• Regeln für den Video-Bereich:

    In den Börsenbereich gehören nur Angebote die bereits den Allgemeinen Regeln entsprechen.

    Einteilung

    - Folgende Formate gehören in die angegeben Bereiche:
    - Filme: Encodierte Filme von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format DivX, XviD und x264.
    - DVD: Filme im Format DVD5, DVD9 und HD2DVD.
    - HD: Encodierte Filme mit der Auflösung 720p oder darüber von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format x264.
    - 3D: Encodierte Filme von BluRay, die in einem 3D Format vorliegen. Dies gilt auch für Dokus, Animation usw.
    - Serien: Cartoon/Zeichentrick, Anime, Tutorials, Dokumentationen, Konzerte/Musik, Sonstiges sind demnach in die entsprechenden Bereiche einzuordnen, auch wenn sie beispielsweise im High Definition-Format oder als DVD5/DVD9/HD2DVD vorliegen. Ausnahme 3D.
    - Bereich Englisch: Englische Releases gehören immer in diesen Bereich.
    - Bereich Talk: Der Bereich, in dem über die Releases diskutiert werden kann, darf, soll und erwünscht ist.


    Angebot/Beitrag erstellen

    - Ein Beitrag darf erst dann erstellt werden, wenn der Upload bei mindestens einem OCH komplett ist. Platzhalter sind untersagt.
    - Bei einem Scenerelease hat der Threadtitel ausschließlich aus dem originalen, unveränderten Releasenamen zu bestehen. Es dürfen keine Veränderungen wie z.B. Sterne, kleine Buchstaben o.ä. vorgenommen werden. Ausnahme Serienbörse:
    - Bei einem Sammelthread für eine Staffel entfällt aus dem Releasename natürlich der Name der Folge. Beispiel: Die Simpsons S21 German DVDRip XviD - ITG
    - Dementsprechend sind also u.a. verboten: Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist.

    Aufbau des Angebots und Threadtitel

    Der Titel nach folgendem Muster erstellt zu werden. <Name> [3D] [Staffel] [German] <Jahr> <Tonspur> [DL] [Auflösung] <Quelle> <Codec> - <Group>
    Beispiel: The Dark Knight German 2008 AC3 DVDRip XviD - iND
    Beispiel: The Dark Knight 2008 DTS DL BDRip x264 - iND
    Beispiel: The Dark Knight 2008 AC3 DL BDRip XviD - iND
    Beispiel: The Dark Knight German 2008 AC3 720p BluRay x264 iND
    Beispiel: The Dark Knight 2008 DTS DL 1080p BluRay x264 iND
    Beispiel: Die Simpsons S01 German AC3 DVDRip XviD iND
    Beispiel: Die Simpsons S20 German AC3 720p BluRay x264 iND
    Beispiel: Sword Art Online II Ger Sub 2014 AAC 1080p WEBRip x264 - peppermint
    Entsprechend sind also u.a. verboten: Sonderzeichen wie Klammern, Sterne, Ausrufezeichen, Unterstriche, Anführungszeichen / Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist
    Ausnahmen hiervon können in den Bereichen geregelt sein.

    Die Beiträge sollen wie folgt aufgebaut werden:
    Überschrift entspricht dem Threadtitel
    Cover
    kurze Inhaltsbeschreibung
    Format, Größe, Dauer sind gut lesbar für Downloader außerhalb des Spoilers zu vermerken
    Nfo sind immer Anzugeben und selbige immer im Spoiler in Textform.
    Sind keine Nfo vorhanden z.B. Eigenpublikationen, sind im Spoiler folgende Dateiinformationen zusätzlich anzugeben :
    Quelle
    Video (Auflösung und Bitrate)
    Ton (Sprache, Format und Bitrate der einzelnen Spuren)
    Untertitel (sofern vorhanden)
    Hosterangabe in Textform außerhalb eines Spoiler mit allen enthaltenen Hostern.
    Bei SD kann auf diese zusätzlichen Dateiinformationen verzichtet werden.

    Alle benötigten Passwörter sind, sofern vorhanden, in Textform im Angebot anzugeben.
    Spoiler im Spoiler mit Kommentaren :"Schon Bedankt?" sind unerwünscht.


    Releases

    - Sind Retail-Release verfügbar, sind alle anderen Variationen untersagt. Ausnahmen: Alle deutschen Retail-Release sind CUT, in diesem Fall sind dubbed UNCUT-Release zulässig.
    - Im Serien-Bereich gilt speziell: Wenn ein Retail vor Abschluss einer laufenden Staffel erscheint, darf diese Staffel noch zu Ende gebracht werden.62
    - Gleiche Releases sind unbedingt zusammenzufassen. Das bedeutet, es ist zwingend erforderlich, vor dem Erstellen eines Themas per Suchfunktion zu überprüfen, ob bereits ein Beitrag mit demselben Release besteht. Ist dies der Fall, ist der bereits vorhandene Beitrag zu verwenden.
    - P2P und Scene Releases dürfen nicht verändert oder gar unter einem iND Tag eingestellt werden.


    Support, Diskussionen und Suche

    - Supportanfragen sind entweder per PN oder im Bereich Talk zu stellen.
    - Diskussionen und Bewertungen sind im Talk Bereich zu führen. Fragen an die Uploader haben ausschließlich via PN zu erfolgen, und sind in den Angeboten untersagt.
    - Anfragen zu Upload-Wünschen sind nur im Bereich Suche Video erlaubt. Antworten dürfen nur auf Angebote von MyBoerse.bz verlinkt werden.


    Verbote

    - Untersagt sind mehrere Formate in einem einzigen Angebotsthread, wie beispielsweise das gleichzeitige Anbieten von DivX/XviD, 720p und 1080p in einem Thread. Pro Format, Release und Auflösung ist ein eigener Thread zu eröffnen.
    - Grundsätzlich ebenso verboten sind Dupes. Uploader haben sich an geeigneter Stelle darüber zu informieren, ob es sich bei einem Release um ein Dupe handelt.
    - Gefakte, nur teilweise lauffähige oder unvollständige Angebote sind untersagt. Dies gilt auch für eigene Publikationen, die augenscheinlich nicht selbst von z.B. einer DVD gerippt wurden. Laufende Serien, bei denen noch nicht alle Folgen verfügbar sind, dürfen erstellt und regelmäßig geupdatet werden.
    - Untersagt sind Angebote, welche nur und ausschließlich in einer anderen Sprache als deutsch oder englisch vorliegen. Ausnahmen sind VORHER mit den Moderatoren zu klären.


    Verstoß gegen die Regeln

    - Angebote oder Beiträge, die gegen die Forenregeln verstoßen, sind über den "Melden"-Button im Beitrag zu melden.
  • Bitte registriere dich zunächst um Beiträge zu verfassen und externe Links aufzurufen.




Englische Tutorials

554d1ab2b539f93507d73bcf8904b083.jpg


Moodle 4.1 para administradores
Last updated 3/2023
Created by Francisco Javier Arce Anguiano
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: Spanish + srt | Duration: 350 Lectures ( 42h 9m ) | Size: 20.5 GB



Moodle es la plataforma gratuita m s utilizada en el mundo



What you'll learn
El alumno aprender a cambiar el idioma de la plataforma, de su perfil y del curso
El alumno manejar , instalar y modificar los temas en Moodle
El alumno aprender a inscribir a los alumnos y a los profesores en un curso
El alumno revisar la configuraci n de seguridad del sitio: Proteger nombres_de_usuarios, Forzar a que los usuarios ingresen, Forzar a los usuarios a ingresar
El alumno aprender a crear y quitar administradores y m nagers, as como la revisi n de las pol ticas de privacidades.
El alumno comprender el manejo de los roles y permisos en Moodle
El alumno aprender a manejar los bloques: Introducci n a los Bloques, Bloque de actividades, Bloques de bloques y marcas de bloques ,Bloque de calendario
El alumno aprender a a adir, configurar y eliminar filtros
El alumno aprender a activar y configurar las caracter sticas avanzadas en Moodle
El alumno aprender a configurar y manejar la instalaci n de los mensajes y notificaciones en Moodle
El alumno aprender a configurar y manejar los par metros de las calificaciones en Moodle: Ajustes generales de calificaciones, Mostrar fecha de env o
El alumno aprender a respaldar los cursos de la plataforma y crear plantillas para los cursos.
El alumno aprender a instalar y a desinstalar plugins o complementos en Moodle
El alumno aprender los reportes del administrador
El alumno aprender a modificar los par metros del servidor y de los trabajos agendados
El alumno crear y modificar las categor as y cursos, as como las plantillas de Moodle: Crear categor as, Tipos de cursos, Campos personalizados para cursos
El alumno aprender a inscribir a los alumnos y a los profesores en un curso: Crear usuarios manualmente, Crear campos personalizados para los usuarios
El alumno aprender a configurar las siguientes agregaciones: Estrategia de agregaci n, Ajustes de categor a de calificaci n, El proceso del c lculo de la calif
El usuario aprender a crear, usar y modificar los resultados u "outcomes" en los cursos en Moodle
El alumno aprender a crear y manejar las competencias, crear planes de trabajo, asignarlas al curso y actividades
El alumno aprender a crear, configurar y asignar insignias a los usuarios
El alumno aprender a manejar los reportes anal ticos, los repositorios, crear un repositorio externo, un repositorio de tipo file system, crear una cuenta OAut

Requirements
Conocimiento en la creaci n de cursos y actividades en Moodle

Description
Moodle (actualizado a la versi n 4.1 es la plataforma gratuitapara educaci n a distancia o eLearning m s utilizada en el mundo. Usted podr construir cursos en l nea con o sin fines de lucro. En este curso aprender a instalar Moodle en una computadora personal con Windows. Crearemos desde un inicio los cursos en sus diferentes modalidades: curso social, de t picos, semanal o de una sola actividad. Asimismo, daremos de alta alumnos, tanto en forma manual como de un archivo, y los inscribiremos a los cursos. Agruparemos los cursos en categor as para una mejor gesti n de nuestra plataforma.(incluye el eBook del curso). Los objetivos del curso son:Conocer las diferentes formas de instalar MoodleAprender a cambiar el idioma de la plataform, de su perfil y del cursoManejar, instalar y modificar los temas en MoodleAprender a inscribir a los alumnos y a los profesores en un cursoRevisar la configuraci n de seguridad del sitioAprender a crear y quitar administradores y m nagers, as como la revisi n de las pol ticas de privacidades.Comprender el manejo de los roles y permisos en MoodleAprender a manejar los bloquesAprender a a adir, configurar y eliminar filtrosActivar y configurar las caracter sticas avanzadas en MoodleConfigurar y manejar la instalaci n de los mensajes y notificaciones en MoodleConfigurar y manejar los par metros de las calificaciones en MoodleRespladar los cursos de la plataforma y crear plantillas para el cursos.Instalar y a desintalar plugins en MoodleAprender los reportes del administradorModificar los par metros del servidor y de los trabajos agendadosEl alumno aprender algunas operaciones b sicas de la manipulaci n de la plataforma desde el servidorEste curso no es un curso sobredise o instruccional, ni abordamos los aspectos del profesor, como crear cursos y sus contenidos. Tampoco es un curso del lado de servidor, como instalaciones complejas, optimizaci n, actualizaci n o manejos de sistemas operativos o bases de datos. Est enfocado a administradores que deseen manejar la plataforma Moodle.Este curso est dirigido a cualquier personaque deseen crear cursos en l nea en la plataforma eLearningm s utilizada en el mundo: Moodle. Como bonus se ver n los plugins: H5P, HotPotatoes, level-up, Big Blue Button, Zoom, Jitsi, Questionnaire, Game, Custom reports, Custom certificate.

Who this course is for
Administradores de la plataforma Moodle



451519974_moodle_4-1_para_administradores.jpg


















 
662c19b79467540f578450c10230594d.jpg


Deep Learning Architectures
Published 2/2023
Created by Sayed Sekandar Sadat
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 65 Lectures ( 40h 29m ) | Size: 23.2 GB



Master AI and Deep Learning Concepts and Buid Your Career in the Field



What you'll learn
Neural Ordinary Differential Equations
Statistical Test for Detecting Adversarial Examples
Accelerating Deep Network Training by Reducing Internal Covariate Shift
Common Assumptions in the Unsupervised Learning of Disentangled Representations

Requirements
Basic Mathematics
Basic understanding of AI concepts

Description
Deep learning is part of a broader family of machine learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi-supervised or unsupervisedIn this course you will learn:Neural Ordinary Differential EquationsWe introduce a new family of deep neural network models. Instead of specifying a discrete sequence of hidden layers, we parameterize the derivative of the hidden state using a neural network. The output of the network is computed using a black-box differential equation solver. These continuous-depth models have constant memory cost, adapt their evaluation strategy to each input, and can explicitly trade numerical precision for speed. We demonstrate these properties in continuous-depth residual networks and continuous-time latent variable models. We also construct continuous normalizing flows, a generative model that can train by maximum likelihood, without partitioning or ordering the data dimensions. For training, we show how to scalably backpropagate through any ODE solver, without access to its internal operations. This allows end-to-end training of ODEs within larger models. The Odds are Odd: A Statistical Test for Detecting Adversarial ExamplesWe investigate conditions under which test statistics exist that can reliably detect examples, which have been adversarially manipulated in a white-box attack. These statistics can be easily computed and calibrated by randomly corrupting inputs. They exploit certain anomalies that adversarial attacks introduce, in particular if they follow the paradigm of choosing perturbations optimally under p-norm constraints. Access to the log-odds is the only requirement to defend models. We justify our approach empirically, but also provide conditions under which detectability via the suggested test statistics is guaranteed to be effective. In our experiments, we show that it is even possible to correct test time predictions for adversarial attacks with high accuracy.Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate ShiftTraining Deep Neural Networks is complicated by the fact that the distribution of each layer's inputs changes during training, as the parameters of the previous layers change. This slows down the training by requiring lower learning rates and careful parameter initialization, and makes it notoriously hard to train models with saturating nonlinearities. We refer to this phenomenon as internal covariate shift, and address the problem by normalizing layer inputs. Our method draws its strength from making normalization a part of the model architecture and performing the normalization for each training mini-batch. Batch Normalization allows us to use much higher learning rates and be less careful about initialization. It also acts as a regularizer, in some cases eliminating the need for Dropout. Applied to a state-of-the-art image classification model, Batch Normalization achieves the same accuracy with 14 times fewer training steps, and beats the original model by a significant margin. Using an ensemble of batch-normalized networks, we improve upon the best published result on ImageNet classification: reaching 4.9% top-5 validation error (and 4.8% test error), exceeding the accuracy of human raters.Challenging Common Assumptions in the Unsupervised Learning of Disentangled RepresentationsIn recent years, the interest in unsupervised learning of disentangled representations has significantly increased. The key assumption is that real-world data is generated by a few explanatory factors of variation and that these factors can be recovered by unsupervised learning algorithms. A large number of unsupervised learning approaches based on auto-encoding and quantitative evaluation metrics of disentanglement have been proposed; yet, the efficacy of the proposed approaches and utility of proposed notions of disentanglement has not been challenged in prior work. In this paper, we provide a sober look on recent progress in the field and challenge some common assumptions. We first theoretically show that the unsupervised learning of disentangled representations is fundamentally impossible without inductive biases on both the models and the data. Then, we train more than 12000 models covering the six most prominent methods, and evaluate them across six disentanglement metrics in a reproducible large-scale experimental study on seven different data sets. On the positive side, we observe that different methods successfully enforce properties "encouraged" by the corresponding losses. On the negative side, we observe in our study that well-disentangled models seemingly cannot be identified without access to ground-truth labels even if we are allowed to transfer hyperparameters across data sets. Furthermore, increased disentanglement does not seem to lead to a decreased sample complexity of learning for downstream tasks. These results suggest that future work on disentanglement learning should be explicit about the role of inductive biases and (implicit) supervision, investigate concrete benefits of enforcing disentanglement of the learned representations, and consider a reproducible experimental setup covering several data sets.

Who this course is for
Students
Those who want to develop their career in data science and AI



451834791_deep_learning_architectures.jpg


















 
40d57939e2637e6352de65bcfd0017a6.jpg


Ccnp Route 300-101 Video Boot Camp With Chris Bryant
Last updated 10/2017
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 20.70 GB | Duration: 30h 12m

Pass The CCNP ROUTE 300-101 Exam With Chris Bryant -- AND Prepare For Real-World Networking Success!



