Aug 23 2024 Master Windows & Linux: Ultimate Admin Bootcamp (2024) BaDshaH LEARNING / e-learning - Tutorials 02:42 0 Published 8/2024MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 27.07 GB | Duration: 91h 40mIT Career Booster: Master AD, Linux, automation & security in Windows & Linux environments What you'll learnMaster Windows Server administration, including Active Directory, Group Policy, and security best practices for enterprise environments.Gain proficiency in Linux system administration, covering command-line operations, user management, and network configuration.Develop advanced scripting skills in both PowerShell and Bash to automate tasks and enhance productivity across both platforms.Implement and manage high availability solutions, including clustering and load balancing, for Windows and Linux servers.Master essential security practices for both Windows and Linux, including hardening techniques, access control, and threat mitigation.And much more...RequirementsBasic IT knowledge and familiarity with computer concepts. No prior experience with Windows Server or Linux is required, but basic computer skills and understanding of networking fundamentals will be helpful. A computer with internet access and the ability to set up virtual machines (8GB RAM recommended) is needed for hands-on practice. We'll guide you through all necessary software installations. This course is designed to take you from beginner to advanced, so come with an eagerness to learn and you'll be well-prepared for the course!DescriptionMaster Windows Server and Linux Administration: The Ultimate Hands-On GuideElevate your IT career with our comprehensive 90+ hour course covering essential skills for managing Windows Server and Linux environments. Perfect for aspiring system administrators and IT professionals looking to expand their expertise and unlock new career opportunities.Key highlights:• Dive deep into Windows Server administration, from installation to advanced features• Explore Active Directory, Group Policy, and security best practices • Learn Linux fundamentals and advanced concepts across popular distributions• Master PowerShell and Bash scripting for efficient system management• Hands-on labs and real-world scenarios to reinforce your learningLinux in the Modern World:Linux powers much of the world's technology infrastructure, from web servers and cloud platforms to mobile devices and embedded systems. Its open-source nature, stability, and flexibility make it a top choice for enterprises, startups, and governments alike. By mastering Linux, you'll position yourself at the forefront of technological innovation and open doors to exciting career opportunities in cloud computing, DevOps, IoT, and more.Windows Server in Enterprise Environments:Windows Server remains a cornerstone of enterprise IT infrastructure, providing essential services for businesses of all sizes. From managing user identities and access to hosting critical business applications, Windows Server skills are in high demand. Proficiency in Windows Server administration will make you an invaluable asset to organizations relying on Microsoft technologies.The Power of Mastering Both:By acquiring skills in both Windows Server and Linux administration, you'll become a versatile and highly sought-after IT professional. This unique combination allows you to:• Seamlessly navigate and integrate diverse IT environments• Implement robust, cross-platform solutions for complex business needs• Adapt quickly to evolving technology landscapes and job requirements• Stand out in the job market with a broader skill set than most candidates• Contribute effectively to hybrid cloud and multi-cloud strategies• Solve a wider range of IT challenges, making you indispensable to employersCareer Advancement and Opportunities:Completing this course will significantly enhance your career prospects in the IT industry:• Qualify for in-demand roles such as Systems Administrator, Network Administrator, or IT Infrastructure Specialist• Boost your earning potential - skilled Windows/Linux admins command competitive salaries• Prepare for sought-after certifications in both Microsoft and Linux domains• Position yourself for career growth into roles like IT Manager or Cloud Architect• Gain the versatility to work across diverse IT environments and industries• Develop a strong foundation for specializing