• Regeln für den Video-Bereich:

    In den Börsenbereich gehören nur Angebote die bereits den Allgemeinen Regeln entsprechen.

    Einteilung

    - Folgende Formate gehören in die angegeben Bereiche:
    - Filme: Encodierte Filme von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format DivX, XviD und x264.
    - DVD: Filme im Format DVD5, DVD9 und HD2DVD.
    - HD: Encodierte Filme mit der Auflösung 720p oder darüber von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format x264.
    - 3D: Encodierte Filme von BluRay, die in einem 3D Format vorliegen. Dies gilt auch für Dokus, Animation usw.
    - Serien: Cartoon/Zeichentrick, Anime, Tutorials, Dokumentationen, Konzerte/Musik, Sonstiges sind demnach in die entsprechenden Bereiche einzuordnen, auch wenn sie beispielsweise im High Definition-Format oder als DVD5/DVD9/HD2DVD vorliegen. Ausnahme 3D.
    - Bereich Englisch: Englische Releases gehören immer in diesen Bereich.
    - Bereich Talk: Der Bereich, in dem über die Releases diskutiert werden kann, darf, soll und erwünscht ist.


    Angebot/Beitrag erstellen

    - Ein Beitrag darf erst dann erstellt werden, wenn der Upload bei mindestens einem OCH komplett ist. Platzhalter sind untersagt.
    - Bei einem Scenerelease hat der Threadtitel ausschließlich aus dem originalen, unveränderten Releasenamen zu bestehen. Es dürfen keine Veränderungen wie z.B. Sterne, kleine Buchstaben o.ä. vorgenommen werden. Ausnahme Serienbörse:
    - Bei einem Sammelthread für eine Staffel entfällt aus dem Releasename natürlich der Name der Folge. Beispiel: Die Simpsons S21 German DVDRip XviD - ITG
    - Dementsprechend sind also u.a. verboten: Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist.

    Aufbau des Angebots und Threadtitel

    Der Titel nach folgendem Muster erstellt zu werden. <Name> [3D] [Staffel] [German] <Jahr> <Tonspur> [DL] [Auflösung] <Quelle> <Codec> - <Group>
    Beispiel: The Dark Knight German 2008 AC3 DVDRip XviD - iND
    Beispiel: The Dark Knight 2008 DTS DL BDRip x264 - iND
    Beispiel: The Dark Knight 2008 AC3 DL BDRip XviD - iND
    Beispiel: The Dark Knight German 2008 AC3 720p BluRay x264 iND
    Beispiel: The Dark Knight 2008 DTS DL 1080p BluRay x264 iND
    Beispiel: Die Simpsons S01 German AC3 DVDRip XviD iND
    Beispiel: Die Simpsons S20 German AC3 720p BluRay x264 iND
    Beispiel: Sword Art Online II Ger Sub 2014 AAC 1080p WEBRip x264 - peppermint
    Entsprechend sind also u.a. verboten: Sonderzeichen wie Klammern, Sterne, Ausrufezeichen, Unterstriche, Anführungszeichen / Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist
    Ausnahmen hiervon können in den Bereichen geregelt sein.

    Die Beiträge sollen wie folgt aufgebaut werden:
    Überschrift entspricht dem Threadtitel
    Cover
    kurze Inhaltsbeschreibung
    Format, Größe, Dauer sind gut lesbar für Downloader außerhalb des Spoilers zu vermerken
    Nfo sind immer Anzugeben und selbige immer im Spoiler in Textform.
    Sind keine Nfo vorhanden z.B. Eigenpublikationen, sind im Spoiler folgende Dateiinformationen zusätzlich anzugeben :
    Quelle
    Video (Auflösung und Bitrate)
    Ton (Sprache, Format und Bitrate der einzelnen Spuren)
    Untertitel (sofern vorhanden)
    Hosterangabe in Textform außerhalb eines Spoiler mit allen enthaltenen Hostern.
    Bei SD kann auf diese zusätzlichen Dateiinformationen verzichtet werden.

    Alle benötigten Passwörter sind, sofern vorhanden, in Textform im Angebot anzugeben.
    Spoiler im Spoiler mit Kommentaren :"Schon Bedankt?" sind unerwünscht.


    Releases

    - Sind Retail-Release verfügbar, sind alle anderen Variationen untersagt. Ausnahmen: Alle deutschen Retail-Release sind CUT, in diesem Fall sind dubbed UNCUT-Release zulässig.
    - Im Serien-Bereich gilt speziell: Wenn ein Retail vor Abschluss einer laufenden Staffel erscheint, darf diese Staffel noch zu Ende gebracht werden.62
    - Gleiche Releases sind unbedingt zusammenzufassen. Das bedeutet, es ist zwingend erforderlich, vor dem Erstellen eines Themas per Suchfunktion zu überprüfen, ob bereits ein Beitrag mit demselben Release besteht. Ist dies der Fall, ist der bereits vorhandene Beitrag zu verwenden.
    - P2P und Scene Releases dürfen nicht verändert oder gar unter einem iND Tag eingestellt werden.


    Support, Diskussionen und Suche

    - Supportanfragen sind entweder per PN oder im Bereich Talk zu stellen.
    - Diskussionen und Bewertungen sind im Talk Bereich zu führen. Fragen an die Uploader haben ausschließlich via PN zu erfolgen, und sind in den Angeboten untersagt.
    - Anfragen zu Upload-Wünschen sind nur im Bereich Suche Video erlaubt. Antworten dürfen nur auf Angebote von MyBoerse.bz verlinkt werden.