What you'll learn

Requirements

Description
The CCNP ROUTE 300-101 exam is generally considered the toughest of the three exams you must pass in order to earn your CCNP. Get ready to pass it with a little help from Chris Bryant, CCIE #12933.You can watch the videos as often as you like until you pass the CCNP ROUTE exam! Your download ability and online access NEVER expire.Since 2005, I've prepared CCNP candidates for success on the difficult routing exam - currently called the CCNP ROUTE exam -- and now I'm going to do the same for you.No prepackaged slides here - you'll see lab after lab on REAL Cisco routers, all designed to teach you the finer points of advanced Cisco routing and prepare you for success in the exam room and real-world networking. From BGP to route redistribution, from multi-area OSPF to distribute-lists, it's all here - and there's a forum right here on this site where you can ask me questions. Your access to this online course is unlimited - you can watch the videos as often as you like and for as long as it takes for you to pass! Let's get started! Chris Bryant CCIE #12933 "The Computer Certification Bulldog"

Overview
Section 1: CCNP ROUTE 300-101: A Brief And Painless (Mostly) Review

Lecture 1 Watching Your Free CCNA Security 210-260 Course

Lecture 2 Review 1: The Case Of TCP v UDP, Part The First

Lecture 3 Review 2: The Case Of TCP v UDP, Part The Second

Lecture 4 Review 3: PPP -- Over Ethernet And Otherwise

Lecture 5 Review 4: Rip-Roarin' Routing Review (Really!)

Section 2: CCNP ROUTE 300-101: EIGRP Fundamentals

Lecture 6 EIGRP Fund 1: Adjacencies And Successors

Lecture 7 EIGRP 2: NBMA Network Lab

Lecture 8 EIGRP 3: Baby, Baby, Where Did Our Subnets Go?

Lecture 9 EIGRP 4: Successors and Feasible Successors

Lecture 10 EIGRP 5: Promoting A Feasible Successor

Lecture 11 EIGRP Fund 6: The Variance Command

Lecture 12 EIGRP Fund 7: DUAL, Passive, And Active Routes

Section 3: CCNP ROUTE 300-101: EIGRP Advanced Concepts

Lecture 13 Adv EIGRP 1: Packet Types And Timers

Lecture 14 Adv EIGRP 2: Hello Timers Lab

Lecture 15 Adv EIGRP 3: "show ip eigrp neighbor" And Some Distance

Lecture 16 Adv EIGRP 4: Feasible, Reported, And Advertised Distances

Lecture 17 Adv EIGRP 5: FD, AD, And Variance

Lecture 18 Adv EIGRP 6: Default And Non-Default Admin Distances

Lecture 19 Adv EIGRP 7: Autosummarization

Lecture 20 Adv EIGRP 8: Manual Route Summarization

Lecture 21 Adv EIGRP 9: The AD 5 and Stub Routing Theory

Lecture 22 Adv EIGRP 10: Passive Interfaces

Lecture 23 Adv EIGRP 11: The Metric Weights

Lecture 24 Adv EIGRP 12: Know Thy Interface Types

Lecture 25 Adv EIGRP 13: Propagating Static Default Routes

Lecture 26 Adv EIGRP 14: The IP Default-Network Command

Lecture 27 Adv EIGRP 15: Neighbor Authentication

Section 4: CCNP ROUTE 300-101: The Fundamentals Of OSPF Success

Lecture 28 OSPF Fund 1: Link State Protocol Operation

Lecture 29 OSPF Fund 2: The DR And BDR

Lecture 30 OSPF Fund 3: DR For Life -- Or IS It?

Lecture 31 OSPF Fund 4: The Buildout Begins! (Broadcast Segment)

Lecture 32 OSPF Fund 5: Building An NBMA Network

Lecture 33 OSPF Fund 6: Building A Point-To-Point Network

Lecture 34 OSPF Fund 7: The Missing Subnets and Virtual Links

Lecture 35 OSPF Fund 8: One Big Area Zero?

Lecture 36 OSPF Fund 9: Interface Cost And Reference Bandwidths

Lecture 37 OSPF Fund 10: The Bandwidth Command And Interface Cost

Lecture 38 OSPF Fund 11: Audible! Lab Confirm And Changing The RID

Lecture 39 OSPF Fund 12: Four Routers Walk Into A Broadcast Network..

Section 5: CCNP ROUTE 300-101: Advanced OSPF Skills

Lecture 40 OSPF Adv A1: Router And LSA Type Review

Lecture 41 OSPF Adv 1: Intro To Route Redistribution And Stub Areas

Lecture 42 OSPF Adv 2: Configuring Stub And Total Stub Areas

Lecture 43 OSPF Adv 3: Configuring NSSAs

Lecture 44 OSPF Adv 4: E1, E2, N1, And N2 Routes

Lecture 45 OSPF Adv 5: More Route Redistribution!

Lecture 46 OSPF Adv 6: Simple Authentication

Lecture 47 OSPF Adv 7: MD5 Authentication

Section 6: CCNP ROUTE 300-101: Route Redistribution

Lecture 48 RouteRedis 1: The Fundamentals Of Success

Lecture 49 RouteRedis 2: OSPF-To-RIP Redistribution

Lecture 50 RouteRedis 3: Ping Both Ways After Redistribution

Lecture 51 RouteRedis4: Beware The Routing Suboptimal

Lecture 52 RouteRedis 5: Changing The AD For An Entire Protocol

Lecture 53 RouteRedis 6: Changing The AD For Some Routes (Or One)

Lecture 54 RouteRedis 7: Changing The AD Based On OSPF Route Type

Lecture 55 Route Redis 8: Redistributing EIGRP (And Tweaking The AD)

Lecture 56 RouteRedis 9: Using Distribute Lists With OSPF

Lecture 57 RouteRedis 10: Distribute Lists And EIGRP Updates

Lecture 58 RouteRedis 11: Route Redistribution And Distribute Lists

Lecture 59 RouteRedis 12: Can Multiple Distribute Lists Co-Exist?

Lecture 60 RouteRedis 13: Writing And Verifying A Route Map

Lecture 61 RouteRedis 14: Applying Route Maps During Route Redistribution

Lecture 62 RouteRedis 15: Route Maps And 2-Way Route Redistribution

Lecture 63 RouteRedis 16: More Route Maps And 2-Way Redistribution!

Lecture 64 RouteRedis 17: Policy Routing Theory And Application

Lecture 65 RouteRedis 18: More Policy Routing Lab Work!

Lecture 66 RouteRedis 19: Local Policy Routing Theory And Application

Section 7: CCNP ROUTE 300-101: VPNs And IPSec

Lecture 67 VPN 1: The Dreaded But Necessary Theory

Lecture 68 VPN 2: IKE Phase 1 In Action

Lecture 69 VPN 3: IPSec SA Configuration

Lecture 70 VPN 4: Building, Verifying, And Debugging Your VPN Build!

Lecture 71 VPN 5: A Dash Of DMVPN, NHRP, And mGRE

Lecture 72 VPN 6: VRF Lab Part 1

Lecture 73 VRF 7: VRF Lab Part 2

Lecture 74 VRF 8: VRF Lab Part 3

Lecture 75 VRF 9: VRF Lab Part 4 -- Pinging!

Section 8: CCNP ROUTE 300-101: IP Version 6 Success

Lecture 76 IPv6 1: Fundamentals And Zero Compression Techniques

Lecture 77 IPv6 2: EUI And The Interface Identifiers

Lecture 78 IPv6 3: Stateless And Stateful Autoconfiguration

Lecture 79 IPv6 4: Building An OSPFv3 Broadcast Segment

Lecture 80 IPV6 5: Adding Loopbacks To Our OSPFv3 Network

Lecture 81 IPv6 6: Configuring OSPFv3 Point-To-Point Networks

Lecture 82 IPv6 7: Configuring An OSPF NBMA Network

Lecture 83 IPv6 8: Route Redistribution And Stub Routing With OSPFv3

Lecture 84 IPv6 9: Configuring EIGRP On IPV6

Lecture 85 IPv6 10: Configuring RIPng

Lecture 86 IPV6 11: T-Shooting OSPF v3

Lecture 87 IPv6 12: Migration Strategies

Section 9: CCNP ROUTE 300-101: Route And Network Security

Lecture 88 Security 1: Standard And Extended ACLs

Lecture 89 Security 2: Host, Any, and Seeing Dollar Signs

Lecture 90 Security 3: Extended ACL Lab

Lecture 91 Security 4: Named ACL Lab

Lecture 92 Security 5: Time-Based ACL Lab

Lecture 93 Security 6: Password Review And Telnet Lab

Lecture 94 Security 7: Username / Password Database And Telnet Lab

Lecture 95 Security 8: Secure Shell And SNMP

Lecture 96 Security 9: The Network Time Protocol

Lecture 97 Security 10: NTP Server / Client Lab

Lecture 98 Security 10A: NTP Broadcast Lab

Lecture 99 Security 11: Unicast RPF

Lecture 100 Security 12 IP Helper Address

Lecture 101 Security 13: Using And Filtering "Debug IP Packet"

Lecture 102 Security 14: Spotting Possible Memory Issues

Lecture 103 Security 15: Core Dump

Section 10: CCNP ROUTE 300-101: BGP

Lecture 104 BGP 1: Intro Remarks

Lecture 105 BGP 2: External BGP Peerings

Lecture 106 BGP 3: iBGP Peering And Loopback Interface Discussion

Lecture 107 BGP 4: eBGP Peering With Loopback Interfaces

Lecture 108 BGP 5: Advertising Routes With The "Network" Command

Lecture 109 BGP 6: The Origin And Next-Hop Attributes, Plus The Best-Path Selection Process

Lecture 110 BGP 7: Examining The Selection Of One BGP Path Over Another

Lecture 111 BGP 8: Next-Hop Addresses

Lecture 112 BGP 9: The Next-Hop Address Rule

Lecture 113 BGP 10: The Multi-Exit Discriminator (MED)

Lecture 114 BGP 11: Local Preference -- All Or Nothing At All

Lecture 115 BGP 12: Local Preference -- Changing One But Not All

Lecture 116 BGP 13: The Weight Attribute

Lecture 117 BGP 14: More Weight Work!

Lecture 118 BGP 15: Route Summarization

Lecture 119 BGP 16: Synch Rules And The Full Mesh

Lecture 120 BGP 17: Route Reflectors -- Why And How

Lecture 121 BGP 18: Prefix Lists Begin

Lecture 122 BGP 19: Prefix Lists Continue

Lecture 123 BGP 20: A Few Final Tips...

Section 11: CCNP ROUTE 300-101: NAT And PAT

Lecture 124 NAT 1: Static NAT

Lecture 125 NAT 2: Dynamic NAT

Lecture 126 NAT 3: Port Address Translation

Section 12: Your Free CCNA Security Course Starts HERE!

Lecture 127 Fund 1: Citizen C.I.A.

Lecture 128 Fund 2: Intro To SIEM

Lecture 129 Fund 3: More SIEM

Lecture 130 Fund 4: Recon Attacks and Phishing

Lecture 131 Fund 5: Social Engineering and Spear Phishing

Lecture 132 Fund 6: Privilege Escalation and Telnet

Lecture 133 Fund 7: Privilege Escalation Continues

Lecture 134 Fund 8: DoS and DDoS Attacks

Lecture 135 Fun 9: Advanced Persistent Threats

Section 13: CCNA Security 210-260, Section 2

Lecture 136 Attack 1: Man-In-The-Middle Attacks

Lecture 137 Attack 2: ARP Poisoning and Dynamic ARP Inspection

Lecture 138 Attack 3: DAI Commands

Lecture 139 Attack 4: MAC Spoofing and CAM Table Overflows

Lecture 140 Attack 5: Port Security Fundamentals

Lecture 141 Attack 6: Port Security Dynamic Address Learning

Lecture 142 Attack 7: Port Security Shutdown And Recovery

Lecture 143 Attack 8: Port Security and Automatic Port Reenabling

Lecture 144 Attack 9: Port Security Static Address Aging

Lecture 145 Attack 10: Port Security Dynamic Address Aging

Lecture 146 Attack 11: Refresh Your VLAN Knowledge Here!

Lecture 147 Attack 12: Private VLAN Theory

Lecture 148 Attack 13: Private VLAN Lab

Lecture 149 Attack 14: OSPF Authentication Fundamentals

Lecture 150 Attack 15: OSPF Clear-Text Authentication

Lecture 151 Attack 16: OSPF MD5 Authentication

Lecture 152 Attack 17: Root Guard

Lecture 153 Attack 18: BPDU Guard and Loop Guard

Lecture 154 Attack 19: VLAN ACLs, Part 1

Lecture 155 Attack 20: VLAN ACLs, Part 2

Lecture 156 Attack 21: Stoppin' VLAN Hoppin'

Lecture 157 Attack 22: DHCP Snooping Intro

Lecture 158 Attack 23: DHCP Snooping Address Renewal

Lecture 159 Attack 24: DHCP Snooping First-Time Address Acquisition

Lecture 160 Attack 25: IPSG Theory and Lab 1

Lecture 161 Attack 26: IPSG Lab Continues

Lecture 162 Attack 27: IPSG Lab, Static Mappings, No DHCP

Lecture 163 Attack 28: Segue To The Next Section

Section 14: CCNA Security 210-260: Privilege Levels

Lecture 164 Levels 1: The First Default

Lecture 165 Levels 2: The Other Defaults

Lecture 166 Levels 3: Intro To Custom Levels

Lecture 167 Levels 4: Custom Level Lab Continues (Configure and Interface Levels)

Lecture 168 Levels 5: The Autocommand and One-Time Password Options

Lecture 169 Levels 6: Privilege Levels and "Show Run"

Lecture 170 Levels 7: Role-Based CLI Begins

Lecture 171 Levels 8: Role-Based CLI Continues

Lecture 172 Levels 9: Superviews!

Lecture 173 Levels 10: Applying The Views, Part 1

Lecture 174 Levels 11: Applying The Views, Part 2

Lecture 175 Levels 12: Intro To Lawful Intercept

Lecture 176 Levels 13: Resilient Config Labs Begin

Lecture 177 Levels 14: Resilient Config Labs Continue

Lecture 178 Levels 15: Resilient Config Test

Lecture 179 Levels 16: Resilient Image Test

Section 15: CCNA Security 210-160: Protecting The Control Plane

Lecture 180 Control Plane 1: Intro To CoPP

Lecture 181 Control Plane 2: Class Maps and CoPP

Lecture 182 Control Plane 3: Policy Maps and CoPP

Lecture 183 Control Plane 4: Verifying CoPP / Intro To CPPp

Section 16: CCNA Security 210-260: VPNs

Lecture 184 VPN 1: Site-to-Site VPNs

Lecture 185 VPN 2: The Phases Of ISAKMP

Lecture 186 VPN 3: Writing The ISAKMP Policy, Part 1

Lecture 187 VPN 4: Writing The ISAKMP Policy, Part 2

Lecture 188 VPN 5: Finishing The ISAKMP Policy / Writing The Keys

Lecture 189 VPN 6: Writing The Transform Sets

Lecture 190 VPN 6A: Defining Interesting Traffic

Lecture 191 VPN 7: Writing The Crypto Map

Lecture 192 VPN 8: Testing and Troubleshooting

Lecture 193 VPN 9: Crypto Map This n' That

Lecture 194 VPN 10: Debugging The Tunnel Build

Lecture 195 VPN 11: Diffie-Hellman Details

Lecture 196 VPN 12: Using ASDM To Build A VPN

Lecture 197 VPN 13: More VPN Building With ASDM

Lecture 198 VPN 14: Wrapping Up Our 1st ADSM VPN Build

Section 17: CCNA Security 210-260: Firewalls

Lecture 199 Firewall 1: What The Heck IS a Firewall?