in cloud technologies, DevOps, or cybersecurityBy the end of this course, you'll have the confidence and skills to:• Deploy and manage Windows Server and Linux systems in enterprise environments• Implement robust security measures and troubleshoot common issues• Automate tasks with PowerShell and Bash scripting• Tackle certification exams with ease• Impress employers with your broad skill set and hands-on experienceWhether you're new to system administration or looking to level up your skills, this course provides the perfect blend of theory and practical knowledge to succeed in today's IT landscape. Start your journey to becoming a versatile and in-demand IT professional today!Invest in your future - gain the skills that will set you apart in the competitive IT job market and open doors to exciting career opportunities.Brief Course Outline:1. Windows Server Administration - Installation and configuration - Active Directory and Group Policy - Networking and storage management - High availability and disaster recovery - Security and performance optimization2. Linux Administration - Linux fundamentals and command line mastery - User and group management - File system administration - Network configuration and security - Package management and software installation3. PowerShell Scripting - PowerShell basics and syntax - Writing and executing scripts - Automating Windows Server tasks - Managing Active Directory with PowerShell4. Bash Scripting - Bash scripting fundamentals - Creating and debugging scripts - Automating Linux system administration tasks - Text processing and data manipulation5. Advanced Topics - Virtualization and containerization - Cloud integration - Configuration management tools (Ansible) - Monitoring and loggingWhat You'll Learn:- Install, configure, and manage Windows Server and Linux systems- Implement and administer Active Directory services- Configure and maintain network services on both platforms- Manage storage solutions, including RAID and LVM- Implement security best practices and hardening techniques- Write powerful scripts in PowerShell and Bash for task automation- Deploy and manage virtual machines and containers- Implement high availability and disaster recovery solutions- Monitor system performance and troubleshoot common issues- Integrate on-premises systems with cloud services- Use configuration management tools for efficient system administrationBy the end of this course, you'll have a comprehensive skill set covering both Windows and Linux environments, positioning you as a versatile and valuable IT professional ready to take on the challenges of modern infrastructure management.OverviewSection 1: IntroductionLecture 1 Instructor's IntroLecture 2 Introduction and Installing Windows Server 2022Lecture 3 Activating Windows Server 2022Lecture 4 Post-Install Tasks. Part 1Lecture 5 Post-Install Tasks. Part 2Lecture 6 Setting a Base Image with SYSPREPLecture 7 RecapLecture 8 Setting up your first DCLecture 9 Installing WAC and Joing a workstation to the domainLecture 10 Server CoreLecture 11 Adding a Child Domain to the LabLecture 12 Recap: Base Lab SOPLecture 13 AD DS Admin ToolsLecture 14 Creating Users in our LabLecture 15 Creating OU, Group, and User TemplateLecture 16 Manging AD DS Objects with PowershellLecture 17 Building Trusts between ForestsLecture 18 Server ManagerLecture 19 Getting started with PowershellLecture 20 Installing Hyper-V in Windows Server LabLecture 21 Installing Hyper-V in Windows Server Lab. Part 2Lecture 22 Networking basicsLecture 23 Configuring Network SettingsLecture 24 Installing updates and upgrading Windows Server 2019 to 2022Lecture 25 Creating an automated answer file to automate the installationLecture 26 Module 1: Installing and configuring domain controllers. OverviewLecture 27 AD DS componentsLecture 28 What is the AD DS schema?Lecture 29 What is an AD DS forest?Lecture 30 What is an AD DS domain?Lecture 31 What are OUs?Lecture 32 What is Azure AD?Lecture 33 Overview of AD DS administration toolsLecture 34 Demo 1: Overview of AD DS administration tools and componentsLecture 35 Demo 2: Overview of AD DS administration tools and componentsLecture 36 Demo 3: Active Directory Administrative Center to administer and manage AD DSLecture 37 Overview of AD DS domain controllersLecture 38 What is a domain controller?Lecture 39 What is a global catalog?Lecture 40 Demo: What