    Verbote

    - Untersagt sind mehrere Formate in einem einzigen Angebotsthread, wie beispielsweise das gleichzeitige Anbieten von DivX/XviD, 720p und 1080p in einem Thread. Pro Format, Release und Auflösung ist ein eigener Thread zu eröffnen.
    - Grundsätzlich ebenso verboten sind Dupes. Uploader haben sich an geeigneter Stelle darüber zu informieren, ob es sich bei einem Release um ein Dupe handelt.
    - Gefakte, nur teilweise lauffähige oder unvollständige Angebote sind untersagt. Dies gilt auch für eigene Publikationen, die augenscheinlich nicht selbst von z.B. einer DVD gerippt wurden. Laufende Serien, bei denen noch nicht alle Folgen verfügbar sind, dürfen erstellt und regelmäßig geupdatet werden.
    - Untersagt sind Angebote, welche nur und ausschließlich in einer anderen Sprache als deutsch oder englisch vorliegen. Ausnahmen sind VORHER mit den Moderatoren zu klären.


    Verstoß gegen die Regeln

    - Angebote oder Beiträge, die gegen die Forenregeln verstoßen, sind über den "Melden"-Button im Beitrag zu melden.
  • Bitte registriere dich zunächst um Beiträge zu verfassen und externe Links aufzurufen.




Englische Tutorials

CBT Nuggets Cisco CCNP Security 300-209 SIMOS

CBT-Nuggets-Cisco-CCNP-Security-300-209-SIMOS.jpg


CBT Nuggets Cisco CCNP Security 300-209 SIMOS
.MP4 | Video: 1280x720, 15 fps(r) | Audio: AAC, 22050 Hz, 2ch | 1.96 GB
Duration: 9 hours 14 minutes | Genre: eLearning Video | Language: English

This Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) course provides training on how to configure and implement a variety of Virtual Private Network (VPN) solutions on the Cisco ASA firewall and Cisco IOS software platforms. Topics include IKEv2, DMVPN, FlexVPN, GETVPN, and troubleshooting.


Related area of expertise:
Cisco security

Recommended skills:
CCNA Route/Switch and CCNA Security certification (or equivalent knowledge and skills)
Knowledge of Microsoft Windows
CCNA Security is a pre-requisite for the CCNP Security certification

Recommended equipment:
IOS that supports DMVPN, GETVPN and FlexVPN
IOS and ASA that support IKEv2

Related certifications:
CCNP Security. This course (SIMOS exam # 300-209) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP© Security) certification

Related job functions:
Network Analyst
Network Engineer
Network Technician
Network Designer
Security Analyst
Security Auditor
Penetration Tester
Security Architect
Technical Manager

1. Welcome and Overview (00:06:36)
In this Nugget, Keith discusses the prerequisites that enable you to get the most from this course, and shares some tips for you to get the most out of this VPN-focused course.
2. Naked DMVPN (00:43:40)
Dynamic Multipoint VPNs (DMVPNs) are a great way to set up full-mesh connectivity with manually setting up n(n-1)/2 static tunnels. In this Nugget, Keith talks with you about the core pieces that make up DMVPNs, including Next Hop Resolution Protocol (NHRP), multipoint GRE tunnel interfaces, dynamic routing protocols, and more. Configuration and verification also is included in this video. Adding IPsec to the DMVPN is covered in the next Nugget.

This video maps to "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
3. Protected DMVPN (00:32:17)
IPsec can be added to the DMVPN topology (and usually is) to provide encryption, authentication, and data integrity services for the packets traveling between the mGRE interfaces on the DMVPN routers. This Nugget presumes the viewer has viewed the previous Nugget in this course, "Naked DMVPN," and has a basic CCNA Security-level understanding of IKEv1 (IKEv1 and other cryptographic fundamentals can be reviewed in the CCNA Security course, specifically the videos "Cryptography Essesntials" and "IPsec Site to Site VPNs", which are part of the CCNA Security course).

This video maps to "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
4. TShoot DMVPN (00:37:23)
"What could go wrong?" These are the famous last words of the technician who didn't learn to identify and correct problems that can cause a DMVPN network to fail. In this Nugget, you join Keith to diagnose, troubleshoot and correct multiple problems in an existing DMVPN network.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
5. IKE Call Admission Control (00:25:17)
A brute force IKE attack, or even a malfunctioning system making multiple requests, can place a heavy load on the router, which may result in a Denial of Service (DoS) attack. In this Nugget, Keith chats about how IKE Call Admission Control (CAC) can be used to limit the number of IKE sessions that can be negotiated and set up on the router.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
6. VTI Site2Site VPNs (00:25:24)
Virtual Tunnel Interfaces (VTIs) are a simpler method of creating IPsec Site to Site tunnels (compared to traditional Crypto Maps), and VTIs offer the benefit of placing specific policies to either encrypted or clear-text traffic that is going through an interface. This Nugget discusses VTIs, and then demonstrates the configuration and verification of a VTI based static Site-to-Site VPN.

This video maps to the "Secure Communications" and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
7. Dynamic VTI Hub (00:23:54)
Using a Dynamic Virtual Tunnel Interface (DVTI), we can avoid the manual creation of multiple tunnel interfaces on the hub, but instead create a virtual template, and have the router automagically use that template to create individual virtual access interfaces on demand for IPsec sessions between it and the remote routers.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
8. FlexVPN Site2Site (00:37:49)
IKEv2 and the new methods of configuring the tunnels might take a bit of getting used to. In this Nugget, Keith helps ease that process by talking with you about the components of IKEv2 including policy, proposal, profile, and key ring. A demonstration of implementing IKEv2 on Cisco IOS is included as well.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
9. FlexVPN DVTI (00:09:12)
This Nugget explains some of the benefits of IKEv2, and demonstrates the conversion from a fixed tunnel interface to a virtual access interface using a virtual template and IKEv2.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
10. FlexVPN Smart Defaults (00:25:56)
Smart defaults can be used to save configuration time, and may be customized for your needs. In this Nugget, Keith demonstrates the defaults for (and customization of) the IKEv2 proposal, IPsec transform-set and IPsec profile.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
11. Certificate Install (00:29:19)
In this Nugget, Keith walks you through configuring an IOS router as a Certificate Authority (CA), as well as other routers becoming CA clients that will authenticate and enroll with the CA (using Simple Certificate Enrollment Protocol, SCEP) - in preparation for using their certificates as part of rsa-sig authentication.