Lecture 200 Firewall 2: Stateless and Stateful Filtering

Lecture 201 Firewall 3: Proxy Firewalls

Lecture 202 Firewall 4: Personal Firewalls

Lecture 203 Firewall 5: Cisco ZBF and Zone Pairs

Lecture 204 Firewall 6: The DMZ

Lecture 205 Firewall 7: IP Addressing Scheme For Firewall Labs

Lecture 206 Firewall 8: Basic Firewall Wizard Lab (CCP)

Lecture 207 Firewall 9: Basic Firewall Lab Concludes

Lecture 208 Firewall 10: Advanced Firewall Lab Begins

Lecture 209 Firewall 11: Advanced Firewall Lab Ends

Lecture 210 Firewall 12: Intro To ASA Firewalling

Lecture 211 Firewall 13: Configuring A New ASA

Lecture 212 Firewall 14: ADSM Lab Begins -- Outside Interface

Lecture 213 Firewall 15: ADSM Lab Continues

Lecture 214 Firewall 16: ADSM Lab Continues (Access Rule Application)

Lecture 215 Firewall 17: ADSM Lab Continues (Global Rule Application)

Lecture 216 Firewall 18: ADSM Lab Concludes

Lecture 217 Firewall 19: October 21 Weekend Note

Section 18: CCNA Security 210-260: The IPS and IDS

Lecture 218 IPS 1: Similarities and Differences

Lecture 219 IPS 2: Where They Can Go, What They Can Do

Lecture 220 IPS 3: Sensor Types



451847557_ccnp_route_300101_video_boot_camp_with_chris_bryant.jpg


















 
ea418ec3fa9e8181c8e2ac6a9aa4db01.jpg


CBTNuggets - CCNP Designing Cisco Enterprise Wireless Networks - 300-425 ENWLSD
Released 5/2022
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 273 Lessons (35h 46m) | Size: 26.8 GB



This intermediate Designing Cisco Enterprise Wireless Networks training covers the objectives in the 300-425 ENWLSD exam, which is one of six concentration exams you can take to earn the CCNP Enterprise certification

If you've been working in IT for a while, you probably already know that the best solutions are custom-built according to unique needs in other words, one-size-fits-all solutions rarely fit well. That's certainly true in wireless networking the best wireless networks aren't added to existing networks, they're designed from the ground up with the underlying needs in mind.

The right hardware, software and equipment for implementing the best wireless networks depends on who'll be using it and why. This course in designing Cisco enterprise wireless networks will make sure you know how to ask the right questions and deliver the right wireless connectivity to your enterprise networks, no matter the constraints or needs.

For supervisors, this Cisco training can be used for 300-425 ENWLSD exam prep, onboarding new network administrators, individual or team training plans, or as a Cisco reference resource.

Designing Cisco Enterprise Wireless Networks: What You Need to Know
For any network administrator using this training for exam preparation, our Designing Cisco Enterprise Wireless Networks course maps to the 300-425 ENWLSD exam objectives, and covers topics such as

Planning advanced designs of Cisco wireless products
Performing site surveys to establish end point placement and configuration
Industry standards and best practices around wireless network design
Undertaking network validation and implementing vertical designs
Who Should Take Designing Cisco Enterprise Wireless Networks Training?
This Designing Cisco Enterprise Wireless Networks training is considered professional-level Cisco training, which means it was designed for network administrators. This wireless networking architecture skills course is designed for network administrators with three to five years of experience with Cisco wireless networks.

New or aspiring network administrators. It's always a good idea to specialize your knowledge and focus your career early, but be warned for brand new network administrators, some of the contents of this course may be challenging. On the other hand, if you're at a point in your career where you want to focus on wireless networking, this course is a great way to get there.

Experienced network administrators. If you've been working in networking for a few years already, this course in wireless network design for enterprises using Cisco equipment is what you need to focus your career. Transition away from wired networks and traditional administration and focus on wireless network planning and implementation with this training.



451559910_ccnp_designing_cisco_enterprise_wireless_networks_-_300-425_enwlsd.jpg





















 
e28c6eb8dd7cf263dbe63cfbb3ffd92e.jpg


CBTNuggets - Certified Wireless Analysis Professional - CWAP-404 - CWNP Certification Training
Released 3/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 306 Lessons (43h 34m) | Size: 36.2 GB



This intermediate CWAP training prepares network admins to analyze and troubleshoot wireless networks with a focus on advanced techniques and knowledge like protocol and spectrum analysis.

The Certified Wireless Analysis Professional certification (CWAP) from CWNP is a professional-level certification. Does your shop have that one person who's been around for a few years longer than everyone else and who gets called in to fix the really tough wireless issues? That's the sort of person this CWAP course turns you into.

Someone with their CWAP analyzes existing wireless network setups and configurations and makes sure they're installed and running properly. Earning the CWAP is a great way to establish yourself as the local expert in wireless operations.

Once you're done with this Certified Wireless Analysis Professional (CWAP) training, you'll know how to analyze and troubleshoot wireless networks with a focus on advanced techniques and knowledge like protocol and spectrum analysis.

For IT managers, this Networking training can be used to onboard new network admins, curated into individual or team training plans, or as a Networking reference resource.

CWAP: What You Need to Know
This Certified Wireless Analysis Professional training has videos that cover topics such as

802.11 devices, protocols, and technologies
Layer frame formats for wireless protocols
MAC layer frame formats and technologies
Spectrum and protocol analysis techniques and troubleshooting

Who Should Take CWAP Training?
This CWAP training is considered associate-level Networking training, which means it was designed for network admins. This WLAN skills course is designed for network admins with three to five years of experience with wireless networking.

New or aspiring network admins. This course covers advanced physical layer formats, MAC layer frame formats, wireless operations, as well as spectrum and protocol analysis and troubleshooting that's advanced stuff for someone who's brand new to network administration or wireless administration. However, if you have to accelerate your wireless knowledge in a hurry, this is a good course to catapult yourself with.

Experienced network admins. If you've had a hand in wireless network administration and management for a few years but you're not sure how to move your career forward, this CWAP training might be what you're looking for. Learn advanced techniques in troubleshooting wireless networks while you learn everything there is to know about advanced wireless technologies and devices.



451295303_certified_wireless_analysis_professional_-_cwap-404_-_cwnp_certification_trainin.jpg



























 
2ab8867925bac176a24ac217a67babc5.jpeg


CBTNuggets - Certified Wireless Design Professional - CWDP-304 - CWNP Certification Training
Last updated 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 172 Lessons (23h 50m) | Size: 20.2 GB



This intermediate CWAP training prepares network admins to analyze and troubleshoot wireless networks with a focus on advanced techniques and knowledge like protocol and spectrum analysis.

The Certified Wireless Analysis Professional certification (CWAP) from CWNP is a professional-level certification. Does your shop have that one person who's been around for a few years longer than everyone else and who gets called in to fix the really tough wireless issues? That's the sort of person this CWAP course turns you into.

Someone with their CWAP analyzes existing wireless network setups and configurations and makes sure they're installed and running properly. Earning the CWAP is a great way to establish yourself as the local expert in wireless operations.

Once you're done with this Certified Wireless Analysis Professional (CWAP) training, you'll know how to analyze and troubleshoot wireless networks with a focus on advanced techniques and knowledge like protocol and spectrum analysis.

For IT managers, this Networking training can be used to onboard new network admins, curated into individual or team training plans, or as a Networking reference resource.

CWAP: What You Need to Know
This Certified Wireless Analysis Professional training has videos that cover topics such as

802.11 devices, protocols, and technologies
Layer frame formats for wireless protocols
MAC layer frame formats and technologies
Spectrum and protocol analysis techniques and troubleshooting

Who Should Take CWAP Training?
This CWAP training is considered associate-level Networking training, which means it was designed for network admins. This WLAN skills course is designed for network admins with three to five years of experience with wireless networking.

New or aspiring network admins. This course covers advanced physical layer formats, MAC layer frame formats, wireless operations, as well as spectrum and protocol analysis and troubleshooting that's advanced stuff for someone who's brand new to network administration or wireless administration. However, if you have to accelerate your wireless knowledge in a hurry, this is a good course to catapult yourself with.

Experienced network admins. If you've had a hand in wireless network administration and management for a few years but you're not sure how to move your career forward, this CWAP training might be what you're looking for. Learn advanced techniques in troubleshooting wireless networks while you learn everything there is to know about advanced wireless technologies and devices.



451549841_certified_wireless_design_professional_-_cwdp-304_-_cwnp_certification_training.jpg


















 
efb9554e95a658268206ae36ec0d901b.jpg


Designing Cisco Enterprise Networks (ENSLD 300-420)
Published 3/2023
Created by Arash Deljoo
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 130 Lectures ( 136h 16m ) | Size: 58.2 GB



Most Complete Teaching of ENSLD 300-420



What you'll learn
Internet Protocol Version 4 (IPv4) Design
Internet Protocol Version 6 (IPv6) Design
Routing Protocol Characteristics, EIGRP, and IS-IS
OSPF, BGP, and Route Manipulation
IP Multicast and Network Management
Enterprise LAN Design and Technologies
Advanced Enterprise Campus Design
WAN for the Enterprise
WAN Availability and QoS
SD-Access Design
SD-WAN Design
Automation

Requirements
You need to have CCNA Level knowledge . You can implement scenarios of this course in GNS3 or EVE-NG.

Description
After taking this course, you should be able to:Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise networkDesign Open Shortest Path First (OSPF) internal routing for the enterprise networkDesign Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise networkDesign a network based on customer requirementsDesign Border Gateway Protocol (BGP) routing for the enterprise networkDescribe the different types and uses of Multiprotocol BGP (MP-BGP) address familiesDescribe BGP load sharingDesign a BGP network based on customer requirementsDecide where the L2/L3 boundary will be in your Campus network and make design decisionsDescribe Layer 2 design considerations for Enterprise Campus networksDesign a LAN network based on customer requirementsDescribe Layer 3 design considerations in an Enterprise Campus networkExamine Cisco SD-Access fundamental conceptsDescribe Cisco SD-Access Fabric DesignDesign a Software-Defined Access (SD-Access) Campus Fabric based on customer requirementsDesign service provider-managed VPNsDesign enterprise-managed VPNsDesign a resilient WANDesign a resilient WAN network based on customer requirementsExamine the Cisco SD-WAN architectureDescribe Cisco SD-WAN deployment optionsDesign Cisco SD-WAN redundancyExplain the basic principles of QoSDesign Quality of Service (QoS) for the WANDesign QoS for enterprise network based on customer requirementsExplain the basic principles of multicastDesigning rendezvous point distribution solutionsDescribe high-level considerations when doing IP addressing designCreate an IPv6 addressing planPlan an IPv6 deployment in an existing enterprise IPv4 networkDescribe the challenges that you might encounter when transitioning to IPv6Design an IPv6 addressing plan based on customer requirementsDescribe Network APIs and protocolsDescribe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF)

Who this course is for
Enterprise Network Engineers , Service Provider Engineers , Enterprise Design Engineers



451491233_designing_cisco_enterprise_networks_ensld_300-420.jpg







































 
5f0926687913f9bcb9aeedb3e7991fec.jpg


Caro-Kann: A Complete Chess Opening Repertoire Vs 1.E4
Last updated 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 33.04 GB | Duration: 28h 12m

Master the Caro-Kann Defence: Boost Strategies, Tactics, Understand Key Positions & Transform Your Performance vs 1.e4



What you'll learn
Be able to confidently play the Caro-Kann Defense against 1.e4, avoiding opening traps and gaining a solid pawn structure
Be able to recognize and respond to common attacking ideas and themes in the Caro-Kann, such as the advance, exchange variation and the classical variation
Be able to use tactical ideas and maneuvers to create counterplay and take advantage of weaknesses in the opponent's position
Be able to develop a deep understanding of the strategic ideas and plans in the Caro-Kann, such as controlling the center and attacking on the wings
Be able to use positional concepts such as pawn structure, piece activity, and the initiative to gain an advantage in the game.
Be able to identify and exploit weaknesses in the opponent's pawn structure, such as isolated or doubled pawns.
Be able to use the Caro-Kann as a flexible and versatile opening, able to transpose into different variations depending on the opponent's moves.
Be able to understand and use the ideas behind the exchange variation, the Panov-Botvinnik attack, and other important variations in the Caro-Kann.
Be able to use the Caro-Kann to play actively and aggressively, creating dynamic and complex positions that offer winning chances from a black perspective
Be able to handle complex tactical and strategic situations that arise from the Caro-Kann, including sharp pawn breaks and piece sacrifices.
Be able to play the Caro-Kann confidently against strong opponents, including grandmasters and other experienced players.
Be able to understand the underlying principles of chess strategy and how they apply specifically to the Caro-Kann Defense.
Be able to use the Caro-Kann to create closed and semi-closed positions, favoring the player with superior pawn structure and control of space.
Be able to handle complex pawn structures in the Caro-Kann, including pawn chains, pawn islands, and pawn majorities.
Be able to use the Caro-Kann as a weapon against aggressive and tactical opponents, blunting their attacks and forcing them to play positionally.
Be able to vary your play depending on your opponent's style and preferences, from aggressive and tactical to solid and positional.
Be able to play with confidence and creativity, and to improvise if necessary.
Be more able to analyze your own games and identify areas for improvement in your Caro-Kann defense play.
Be able to play the sidelines and less common variations of the Caro-Kann defense such as an early c5 against the Advance variation
Be able to play the Caro-Kann defense with confidence in blitz and rapid chess games.
Be able to understand and implement the principles of the Caro-Kann defense in other related openings, such as the French defense and the Slav defense.
Be able to study and learn from the games of top grandmasters who have played the Caro-Kann defense, such as Tigran Petrosian, Anatoly Karpov and Michael Adams
Be able to understand and apply the key endgame principles that arise from the Caro-Kann defense, such as pawn structure and piece coordination.
Be able to use the Caro-Kann defense to transition into favorable middlegame and endgame positions.
Be able to handle complex and tactical positions with greater confidence from seeing key games in this course


Requirements
Know how the chess pieces move


Description
Mastering an opening repertoire is a vital part of any chess player's strategy. It guides you through the early intricacies of the game, laying the groundwork for the unfolding match. If you seek a robust and reliable opening when playing with the Black pieces, look no further than the Caro-Kann defense.Our course offers an all-inclusive, proven repertoire for handling the complexities of playing Black against 1.e4, with a focus on the Caro-Kann defense. This defense, favored by World Chess Champions like Jose Raul Capablanca, Mikhail Botvinnik, Tigran Petrosian, and Anatoly Karpov, provides a reliable response to 1.e4, allowing for strategic over tactical play.You'll learn how the Caro-Kann can neutralize aggressive tactical players, mirroring Botvinnik's success in his 1961 rematch against Mikhail Tal. We delve into why the Caro-Kann often lacks the forcing variations seen in the Sicilian defense, making it easier to learn and ideal for those preferring strategic play.We start with an introduction to the Caro-Kann defense, its history, and the distinctive traits of its various variations. Key focus is placed on the Advance and Exchange Variations, but we also cover the Panov Botvinnik Attack, the Fantasy Variation, the Two Knights Variation, and other sidelines that you might face.Our course dives into the key concepts, strategic plans, and tactics essential for each variation, alongside addressing the potential pitfalls and strengths. We guide you on mitigating these challenges and maximizing your position's potential.We provide recommendations for:Main Line: 2.d4 d5 3. Nc3 and 3. Nd2Advance Variation: 3. e5Exchange Variation: 3. exd5Panov Botvinnik Attack: 4. c4Fantasy Variation: 3. f3Two Knights Variation: 2. Nc3 d5 3. Nf3 (or 2. Nf3 d5 3. Nc3)Early Queen move 2. Qe2Suitable for players ranging from beginners to advanced, this course starts from the basics and progresses to intricate concepts, facilitating learning at your own pace.By the course's end, you'll possess a comprehensive, engine-approved opening repertoire against 1.e4, one that's fun, easy to play, and statistically sound. You'll confidently navigate the Caro-Kann defense, setting the stage for a successful game.Take the plunge now! Enroll and start your journey to mastering the Caro-Kann defense today!

Overview
Section 1: Introduction

Lecture 1 How did the Caro-Kann get its name?

Lecture 2 Marcus Kann's brilliancy game vs Honorary Grandmaster Jacques Mies in 1885

Lecture 3 Horatio Caro's great win vs Emanuel Lasker's Brother - Berthold Lasker - 1886

Lecture 4 Why play the Caro-Kann?

Lecture 5 What does it mean to have a "Solid" Opening?

Lecture 6 How are the opening repertoire "Recommended" choices made?

Lecture 7 Why include "Interesting" sections?

Lecture 8 Tools and resources often made use of in this course

Lecture 9 Top 100 Caro-Kann exponents 2023

Section 2: Tartakower Variation 1.e4 c6 2.d4 d5 3.Nc3/d2 dxe4 4.Nxe4 Nf6 5.Nxf6+ exf6!