is a global catalog?Lecture 41 Overview of domain controller SRV recordsLecture 42 Demo: Overview of domain controller SRV recordsLecture 43 AD DS sign-in processLecture 44 Demo: AD DS sign-in processLecture 45 Demo: AD DS sign-in processLecture 46 What are operations masters?Lecture 47 Transferring and seizing rolesLecture 48 Deploying a domain controller: OverviewLecture 49 Installing a domain controller from Server ManagerLecture 50 Demo: Part 1. Installing a domain controller from Server ManagerLecture 51 Demo: Part 2. Installing a domain controller from Server ManagerLecture 52 Installing a domain controller on a Server Core installation of Windows ServerLecture 53 Demo: Installing a domain controller on a Server CoreLecture 54 Installing a domain controller by installing from mediaLecture 55 Cloning domain controllersLecture 56 Demonstration: Cloning domain controllersLecture 57 Demonstration: Adding Another domain controllersLecture 58 Demonstration: Installing a domain controller with PowershellLecture 59 Demonstration: FSMO RolesSection 2: Managing user accountsLecture 60 Managing User Accounts OverviewLecture 61 Creating user accountsLecture 62 Demo: Configuring user account attributesLecture 63 Demo: Managing user accountsLecture 64 Creating user profilesLecture 65 Demo: Creating user profilesLecture 66 Demo: User account templatesLecture 67 Using Windows PowerShell cmdlets to manage user accountsLecture 68 Using Windows PowerShell to create usersLecture 69 Using Windows PowerShell for bulk users operationsLecture 70 Using Windows PowerShell to modify users' propertiesLecture 71 Using Windows PowerShell to add users to groupsLecture 72 Using Windows PowerShell to modify users' properties. Part2Lecture 73 Using Windows PowerShell to enable/move usersLecture 74 Using Windows PowerShell to delete usersSection 3: Managing groups, computers, OU in AD DSLecture 75 Managing groups in AD DS Section OverviewLecture 76 Group typesLecture 77 Group typesLecture 78 Group scopesLecture 79 Demo: Group scopesLecture 80 Implementing group managementLecture 81 Demo: Implementing group management (IGDLA)Lecture 82 Managing members with GPOLecture 83 Demo: Using Restricted Groups SettingLecture 84 Default groupsLecture 85 Demo: Using Account Operators Groups and Delegate ControlLecture 86 Special identitiesLecture 87 Demonstration: Managing groups in Windows ServerLecture 88 Demo: Checking Groups MembershipLecture 89 Managing computer objects in AD DS Section OverviewLecture 90 Specifying the location of computer accountsLecture 91 Controlling permissions to create computer accountsLecture 92 Joining a computer to a domainLecture 93 Demo: Managing Computer ObejectsLecture 94 Resetting the computer account (secure channel)Lecture 95 Demo: Resetting the computer account (secure channel)Lecture 96 Performing an offline domain joinLecture 97 Lab Tasks: Managing objects in AD DSLecture 98 Lab Solution: Managing objects in AD DSLecture 99 Implementing and managing OUs Section OverviewLecture 100 Planning OUsLecture 101 OU hierarchy considerationsLecture 102 Considerations for using OUsLecture 103 AD DS permissionsLecture 104 Delegating AD DS permissionsLecture 105 Using Windows PowerShell for AD DS administration Section OverviewLecture 106 Using Windows PowerShell cmdlets to manage groupsLecture 107 PowerShell: Managing, configuring and modifying Group objects. Part 1Lecture 108 PowerShell: Managing, configuring and modifying Group objects. Part 2Lecture 109 PowerShell: Managing, configuring and modifying Group objects. Part 3Lecture 110 PowerShell: Managing, configuring and modifying Group objects. Part 4Lecture 111 PowerShell: Managing, configuring and modifying Group objects. Part 5Lecture 112 Windows PowerShell cmdlets to manage computers and OUsLecture 113 PowerShell: Managing, configuring and modifying Computer objects. Part 1Lecture 114 PowerShell: Managing, configuring and modifying Computer objects. Part 2Section 4: Part 2Lecture 115 Course OverviewLecture 116 Section OverviewLecture 117 Overview of domain and forest boundaries in an AD DS structureLecture 118 Why implement multiple domains?Lecture 119 Why implement multiple forests?Lecture 120 Deploying a domain controller in Azure IaaSLecture 121 Managing objects in complex AD DS deploymentsLecture 122 Deploying a distributed AD DS environment. Section OverviewLecture 123 AD DS