This video maps to the "Secure Communications", and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
12. RSA-Sig IKEv2 Authentication (00:19:41)
Using digital certificates, peers who have a a common trusted CA, can authenticate and use the peer's cert and public key to verify the peer's digital signatures for the authentication of the IKEv2 tunnel. In this Nugget, Keith demonstrates this IKEv2 implementation. Supporting files are contained in the NuggeLab download associated with this course.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
13. DVTI IKEv2 Hub and Spoke RSA-Sig (00:16:56)
This Nugget demonstrates how to implement and verify the following: Dynamic Virtual Tunnel Interface (DVTI) on the Hub, Static Tunnel Interfaces on the Spokes, and IKEv2 with RSA-Sig for authentication. Configuration files, including the full final configs, are in the NuggetLab files associated with this course.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
14. IKEv2 Pushing Policy (00:12:51)
Adding network authorization and AAA can allows us to push policy down to VPN peers. This is implemented by creating a new (or modifying the default) IKEv2 authorization policy, and including that IKEv2 authorization policy in the IKEv2 profile.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
15. FlexVPN Clients (00:30:41)
Setting up a spoke as a FlexVPN "Client" allows opportunities for additional features including multiple peers for fault tolerance, and the pushing of networks based on the IKEv2 authorization policy configured. In this Nugget, Keith walks you through reconfiguring the spoke routers to be FlexVPN clients. The use of the IKEv2 authorization profile also is demonstrated to advertise routes between the FlexVPN client and server.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
16. Spoke 2 Spoke FlexVPN (00:32:59)
FlexVPN borrows the Next Hop Resolution Protocol (NHRP) from DMVPN to allow a hub and spoke topology to dynamically build spoke to spoke tunnels. The NuggetLab files contain all the configuration commands used in this video, along with the final working configuration for all four routers.

This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
17. FlexVPN Troubleshooting (00:20:18)
In this Nugget, Keith walks you through a troubleshooting scenario, leveraging show commands and pings to isolate the problems in a FlexVPN network.

This video maps to the "Troubleshooting, Monitoring, and Reporting Tools" section of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
18. GETVPN (00:50:45)
Group Encrypted Transport VPN (GETVPN) overcomes the delays often associated with creating a spoke-to-spoke tunnel, as there are no formal IPsec tunnels created between group members. In this Nugget, Keith explains and then demonstrates the implementation and verification of GETVPN.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
19. ASA 2 IOS IKEv2 (Site-to-Site IPsec VPN) (00:23:15)
In this Nugget, Keith explains and demonstrates the configuration on the ASA to support both IKEv1 and IKEv2 site-to-site tunnels, as well as configuring a peer IOS router. The router demonstration includes IKEv1 first, with the verification commands to confirm it is working, and then IKEv2 and verification once again that it is working.

This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
20. Verify and TShoot IPsec (00:07:29)
In this Nugget, Keith demonstrates where to look inside ASDM to verify or configure the IPsec Site-to-Site configuration implemented from the CLI in the previous video. Note: The following three videos are from the CCNP Security VPN v2.0 course, and it's recommended that you watch them before watching the next Nugget in this course.

ASA VPN Options Site to Site IPsec VPNs Troubleshooting IPsec Site-to-Site VPNs

This video along with the 3 assigned videos map to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
21. RA VPNs (00:12:17)
Remote Access (RA) VPNs play a critical role in secure mobility solutions. In this Nugget, Keith refers to some IOS VPN server documentation that may be useful for administrators of IOS based RA VPNs.

This video includes an assignment of watching the following videos from the CCNP Security VPNv2.0 course: VPN Profiles and Policies; Implementing Clientless SSL VPNs; AnyConnect SSL VPNs; Smart Tunnels and Plugins; AAA VPN Authentication; Troubleshooting Clientless SSL VPNs; Troubleshooting AnyConnect Client SSL VPNs; Cisco Secure Desktop and DAP; High Availability VPNs; and VPN Pieces and Parts.

These videos from the CCNP Security VPN v2.0 course are relevant for real-world experience, as well as the SIMOS 300-209 certification exam from Cisco. The list of assigned videos from this lesson also can be found in the NuggetLab files as a document named "Video Assignment.txt."

This video, along with the assigned videos, maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
22. AnyConnect Client Profile (00:14:24)
Whoever thought an XML file could be so powerful? In this Nugget, Keith demonstrates how to modify an AnyConnect Client Profile (the .xml file) on the ASA, and have that profile be automatically downloaded to AnyConnect Clients when they connect. This is an effective way to modify the AnyConnect client profile of remote systems using the ASA as a central distribution point.

This video maps to the "Secure Communications," "Troubleshooting," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).
23. Closing Thoughts (00:15:33)
In this Nugget, Keith shares some tips for continued growth and success, along with some troubleshooting strategies.

This video maps to the "Secure Communications" and "Troubleshooting," sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209).

02-Naked-DMVPN-s.jpg



...
 
CBT Nuggets - Cisco CCNP Security 300-208 SISAS

CBT-Nuggets-Cisco-CCNP-Security-300-208-SISAS.jpg


CBT Nuggets - Cisco CCNP Security 300-208 SISAS
.MP4 | Video: 1280x720, 12 fps(r) | Audio: AAC, 22050 Hz, 2ch | 1.53 GB
Duration: 5 hours 32 minutes | Genre: eLearning Video | Language: English

This Implementing Cisco Secure Access Solutions (SISAS) (300-208) video training course addresses the concepts and implementation of secure access using 802.1X and Cisco Identity Services Engine (ISE). Topics covered include certificates, MAC authentication Bypass (MAB), AnyConnect Network Access Manager (NAM), active directory integration, authentication and authorization policies, profiling, posturing, MACsec, TrustSec, Sponsor Portals, BYOD, and more.