Lecture 10 Introduction to 3...Nf6 with 4...exf6

Lecture 11 Black castles queenside and later c5 break gives Ne5xd3 option- Duda vs Artemiev

Lecture 12 DEBUT game 1908 - Black has nice pressure for e-file tactic - Leonhardt vs Duras

Lecture 13 12 Cs- Beautiful 7th rank based winning tactic - Forgacs vs Duras

Lecture 14 Giving White dynamic f-file could have been dangerous - Asztalos vs Nimzovich

Lecture 15 White's Queen manages to get trapped with early attack - Bezruchko vs Flohr

Lecture 16 Black's h pawn used as a battering ram creating tactical issues - Toms vs Navara

Lecture 17 Downsides of f4 weaken key g1-a7 diagonal tactically - Perez vs Alekhine

Lecture 18 Thorn pawn strategy creates dangerous passed pawn possibilities - Real vs Houska

Lecture 19 Very interesting but risky Ne6-g5 plan - Haldorsen vs Artemiev

Lecture 20 Dangerous knight on g5 supports great tactical idea - Tissir vs Artemiev

Lecture 21 11 C's Black's mass of pawns create concrete threats - Torre vs Korchnoi

Lecture 22 Establishing piece on d5 after c5 provoked gives great attack - Mieses vs Flohr

Lecture 23 Powerful exchange sacrifice improves King and weakens opponent - Lujan vs Houska

Lecture 24 Black's pawn mass with f5 creates useful threats - Solomunovic vs Lechtynsky

Lecture 25 Opportunity to create threats vs undoubling pawns important - Kujipers vs Flohr

Lecture 26 16 C's - Beautiful instructive play on light squares - Tarrasch vs Tartakower

Lecture 27 4 Cs-Dynamic use of backward 'c' pawn keeping active pieces - Team vs Capablanca

Lecture 28 17 C's Unprotected rook proves fatal to combination - Bluemich vs Alekhine

Lecture 29 Remarkably strong attacking dynamics and pressure on Q-side - Player vs Houska

Lecture 30 White's a-file pressure doesn't create smooth combination- Sznapik vs Lechtynsky

Lecture 31 8 C's Interesting imbalances result in better endgame - Grant vs Korchnoi

Lecture 32 Tactical themes revolve around pin and Queen trapping - Kveinys vs Lechtynsky

Lecture 33 Semi-open d-file provides opportunity for endgame probing - Morals vs Lechtynsky

Lecture 34 Interesting opposite side castling game with undermining - Carleton vs Keene

Lecture 35 Powerful exchange sac amplifies dark square weaknesses - Stefansson vs Navara

Lecture 36 K left too long in the center - c5 opens up position - SirJohn vs Kingscrusher

Lecture 37 Technical analysis: Theoretically best just to take d4 pawn - Discussion

Lecture 38 Exchange dark square bishops, centralise and win endgame - Pozun vs Cukrowski

Lecture 39 Aggressive h5 response gives Black very dynamic play - Semenova vs Howell

Lecture 40 Instructive themes for making use of emerging pawn majority - Nozdrin vs Kostin

Lecture 41 Weakness of last move tactical trap relating to c2 to be aware of - Woda vs Berg

Lecture 42 White gets carried away with Q-side play at expense of K safety - Ernst vs Berg

Section 3: Tartakower Variation - 1.e4 c6 2.d4 d5 3.Nc3/d2 dxe4 4.Nxe4 Nf6 5.Ng3 h5!

Lecture 43 Very accurate Be4 move leads to major opening blunder - Glass vs Tartakower

Lecture 44 Dark square strategy with Queen and Bishop menacing - Romanovsky vs Flohr

Lecture 45 Crushing Q-side attack facilitated by pressure earlier- TurksteR vs Kingscrusher

Section 4: Tartakower Variation 1.e4 c6 2.d4 d5 3.Nc3/d2 dxe4 4.Nxe4 Nf6 5.Ng5 {h6!)

Lecture 46 Very interesting Queen sacrifice for potential upward trend - Westerinen vs Wade

Lecture 47 King brought down the board to be mated - Schmid vs Korchnoi

Section 5: Advance - Botvinnik-Carls Variation vs 3.e5 : Advance 1.e4 c6 2.d4 d5 3.e5 c5!

Lecture 48 Introduction to why this variation avoids weight of theory of Bf5

Lecture 49 Botvinnik name: Exchange sacrifice - Tal vs Botvinnik 1961 World Ch. Rd 4

Lecture 50 Botvinnik: Bishop pair given up but Black solid - Tal vs Botvinnik - 1961 Rd 6

Lecture 51 Botvinnik name: Squeezing the Bishop Pair - Tal vs Botvinnik 1961 World Ch. Rd 8

Lecture 52 Carls name: K safety reduced on Q-side from undermining - Treybal vs Carls

Lecture 53 Introduction to more recently named "Arkell/Khenkin" variation

Lecture 54 Technical intro and discussion: 1.e4 c6 2.d4.d5 3.e5 c5 4.dxc5 e6 5.a3

Lecture 55 Technical intro and discussion 1.e4 c6 2.d4 d5 3.e5 c5 4.dxc5 Nc6

Lecture 56 === 4.dxc5 e6 option - GM Khenkin==== (1.e4 c6 2.d4 d5 3.e5 c5 4.dxc5 e6)

Lecture 57 Very energetic g5-g4 plan to undermine White's center - Kortenbusch vs Khenkin

Lecture 58 Ba6 serves as Anti-Greek Gift resource - Ojeda vs Khenkin

Lecture 59 Piece sacrifice to make the attack and pins vs opponent K - Volokitin vs Foreest

Lecture 60 Early Nd4 is part of process to win e5 pawn early on - Shuvalova vs Dreev

Lecture 61 Powerful exchange sacrifice gives greater opportunities - Greeff vs Houska

Lecture 62 Dynamic recapture away from center with fxg6 - Risteski vs Tari

Lecture 63 Unsoundly going for f2 pawn but opportunities later - Harsha vs Fedoseev

Lecture 64 Great central pawn mobility after Opening- Kosteniuk vs Khotenashvilli

Lecture 65 Contortions for trying to win the a4 pawn creates bad endgame - Grant vs Gunina

Lecture 66 Black succeeds in dramatically gaining mass of center pawns - Parry vs Arkell

Lecture 67 Risky castling queenside but f6 later gives central mobility - Duda vs Liren

Lecture 68 === 4.dxc5 Nc6 option - GM Keith Arkell==== (1.e4 c6 2.d4 d5 3.e5 c5 4.dxc5 Nc6)

Lecture 69 Really dynamic use of light square bishop without counterpart - Greet vs Arkell

Lecture 70 Holding onto the extra pawn can end up being a pawn down - Lee vs Arkell

Lecture 71 A very dramatic double edged game - rook on 7th unpleasant - McLean vs Arkell

Lecture 72 Getting bishop outside of pawn chain early justified - Haussernot vs Arkell

Lecture 73 Beautiful counterplay generation making use of 'e' pawn sac - Antal vs Khenkin

Lecture 74 === 4.c3 29% ==== (1.e4 c6 2.d4 d5 3.e5 c5 4.c3)

Lecture 75 White's light squares require care and responsibility - Briem vs Arkell

Lecture 76 === 4.Nf3 11% ==== (1.e4 c6 2.d4 d5 3.e5 c5 4.Nf3)

Lecture 77 Healing pawn structure leads to potentially losing endgame - Balogh vs Khenkin

Lecture 78 Queenside counterplay leads to strong attack - Msellek vs Gunina

Lecture 79 === 4.c4 4% ==== (1.e4 c6 2.d4 d5 3.e5 c5 4.c4)

Lecture 80 6 Cs- Similarities to Albin counter gambit after d4 - Azerbaev vs Tal

Lecture 81 Double edged game with g-file involvement helping Black - Zhou vs Arkell

Lecture 82 Very smooth slight advantage for black after early b3 played - Lane vs Arkell

Lecture 83 === 4.Ne2 1% ==== (1.e4 c6 2.d4 d5 3.e5 c5 4.Ne2)

Lecture 84 See 2.Ne2 section for example games that transpose

Section 6: Exchange Variation 4.Bd3- 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.Bd3 Nc6 5.c3 g6!

Lecture 85 Introduction: Carlsbad Pawn structure

Lecture 86 Why recommend 5...g6? - Sometimes early Bf5 immediately after is okay :)

Lecture 87 ====6.Bf4 39%==== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.Bd3 Nc6 5.c3 g6 6.Bf4

Lecture 88 A number of thematic Carlsbad plans made use of - Munkhzul vs Khotenashvili

Lecture 89 Strategic bishop exchange facilitates minority attack - Hasan vs Arkell

Lecture 90 ====6.Nf3 23%==== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.Bd3 Nc6 5.c3 g6 6.Nf3

Lecture 91 Minority attack becomes more important after Queens exchanged - Fabri vs Arkell

Lecture 92 A slightly doubled edged game but Bg3 gave no problems - Reiling vs Arkell

Lecture 93 Doubled pawns provide great compensation and nice endgames - Renner vs Khenkin

Lecture 94 ====6.h3 21 %==== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.Bd3 Nc6 5.c3 g6 6.h3

Lecture 95 Black gradually improves position with controlled little steps - Derylo vs Baum

Lecture 96 Dangerous g-file attack greatly compensates pawn structure - Werner vs Miles

Lecture 97 Sufficient counterplay for doubled pawns offering - Zhaoyang Li vs Dreev

Lecture 98 e5 break powerful but c4 not timed well - Mozgokliuj vs Kingscrusher

Lecture 99 Black occupies the center but there are dxe5 and f4 concerns - Roos vs Khenkin

Section 7: Caro-Kann Fantasy Variation 1.e4 c6 2.d4 d5 3.f3 e6!

Lecture 100 Why recommend 3...e6?

Lecture 101 ===4.Nc3 73%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.Nc3

Lecture 102 Instead of be greedy in opening aim for central pressure - Kamsky vs Dreev

Lecture 103 Giving up both bishops creates easy and effective pawn storm- Catherina vs Girya

Lecture 104 Double edged game transforms into easily winning endgame - Tate vs Arkell

Lecture 105 A doubled edged game after 6...dxe4 instead of 6...Be7 - Wall vs Houska

Lecture 106 Giving up light square bishop could have ended badly - Chebotarev vs Galkin

Lecture 107 Early Ba6 plan very effective and dangerous for White - Alinasab vs Houska

Lecture 108 Undermining pawn chain at exploitable base d4 - Gallagher vs Arkell

Lecture 109 ===4.Be3 10%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.Be3

Lecture 110 8 Cs- Strategic bishop exchanged coupled with Ne7 very solid - Mitkov vs Dreev

Lecture 111 ===4.e5 4%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.e5

Lecture 112 Very bad version of the Advance French Defence - Sadikovic vs Radivojevic

Lecture 113 ===4.c4 4%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.c4

Lecture 114 Dark square pressure with Knight pinned early and c5 - Jovanovic vs Markovic

Lecture 115 ===4.Bd3 2%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.Bd3

Lecture 116 19C's - Early defensive f5 becomes attacking pawn later - Tartakower vs Khan

Lecture 117 ===4.c3 2%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.c3

Lecture 118 Accepting Gambit should have been a smoother ride - Malinovsky vs Moksh

Lecture 119 ===4.Bf4 1%=== 1.e4 c6 2.d4 d5 3.f3 e6 4.Bf4

Lecture 120 Bishop pair obtained then pawn sac to increase pressure - Wolf vs Tartakower

Section 8: Panov-Botvinnik Attack - 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 Nf6 5.Nc3 g6!

Lecture 121 Why recommend 5...g6?

Lecture 122 ===6.Nf3 36%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 Nf6 5.Nc3 g6 6.Nf3

Lecture 123 Black gets a very favourable Isolated Queen Pawn situation - Stolakis vs Turov

Lecture 124 Knight to c4 plan very effective plan - Pelling vs Keene

Lecture 125 Double edged blitz game - resources of both sides - Dristigheten vs Kingscrusher

Lecture 126 ===6.cxd5 25%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 g6 5.Nc3 g6 6.cxd5

Lecture 127 Accepting central isolated pawn gives great piece activity - Hermlin vs Keres

Lecture 128 Tactical shot Na4 leads to Black getting positional advantages - Schultz vs Mile

Lecture 129 5 Cs- Weak looking g4 was asking for punishment later - Bisguier vs Larsen

Lecture 130 Black has nothing to fear after early Queen trade- Ghinda vs Lobron

Lecture 131 Holding extra pawn White starts to go wrong with weakening f3 - Fuchs vs Girya

Lecture 132 ===6.Qb3 21%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 g6 5.Nc3 g6 6.Qb3

Lecture 133 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 Nf6 5.Nc3 g6 6.Qb3 Bg7 7.cxd5 O-O

Lecture 134 Even if d5 pawn reinforced, d4 can be the next target - Van Den Bosch vs Euwe

Lecture 135 Bishop pair create great winning opportunities - Martinez vs Arkell

Lecture 136 16 Cs- A remarkable Queen trap issue - Fuchs vs Bronstein

Lecture 137 10 Cs- Punishment for trying to hold onto pawn too hard - Balashov vs Botvinnik

Lecture 138 ===6.Bg5 10%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 g6 5.Nc3 g6 6.Bg5

Lecture 139 Superior Bishop vs Knight after Black regains pawn - Sharma vs Arkell

Lecture 140 ===6.c5 3%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 g6 5.Nc3 g6 6.c5

Lecture 141 c5 opposed with classic b6 undermining giving great piece play - Hoorn vs Euwe

Lecture 142 ===EARLIER non critical 5.Nf3 8%=== 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 g6 5.Nf3

Lecture 143 9 Cs- Grabbing the light squared bishop gives easy game- Fahrni vs Nimzovich

Section 9: 2.Nf3 Caro-Kann 1.e4 c6 2.Nf3 d5!

Lecture 144 Intro- 2.Nf3 at master level usually to enter two knights variation - not exd5

Lecture 145 ===3.exd5 (45%)===

Lecture 146 3 C's Easy plan of Ne4 and g5 instead of minority attack - Bonnaire vs Dreev

Lecture 147 2 Cs- Strong positional play vs White's weakened light squares - Rivier vs Flohr

Lecture 148 8 Cs-Minority attack, probing and exploiting weaknesses - Ljuboschiz vs Kasparov

Lecture 149 Creating opposite side castling attacking game with pressure - Yates vs Euwe

Lecture 150 Light square strategy creates pawn on c4 and e5 break - Grob vs Nimzovich

Lecture 151 e5 break facilitated when kicking e5 knight with f6 - Sedlak vs Wojtaszek

Lecture 152 Ne5 with Bxc6 needs great care around e5 knight - Charochkina vs Khotenashvilli

Lecture 153 Instructive attacking chess opening routes to King - Pichot vs Firouzja

Section 10: Two Knights Variation (Fischer Favourite!)- 1.e4 c6 2.Nc3/f3 d5 3.Nf3/c3 Bg4!

Lecture 154 Why 3...Bg4 vs the Two Knights Variation?

Lecture 155 Classic trap with Ne5 Qh5 etc if black not careful (no d4)

Lecture 156 ===4.h3 (77%) === 1.e4 c6 2.Nf3 d5 3.Nf3 Bg4 4.h3

Lecture 157 15 C's - Crushing pressure build up against Q-side castled King - Day vs Keene

Lecture 158 5 C's Simplification out of opening minimises any problems - Djuric vs Anand

Lecture 159 White King left in center leading to great tactic - Marzouk vs Houska

Lecture 160 5 Cs - Volunteering both bishops leads to equality - Klavins vs Petrosian

Lecture 161 Intense dark square pressure with fianchetto bishop - Prandsetter vs Lechtynsky

Lecture 162 45 Cs- Bishop shut in, dark squares dismantled around King - Fischer vs Keres

Lecture 163 2 C's - Attack potential disappears after casual rook move - Georgiev vs Karpov

Lecture 164 ===4.Be2 (7%) === 1.e4 c6 2.Nf3 d5 3.Nf3 Bg4 4.Be2

Lecture 165 Improved version of French Advance variation has perks - Kasparian vs Petrosian

Lecture 166 Dangers of f4 weakening key diagonal illustrated - Matulevicius vs Kholmov

Lecture 167 ===4.d4 (6%) === 1.e4 c6 2.Nf3 d5 3.Nf3 Bg4 4.d4

Lecture 168 Solid 4...Nf6 but beware of light square bishop missing - Senador vs Rakhmanov

Lecture 169 Avoiding materialism and instead damaging structure - Amer vs Khenkin

Lecture 170 Unsoundly accepting gambit but Bd2 not accurate follow up - Erker vs Adams

Section 11: Accelerated Panov Attack Variation- 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6!

