.srt 17.0 KB
  275. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.mp4 5.7 MB
  276. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.srt 7.1 KB
  277. 5/1. Course Overview/1. Course Overview.mp4 2.8 MB
  278. 5/1. Course Overview/1. Course Overview.srt 1.9 KB
  279. 5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.mp4 12.8 MB
  280. 5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.srt 15.2 KB
  281. 5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.mp4 15.4 MB
  282. 5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.srt 14.7 KB
  283. 5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.mp4 14.6 MB
  284. 5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.srt 9.4 KB
  285. 5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.mp4 23.6 MB
  286. 5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.srt 18.7 KB
  287. 5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.mp4 12.9 MB
  288. 5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.srt 8.8 KB
  289. 5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.mp4 10.6 MB
  290. 5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.srt 7.9 KB
  291. 5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.mp4 15.0 MB
  292. 5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.srt 8.5 KB
  293. 5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.mp4 24.4 MB
  294. 5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.srt 17.3 KB
  295. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.mp4 11.3 MB
  296. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.srt 12.9 KB
  297. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.mp4 15.2 MB
  298. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.srt 15.2 KB
  299. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.mp4 21.7 MB
  300. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.srt 12.9 KB
  301. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.mp4 3.3 MB
  302. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.srt 4.2 KB
  303. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.mp4 14.5 MB
  304. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.srt 10.0 KB
  305. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.mp4 13.2 MB
  306. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.srt 9.3 KB
  307. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.mp4 11.6 MB
  308. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.srt 9.8 KB
  309. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.mp4 15.6 MB
  310. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.srt 11.5 KB
  311. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.mp4 14.6 MB
  312. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.srt 16.2 KB
  313. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.mp4 16.1 MB
  314. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.srt 12.1 KB
  315. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.mp4 9.0 MB
  316. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.srt 6.6 KB
  317. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.mp4 9.6 MB
  318. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.srt 6.4 KB
  319. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.mp4 2.0 MB
  320. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.srt 2.2 KB
  321. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.mp4 22.4 MB
  322. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.srt 18.6 KB
  323. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.mp4 4.8 MB
  324. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.srt 6.3 KB
  325. 6/1. Course Overview/1. Course Overview.mp4 3.2 MB
  326. 6/1. Course Overview/1. Course Overview.srt 2.4 KB
  327. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.mp4 14.7 MB
  328. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.srt 14.7 KB
  329. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.mp4 29.9 MB
  330. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.srt 15.1 KB
  331. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.mp4 11.6 MB
  332. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.srt 6.9 KB
  333. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.mp4 13.1 MB
  334. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.srt 9.5 KB
  335. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.mp4 20.8 MB
  336. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.srt 13.0 KB
  337. 6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.mp4 12.3 MB
  338. 6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.srt 9.4 KB
  339. 6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.mp4 18.5 MB
  340. 6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.srt 11.7 KB
  341. 6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.mp4 12.0 MB
  342. 6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.srt 7.3 KB
  343. 6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.mp4 24.3 MB
  344. 6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.srt 11.5 KB
  345. 6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.mp4 9.3 MB
  346. 6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.srt 6.9 KB
  347. 6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.mp4 13.6 MB
  348. 6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.srt 8.0 KB
  349. 6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.mp4 12.1 MB
  350. 6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.srt 6.0 KB
  351. 6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.mp4 4.2 MB
  352. 6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.srt 4.0 KB

Similar Posts:

  1. E-books Humphries A. Implementing and Managing Collaborative Relationships 2022 June 23, 2023, 12:33 p.m.
  2. E-books Von Oven P. Learning Vmware Workstation for Windows. Implementing..Managing 2024 Dec. 19, 2023, 12:16 p.m.
  3. E-books Avila J. Hands-On Salesforce Data Cloud. Implementing and Managing...2024 Aug. 12, 2024, 7:08 p.m.
  4. E-books Modern DevOps Practices - Implement, secure, and manage applications on the publ Sept. 16, 2024, 6:23 p.m.
  5. E-books Von Oven P. Implementing VMware Dynamic Environment Manager.2022 Jan. 30, 2023, 6:14 a.m.