Recommended Skills:

CCNA Route/Switch and CCNA Security certification (or equivalent knowledge and skills)
Knowledge of Microsoft Windows
CCNA Security is a pre-requisite for the CCNP Security certification

Recommended Equipment:

Switch
Windows AD
Identity Services Engine (ISE)
AnyConnect suite (NAM and profile editor)
1 or more PCs to connect to switch

Related Certifications:

CCNP Security. This course (SISAS exam # 300-208) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP© Security) certification

Related Job Functions:

Network engineer
Network technician
Network designer
Security analyst
Security auditor
Penetration tester
Security architect
Technical manager

The focus of this course is to assist you in learning how to implement and manage network access security using Cisco Identity Services Engine (ISE) and 802.1x solutions. The CCNA Wireless course is highly recommended as wireless access can be closely integrated with ISE.

03-802-1x-Wired-s.jpg



...
 
CBT Nuggets - Cisco CCNP Security 300-207 SITCS

CBT-Nuggets-Cisco-CCNP-Security-300-207-SITCS.jpg


CBT Nuggets - Cisco CCNP Security 300-207 SITCS
.MP4 | Video: 1280x720, 15 fps(r) | Audio: AAC, 22050 Hz, 2ch | 832 MB
Duration: 2 hours 48 minutes | Genre: eLearning Video | Language: English

This Implementing Cisco Threat Control Solutions (SITCS) 300-207 course provides training on integration of Intrusion Prevention System (IPS, not SourceFire) context-aware firewall components (not SourceFire), as well as web (Cloud) and email security solutions.

Note: The exam associated with this course retired on March 31, 2017. Learners should plan accordingly to sit for the exam before its official retirement.

Recommended Experience

CCNA Routing and Switching and CCNA Security certification (or equivalent knowledge and skills)
Knowledge of Microsoft Windows
CCNA Security is a pre-requisite for the CCNP Security certification

Recommended Equipment

Evaluation or test lab licenses for the Email Security Appliance (ESA), Web Security Appliance (WSA)
ASA Firewall
IOS Router
Virtualization Environment, such as VMware

Related Certifications

CCNP Security. This course (SITCS 300-207) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP Security) certification

Related Job Functions

Network Analyst
Network Engineer
Network Technician
Network Designer
Security Analyst
Security Auditor
Penetration Tester
Security Architect
Technical Manager

Keith Barker has been a CBT Nuggets trainer since 2012 and holds a variety of networking and security certifications, including CCIE R&S, CCIE Security, (ISC)2 CISSP, Palo Alto CNSE, and Check Point CCSA.

03-Bootstrapping-the-WSA-s.jpg



...
 
CBT Nuggets - Cisco CCNP Security 300-206 SENSS

Jt-Fu-Kgw-Fwf-Xw24y604n-QEl9-HHC4-Pi-DW1.jpg


CBT Nuggets - Cisco CCNP Security 300-206 SENSS
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.32 GB
Duration: 10 hours 22 minutes | Genre: eLearning Video | Language: English

This Cisco training course with Keith Barker will teach you how to implement Cisco Edge network security solutions. Learn to configure and implement security on Cisco network perimeter edge devices as you prepare for the 300-206 SENSS exam, one of four exams that must be passed to receive your CCNP Security certification.

Recommended Experience

An understanding of concepts taught in ICND1 and ICND2
CCNA Security is a pre-requisite for the CCNP Security certification

Recommended Equipment

Switch, IOS and ASA. Emulated IOS and ASA may be used.

Related Certifications

CCNP Security. This course (SENSS exam # 300-206) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP© Security) certification

Related Job Functions

Network Analyst
Network Engineer
Network Technician
Network Designer
Security Analyst
Security Auditor
Penetration Tester
Security Architect
Technical Manager

Keith Barker has been a CBT Nuggets trainer since 2012 and working with networking and security since 1985. Keith has received several security-related certifications including Cisco CCIE Security, Palo Alto CNSE, Check Point CCSA, CISSP and more.

02-Port-Security-s.jpg



...
 
The Art of Hacking (Video Collection) - Part 1

Xu-Aon8-I9-Wyz8e7-Yd-Wn-M9-Or9u-MPEJ0bc-Y.jpg


The Art of Hacking (Video Collection) - Part 1
MP4 | Video: AVC 1280 x 720 | Audio: AAC 48 KHz 2ch | Duration: 18:02:05 | 29 GB
Genre: eLearning | Language: English

The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture.

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker.

Courses include:

Security Penetration Testing (The Art of Hacking Series) LiveLessons
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series) LiveLessons
Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments
About the Authors

Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.  He is the author of several cybersecurity books and video courses.

Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG).  He has over 20 years of experience in the networking and security industry.  He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries.  He was formerly with Spirent Communications and the U.S. Air Force.  He is CCIE certified in the Routing & Switching and Service Provider tracks, which he has held for over 10 years.

Jon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcare and credit union industries. Jon has been a lead contributor to securing a wide variety of organizations in healthcare, education, finance, legal, and government industries throughout his 13+ years in the security field. He co-chairs the Privacy and Security Workgroup at the North Carolina Healthcare Information and Communications Alliance (NCHICA). Jon was the former President of the BSides Raleigh Security conference. Stern Security's website:
Ron Taylor has been in the Information Security field for almost 20 years. Ten of those years were spent in consulting where he gained experience in many areas. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance.   In 2012, he moved into a position with the Security Research & Operations group (PSIRT) where his focus was mostly on penetration testing of Cisco products and services. 