Lecture 171 Introduction to 4...Nf6 vs Accelerated Panov-Botvinnik attack

Lecture 172 ===5.Nc3 58% ==== 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6 5.Nc3

Lecture 173 20 Cs- A magnificent defensive combination for K-safety - Sokolov vs Karpov

Lecture 174 10 Cs- White's K safety reduced from efforts to hold pawn- Conquest vs Bronstein

Lecture 175 Giving up bishop pair leads to dominating knights vs bishops - Winants vs Adams

Lecture 176 King goes to light square f5 in interesting endgame - Beliavsky vs Ivanchuk

Lecture 177 ===5.Qa4+ 17% ==== 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6 5.Qa4+

Lecture 178 White holds on to material but pieces away from K - Muzychuk vs Danielian

Lecture 179 ===5.Bb5+ 16% ==== 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6 5.Bb5+ Nbd7

Lecture 180 Solid bishop pair advantage and strong g-file attack - Gurevich vs Speelman

Lecture 181 ===5.d4 4% ==== 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6 5.d4

Lecture 182 See Panov-Botvinnik section as 5.d4 transposes

Lecture 183 ===5.Bc4 1% ==== 1.e4 c6 2.c4 d5 3.cxd5 cxd5 4.exd5 Nf6 5.Bc4

Lecture 184 An important trap to be aware of if White too keen on d5- Wolthuis vs Euwe

Lecture 185 Tricky 3...Nf6 possibility (1. e4 c6 2. c4 d5 3. exd5 Nf6 )

Lecture 186 Tricky Opening move order gambit then IQP situation - Dickson vs Houska

Section 12: Breyer variation 1.e4 c6 2.d3 d5 {Breyer} 3.Nd2/Nf3 g6!

Lecture 187 Introduction to Breyer variation and recommendation of g6

Lecture 188 === 4.Ngf3 69% === 1.e4 c6 2.d3 d5 3.Nd2 g6 4.Ngf3

Lecture 189 a5 weakens Queenside and Black wins pawn with pressure - Raaste vs Lechtynsky

Lecture 190 White's lack of development and weaknesses create disaster- Robatsch vs Portisch

Lecture 191 === 4.g3 18% === 1.e4 c6 2.d3 d5 3.Nd2 g6 4.g3

Lecture 192 Backward d3 pawn torture leads to sudden Q-side invasion - Visser vs Miles

Lecture 193 3 Cs- Removing fianchetto bishop then opening up King - Larsson vs Adams

Lecture 194 === 4.f4 4% === 1.e4 c6 2.d3 d5 3.Nd2 g6 4.f4

Lecture 195 Early f4 dark square weaknesses allow annoying resources - Zhou vs Dreev

Lecture 196 N.B. For 1.e4 c6 2.Nf3 d5 3.d3 see Pichot vs Firouzja game in 2.Nf3 section

Section 13: Rasa-Studier Gambit - 1.e4 c6 2.d4 d5 3.Nc3 dxe4 4.f3 Nf6!

Lecture 197 Interesting fun King going up the board for attack - Wuts vs Barczay

Section 14: Von Hennig Gambit - 1.e4 e6 2.d4 d5 3.Nc3 dxe4 4.Bc4 Nf6!

Lecture 198 Neutralising opponent's light square bishop with extra pawn - Short vs Bareev

Section 15: Bohemian Attack (2.Ne2) 1.e4 c6 2.Ne2 d5!

Lecture 199 39 Cs-Leave c8 bishop at home instead of facing threats - Bronstein vs Petrosian

Section 16: Hillbilly Attack 1.e4 c6 2.Bc4 d5 3.Bb3 dxe4!

Lecture 200 b3 bishop targeted with a5-a4 plan - Williams vs Jones

Section 17: Goldman Variation - 1.e4 c6 2.Nc3 d5 3.Qf3 dxe4! 4.Nxe4 Nd7

Lecture 201 3 Cs- White goes off the rails giving up center pawn - Fernandez vs Arkell

Lecture 202 Very accurate play exploiting dark square weaknesses - Friedgood vs Salamanca

Section 18: GM Aleksei Pridorozhni (AlexSur81) favourite - 1.e4 c6 2.Nc3 d5 3.Qe2 d4!

Lecture 203 Interesting pawn sac to keep ambitious ideas - Voitsekhovsky vs Tomashevsky

Lecture 204 Bishop sac to generate dangerous counterplay - Alexsur81 vs Kingscrusher

Section 19: Euwe Attack - 1.e4 c6 2.b3 d5!

Lecture 205 Instructive endgame simplification where bishop has targets - Linton vs Wade

Section 20: Mieses Gambit - 1.e4 c6 2.d4 d5 3.Be3 dxe4!

Lecture 206 Black hold onto extra pawn for a while - Mieses vs Davidson

Section 21: Interesting 3...dxe4 in Two Knights attack - 1.e4 c6 2.Nc3 d5 3.Nf3

Lecture 207 7 Cs- Interesting Bh6 possibility and later nasty pin - Penrose vs Larsen

Section 22: Interesting 3...Bf5- Classical (6.Ne2) - 2.Nc3 dxe4 3.Nxe4 Bf5 5.Ng3 Bg6 6.Ne2

Lecture 208 120 Cs- Handling a dangerous Knight sacrifice keeping safe- Tal vs Botvinnik

Section 23: Interesting 3...Bf5 Classical (no h4) - 2.Nc3 dxe4 3.Nxe4 Bf5 5.Ng3 Bg6 6.Nf3

Lecture 209 73 Cs- Riskily playing for win including exchange sac - Dueckstein vs Petrosian

Section 24: Interesting 3...Bf5 Classical - 2.Nc3/Nd2 dxe4 3.Nxe4 Bf5 5.Ng3 Bg6 6.h4

Lecture 210 Weak h4 and c4 pawns makes it easier to blunder - Nievergelt vs Larsen

Lecture 211 15 Cs- Black dares to castle queenside and has Qd5 resource- Firmian vs Korchnoi

Lecture 212 18 Cs- Very interesting Bg8 to make e6 more solid - Porreca vs Bronstein

Section 25: Interesting 3...Bf5 Classical- 2.Nc3 and 2.Nd2 dxe4 3.Nxe4 Bf5 5.Ng3 Bg6 6.Bc4

Lecture 213 2 Cs-h4 liability soon after the opening amplified with Bxf6 - Tiviakov vs Dreev

Section 26: Interesting 6..e6 Maroczy - 2.d4 d5 3.Nd2 dxe4 4.Nxe4 Bf5 5.Ng3 Bg6 6.f4 e6

Lecture 214 16 Cs- Simplification to endgame exposes weak pawns- Marshall vs Capablanca

Section 27: Interesting 4...Nd7 Modern variation- 1.e4 c6 2.d4 d5 3.Nc3/d2 dxe4 4.Nxe4 Nd7

Lecture 215 A fun trap to be aware of to win a piece - Osoblivy vs Danielian

Lecture 216 Nd7 starts to prove weaknesses in White's camp after h4 - Lalic vs Arkell

Lecture 217 73 C's - Iconic move to help improve King safety - Kamsky vs Karpov

Section 28: Interesting 5..gxf6: Bronstein 1.e4 c6 2.d4 d5 3.Nc3 dxe4 4.Nxe4 Nf6 5.Nxf6 gxf6

Lecture 218 14 Cs- Too much chaos and counterplay for Karpov to control - Karpov vs Miles

Lecture 219 148 Cs- Dynamic play with thorn pawn and g-file pressure - Bakulin vs Bronstein

Lecture 220 16 C's - Intense struggle with repeat exchange sacs - Kavalek vs Bronstein

Section 29: Interesting 3...Bf5: Caro-Kann Advance Mainline- 1.e4 c6 2.d4 d5 3.e5 Bf5

Lecture 221 368 Cs- ICONIC Game - positional masterpieces - Nimzovich vs Capablanca

Lecture 222 Bd7 retreat avoids e6 and supports strategic bishop exchange - Kamsky vs Adams

Section 30: Interesting: 4.Nc6 (then Nf6) vs Exchange 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.Bd3 Nc6

Lecture 223 Many exponents including Bronstein, Riazantsev, Danielian, Gunina, Galkin

Lecture 224 59 Cs - Practical choices for g-file pressure - Maroczy vs Capablanca

Section 31: Interesting 5...Not g6- Panov 1.e4 c6 2.d4 d5 3.exd5 cxd5 4.c4 Nf6 5.(not g6)

Lecture 225 63 Cs- Adventure to win a rook badly backfires - Nimzowitsch vs Alekhine

Lecture 226 51 Cs- Playing effectively against the Isolated Queen Pawn- Botvinnik vs Euwe

Lecture 227 150 Cs - Iconic instructive play vs Isolated Queen's pawn - Kamsky vs Karpov

Section 32: Interesting 3...d6 Accelerated Panov Attack - 1.e4 c6 2.c4 e5 3.d4 d6

Lecture 228 19 Cs- Passive d6 worked in end but not due to the Opening - Alapin vs Nimzovich

Section 33: Interesting dxe4 and 4...Nf6 vs Goldman 1.e4 c6 2.Nc3 d5 3.Qf3 dxe4 4.Nxe4 Nf6

Lecture 229 Accepting doubled pawns to maintain Ne5 threat - Roy vs Riazantsev

Section 34: Interesting 4...exf3 vs Rasa-Studier Gambit - 1.e4 c6 2.d4 d5 3.Nc3 dxe4 4.f3

Lecture 230 Accepting the gambit then castling Q-side - Thenhausen vs Meduna

Section 35: PGN Downloads

Lecture 231 PGN Downloads of games made use of in this course

Section 36: Conclusions and Philosophical points

Lecture 232 Conclusions and Philosophical points

Section 37: Bonus

Lecture 233 Bonus Lecture

Beginner to Intermediate chess players


Homepage


452170006_152-ne5-with-bxc6-needs-great-care-around-e5-knight-charochkina-vs-khotenashvi.jpg















 
44674743f2de8df4dad4d8391be5a303.jpg


Full Pilots Licence Course {Flight School}
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (UK) | Size: 23.87 GB | Duration: 12h 52m

FULL PILOTS LICENSE FLYING EXERCISES and much more.



What you'll learn
Airline pilot training. PPL. FLYING TRAINING


Requirements
Pilot training learn to fly airline pilot airplane aircraft


Description
"Once you have tasted flight, you will forever walk the earth with your eyes turned skyward. For there you have been, and there you will always long to return."Leonardo da Vinci.Flight Training can be very slow and expensive. Whether you fly as a student or fly as an experienced pilot, every hour of flight costs you loads of money. You don t have much control. Well with VR Flight sim you gain the control. You set yourself up once and practice whenever you want and for as long as you want. Let me be your guide into the VR World. Start learning what you need to know.The USAF train their jet fighter pilots with the VR headset and the controllers. If it is good enough for the airforce it must be good...and it certainly is.Pilots often take 2 sides on what is the best training aircraft, the Pa 28 or the Cessna 172. The answer is they are both very good at what they do. They both have pluses and minuses, however it is really down to personal preference. I learned to fly and got my pilots licence on the PA 28 161 warrior, so I am very fond of them however out of the two I would rather fly the C 172. It is not because it is better it just suits my needs better. In this course I will explain everything.Learning to fly in VR is better in my opinion. much cheaper and safer than in real life, then at the end of the day you can decide if you want to spend over 10 grand on a licence of not.

Who this course is for
Beginners course to pilots licence


Homepage


452321906_64-oban-to-inverness-part-1_s.jpg












 
4fc5fc31aeb3f0fa03cd9bfa4ffa38db.jpg


Sap S/4Hana Sales (Sd - Sales And Distribution)
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 29.65 GB | Duration: 68h 26m

The course covers both configuration and end-user processes for SAP S/4HANA Sales (Sales and Distribution)



What you'll learn
Configuration and End-User activities for SAP S/4HANA Sales
O2C - Order to Cash Cycle Processes on SAP S/4HANA Business Suite
Be able to take SAP S/4HANA Sales Certification exam
To understand how required business processes run related to SAP S/4HANA SD
Required SAP S/4HANA Finance & Controlling configuration for SAP S/4HANA SD
Integration of SAP S/4HANA Sales with FICO, MM and PP modules
Master Data related to Customer, Material, and Conditions
Order types, Item Categories, Scheduling line categories
Availability Check, Transfer of Requirements, and MRP Run
Sales Order Costing
Bill of Material and Production Planning
Logistics Execution - Delivery types, Picking, Packing, and Post Goods Issue
Billing Plans - Periodic Billing and Milestone Billing
Material Classification, Batch Management and Classification, and Batch Split
Working through SAP Fiori Apps related to SAP S/4HANA Sales
Copying Control for Sales Documents Configuration
Master Contract, Quantity and Value Contracts
Pre-Sales Activities - Inquiry and Quotation and different Sales Processes as an En-User
Customer Consignment Stock, and SAP S/4HANA Credit Management
Rebate Agreement, Intercompany Billing, Stock Transfer


Requirements
Access to SAP system


Description
The course will prepare the students to learn and understand all the necessary end-to-end implementation steps to configure SAP S/4HANA Sales 2021, previously known as SAP SD (Sales and Distribution), along with End-User activities for any organization.After this course, the students will be able to identify and analyze the business requirements for any organization related to the Order to Cash process cycle and to configure SAP S4 HANA Sales accordingly.After taking this course, the Learners will be able to work both as a Consultant and End-User and can also take SAP S/4HANA Sales 2021 certification exam i.e., C_TS462_2021.Most of the lectures under each Section can easily be identified for 'Configuration' and 'End-User' activities, so if you are interested in the End-User training only, then you can filter those lectures easily.Here are the highlights of the course:- Section 1 is about the SAP S/4HANA Business Suite and its HANA database capabilities including SAP Fiori as New User Interface- Section 2 demonstrates Business Requirements, SAP Activate Methodology, and kicks-off the configuration from the Enterprise Structure on SAP S/4HANA Business Suite- Section 4 makes this course unique by demonstrating the configuration of SAP S/4HANA Finance and Controlling module that is required to work on SAP S/4HANA Sales module and you will not easily find this information in most of the other training courses- Section 6 demonstrates the configuration and creation of Business Partner master data including Customer and Vendor master data- Section 7 demonstrates the configuration for Material master data and then shows how to create a Material master- Section 8 demonstrates the Material classification and Batch Management- Sections 10, 11, and 12 are important in terms of understanding the configuration related to Sales document types, Item categories, Schedule line categories, and Movement types- Sections 13 and 14 are about the integration between Finance module with Materials Management and Sales and Distribution- Sections 15 and 16 show the configuration of Sales Pricing Procedure and Pricing Condition RecordsSections 18, 19, 20, 21, and 22 demonstrate the configuration of Material availability check and then transfer its requirements to the Production and Purchasing department, if the material quantity is not available in the stock as per the Customer s sales order, with planned dependent and planned independent requirements- Sections 24 and 25 show the configuration and end-user activities related to Outbound delivery to the Customer and Sales billing/invoice- Sections 26 and 27 kicks off the demonstration of the typical sales processes such as Inquiry, Quotation, and Sales Contracts- Sections 28 and 29 continue with the demonstration of the sales processes such as Customer Returns, Credit Memo Request, Debit Memo Request, Cash Sale, Rush Order, Free Goods, Cross Selling etc.- Section 30 demonstrates the processes around Sales Billing such as Billing plan types of Periodic Billing and Milestone Billing along with the process of Pro Forma Invoicing- Sections 31 and 32 demonstrate the processes around Customer Consignment Stock, Sales Rebate Agreement, and Sales Promotions and Deals- Section 34 is important to understand how Serial numbers for Products can be created. The same section demonstrates the processes around Outbound delivery without Order, and Material BOM Usage with Sales and Distribution- Section 35 demonstrates the process for Intercompany Billing when there are transactional activities between two different company codes and Section 36 shows how the stocks can be transferred from one Storage location to another, from one Plant to another, and from one Company code Plant to another Company code Plant- Section 37 shows the processes around Customer Credit Management and Customer Payment, as the Customer Payment is the final part of Order to Cash cycle- Section 38 finally shows how the Reporting and Data analysis activities can be done through SAP Gui, Universal Journal, and SAP Fiori Analytical apps- Section 39 gives you the information on Certification Exam on SAP S/4HANA SalesDisclaimer: SAP or other products of SAP mentioned in the training is a trademark or registered trademark of SAP SE, Germany. I am not related or affiliated with that.