domain functional levelsLecture 124 AD DS forest functional levelsLecture 125 Demo: New domain and functional levels in Windows Server 2025Lecture 126 Deploying new AD DS domainsLecture 127 Considerations for implementing complex AD DS environmentsLecture 128 Demo: Installing a domain controller in a new domain in an existing forestLecture 129 Upgrading a previous version of AD DS to Windows Server 2016Lecture 130 Migrating to Windows Server 2016 AD DS from a previous versionLecture 131 Configuring AD DS trusts. Section OverviewLecture 132 Overview of different AD DS trust typesLecture 133 How trusts work in a forestLecture 134 How trusts work between forestsLecture 135 Configuring advanced AD DS trust settingsLecture 136 Course OverviewLecture 137 Section OverviewLecture 138 What are AD DS partitions?Lecture 139 Characteristics of AD DS replicationLecture 140 How AD DS replication works within a siteLecture 141 Resolving replication conflictsLecture 142 How replication topology is generatedLecture 143 How SYSVOL replication worksLecture 144 Configuring AD DS sites Section OverviewLecture 145 What are AD DS sites?Lecture 146 Why implement additional sites?Lecture 147 How replication works between sitesLecture 148 What is the ISTG?Lecture 149 Overview of SRV recordsLecture 150 How client computers locate domain controllers within sitesLecture 151 Moving domain controllers between sitesLecture 152 Configuring and monitoring AD DS replication Section OverviewLecture 153 What are AD DS site links?Lecture 154 What is site link bridging?Lecture 155 What is universal group membership caching?Lecture 156 Lab: Sites and Replication. Exercies and TasksLecture 157 Lab: Sites and Replication. SolutionSection 5: Group PolicyLecture 158 Course OverviewLecture 159 What is Configuration ManagementLecture 160 Overview of Group Policy tools and consolesLecture 161 Computer Configuration and User ConfigurationLecture 162 Demonstration: Exploring Group Policy tools and consolesLecture 163 Benefits of using Group PolicyLecture 164 Group Policy ObjectsLecture 165 Overview of GPO scopeLecture 166 Overview of GPO inheritanceLecture 167 The Group Policy Client service and client-side extensionsLecture 168 What are domain-based GPOs?Lecture 169 GPO storageLecture 170 What are starter GPOs?Lecture 171 Common GPO management tasksLecture 172 Delegating administration of Group PolicyLecture 173 Demo: Delegating administration of Group PolicyLecture 174 Lesson 3: Group Policy scope and Group Policy processingLecture 175 What are GPO links?Lecture 176 Group Policy processing orderLecture 177 Configuring GPO inheritance and precedenceLecture 178 Using security filtering to modify Group Policy scopeLecture 179 What are WMI filters?Lecture 180 How to enable or disable GPOs and GPO nodesLecture 181 Loopback policy processingLecture 182 Considerations for slow links and disconnected systemsLecture 183 Identifying when settings become effectiveLecture 184 Lab A Tasks: Implementing a Group Policy infrastructureLecture 185 Lab A Solution: Implementing a Group Policy infrastructureLecture 186 Troubleshooting the application of GPOs Lesson OverviewLecture 187 Refreshing GPOsLecture 188 What is RSoP and Generating RSoP ReportLecture 189 Course OverviewLecture 190 Section OverviewLecture 191 What are administrative templates?Lecture 192 What are .adm and .admx files?Lecture 193 Overview of the central storeLecture 194 Demonstration: Configuring settings with administrative templatesLecture 195 Importing security templatesLecture 196 Managing administrative templatesLecture 197 Section OverviewLecture 198 What is Folder Redirection?Lecture 199 Settings for configuring Folder RedirectionLecture 200 Security settings for redirected foldersLecture 201 Demonstration: Configuring Folder RedirectionLecture 202 Managing software with Group PolicyLecture 203 Group Policy settings for applying scriptsLecture 204 Demonstration: Configuring scripts with GPOsLecture 205 Section OverviewLecture 206 What are Group Policy preferences? Comparing with Policy settingsLecture 207 Features of Group Policy preferencesLecture 208 Item-level targeting optionsLecture 209 Demonstration: Configuring Group Policy preferencesLecture 210 Lab Tasks: Managing user settings with Group PolicyLecture 211 Lab Solution: Managing user settings with Group PolicyLecture 212 Lab Review: Managing user settings with