Ron was also involved in developing and presenting security training to internal development and test teams globally.  Additionally, he provided consulting support to many product teams as an SME on product security testing.  In his current role, he is a Consulting Systems Engineer specializing in Cisco's security product line. Certifications include GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP and MCSE.  Ron is also a Cisco Security Blackbelt, SANS mentor, Co-Founder and President of the Raleigh BSides Security Conference, and member of the Packet Hacking Village team at Defcon.

Who Should Take This Course

Any network and security professional who is starting a career in ethical hacking and penetration testing
Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP)and any other ethical hacking certification
Any cyber security professional who wants to learn the skills required to becoming a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts.

004-1-2-Getting-Started-with-Ethical-Hacking-and-Pen-Testing-s.jpg




...
 
The Art of Hacking (Video Collection) - Part 2

Xu-Aon8-I9-Wyz8e7-Yd-Wn-M9-Or9u-MPEJ0bc-Y.jpg


The Art of Hacking (Video Collection) - Part 2
MP4 | Video: AVC 1280 x 720 | Audio: AAC 48 KHz 2ch | Duration: 08:30:32 | 12.49 GB
Genre: eLearning | Language: English

The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture.

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker.

Courses include:

Security Penetration Testing (The Art of Hacking Series) LiveLessons
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons
Enterprise Penetration Testing and Continuous Monitoring (the Art of Hacking Series) LiveLessons
Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments
About the Authors

Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities.  He is the author of several cybersecurity books and video courses.

Chris McCoy is a technical leader in Cisco's Advanced Security Initiatives Group (ASIG).  He has over 20 years of experience in the networking and security industry.  He has a passion for computer security, finding flaws in mission-critical systems, and designing mitigations to thwart motivated and resourceful adversaries.  He was formerly with Spirent Communications and the U.S. Air Force.  He is CCIE certified in the Routing & Switching and Service Provider tracks, which he has held for over 10 years.

Jon Sternstein is the Founder and Principal Consultant of Stern Security, a security company focused on healthcare and credit union industries. Jon has been a lead contributor to securing a wide variety of organizations in healthcare, education, finance, legal, and government industries throughout his 13+ years in the security field. He co-chairs the Privacy and Security Workgroup at the North Carolina Healthcare Information and Communications Alliance (NCHICA). Jon was the former President of the BSides Raleigh Security conference. Stern Security's website:
Ron Taylor has been in the Information Security field for almost 20 years. Ten of those years were spent in consulting where he gained experience in many areas. In 2008, he joined the Cisco Global Certification Team as an SME in Information Assurance.   In 2012, he moved into a position with the Security Research & Operations group (PSIRT) where his focus was mostly on penetration testing of Cisco products and services. 

Ron was also involved in developing and presenting security training to internal development and test teams globally.  Additionally, he provided consulting support to many product teams as an SME on product security testing.  In his current role, he is a Consulting Systems Engineer specializing in Cisco's security product line. Certifications include GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP and MCSE.  Ron is also a Cisco Security Blackbelt, SANS mentor, Co-Founder and President of the Raleigh BSides Security Conference, and member of the Packet Hacking Village team at Defcon.

Who Should Take This Course

Any network and security professional who is starting a career in ethical hacking and penetration testing
Individuals preparing for the CompTIA PenTest+, the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP)and any other ethical hacking certification
Any cyber security professional who wants to learn the skills required to becoming a professional ethical hacker or who wants to learn more about general security penetration testing methodologies and concepts.

196-2-1-Understanding-Wireless-Client-Attacks-and-Their-Motive.jpg



...
 
MasterClass - Hans Zimmer Teaches Film Scoring

Yh-Ra71-JHVi38-Eb-Fzo-ZTOf-Pl-Nu9p-Bnmum.jpg


MasterClass - Hans Zimmer Teaches Film Scoring
ts | Video: AVC 1920 x 1080 | Audio: AAC 44 KHz 2ch | Duration: 05:40:08 | 5.99 GB
Genre: eLearning | Language: English

Zimmer will teach aspiring filmmakers and musicians how to use music to tell a story. Hans Zimmer didnt see a film until he was 12 years old. Since then, hes scored over 150 films, including Inception, The Lion King, and The Dark Knight. In his MasterClass, the self-taught Academy Award winner teaches how he creates sounds from nothing, composes compelling character themes, and scores a movie before ever seeing it. By the end, youll have everything you need to tell your story.
Today, premiere education platform MasterClass announced that renowned composer Hans Zimmer will teach a film scoring class. In his first ever online class, Zimmer will teach aspiring filmmakers and musicians how to use music to tell a story. He will examine the inner workings of composition and covers a bevy of topics, like creating sound palates and establishing tempos. Students will even study examples from his own work and learn how to create music that defines a character.

Zimmer is best known for creating some of the most iconic, successful scores in modern film history. He has received four Grammy Awards, two Golden Globes, and an Oscar for Best Original Score for The Lion King. Some of his most popular scores include Terrence Malicks The Thin Red Line, Ridley Scotts The Gladiator and Christopher Nolans The Dark Knight trilogy.

MasterClass offers access to some of the best minds working in the film and music industry through affordable online courses. Through the platform, instructors create engaging online classes with interactive assignments and course materials that create a unique educational experience. Some of the previous instructors include Kevin Spacey, Aaron Sorkin, Werner Herzog and Serena Williams. Most recently, MasterClass announced another class taught by deadmau5 on electronic music production, continuing to strengthen its roster of music instructors.

0043efff.jpg

0043f001.jpg

0043f002.jpg



...
 