Overview
Section 1: Introduction to the Course and SAP S/4HANA Business Suite

Lecture 1 Introduction to the Course

Lecture 2 Overview of the Course Content

Lecture 3 Introduction to SAP S/4HANA Business Suite

Lecture 4 Introduction to SAP Gui - User Interface

Lecture 5 Introduction to SAP Fiori - New User Interface

Section 2: Business Requirements, and Enterprise Structure (Configuration)

Lecture 6 Business Requirements for SAP S/4HANA Sales (High-level)

Lecture 7 Types of Projects

Lecture 8 Introduction to SAP Activate Methodology

Lecture 9 Client Definition (Configuration)

Lecture 10 Enterprise Structure (FI) - Company Code (Configuration)

Lecture 11 Company Code Global Parameters (Configuration)

Lecture 12 Enterprise Structure (FI) - Business Areas (Configuration)

Lecture 13 Enterprise Structure (FI) - Company (Configuration)

Lecture 14 Customizing Requests Transport Organizer

Lecture 15 Enterprise Structure - Logistics General (Configuration)

Lecture 16 Enterprise Structure - Sales and Distribution (Configuration)

Lecture 17 Enterprise Structure - Materials Management (Configuration)

Lecture 18 Enterprise Structure - Logistics Execution (Configuration)

Lecture 19 Enterprise Structure - Consistency Check for Sales and Distribution

Section 3: Fiscal Year, Posting Period Variant, and Period for Material Master Records

Lecture 20 Business Requirements, Variant Principle, and Fiscal Year Variant (Config)

Lecture 21 Posting Period Variant (Configuration)

Lecture 22 Open and Close Posting Periods for Business Areas (Configuration)

Lecture 23 Open/Close Period for Material Master Records (Configuration and End-User)

Section 4: Required Finance & Controlling Configuration and End-User activities

Lecture 24 Chart of Accounts, G/L Accounts & Field Status Variant/Group (Config & End-User)

Lecture 25 G/L Accounts List Display (End-User)

Lecture 26 Classify GL Accounts for Document Splitting (Configuration)

Lecture 27 Define Segments (Configuration)

Lecture 28 Business Scenario & Maintain Controlling Area (Configuration)

Lecture 29 Profit Center Accounting (Configuration)

Lecture 30 Profit Center Master Data with Standard Hierarchy (End-User)

Lecture 31 Cost Center Master Data with Standard Hierarchy (End-User)

Lecture 32 Cost Element as G/L Account Master Data (End-User)

Lecture 33 Currency Settings, Maintain Exchange Rates, Ledger Configuration (Configuration)

Lecture 34 G/L Accounts Determination for Open Items Exchange Rate Differences (Config)

Lecture 35 Tax on Sales/Purchases (Configuration)

Lecture 36 Tolerance Limits for Users, G/L Accounts, Customer and Vendor (Configuration)

Lecture 37 Activation of Material Ledger (Configuration)

Section 5: SAP User Parameters, Parameter ID, and SAP Fiori Default Values (End-User)

Lecture 38 SAP User Parameters, and Parameter ID (End-User)

Lecture 39 SAP Fiori Default Values (End-User)

Section 6: BP, Customer and Vendor Master in SAP S/4HANA Sales (Configuration and End-User)

Lecture 40 Business Scenario and Definition of Master Data

Lecture 41 Obsolete T-codes and BP Transaction code and its hierarchy (End-User)

Lecture 42 Customer Account Groups, Field Status, Number Ranges (Configuration)

Lecture 43 BP Number Ranges, Grouping, Field Status, BP Roles (Configuration)

Lecture 44 Number Assignment for Direction BP to Customer (Configuration)

Lecture 45 Sales and Distribution Customer Partner Determination (Configuration)

Lecture 46 Terms of Payment, Incoterms and other Customer Master Configuration

Lecture 47 Creation of Business Partner and Customer Master Data (End-User)

Lecture 48 SAP Fiori BP Customer Master Data Creation (End-User)

Lecture 49 Creation of One-time BP Customer Master (End-User)

Lecture 50 Extend the Customer Master to Second Company code and Sales Area (End-User)

Lecture 51 Summary - Display Customer List - SAP Fiori (End-User)

Lecture 52 Supplier Master Business Scenario, Hierarchy and Tables

Lecture 53 Supplier Account Groups, Field Status, Number Ranges (Configuration)

Lecture 54 Business Partner for Supplier Master Data (Configuration)

Lecture 55 Supplier Master Partner Roles/Schemas (Configuration)

Lecture 56 Creation of BP and Supplier Master Data (End-User)

Lecture 57 SAP Fiori - BP and Supplier Master Data Creation (End-User)

Lecture 58 Create a Supplier Master through Copy Function in SAP Fiori (End-User)

Lecture 59 Summary - Display Supplier List - SAP Fiori (End-User)

Section 7: Material Master, Material Types, Material Groups, Pricing, Product Hierarchy

Lecture 60 Business Scenario and Introduction to Material Master

Lecture 61 Overview of Configuring the Material Master (Configuration)

Lecture 62 Material Master Field Selection (Configuration)

Lecture 63 Define Industry Sector for Material Master (Configuration)

Lecture 64 Material Number Format, and Extended Material Number (Configuration)

Lecture 65 List of Materials with Material Types (End-User)

Lecture 66 Material Types, Number Ranges, and Basic Settings (Configuration)

Lecture 67 Define Material Groups (Configuration)

Lecture 68 Settings for Key Fields in Material Master (Configuration)

Lecture 69 Units of Measurement for Material Master (Configuration)

Lecture 70 Creation of Product Hierarchy and its template (Configuration)

Lecture 71 Material Search and its Pricing through Product Hierarchy (End-User)

Lecture 72 Material Data Relevant to Sales and Distribution (Configuration)

Lecture 73 Creation of Finished Products (End-User)

Lecture 74 Copy, and Extend the Material Master (End-User)

Lecture 75 Creation of Trading Goods - Material Master - SAP Fiori (End-User)

Lecture 76 Creation of Services - Material Master (End-User)

Lecture 77 Creation of Raw Materials - Material Master (End-User)

Lecture 78 Creation of Semi-Finished Products - Material Master (End-User)

Lecture 79 Creation of Packaging - Material Master (Configuration and End-User)

Lecture 80 Creation of Returnable Packaging - Material Master (Configuration and End-User)

Lecture 81 Moving Average Price vs Standard Price for a Material (End-User)

Lecture 82 Material Price Changes (End-User)

Lecture 83 Open Periods for Material Master, and Update Exchange Rates (End-User)

Lecture 84 Summary of the Section with Manage Product Master Data - SAP Fiori (End-User)

Section 8: Material Classification, Batch Management, and its Classification for a Material

Lecture 85 Material Classification - Characteristics and Classes (Configuration & End-User)

Lecture 86 Batch Management and Classification (Configuration and End-User)

Section 9: Define Common Distribution Channels and Common Divisions (Configuration)

Lecture 87 Business Scenario

Lecture 88 Define Common Distribution Channels (Configuration)

Lecture 89 Define Common Divisions (Configuration)

Section 10: Sales Documents - Sales Document Header (Configuration)

Lecture 90 Define Sales Document Types (Configuration)

Lecture 91 Convert Language for Each Sales Document Type (Configuration)

Lecture 92 Define Number Ranges for Sales Documents (Configuration)

Lecture 93 Define and Assign Order Reasons (Configuration)

Lecture 94 Define Purchase Order Types, and Usage Indicators (Configuration)

Lecture 95 Assign Sales Areas to Sales Document Types (Configuration)

Lecture 96 Table View of Sales Document - Header Data (End-User)

Section 11: Sales Documents - Item Categories and Determination (Configuration)

Lecture 97 Define Item Categories (Configuration)

Lecture 98 Item Category Groups, Default Values for Material Type, and Item Category Usage

Lecture 99 Assign Item Categories or Determination of Item Categories (Configuration)

Lecture 100 Define and Assign Reasons for Rejection (Configuration)

Lecture 101 Table View of Sales Document - Item Data (End-User)

Section 12: Schedule line Categories and Movement Types (Configuration)

Lecture 102 Define Schedule line Categories (Configuration)

Lecture 103 Assign Schedule Line Categories or Determination of Sch. Line Cat. (Config.)

Lecture 104 Movement Types (Configuration)

Section 13: Required Integration between SAP S/4HANA Finance and Sourcing & Procurement (MM)

Lecture 105 Integration between SAP S/4HANA Finance and Sourcing and Procurement (MM)

Section 14: Revenue Account Determination - Integration between SAP S/4HANA FICO and Sales

Lecture 106 Business Scenario

Lecture 107 The Condition Technique (Configuration)

Lecture 108 Define and Assign Account Keys (Configuration)

Lecture 109 Revenue Account Determination (Assign G/L Accounts)

Lecture 110 Cash Account Determination (Assign G/L Accounts) - Configuration

Lecture 111 Reconciliation Account Determination and Assign Dunning Areas (Configuration)

Lecture 112 Assign Cost Centers (Configuration)

Lecture 113 Assign Dunning Areas (Configuration)

Lecture 114 Account Determination Analysis (End-User)

Section 15: Pricing Procedure and Taxes in SAP S/4HANA Sales (Configuration)

Lecture 115 Business Scenario

Lecture 116 The Condition Technique (Configuration)

Lecture 117 Condition Technique - Fields and Condition Tables (Configuration)

Lecture 118 Condition Technique - Access Sequences (Configuration)

Lecture 119 Condition Technique - Condition Types (Configuration)

Lecture 120 Condition Technique - Set Pricing Procedure (Configuration)

Lecture 121 Set and Assign Customer and Document Pricing Procedures (Configuration)

Lecture 122 Set Pricing Procedure Determination and Condition Supplements (Configuration)

Lecture 123 Define Pricing by Item Category (Configuration)

Lecture 124 Price-Relevant Master Data Fields (Configuration)

Lecture 125 Sales and Distribution Taxes (Configuration)

Section 16: Pricing Condition Records and Customer-Material Info Record (End-User)

Lecture 126 Business Scenario and creation of Pricing Condition Record - VK11 (End-User)

Lecture 127 Creation of Freight Condition Record - VK31 (End-User)

Lecture 128 Creation of Condition Records through SAP Fiori (End-User)

Lecture 129 Import to update Sales Prices in Bulk - SAP Fiori (End-User)

Lecture 130 Condition Record with Product Hierarchy to give Prod. Price Discount (End-User)

Lecture 131 Maintain Common Conditions Master Data and Pricing Analysis (End-User)

Lecture 132 Customer-Material Info Record Creation (End-User)

Lecture 133 SAP Fiori - Creation of Customer-Material Info Record (End-User)

Section 17: Shipping Point Determination and Delivery Scheduling (Configuration)

Lecture 134 Shipping Point and Goods Receiving Point Determination (Configuration)

Lecture 135 Delivery and Transportation Scheduling by Sales Document Type (Configuration)

Section 18: Available to Promise (ATP) and Transfer of Requirements (Configuration)

Lecture 136 Availability Check with ATP Logic or Against Planning (Configuration)

Lecture 137 Transfer of Requirements (Configuration)

Section 19: Planned Dependent Requirements (BOM, Sales Order, Stock Reqs., MRP)

Lecture 138 Business Scenario - Planned Dependent Requirements

Lecture 139 Material BOM for Production usage (End-User)

Lecture 140 Sales Order Costing (Configuration and End-User)

Lecture 141 Create Sales Order, Stock/Requirements List, Display Product Costing (End-User)

Lecture 142 Order BOM for Production usage (End-User)

Lecture 143 MRP Run for Finished Product to create Planned Order (End-User)

Lecture 144 SAP Fiori - Sales Order for Trading Goods (End-User)

Lecture 145 MRP Run for Trading Goods to create Purchase Requisition (End-User)

Section 20: Required SAP S/4HANA Sourcing & Procurement (MM) Processes (Config & End-User)

Lecture 146 Convert Purchase Requisition to Purchase Order (Configuration and End-User)

Lecture 147 Create Goods Receipt with the reference to a Purchase Order (Config & End-User)

Section 21: Required SAP S/4HANA Production Processes (Configuration & End-User)

Lecture 148 Convert Planned Order to Production Order (Configuration)

Lecture 149 Semi-Finished Products - Convert Planned Order to Production Order (End-User)

Lecture 150 Semi-Finished Prods.- Goods Receipt with the ref. to Production Order (End-User)

Lecture 151 Finished Product - Convert Planned Order to Production Order (End-User)

Lecture 152 Finished Product - Goods Receipt with the ref. to Production Order (End-User)

Section 22: Planned Independent Requirements for MRP without Sales Order (Forecasting)

Lecture 153 Business Scenario - Planned Independent Requirements without Sales Order

Lecture 154 Required Settings for Planned Independent Requirements (Config. & End-User)

Lecture 155 Create Planned Independent Requirements, and MRP Run (End-User)

Lecture 156 Raw Materials - Convert PR to PO, and Post GR (End-User)

Lecture 157 Semi-finished and Finished Products - Create Production Order, and GR (End-User)

Lecture 158 Sales Order Creation with Stock Availability (End-User)

Section 23: Batch Determination Procedure/Batch Search Strategy (Configuration and End-User)

Lecture 159 Business Scenario and Introduction to Batch Determination Procedure

Lecture 160 Batch Search Strategy with Condition Technique (Configuration)

Lecture 161 Automatic Batch Determination/Batch Search Strategy (End-User)

Section 24: Logistics Execution - Delivery, Picking and Packing (Configuration)

Lecture 162 Introduction to Outbound Delivery Document (End-User)

Lecture 163 Configure Global Shipping Data, Define Delivery Types, & Number Ranges (Config)

Lecture 164 Define Delivery Item Categories, Usage and Determination (Configuration)

Lecture 165 Define and Assign Reasons for Blocking in Shipping (Configuration and End-User)

Lecture 166 Copying Control - Sales Document to Delivery Document (Configuration)

Lecture 167 Picking (Configuration and End-User)

Lecture 168 Packing (Configuration and End-User)

Lecture 169 Create Outbound Delivery with Loading and Shipment (End-User)

Lecture 170 Collective Processing of Documents Due for Delivery - (End-User)

Lecture 171 Outbound Delivery Monitor (End-User)

Lecture 172 Delivery Document Tables (End-User)

Section 25: SAP S/4HANA Sales Billing (Order-related and Delivery-related)

Lecture 173 Introduction to Billing Document (End-User)

Lecture 174 Define Billing Types for Sales and Number Ranges (Configuration)

Lecture 175 Define and Assign Blocking Reasons for Billing (Configuration and End-User)

Lecture 176 Copying Control - Sales Document to Billing Document (Configuration)

Lecture 177 Create the Billing Document (End-User)

Lecture 178 Release Billing Documents for Accounting (End-User)

Lecture 179 Process Billing Due List (End-User)

Lecture 180 Billing Document Tables (End-User)

Lecture 181 Delivery-related Billing w/ Batch Sub-item & Pre-requisites (Config & End-User)

Section 26: Pre-Sales Activities - Inquiry and Quotation (Configuration and End-User)

Lecture 182 Inquiry Type (Configuration and End-User)

Lecture 183 Copying Control - Sales Document to Sales Document (Configuration)

Lecture 184 Quotation Type (Configuration and End-User)

Section 27: Sales Contracts (Agreements) - (Configuration and End-User)

Lecture 185 Business Scenario and Introduction

Lecture 186 Master Contract (Configuration)

Lecture 187 Master Contract (End-User)

Lecture 188 Quantity Contract (Configuration)

Lecture 189 Quantity Contract and its Sales Order (End-User)

Lecture 190 Quantity Contract w/d reference to Quotation (End-User)

Lecture 191 Value Contract (Configuration)

Lecture 192 Value Contract (End-User)

Lecture 193 Scheduling Agreement (Configuration)

Lecture 194 Scheduling Agreement (End-User)

Section 28: Sales Business Processes w/d Special Sales Document Types & Import Sales Orders