Group PolicySection 6: Securing domain controllersLecture 213 Section OverviewLecture 214 Security risks that can affect domain controllersLecture 215 Demo: Installing and Using Nmap for Network Scanning and Vulnerability AssessLecture 216 Modifying the security settings of domain controllersLecture 217 Demo Example 1: Configuring and Verifying Domain Controller Security PoliciesLecture 218 Demo Example 2: Configuring Custom Security Policies for Domain ControllersLecture 219 Benefits of Custom GPOs for Domain Controllers: Best Practices and ConsiderationLecture 220 Implementing secure authenticationLecture 221 Securing physical access to domain controllersLecture 222 What are RODCs?Lecture 223 Deploying an RODCLecture 224 Planning and configuring an RODC password replication policyLecture 225 Demonstration: Configuring a password replication policyLecture 226 Separating RODC local administrationLecture 227 Best Practices for Securing Active DirectoryLecture 228 Section OverviewLecture 229 Password policiesLecture 230 Account lockout policiesLecture 231 Kerberos policiesLecture 232 Demonstration: Configuring a fine-grained password policyLecture 233 Protecting groups in AD DSLecture 234 Fine-grained password and lockout policiesLecture 235 Tools for creating PSOsLecture 236 Demonstration: Configuring authentication-related audit policies and viewing logLecture 237 PSO precedence and resultant PSOLecture 238 Account-security optionsLecture 239 Configuring user account policiesLecture 240 Account logon and logon events skdlfdklsj lksdjflkdsjflkj lksdjfldsakjflkj dslkjLecture 241 Demonstration: Configuring authentication-related audit policies and viewing logLecture 242 Scoping audit policiesLecture 243 Section OverviewLecture 244 Overview of service accountsLecture 245 Challenges of using service accountsLecture 246 Overview of managed service accountsLecture 247 What are group MSAs?Lecture 248 Demonstration: Configuring group MSAsLecture 249 Lab: Securing AD DS Exercises and TasksLecture 250 Lab: Securing AD DS. Solution. Part 1Lecture 251 Lab: Securing AD DS. Solution. Part 2Lecture 252 Lab ReviewLecture 253 Module Review and TakeawaysLecture 254 Plan Your ProgressLecture 255 Course OverviewLecture 256 Section Overview: Deploying CAsLecture 257 What is AD CS?Lecture 258 Options for implementing CA hierarchiesLecture 259 Standalone vs. enterprise CAsLecture 260 Considerations for deploying a root CALecture 261 Demonstration: Deploying an enterprise root CALecture 262 Considerations for deploying a subordinate CALecture 263 How to use the CAPolicy.inf file for installing a CALecture 264 Section Overview: Administering CAsLecture 265 Managing CAsLecture 266 Configuring CA securityLecture 267 Security roles for CA administrationLecture 268 Configuring CA policy and exit modulesLecture 269 Configuring CDPs and AIA locationsLecture 270 Demonstration: Configuring CA propertiesLecture 271 Section Overview: Troubleshooting CAsLecture 272 Renewing a CA certificateLecture 273 Moving a root CA to another computerLecture 274 Monitoring CA operationsLecture 275 Lab Task: Deploying and managing AD CSLecture 276 Lab Demonstration Steps: Deploying and managing AD CSLecture 277 Course OverviewLecture 278 Course OverviewLecture 279 Section OverviewLecture 280 What are certificates and certificate templatesLecture 281 Certificate template versions in Windows ServerLecture 282 Configuring certificate template permissionsLecture 283 Configuring certificate template settingsLecture 284 Options for updating a certificate templateLecture 285 Demonstration: Modifying and enabling a certificate templateLecture 286 Assess Your Knowledge. Section Overview: Managing certificateLecture 287 Certificate enrollment methodsLecture 288 Overview of certificate autoenrollmentLecture 289 What is an enrollment agent?Lecture 290 How does certificate revocation work?Lecture 291 Overview of key archival and recoveryLecture 292 Demonstration: Configuring a CA for key archivalLecture 293 Using certificates for SSLLecture 294 Using certificates for digital signaturesLecture 295 Using certificates for content encryptionLecture 296 Demonstration: Signing a document digitally. Encrypting a fileLecture 297 Lab: Deploying and using certificatesLecture 298 Lab Demonstration Steps: Deploying and using certificatesLecture 299 Module Review and TakeawaysLecture 300 Building a PKI Lab