Zuletzt bearbeitet:
MasterClass - Dan Brown Teaches Writing Thrillers

Usl-Dkqo-Vjhgu-YFi-Nyk1g-TWknx9-Eis-Sqn.jpg


MasterClass - Dan Brown Teaches Writing Thrillers
MP4 | Video: AVC 1280 x 720 | Audio: AAC 48 KHz 2ch | Duration: 03:47:14 | 1.43 GB
Genre: eLearning | Language: English

Craft page-turning suspense
Packed with secret symbols and high-stakes suspense, Dan Brown's thrillers have sold more than 250 million copies, including one of the world's best-selling novels, The Da Vinci Code. In his MasterClass, Dan unveils his step-by-step process for turning ideas into gripping narratives. Learn his methods for researching like a pro, crafting characters, and sustaining suspense all the way to a dramatic surprise ending.

Lesson Plan

01 - Introduction
02 - The Anatomy of a Thriller
03 - Finding the Idea
04 - Choosing Locations
05 - Creating Heroes and Villains
06 - Universal Character Tools
07 - Character Case Study: The Da Vinci Code
08 - Research, Part 1
09 - Research, Part 2
10 - Building a Story From the Ground Up
11 - Creating Suspense, Part 1
12 - Creating Suspense, Part 2
13 - Writing Chapters and Scenes
14 - Selecting and Utilizing Point of View
15 - Exposition and Dialogue
16 - Editing and Rewriting
17 - Protecting Your Process
18 - Life As A Writer
19 - The Secret of Secrets

03-Finding-the-Idea-s.jpg



...
 
MasterClass - Dustin Hoffman Teaches Acting

004963d3.jpg


MasterClass - Dustin Hoffman Teaches Acting
MP4 | Video: AVC 960 x 540 | Audio: AAC 44 KHz 2ch | Duration: 05:20:46 | 2.03 GB
Genre: eLearning | Language: English

Learn Dustins Method
Dustin Hoffman believes that every great character is already inside youthe hard part is learning to access them.

In his first ever online class, the two-time Academy Award winning star of The Graduate, Tootsie, and Rain Man teaches you everything hes learned during his 50 year acting career.

For 24 lessons, Dustin will teach you everything he wanted to be taught by someone at the beginning of his career.

Lesson Plan

01. Dustin's Method
Dustin's approach to acting is unique. In this lesson, he reveals the principles of his method and how to start implementing it.

02. Working with a Co-Star - Jerry Maguire Scene Work Part 1
Dustin has had famous on-screen chemistry with the likes of Robert Redford, Tom Cruise and Meryl Streep. Watch as he teaches two strangers to build an instant bond on set, and then makes you try the same Jerry Maguire scene with a fellow student.

03. Relating to Your Character - Jerry Maguire Scene Work Part 2
Relating to your character is crucial to a great performance. Dustin teaches you how to read through the lines to add emotion and depth to your role.

04. Managing Your Nerves - Jerry Maguire Scene Work Part 3
Every good actor gets nervous, even Dustin. Vulnerability is key to bringing depth to a performance. Here's how to use your fears to get deeper into character.

05. Performing Honestly - Jerry Maguire Scene Work Part 4
Uncover and access the deepest layers of your personality so you can stop pretending and start being your character.

06. Critiquing Yourself - Jerry Maguire Scene Work Part 5
Dustin is his own harshest critic, even when the director is happy and the audience loves him. Learn how he finds ways to question, critique and improve his perfomance.

07. What I Learned in Acting Class
Dustin learned from the most prominent acting teachers of his day, including Lee Strasberg - hear the tips and stories that stuck with him.

08. Researching Your Character
Whether he's studying women's vocal patterns or sneaking into San Quentin prison-Dustin conducts detailed research to create memorable and believable characters.

09. Creating Your Character
The essence of Raymond Babbit came from an accidental vocal tick; Benjamin Braddock grew from Dustin's childhood memories. There's no one way to bring a new character to life, but these are some of the ways that have worked for Dustin.

10. Saying Your Lines
Memorizing your lines is just the first step. Here's how Dustin approaches a new script to bring life to words on a page.

11. Funny Business
You can't always plan for the laugh. Dustin explains how to develop your comic instincts and use everyday life as your comedic inspiration.

12. Staying In The Moment
When you leave the script behind and make things up as you go, the results can can be inspiring, fun, or sometimes flat-out embarrassing. You have to be willing to fail to triumph as an actor.

13. Stage and Screen
For a play, you rehearse for weeks. On a film set, you might get ten minutes. As an actor who trained for the stage, Dustin shares how he changed his approach to the craft for the camera.

14. Dustin's Story
From college dropout to Oscar-winning actor, learn a little bit more about your teacher..

15. Being Present - Good Will Hunting Scene Work Part 1
Learning to look beyond the script to what's not being said, and using that powerful subtext to reveal parts of yourself is the essence of Dustin's approach to acting. Dustin applies this lesson to a scene from Good Will Hunting.

16. Be Yourself to Be the Character - Good Will Hunting Scene Work Part 2
If the audience isn't seeing your secrets, you're doing it wrong. Pushing yourself to admit and accept your most painful and uncomfortable truths will help bring depth and honesty to the characters you play. See how brave you can learn to be.

17. Embracing Your Vulnerability - Good Will Hunting Scene Work Part 3
Nobody's perfect - and audiences will love you for it. Watch a scene from Good Will Hunting come to life when Dustin directs two actors to draw upon their own insecurities.

18. Creating a Relatable Character - Good Will Hunting Scene Work Part 4
Learn how to craft a timeless, relatable character that audiences will fall in love with.

19. Staying True to Yourself - Good Will Hunting Scene Work Part 5
Dustin never lets a script hold him back from giving what he believes is the right performance. Here's how to stay true to yourself without getting fired.

20. Working Together
Get Dustin's insider tips on how to keep an open, creative environment on set, respect your fellow actors, and most importantly-relax.