Lecture 195 Business Scenario

Lecture 196 Introduction to Customer Returns and Configuration

Lecture 197 Customer Returns (End-User)

Lecture 198 Introduction to Credit Memo Request

Lecture 199 Credit Memo Request (Configuration)

Lecture 200 Credit Memo Request (End-User)

Lecture 201 Introduction to Debit Memo Request and Configuration

Lecture 202 Debit Memo Request (End-User)

Lecture 203 Introduction to Invoice Correction Request

Lecture 204 Invoice Correction Request (Configuration)

Lecture 205 Invoice Correction Request (End-User)

Lecture 206 SAP Fiori - Forward Sales Cycle (End-User)

Lecture 207 Reversal Sales Cycle (End-User)

Lecture 208 Introduction to Cash Sale

Lecture 209 Cash Sale (Configuration)

Lecture 210 Cash Sale (End-User)

Lecture 211 Introduction to Rush Order Process

Lecture 212 Rush Order Process (Configuration)

Lecture 213 Rush Order Process (End-User)

Lecture 214 Introduction to Free Goods

Lecture 215 Free Goods (Configuration)

Lecture 216 Free Goods (End-User)

Lecture 217 SAP Fiori - Import Sales Orders through CSV File (End-User)

Section 29: Sales Business Processes related to Products (Configuration and End-User)

Lecture 218 Business Scenario

Lecture 219 Introduction to Item Proposal and Configuration

Lecture 220 Item Proposal (End-User)

Lecture 221 Introduction to Material Determination

Lecture 222 Material Determination (Configuration)

Lecture 223 Material Determination (End-User)

Lecture 224 Introduction to Cross Selling

Lecture 225 Cross Selling (Configuration)

Lecture 226 Cross Selling (End-User)

Lecture 227 Introduction to Material Listing and Exclusion

Lecture 228 Material Listing and Exclusion (Configuration)

Lecture 229 Material Listing and Exclusion (End-User)

Section 30: Sales Billing Plan and Pro Forma Invoice (Configuration And End-User)

Lecture 230 Business Scenario and Introduction

Lecture 231 Billing Plan Types (Configuration)

Lecture 232 Periodic Billing (Configuration)

Lecture 233 Periodic Billing (End-User)

Lecture 234 Introduction to Milestone Billing Plan

Lecture 235 Milestone Billing (Configuration)

Lecture 236 Milestone Billing (End-User)

Lecture 237 Introduction to Pro Forma Invoice

Lecture 238 Pro Forma Invoice from Sales Order (Configuration)

Lecture 239 Pro Forma Invoice from Sales Order (End-User)

Lecture 240 Pro Forma Invoice from Outbound Delivery (End-User)

Section 31: Customer Consignment Stock Process (Configuration and End-User)

Lecture 241 Business Scenario and Introduction to Customer Consignment Stock Process

Lecture 242 The Consignment Fill-Up (Configuration)

Lecture 243 The Consignment Fill-Up (End-User)

Lecture 244 The Consignment Issue (Configuration)

Lecture 245 The Consignment Issue (End-User)

Lecture 246 The Consignment Returns (Configuration)

Lecture 247 The Consignment Returns (End-User)

Lecture 248 The Consignment Pick-Up (End-User)

Section 32: Sales Rebate Agreement, Sales Promotions, and Deals (Config. and End-User)

Lecture 249 Business Scenario and Introduction to Sales Rebate (Settlement Management)

Lecture 250 Sales Rebate Agreement - Condition Contract (Configuration)

Lecture 251 Sales Rebate Agreement - Condition Contract (End-User)

Lecture 252 Sales Promotions, and Deals (Configuration)

Lecture 253 Sales Promotions, and Deals (End-User)

Section 33: Profitability Analysis (CO-PA) Postings through SAP S/4HANA Sales

Lecture 254 Business Scenario and Introduction to CO-PA

Lecture 255 CO-PA Configuration

Lecture 256 CO-PA Postings through SAP S/4HANA Sales (End-User)

Section 34: Serial Numbers for Products, Delivery without Order, Material BOM Usage with SD

Lecture 257 Business Scenario and Introduction to Serial Numbers for Products

Lecture 258 Serial Numbers for Products (Configuration)

Lecture 259 Serial Numbers for Products (End-User)

Lecture 260 Outbound Delivery without reference to a Sales Order (Configuration)

Lecture 261 Outbound Delivery without reference to a Sales Order (End-User)

Lecture 262 Introduction to Material BOM Usage with Sales and Distribution

Lecture 263 Material BOM with Sales and Distribution Usage (Configuration)

Lecture 264 Material BOM with Sales and Distribution Usage (End-User)

Section 35: Intercompany Billing Process in SAP S/4HANA Sales (Configuration and End-User)

Lecture 265 Business Scenario and Introduction to Intercompany Billing Process

Lecture 266 Intercompany Billing Process (Configuration)

Lecture 267 Intercompany Billing Process (End-User)

Section 36: Stock Transfer and Stock Transport Order for Intercompany Purchasing

Lecture 268 Information on Organizational and Master Data and Business Scenario

Lecture 269 Stock Transfer from Storage location to Storage location (End-User)

Lecture 270 Stock Transfer from Plant to Plant (One-Step) - End-User

Lecture 271 Stock Transfer from Plant to Plant (Two-Step) - End-User

Lecture 272 Stock Transport Order from one Company code Plant to another Company code plant

Lecture 273 Introduction to Intercompany Purchasing

Lecture 274 Stock Transport Order with Delivery and Billing Document (Configuration)

Lecture 275 Stock Transport Order with Delivery and Billing Document (End-User)

Section 37: Customer Credit Management and Customer Payment (Configuration and End-User)

Lecture 276 Customer Credit Management in FSCM (Configuration)

Lecture 277 Customer Credit Management Process (End-User)

Lecture 278 Customer Payment in Order to Cash Cycle (End-User)

Section 38: Reporting and Data Analysis for SAP S/4HANA Sales (End-User)

Lecture 279 SAP Gui Tables - Reporting and Data Analysis (End-User)

Lecture 280 Universal Journal - Reporting and Data Analysis (End-User)

Lecture 281 SAP Fiori Analytical Apps - Reporting and Data Analysis (End-User)

Section 39: Bonus Lecture

Lecture 282 Bonus Lecture

Anyone who wants to learn SAP S/4HANA Sales configuration and end-user processes,SAP Users who want to learn the End-User processes related to SAP S/4HANA Sales,Other ERP Consultants who want to learn SAP S/4HANA Sales configuration and end-user activities,SAP Sales Consultants and SAP CRM Consultants,Business Analysts,Project Managers,Software Engineers


Homepage


452460767_90-define-sales-document-types-configuration_s.jpg














 
6f73416d6fc584bf1527dfeec7e04479.jpg


Linux Administration: Build 5 Hands-On Linux Projects 2023
Last updated 9/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.41 GB | Duration: 16h 45m

Learn Linux by Doing with 5 Projects: Docker, Secure Linux, Run Web and DNS Servers, Run a Mail System, Automate Linux



What you'll learn
Become a professional Linux Engineer by Building 5 Hands-On Linux Projects.
Learn how to run containerized applications with Docker.
Learn to manage Docker images and containers.
Learn to tag and push images to Docker Hub.
Learn to build custom Docker images using Dockerfile.
Learn how to secure and harden Linux Systems.
You will MASTER Network Security Key Concepts (Encryption, Steganography, Reconnaissance, Iptables Firewall ...).
Learn to configure an authoritative DNS server (BIND9).
Learn to configure a Web Server (Apache2).
Learn to install and secure WordPress.
Learn to run a Mail System (Potsfix, Dovecot, MySql, OpenSSL, SMTP AUTH, Rspamd, ClamAV).
Acquire the skills to automate the most common Linux administrative tasks using Bash scripting and Ansible.
Learn to use Ansible in large Networks for Network Automation.
By the end of this course you will have a deep understand of the Linux operating system and be able to apply that knowledge in Real-World projects.


Requirements
A computer (Windows, Mac, or Linux) with an Internet connection. That's it!
Basic Linux knowledge is required. If you are a complete Linux beginner, this course might not be for you.
Your time and enthusiasm to learn.


Description
***Fully updated for 2023*** This practical Linux Administration course consists of Building 5 Hands-On Linux projects from scratch! It s the 2nd part of Linux Administration: The Complete Linux Bootcamp and requires basic Linux knowledge. The course is not recommended for complete beginners!Course Updates:Update: November 2022 - Updates to be 2023 readyUpdate: Summer 2022 - New Videos in the Security section, different other updatesUpdate: August 2021 - New Videos in the "Running a Mail System" project on fighting against malware (Postfix Access Restrictions In-Depth, Rspamd, Amavis & ClavAv)Update: April 2021 - New Videos in the "Running a Web Server" project on Apache Authorization and Authentication, HTTP Compression, mod_status, and many moreCourse Launch: January 10, 2021This course IS NOT like any other Linux Administration course you can take online. This course is focused on learning by doing. You ll learn what really matters and you ll get the skills to get ahead and gain an edge.Enrolling now in this project-focused Linux Administration course is the best investment in your career!By the end of this course, you'll have an in-depth knowledge of building real-world projects in Linux.This course is for you if you already have some basic Linux Knowledge and want to advance and dive deeper into Linux and learn how to build projects for the real world.You'll have access to my closed and Exclusive Online Group in order to provide you with improved, faster, and better support for your course-related questions.This course is taught by me, a Senior Network Engineer and a Professional Trainer. Why should you learn from me?I'm a Practitioner and an Enthusiast. Welcome to the real world! I ve been using Linux for the last 15 years in real-world projects. I m not just a random guy that teaches Linux Administration. Just imagine that during this time I ve learned and applied more and more almost on a daily basis. And now I m giving everything to you!I'm an Educator and I know how to make a Syllabus. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Linux Administration, Security, Networking, and Programming.After this course, you'll be an effective Linux System Engineer or Administrator!You'll have lifetime access and you can return and look at a specific Linux project anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!Project #1 - Running Containerized Applications with Docker- What is Docker? Why use it?- Installing Docker- The Docker Client- Pulling Images and Running Containers- Lab: Running a Web Server in a Docker Container- Listing Images and Containers- Removing Images and Containers- Getting Shell Access to a Container- Executing Commands in a Running Container- Getting Information about the Running Containers- Committing Container Changes into a New Image- Tagging and Pushing Custom Images to Docker Hub- Image Structure and Layers- Creating Custom Images using Dockerfile- Persistent Data: VolumesProject #2 - Securing and Hardening a Linux System- Linux Security Checklist- Securing the OpenSSH Server (sshd)- Securing the Boot Loader (Grub)- Enforcing Password Policy- Locking or Disabling User Accounts- Giving Limited root Privileges (sudoers and visudo)- Setting Users Limits (Running a DoS Attack Without root Access)- Intro to Cracking Passwords- Cracking Linux Passwords Using John the Ripper- Checking Files Integrity with AIDE - Part- Scanning for Rootkits (rkhunter and chkrootkit)- Scanning for Viruses with ClamAV- Full Disk Encryption Using dm-crypt and LUKS- Unlocking LUKS Encrypted Drives With A Keyfile- Symmetric Encryption Using GnuPG- Using an Encrypted Text Editor (EncryptPad)- Steganography Explained- Steganography In Depth- Hide Secret Messages Through Steganography with Steghide- Scanning Networks with Nmap- Nmap Advanced- Introduction to Linux Firewalls- Securing Your Linux System with a Firewall (Netfilter/Iptables)- Chains, Tables, Matches, and Targets In Depth- Stateful Firewall In DepthProject #3: Setting Up a Web and DNS Server- Getting a Domain Name- Diving into the DNS Protocol and Installing a DNS Server (BIND9)- Setting Up the Authoritative BIND9 DNS Server- Installing a Web Server (Apache2)- Setting Up Virtual Hosting- Securing Apache with OpenSSL and Digital Certificates- Access Control by Source IP Address- The <Files> Directive- The .htaccess File- HTTP Digest Authentication- The Options Directive and Indexing- HTTP Compression- SetHandler and Server Status- Installing PHP- Installing and Securing the MySql Server- Installing a Web Application (WordPress)- Securing WordPressProject #4 - Running a Virtual Mail Server- Overview of a Complete Virtual Mail System- Mail and DNS: MX Records and Reverse DNS- Checking the Prerequisites- Installing Software Packages- Configuring MySql and Connect it With Postfix- Configuring Postfix Using the Postconf Command- Configuring SMTP AUTH (SASLAUTHD and MySql)- Configuring Dovecot (POP3/IMAP)- Adding Domains and Virtual Users. Testing the System- Enabling SMTPS Port 465 in Postfix For Email Submission- Troubleshooting- Virus Scanning Using Amavis and ClamAV- Testing Amavis and ClamAV- Fighting Against Spam: Postfix Access Restrictions- Fighting Against Spam: Postfix HELO Restrictions- Fighting Against Spam: Postfix Sender Restrictions- Fighting Against Spam: Postfix Recipient Restrictions- Fighting Against Spam: Using Public RBLs- Intro to Spam Filtering Systems- Installing Rspamd and Postfix Integration- Configuring and Testing Rspamd- Postfix Log Monitoring Using pflogsummProject #5 - Automating Linux Administrative Tasks- Intro to Ansible- Prerequisites- Ansible Inventory File- Ansible Ad-Hoc Commands: The Shell Module- Ansible Ad-Hoc Commands: The Script Module- Ansible Ad-Hoc Commands: The APT Module- Task Automation and Scheduling Using Cron (crontab)- Scheduling Tasks Using Anacron- Dropping Packets Based on Source IP Address- Dropping a List of IP Addresses- System Administration Script using Bash Menus- Intro to Ansible- Ansible Inventory File- Ansible Ad-Hoc Commands- Ansible modules: raw, shell, command, scriptEvery project is complete and includes all the scripts and configuration files, a command section, lots of quizzes, slides, and many practice challenges.The skills you ll learn will boost your career and make you more valuable in the job market.See you in the courses!

Overview
Section 1: Getting Started

Lecture 1 How to Get the Most Out of This Course

Lecture 2 Running a Linux Server in the Cloud

Lecture 3 Securing SSH with Key Authentication

Lecture 4 Ubuntu and CentOS Download Links (OVA Files)

Lecture 5 Join Our Online Community!

Section 2: Project #1 - Running Containerized Applications with Docker

Lecture 6 Project Overview

Lecture 7 What is Docker? Why use it?