Environment with Hyper-V and Base ImageLecture 301 Configuring Offline Root Certification AuthorityLecture 302 Configuring Root CA SettingsLecture 303 Installing IIS Web Server and Importing Root CA CertificateLecture 304 Configuring IIS Virtual Directory and Settings for PKILecture 305 Setting Up an Enterprise Subordinate Certification AuthorityLecture 306 Configuring CRL and AIA Distribution Points on Subordinate CALecture 307 Building a PKI infrastructure lab on Windows Server Core VMsLecture 308 Building a PKI infrastructure lab on Windows Server Core VMs.Lecture 309 Building a PKI infrastructure lab on Windows Server Core VMs.Lecture 310 Managing disks in Windows ServerLecture 311 Selecting a disk typeLecture 312 Selecting a file systemLecture 313 Implementing ReFSLecture 314 Implementing ReFS with PowershellLecture 315 Using .vhd and .vhdx file typesLecture 316 Using .vhd and .vhdx file typesLecture 317 Working with Dynamic VolumesLecture 318 Working with DiskpartLecture 319 Lab Assignment: Configuring Local StorageLecture 320 Lab Solution: Configuring Local StorageLecture 321 Selecting a disk typeLecture 322 What is RAID?Lecture 323 RAID levelsLecture 324 What is DAS?Lecture 325 What is NAS?Lecture 326 What is a SAN?Lecture 327 Comparison and scenarios for usageLecture 328 Block-level storage vs. file-level storageLecture 329 What is Fibre Channel?Lecture 330 Considerations for implementing Fibre ChannelLecture 331 What is iSCSI?Lecture 332 iSCSI componentsLecture 333 Core storage componentsLecture 334 Demo: Configuring an iSCSI targetLecture 335 What is iSNS?Lecture 336 What is DCB?Lecture 337 What is MPIO?Lecture 338 Demo: Configuring MPIOLecture 339 What is SMB?Lecture 340 Configuring SMB sharesLecture 341 Demo: Configuring SMB shares by using Server Manager andLecture 342 What is NFS?Lecture 343 Configuring NFS sharesLecture 344 Demo: Configuring an NFS share by using Server ManagerLecture 345 Lab Assignment: Implementing enterprise storage solutionsLecture 346 Lab Solution: Implementing enterprise storage solutionsLecture 347 Enterprise storage needsLecture 348 What are Storage Spaces?Lecture 349 Components and features of Storage SpacesLecture 350 Demonstration: Configuring Storage SpacesLecture 351 Changes to file and storage services in Windows ServerLecture 352 Storage Spaces usage scenariosLecture 353 Discussion: Comparing Storage Spaces to other storage solLecture 354 Managing Storage SpacesLecture 355 Managing disk failure with Storage SpacesLecture 356 Storage pool expansionLecture 357 Demonstration: Managing Storage Spaces by using Windows PLecture 358 Event logs and performance countersLecture 359 Event logs and performance counters. Part 2Lecture 360 Performance countersLecture 361 Lab A Tasks: Implementing Storage Spaces. Execrcise 1Lecture 362 Lab A Tasks: Implementing Storage Spaces. Execrcise 2Lecture 363 Lab A Solution: Implementing Storage Spaces. Execrcise 1Lecture 364 Lab A Solution: Implementing Storage Spaces. Execrcise 2Lecture 365 What is Data Deduplication?Lecture 366 Data Deduplication componentsLecture 367 Deploying Data DeduplicationLecture 368 Usage scenarios for Data DeduplicationLecture 369 Monitoring and maintaining Data DeduplicationLecture 370 Backup and restore considerations with Data DeduplicationLecture 371 Lab B Tasks: Implementing Data DeduplicationLecture 372 Lab B Tasks: Implementing Data DeduplicationLecture 373 Lab B Solution: Implementing Data DeduplicationLecture 374 Module IntroductionLecture 375 New Hyper-V host features in Windows ServerLecture 376 New Hyper-V virtual machine featuresLecture 377 Lesson 3: Configuring storage on Hyper-V host serversLecture 378 Considerations for virtual hard disk formats and typesLecture 379 Demo: Managing storage in Hyper-VLecture 380 Lesson 4: Types of Hyper-V networksLecture 381 Best Practices for configuring Hyper-V virtual networksLecture 382 New Hyper-V networking features in Windows ServerLecture 383 Demo: Configuring Hyper-V networksLecture 384 Lesson 5: Configuring Hyper-V virtual machinesLecture 385 Virtual machine generation versionsLecture 386 Virtual machine settingsLecture 387 VMs features and best practiceLecture 388 Demo: Virtual machine configuration versionsLecture 389 Demo: Creating a virtual machineLecture 390 Demo: Creating a virtual machine with PowershellLecture 391 Lesson 6: Managing virtual machinesLecture 392 Managing