21. Auditions
Dustin has spent his career defying "leading man" stereotypes. Here's how to take the right risks to set yourself apart from the crowd and handle the rejection all actors face.

22. Making Acting Your Living
After painful rejections, how do you stop the candle inside you from burning out? Dustin sheds light on the difficult decisions involved in making acting your living.

23. Great Mistakes
It can be harder than you think to tell the difference between an accident and a stroke of genius. The most iconic scene in Midnight Cowboy was an on-set accident. Make every mistake an opportunity.

24. Always Be Working
Dustin closes his MasterClass with one lesson he wants every actor to remember.

004963d5.jpg
004963d6.jpg



...
 
TGC - Early Middle Ages

eh-Mi1w-TL6d-Uil-NDIJ8-F0hw-IWn8qys-Kn-H.jpg


TGC - Early Middle Ages
Prof. Philip Daileader, Ph.D. | Video: 640x480 | Audio: AAC 44KHz | Duration: 12:26 H/M | Lec: 24 - Average 31 minutes each | 10.0 GB | Language: English + Course Guidebook

Description
We often call them the "Dark Ages," the era which spanned the decline and fall of Rome's western empire and lingered for centuries, a time when the Ancient World was ending and Europe had seemingly vanished into ignorance and shadow, its literacy and urban life declining, its isolation from the rest of the world increasing.

It was a time of decline, with the empire fighting to defend itself against an endless onslaught of attacks from all directions: the Vikings from the North, the Huns and other Barbarians from the East, the Muslim empire from the south.

It was a time of death and disease, with outbreaks of plague ripping through populations both urban and rural.

It was a time of fear, when religious persecution ebbed and flowed with the whims of those in power.

And as Rome's power and population diminished, so, too, did its ability to handle the administrative burdens of an overextended empire. Fewer records were kept, leaving an often-empty legacy to historians attempting to understand the age.

But modern archaeology has begun to unearth an increasing number of clues to this once-lost era. And as historians have joined them to sift through those clues-including evidence of a vast arc of Viking trade reaching from Scandinavia to Asia-new light has begun to fall across those once "dark" ages and their fascinating personalities and events.

"A World Recognizably Becoming Our Own"
In his new course on The Early Middle Ages-which traces a journey from Scandinavia across northern and central Europe to the farthest reaches of the Byzantine and Islamic empires-Professor Philip Daileader shares this new understanding of a world, no matter how far away and strange it may seem, that is "recognizably becoming our own."

"In countless ways, seemingly obscure events and developments from the 'Dark Ages' impinge on the lives of people today. This is true in the realm of religion, because our period saw the triumph of Christianity over paganism. This is true in the realm of language, because every word that we speak and write-indeed, the handwriting that we use each and every day-is a product of the historical forces that we will study. And this is true in the realm of family life, because many practices that existed in 300-such as polygyny, marriage within the kin group, and infanticide-are illegal today and were vanishing or completely gone by the year 1000."

TGC-8267-Lect01-Early-Middle-Ages-s.jpg



...
 
TGC - High Middle Ages

613-Ik-Y53-T8-L.jpg


TGC - High Middle Ages
Prof. Philip Daileader, Ph.D. | Video: 640x480 | Audio: AAC 44KHz | Duration: 12:23 H/M | Lec: 24 - Average 31 minutes each | 10.9 GB | Language: English + Course Guidebook

In this course you examine how and why Europeans achieved this stunning turnaround. By its conclusion, you will be able to describe and analyze the social, intellectual, religious, and political transformations that underlay this midsummer epoch of the medieval world.

Description
As the last millennium dawned, Europe didn't amount to much. Illiteracy, starvation, and disease were the norm. In fact, Europe in the year 1000 was one of the world's more stagnant regions-an economically undeveloped, intellectually derivative, and geopolitically passive backwater. Three short centuries later, all this had changed dramatically. A newly invigorated cluster of European societies revived city life, spawned new spiritual and intellectual movements and educational institutions, and began, for reasons both sacred and profane, to expand at the expense of neighbors who traditionally had expanded at Europe's expense.

The Revival of Europe
In this course you examine how and why Europeans achieved this stunning turnaround. By its conclusion, you will be able to describe and analyze the social, intellectual, religious, and political transformations that underlay this midsummer epoch of the medieval world.

But why were "the Middle Ages"-the period from 1000 to 1300-so designated?

Petrarch, writing in the 1300s, defined the period of "literary and artistic rot" in Europe after the sack of Rome in A.D. 410 as an Age of Darkness. The idea of the Middle Ages originates with Petrarch's concept, even though he did not use the term himself. The Latin term "medium aevum" (the Middle Age) first appeared in the 15th century.

Themes and Topics You'll Cover
The first eight lectures treat medieval society: the warrior aristocracy of knights, castellans, counts, and dukes; the free and unfree peasants whose work in the fields made the existence of medieval society possible; and the townspeople, the artisans and merchants who represented the newest arrivals on the medieval scene.

Lectures 9-16 examine the intellectual and religious history of high medieval Europe. You study monks and the monastic life, charismatic preachers such as Francis of Assisi, and theologians such as Thomas Aquinas. You examine the lives of those who found themselves outside the religious mainstream, especially the heretics and Jews of high medieval Europe.

The final eight lectures discuss the major political developments and events between 1000 and 1300, including the First Crusade, the Norman Conquest of England, and the granting of Magna Carta.

The key events, entities, and personalities you will learn about include:

The demographic, climatic, and technological changes that set the stage for Europe's resurgence
The three groups-"those who work, those who fight, and those who pray"-who formed the backbone of medieval society
An in-depth look at the renewed world of cities, artisans, merchants, and commercial exchange that shaped the high-medieval scene in crucial ways
The ongoing struggles between popes and emperors
The significance of figures as diverse as William the Conqueror, Pope Gregory VII, Abelard, Emperor Frederick II, King Philip II Augustus of France, Saint Benedict, Bernard of Clairvaux and Hildegard of Bingen
The institutions of knighthood, feudalism, the church and monasticism, the Scholastic university, and the urban guild
The situations of marginalized groups such as peasants, urban workingfolk, women, Jews, and heretics.