Lecture 8 Installing Docker

Lecture 9 Commands - Installing Docker

Lecture 10 The Docker Client

Lecture 11 Pulling Images and Running Containers

Lecture 12 Commands - The Docker CLI, Pulling Images & Running Containers

Lecture 13 Lab: Running a Web Server in a Docker Container

Lecture 14 Listing Images and Containers

Lecture 15 Removing Images and Containers

Lecture 16 Commands - Listing and Removing Images and Containers

Lecture 17 Getting Shell Access to a Container

Lecture 18 Executing Commands in a Running Container

Lecture 19 Commands - Executing Commands

Lecture 20 Getting Information about the Running Containers

Lecture 21 Committing Container Changes into a New Image

Lecture 22 Tagging and Pushing Custom Images to Docker Hub

Lecture 23 Commands - Committing Changes, Tagging and Pushing Images

Lecture 24 Image Structure and Layers

Lecture 25 Creating Custom Images using Dockerfile

Lecture 26 Persistent Data: Volumes

Lecture 27 Commands - Volumes

Section 3: Challenges - Docker

Lecture 28 Docker

Section 4: Project #2 - Securing and Hardening a Linux System

Lecture 29 Project Overview

Lecture 30 Linux Security Checklist

Lecture 31 Securing the OpenSSH Server (sshd)

Lecture 32 Commands - SSH

Lecture 33 Securing the Boot Loader (Grub)

Lecture 34 Enforcing Password Policy

Lecture 35 Locking or Disabling User Accounts

Lecture 36 Commands - Locking User Accounts

Lecture 37 Giving Limited root Privileges (sudoers and visudo) - Part 1

Lecture 38 Giving Limited root Privileges (sudoers and visudo) - Part 2

Lecture 39 Setting Users Limits (Running a DoS Attack Without root Access)

Lecture 40 Intro to Cracking Passwords

Lecture 41 Cracking Linux Passwords Using John the Ripper

Lecture 42 Commands - John the Ripper (JTR)

Lecture 43 Checking Files Integrity with AIDE - Part 1

Lecture 44 Checking Files Integrity with AIDE - Part 2

Lecture 45 Commands - AIDE

Lecture 46 Scanning for Rootkits (rkhunter and chkrootkit)

Lecture 47 Commands - rkhunter & chkrootkit

Lecture 48 Scanning for Viruses with ClamAV

Lecture 49 Commands - ClamAV

Lecture 50 Full Disk Encryption Using dm-crypt and LUKS

Lecture 51 Unlocking LUKS Encrypted Drives With A Keyfile

Lecture 52 Commands - Full Disk Encryption

Lecture 53 Symmetric Encryption Using GnuPG

Lecture 54 Using an Encrypted Text Editor (EncryptPad)

Lecture 55 Steganography Explained

Lecture 56 Steganography In Depth

Lecture 57 Hide Secret Messages Through Steganography with Steghide

Lecture 58 Commands - Steganography

Lecture 59 Scanning Networks with Nmap

Lecture 60 Nmap Advanced

Lecture 61 Commands - Nmap

Lecture 62 Introduction to Netfilter and Iptables

Lecture 63 Chain Traversal in a Nutshell

Lecture 64 Iptables Basic Usage

Lecture 65 Iptables Options (Flags) - Part 1

Lecture 66 Iptables Options (Flags) - Part 2

Lecture 67 Where Do We Write Iptables Rules

Lecture 68 Setting the Default Policy

Lecture 69 Deleting the Firewall

Lecture 70 Filter by IP Address

Lecture 71 Filter by Port

Lecture 72 Intro to Stateful Firewalls (Connection Tracking)

Lecture 73 Implementing Stateful Firewalls with Iptables

Lecture 74 Filter by MAC Address

Lecture 75 Match by Date and Time

Lecture 76 The ACCEPT and DROP Targets

Lecture 77 The LOG Target

Section 5: Challenges - Securing a Linux Server

Lecture 78 John The Ripper (JTR)

Lecture 79 Steganography

Lecture 80 Scanning with Nmap

Lecture 81 Challenges - Netfilter and Iptables

Section 6: Project #3 - Setting Up a Web and DNS Server

Lecture 82 Project Overview: The Big Picture

Lecture 83 Getting a Domain Name

Lecture 84 Diving into the DNS Protocol and Installing a DNS Server (BIND9)

Lecture 85 Setting Up the Authoritative BIND9 DNS Server

Lecture 86 Installing a Web Server (Apache2)

Lecture 87 Setting Up Virtual Hosting

Lecture 88 Securing Apache with OpenSSL and Digital Certificates

Lecture 89 Access Control by Source IP Address

Lecture 90 The Directive

Lecture 91 The .htaccess File

Lecture 92 HTTP Digest Authentication

Lecture 93 The Options Directive and Indexing

Lecture 94 HTTP Compression

Lecture 95 SetHandler and Server Status

Lecture 96 Installing PHP

Lecture 97 Installing and Securing the MySql Server

Lecture 98 Installing phpMyAdmin

Lecture 99 Securing phpMyAdmin

Lecture 100 Commands - phpMyAdmin

Lecture 101 Installing a Web Application (WordPress)

Lecture 102 Securing WordPress

Section 7: Challenges - DNS and WEB

Lecture 103 Challenges - DNS and BIND

Lecture 104 Challenges - Apache2

Section 8: Project #4 - Running a Virtual Mail Server

Lecture 105 Overview of a Complete Virtual Mail System

Lecture 106 Mail and DNS: MX Records and Reverse DNS

Lecture 107 Checking the Prerequisites

Lecture 108 Installing Software Packages

Lecture 109 Configuring MySql and Connect it With Postfix

Lecture 110 Configuring Postfix Using the Postconf Command

Lecture 111 Configuring SMTP AUTH (SASLAUTHD and MySql)

Lecture 112 Configuring Dovecot (POP3/IMAP)

Lecture 113 Adding Domains and Virtual Users. Testing the System

Lecture 114 Enabling SMTPS Port 465 in Postfix For Email Submission

Lecture 115 Troubleshooting

Lecture 116 Mail Project Archive (etc.tar.gz)

Lecture 117 Virus Scanning Using Amavis and ClamAV

Lecture 118 Amavis Installation Guide

Lecture 119 Testing Amavis and ClamAV

Lecture 120 Fighting Against Spam: Postfix Access Restrictions

Lecture 121 Fighting Against Spam: Postfix HELO Restrictions

Lecture 122 Fighting Against Spam: Postfix Sender Restrictions

Lecture 123 Fighting Against Spam: Postfix Recipient Restrictions

Lecture 124 Fighting Against Spam: Using Public RBLs

Lecture 125 Config - Postfix Access Restrictions

Lecture 126 Intro to Spam Filtering Systems

Lecture 127 Installing Rspamd and Postfix Integration

Lecture 128 Rspamd Installation Guide

Lecture 129 Configuring and Testing Rspamd

Lecture 130 Postfix Log Monitoring Using pflogsumm

Section 9: Project #5 - Automating Linux Administrative Tasks

Lecture 131 Project Overview

Lecture 132 Intro to Ansible

Lecture 133 Prerequisites

Lecture 134 Ansible Inventory File

Lecture 135 Ansible Ad-Hoc Commands: The Shell Module

Lecture 136 Ansible Ad-Hoc Commands: The Script Module

Lecture 137 Ansible Ad-Hoc Commands: The APT Module

Lecture 138 Ansible Ad-Hoc Commands: The Service Module

Lecture 139 Ansible Ad-Hoc Commands: The User Module

Lecture 140 Task Automation and Scheduling Using Cron (crontab)

Lecture 141 Commands - Cron

Lecture 142 Scheduling Tasks Using Anacron

Lecture 143 Moving to Automation With Bash Shell Scripting

Lecture 144 Dropping Packets Based on Source IP Address

Lecture 145 Dropping a List of IP Addresses

Lecture 146 System Administration Script using Bash Menus

Section 10: Challenges - Automating Administrative Tasks

Lecture 147 Ansible

Section 11: [EXTRA] Bash Shell Scripting

Lecture 148 Intro to Bash Shell Scripting

Lecture 149 The Bash Shebang and Comments

Lecture 150 Running Scripts

Lecture 151 Variables in Bash

Lecture 152 Getting User Input

Lecture 153 Special Variables and Positional Arguments

Lecture 154 Coding - Variables in Bash

Lecture 155 If, Elif and Else Statements

Lecture 156 Testing Conditions For Numbers

Lecture 157 Multiple Conditions and Nested If Statements

Lecture 158 Command Substitution

Lecture 159 Comparing Strings in If Statements

Lecture 160 Lab: Testing Network Connections

Lecture 161 Coding - If...Elif...Else Statements

Lecture 162 For Loops

Lecture 163 While Loops

Lecture 164 Case Statement

Lecture 165 Functions in Bash

Lecture 166 Variable Scope in Functions

Lecture 167 Menus in Bash. The Select Statement

Lecture 168 Intro to Bash Arrays

Lecture 169 Arrays In Depth

Lecture 170 Using the Readarray Command

Lecture 171 Iterating Over Arrays

Lecture 172 Project: Account Creation

Section 12: Challenges - Bash Scripting

Lecture 173 Bash Scripting Basics

Lecture 174 Flow Control (if...elif...else) and Command Substitution

Lecture 175 Loops in Bash: for, while

Lecture 176 Functions and Menus

Section 13: [EXTRA] The VIM Editor

Lecture 177 The Basics of VIM Text Editor

Lecture 178 The VIM Editor In Depth - Part 1

Lecture 179 The VIM Editor In Depth - Part 2

Section 14: Where To Go From Here?

Lecture 180 What's Next?

Section 15: BONUS SECTION

Lecture 181 Congratulations

Lecture 182 BONUS: THANK YOU GIFT!

People with some Linux experience who want to dive deeper into Linux.,Network Engineers who want to advance in Linux by building practical projects.,This is an intermediate Linux course. If you are a complete Linux beginner, this course might not be for you.


Homepage


452321635_178-the-vim-editor-in-depth-part-1_s.jpg






 
cc10743c12177ceb25c6c2d995a0ea9c.jpg


Tarot Reading Advanced Cards Meaning Influences
Last updated 10/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 21.94 GB | Duration: 13h 16m

Next level Rider Waite Tarot Reading And Psychic Development



What you'll learn
Tarot astrology
Tarot numerology
Sacred geometry principles
12 Universal laws, plus karma
Creation duplication
Energy, vibration, manifestation
Giving a reading
Psychic development
Deep drive through 78 Ride Waite cards
Starting your brand
Building your brand
Expanding you brand
Marketing your brand
Clientele demographics
AND literally, so much more !!!


Requirements
A firm understanding of tarot reading, as taught in my predecessor course: Tarot Card Reading DETAILED Step by Step COURSE Rider-Waite


Description
This advanced psychic tarot reading course follows as the next complimentary level to my Detailed Tarot Reading Course - Step by Step (Rider-Waite).It is ideally suited to those who successfully mastered my first course, individuals well versed in tarot reading and looking to expand upon that plus those intrigued by higher energy concepts.Psychic development is a given with this course. The concepts you will learn naturally unfolds your deeper psyche connection and higher self awareness.Topics covered in this course stem from many of my other areas of expertise and practice. These include, yet are not limited to:* Tarot reading * Oracle cards reading* Psychic development * Divination * Sacred geometry* Astrology* Numerology* Spell work (Pagan/Wicca)* Energy healing/balancing * Reiki* NLP* Quantum physics * Regression hypnosis * Thoth (advanced) tarot* OSHO Zen tarotIn this course, I am privileged to share with you lots of the knowledge I gained over the past 20 plus years. I also share with you some tips for marketing your services, along with providing online and in-person readings. How to find your niche market, etc.If you are not familiar with in-depth tarot reading, either via my Detailed Tarot Reading Course - Step by Step (Rider-Waite) or your personal experience, please note that the concepts presented in this course may not yet be suited to you. Blessings, love and lightAdrian H. Nelson

Overview
Section 1: HELLO AND WELCOME

Lecture 1 Powerful Ancient Tarot Magick

Lecture 2 We Are One

Lecture 3 What is Your Intention?

Lecture 4 SMiLe

Lecture 5 Thoth Tarot Foundation

Lecture 6 Legal Disclaimer

Lecture 7 3 Masks of Fear

Lecture 8 Mask #1 - The Victim

Lecture 9 Mask #2 - The Saviour

Lecture 10 Mask #3 - The Perpetrator

Lecture 11 Swopping Fear Masks

Lecture 12 Breathing in a Square

Lecture 13 Grounding

Lecture 14 Revisit Your Intention

Lecture 15 Redrooming

Section 2: 12 UNIVERSAL LAWS

Lecture 16 12 Immutable Laws

Lecture 17 Law 1 - Law of Oneness

Lecture 18 Law 2 - Law of Vibration

Lecture 19 Law 3 - Law of Correspondence

Lecture 20 Law 4 - Law of Attraction

Lecture 21 Law 5 - Law Inspired Action

Lecture 22 Law 6 - Law of Perpetual Transmutation of Energy

Lecture 23 Law 7 - Law of Cause And Effect

Lecture 24 Law 8 - Law of Compensation

Lecture 25 Break Time!!!

Lecture 26 Law 9:- Law of Relativity

Lecture 27 Law 10 - Law of Polarity

Lecture 28 Law 11 - Law of Rhythm

Lecture 29 Law 12 - Law of Gender

Lecture 30 Karma

Section 3: TAROT ASTROLOGY

Lecture 31 Soul Blueprint

Lecture 32 Free Will

Lecture 33 Sun Moon Rising / Ascending / Ascended

Lecture 34 Venus Placement

Lecture 35 Mars Placement

Lecture 36 Jupiter Placement

Lecture 37 Sun Energy

Lecture 38 Moon Influence

Lecture 39 Planetary Characteristics

Lecture 40 Mercury

Lecture 41 Venus

Lecture 42 Earth

Lecture 43 Mars

Lecture 44 Jupiter

Lecture 45 Saturn

Lecture 46 Uranus

Lecture 47 Neptune

Lecture 48 Pluto

Lecture 49 Chiron

Lecture 50 North Node

Lecture 51 South Node

Lecture 52 Black Lilith

Section 4: TAROT ZODIACS

Lecture 53 Healthy Fear

Lecture 54 Zodiac Gender Energy

Lecture 55 Cardinal / Fixed / Mutable

Lecture 56 Cardinal Signs

Lecture 57 Fixed Signs

Lecture 58 Mutable Signs

Lecture 59 Triplicities / Elements

Lecture 60 Air Element

Lecture 61 Water Element

Lecture 62 Fire Element

Lecture 63 Earth Element

Lecture 64 Aries - House of Self

Lecture 65 Taurus - House of Value

Lecture 66 Gemini - House of Communication

Lecture 67 Cancer - House of Family

Lecture 68 Leo - House of Pleasure

Lecture 69 Virgo - House of Health

Lecture 70 Libra - House of Partnerships

Lecture 71 Scorpio - House of Transformation

Lecture 72 Sagittarius - House of Purpose

Lecture 73 Capricorn - House of Social Status

Lecture 74 Aquarius - House of Friendship

Lecture 75 Pisces - House of Subconscious

Lecture 76 Cusps Influence

Lecture 77 Zodiac Relations

Lecture 78 Practicing What I Preach

Section 5: Kabbalistic Tree of Life

Lecture 79 Story of Creation

Lecture 80 Four Worlds

Lecture 81 Emperor / Star Swop

Lecture 82 Three Pillars

Lecture 83 Three Triangles

Lecture 84 Sephiroth And Sephirah

Lecture 85 First Sephirah - THE CROWN

Lecture 86 Second Sephirah WISDOM

Lecture 87 Third Sephirah INTELLIGENCE

Lecture 88 Fourth Sephirah KINDNESS

Lecture 89 Fifth Sephirah STRENGTH

Lecture 90 Sixth Sephirah BEAUTY

Lecture 91 Seventh Sephirah TRIUMPH

Lecture 92 Eight Sephirah GLORY

Lecture 93 Ninth Sephirah FOUNDATION

Lecture 94 Tenth Sephirah THE KINGDOM

Lecture 95 The Paths

Lecture 96 The Fool

Lecture 97 The Magician

Lecture 98 The High Priestess

Lecture 99 The Empress

Lecture 100 The Emperor

Lecture 101 The Hierophant

Lecture 102 The Lovers

Lecture 103 The Chariot

Lecture 104 Strength

Lecture 105 The Hermit

Lecture 106 Wheel Of Fortune

Lecture 107 Justice

Lecture 108 The Hanged Man

Lecture 109 Death

Lecture 110 Temperance

Lecture 111 The Devil

Lecture 112 The Tower

Lecture 113 The Star

Lecture 114 The Moon

Lecture 115 The Sun

Lecture 116 Judgement

Lecture 117 The World

Lecture 118 Bringing It All Together

Lecture 119 Divine Male / Female Energies

Lecture 120 Kings

Lecture 121 Queens

Lecture 122 Knights

Lecture 123 Pages

Lecture 124 Astrology in Tree of Life

Lecture 125 Tree of Life Meditation

Section 6: SACRED GEOMETRY

Lecture 126 Cosmic Blueprint

Lecture 127 Viseca Pisces

Lecture 128 Fibonacci Sequence

Lecture 129 Seed of Life / Egg of Life

Lecture 130 Fruit of Life

Lecture 131 Metatron s Cube / Merkaba

Lecture 132 Flower of Life / Tree of Life

Lecture 133 The Big Reminder

Lecture 134 OM Chant

Section 7: JUST SOME THOUGHTS

Lecture 135 Expand Your Intuition Exercise

Lecture 136 Sound Healing / Hertz

Lecture 137 Nikola Tesla s Sleep Manifestation Technique

Lecture 138 Benefit of Feeling Stuck

Lecture 139 Always About A Feeling

Lecture 140 Be CLEAR About Your Offer

Lecture 141 Create Passive Income

Lecture 142 Not A Hustle

Lecture 143 Not Your Friends

Section 8: IT S A WRAP

Lecture 144 Thank You (now start all over again)

Lecture 145 Download Your Certificate

Psychics, oracle, energy healers, channelers, Nordic Runes readers and all others interested in broadening their cosmic scope, through advanced concepts coaching of the ancient tarot.


Homepage


451926268_126-cosmic-blueprint_s.jpg











 
Zurück
Oben Unten