checkpointsLecture 393 Demo: Creating checkpointsLecture 394 Importing and exporting virtual machinesLecture 395 Demo: Live migration of a virtual machineLecture 396 What is Docker?Lecture 397 Demo: Installing DockerLecture 398 Module OverviewLecture 399 What is high availability?Lecture 400 What is continuous and availability?Lecture 401 Creating a disaster recovery planLecture 402 Highly available networking and storageLecture 403 Lesson 2: Planning high availability and disaster recoverLecture 404 High availability considerations with Hyper-V virtual macLecture 405 Overview of Live MigrationLecture 406 Providing high availability with storage migrationLecture 407 Demo: Configuring live migrationLecture 408 Overview of Hyper-V ReplicaLecture 409 Demo: Configuring storage migration. Implementing Hyper-VLecture 410 Lesson 3: Backing up and restoring by using Windows ServeLecture 411 Lesson 4: High Availability with failover clustering in WLecture 412 What is failover clustering?Lecture 413 Course IntroductionLecture 414 Key Considerations for Designing a Highly Available FailoLecture 415 Identifying and Preparing Applications for Failover ClustLecture 416 Storage Options and Requirements for Failover ClustersLecture 417 Hardware and Network Requirements for Failover ClusteringLecture 418 Configuring Software, Security, and Migration for FailoveLecture 419 Cluster Configuration: Properties, Nodes, and Failover/FaLecture 420 Quorum Modes and Configuration in Failover ClusteringLecture 421 Deploying and Configuring Failover ClustersLecture 422 Demo: Creating a failover clusterLecture 423 Configuring Storage and Networking for Failover ClustersLecture 424 Setting Up and Administering Failover Clustering RolesLecture 425 Demo: Creating a general file-server failover clusterLecture 426 Configuring Cluster Quorum SettingsLecture 427 Demo: Configuring the quorumLecture 428 Monitoring, Backing Up, and Maintaining Failover ClustersLecture 429 Demo: Configure failover and failback settingsLecture 430 Failover Cluster Maintenance - Backup, Recovery, and TrouLecture 431 Optimizing Network Thresholds and Monitoring for ClusterLecture 432 Zero Downtime OS Updates Using Cluster-Aware UpdatingLecture 433 Demo: Configuring CAULecture 434 Identifying and Resolving Failover Cluster CommunicationLecture 435 Troubleshooting Cluster Availability Issues Related to CNLecture 436 Monitoring and Diagnostic Tools for Failover Cluster ManaLecture 437 Deploying Stretch Clusters for Site ResiliencyLecture 438 Deploying Highly Available Stretched Clusters Across LocaLecture 439 Understanding Synchronous vs Asynchronous Replication forLecture 440 Using Storage Replica for Stretched Clusters and ReplicatLecture 441 Witness Selection for Site-Aware Stretched Failover ClustLecture 442 Implementing Site-Aware Failover ClusteringLecture 443 Failover and Failback Procedures for Stretched ClustersLecture 444 Course introLecture 445 What is NLB?Lecture 446 Deployment requirements for NLBLecture 447 Network considerations for NLBLecture 448 Configuration options for NLBLecture 449 Designing applications and storage support for NLBLecture 450 Considerations for deploying an NLB cluster on virtual maLecture 451 Considerations for securing NLBLecture 452 Considerations for scaling and upgrading NLBLecture 453 Demo: Implementing NLBLecture 454 IntroductionLecture 455 Hands-On Lab OverviewLecture 456 Hands-On Lab Part 1Lecture 457 Hands-On Lab Part 2Lecture 458 Hands-On Lab Part 3Lecture 459 Hands-On Lab Part 4Section 7: LinuxLecture 460 Changing the directories, inspecting the system, examininLecture 461 Displaying and setting time and date. Part 1Lecture 462 Displaying and setting time and date. Part 2Lecture 463 Getting device information and using compression/archivinLecture 464 Getting help (continued)Lecture 465 Path and file typesLecture 466 Creating files or directories and listing files or directLecture 467 Copying, moving, renaming, removing files and directoriesLecture 468 File and directory control attributesLecture 469 Finding files. Part 1Lecture 470 Finding files. Part 2Lecture 471 Finding files. Part 3Lecture 472 Finding files. Part 4Lecture 473 Hands-On Task Demo: Finding Large Files and Creating a LoLecture 474 File permissions. Part 1Lecture 475 File permissions. Part 2Lecture 476 Permissions for group collaborationLecture 477 Hands-On Task Demo: Configuring