Homepage

TGC-869-Lect02-High-Middle-Ages-s.jpg



...
 
TGC - Redefining Reality: The Intellectual Implications of Modern Science

LYM64r0-RFwuk-SLiqgv-R8-RREVgd3fp-RUb.jpg


TGC - Redefining Reality: The Intellectual Implications of Modern Science
Prof. Steven Gimbel, Ph.D. | Video: 640x360 | Audio: AAC 44KHz | Duration: 18:09 H/M | Lec: 36 - Average 30 minutes each | 16.2 GB | Language: English + Course Guidebook

Living the French Revolution and the Age of Napoleon is your opportunity to learn the full story of this captivating period. Taught by Dr. Suzanne M. Desan

Description
No subject is bigger than reality itself, and nothing is more challenging to understand, since what counts as reality is undergoing continual revision and has been for centuries. For example, the matter that comprises all stars, planets, and living things turns out to be just a fraction of what actually exists. Moreover, we think that we control our actions, but data gathering systems can predict, with astonishing accuracy, when we will get up in the morning, what items we will buy, and even whom we will marry.

The quest to pin down what's real and what's illusory is both philosophical and scientific. At its core, it is nothing less than the metaphysical search for ultimate reality that goes back to the ancient Greeks. And for the last 400 years, this search has been increasingly guided by scientists, who create theories and test them in order to define reality and then redefine it as new theories replace old.

In physics, biology, psychology, economics, and many other fields, defining reality is a task that needs frequent updates. Consider these once solid facts that were later thrown into doubt:

Space and time: Nothing is more real to us than our experience of space and time, which is why one of the greatest revolutions in human thought is Einstein's discovery that these two seemingly stable features of the universe are surprisingly fluid in ways that defy common sense.
Matter: It seems obvious that matter down to the smallest scale should have measurable properties: it's either here or there, it's spinning this way or that. But quantum mechanics shows that subatomic particles are in many places and states at the same time - until you measure them.
Mathematics: What could be more ironclad than the truths of mathematics? Yet in the 1930s, Kurt Godel showed that the field was built on shifting sands - that no set of axioms designed to serve as the foundation of mathematics could be both self-consistent and complete.
Life-giving sun: Plants need sunlight; animals eat plants or other animals; therefore all life on Earth ultimately depends on the sun. This seemed indisputable, until scientists discovered colonies of life in the dark ocean depths, feeding on mineral-rich hot fluids from volcanic vents.
When faced with reversals such as these, it's tempting to give up and conclude that nothing will ever be certain. But there's a more rewarding way to look at it, which is that every successful new theory is an improvement on its predecessor, drawing the net ever more tightly around reality, whose form is gradually coming into focus.

Redefining Reality: The Intellectual Implications of Modern Science gives you the thrill of this exciting quest in 36 wide-ranging lectures that touch on many aspects of the ceaseless search for reality, both scientific and philosophical. From the birth of the universe to brain science, award-winning Professor of Philosophy Steven Gimbel of Gettysburg College shows that separating the real from the illusory is an exhilarating intellectual adventure.

And since dealing with reality is an experience we all share, this course is designed for people of all backgrounds. No prior training in science or philosophy is assumed. Furthermore, the richness of Professor Gimbel's presentation assures that even those who have studied this problem in depth will find new connections and unexpected insights. Dr. Gimbel's thoroughness makes Redefining Reality an unrivaled introduction to key themes in the history of science and philosophy.

The How and Why of Reality

You begin with the contrasting views of two of the most influential philosophers who ever lived: Plato and Aristotle. According to Plato, reality resides in an abstract world of forms that can only be perceived by the mind; while for Aristotle, reality is right here in this world. It was this elevation of the material realm by Aristotle that launched what we think of as science.

Science was part of philosophy until the 16th and 17th centuries. The turning point came with Isaac Newton's laws of motion and principle of universal gravitation, which showed that the world is governed by natural laws. Newton's supremely successful mathematical theory established science as a separate mode of inquiry and provided a model for the ambitions of all future scientists. Henceforth, science was devoted to explaining how the world works. Speculation about why it works the way it does remained the province of philosophy.

A striking case of when a philosophical subject suddenly became scientific occurred in 1965, with the discovery of the fossil radio signal from the big bang, the moment when the universe can be said to have begun. Before this discovery, the notion of a beginning to time was largely theological. After, it was a scientific problem that could be quantified and explored in detail. In Redefining Reality, you examine scores of similar examples of reality in transition, including these:

Ghost in a machine: Traditionally, doctors saw the human body as a closed system inhabited by a soul - a "ghost in a machine." The discovery of disease-causing microbes led to a new paradigm: the body as a fortress under attack. Today there's a revised view: microbes are considered crucial to human life.
Economics: Newton's success in physics inspired the field of economics. But attempts to predict the complexities of production, consumption, and trade defied exact mathematical analysis. Recent theories have revised our view of economic reality by factoring in the human tendency for irrational economic choices.
Artificial intelligence: Can machines think? One current view is that a machine capable of human-like responses to questions would indeed have a mind. But philosopher John Searle's famous "Chinese Room" thought experiment suggests that the imitation of outward behavior is not enough to constitute a mind.
Free will: One outcome of today's revolution in big data is that computers can now predict what individuals will do in many situations, including who is likely to commit a crime. These techniques challenge the age-old belief that we have free will - that our actions are the result of deliberate personal choices.

Homepage

TGC-4140-Lect03-Redefining-Reality-m4v.jpg




...
 
Zurück
Oben Unten