Linux Permissions for a DLecture 478 Getting Started with Vim BasicsLecture 479 Creating, opening and saving a file. Moving around VIM edLecture 480 Getting help in VIMLecture 481 Creating the first file in vimLecture 482 Basic vim commandsLecture 483 VIM motion commands and searchLecture 484 Opening and saving files in VIMLecture 485 Opening multiple files and splitting windowsLecture 486 Switching between windowsLecture 487 Introduction to Basic Navigation in VimLecture 488 Hands-on Practice: Vim Installation and Basic NavigationLecture 489 Fundamentals of Editing in VimLecture 490 Basic Vim NavigationLecture 491 Advanced Vim NavigationLecture 492 Vim Search and ReplaceLecture 493 Vim Copy and InsertLecture 494 Vim Fundamentals: A Comprehensive Review of Core ConceptsLecture 495 Overview of Exercise Lessons. What will we learn?Lecture 496 Exercise 1: Editing in VimLecture 497 Exercise 2: Editing in VimLecture 498 Exercise 3: Editing in VimLecture 499 Navigating and Editing Multiple Files in VimLecture 500 Advanced Vim Techniques for Managing Multiple FilesLecture 501 Searching the needed info with grep&wcLecture 502 Cat and output redirectionLecture 503 Using pipesLecture 504 Processes revealedLecture 505 Processes and jobsLecture 506 Exploring all running processes with top commandLecture 507 Understanding process statesLecture 508 Changing process priority with niceLecture 509 Controlling processes with signalsLecture 510 Changing password with passwd and working withPATHLecture 511 Special characters and command-line keystrokesLecture 512 Chaining operatorsLecture 513 Sed and awkLecture 514 Sed and awk. Part 2Lecture 515 Performing exit, reboot or shutdown on the systemLecture 516 Using BASH historyLecture 517 Using aliases to create your own commandsLecture 518 Watching files and how they're changing live with watch cLecture 519 Gaining administrative privileges with sudo commandLecture 520 Understanding Job Scheduling with cron and at commndsLecture 521 Packages overviewLecture 522 Managing packages with rpm commandLecture 523 Installing and modifying packages with rpm commandLecture 524 Viewing pgp keys and verifying package attributesLecture 525 YUM package manager. Part 1Lecture 526 YUM package manager. Part 2Lecture 527 YUM package manager. Part 3Lecture 528 Configuring hostnameLecture 529 IPv4 concepts and traceroute command usageLecture 530 Using 'ip' commandLecture 531 Validating and Troubleshooting Network ConfigurationLecture 532 Practice Lab: Examining Network ConfigurationLecture 533 Configuring Networking with nmcliLecture 534 Validating Network Configuration (with Guided Exercise)(Lecture 535 Editing Network Configuration Files (with Guided ExerciseLecture 536 Lab: Managing NetworkingLecture 537 Installing RHEL9Lecture 538 Registering RHEL9Lecture 539 Users: Intro, id command, passwd fileLecture 540 Users: Gaining Superuser Access. su and sudo commandsLecture 541 Users: Configuring sudoLecture 542 Users: Guided Exercise Using sudoLecture 543 Users: Using useradd, userdel and usermodLecture 544 Users: Practice excersise with useradd, userdel and usermLecture 545 Groups: groupadd, groupdel and groupmodLecture 546 Groups: adding users to groupsLecture 547 Users: working with passwordsLecture 548 Users: Practice. Working with passwordsLecture 549 Lab: Managing Users and GroupsLecture 550 File permissionsLecture 551 Changing Permissions for Files and DirectoriesLecture 552 Changing Ownership for Files and DirectoriesLecture 553 Guided Exercise: Managing File System Permissions from thLecture 554 Umask and Managing Default Permissions and File AccessLecture 555 Guided Exercise: Umask and Managing Default PermissionsLecture 556 Lab: Controlling Access to FilesLecture 557 Listing Processes and Process States. PS command optionsLecture 558 Controlling JobsLecture 559 Guided Exercise: Controlling JobsLecture 560 Killing ProcessesLecture 561 Monitoring process activityLecture 562 Lab: Monitoring and Managing ProcessesLecture 563 Controlling Services and DaemonsLecture 564 Controlling Services and Daemons: Guided ExercisesLecture 565 Accessing Comand Line with SSHLecture 566 Configuring SSH key-based authenticationLecture 567 Configuring and securing SSHLecture 568 Describing System Log ArchitechtureLecture 569 Reviewing Syslog FilesLecture 570 Reviewing System Journal EntriesLecture 571 Preserving the System JournalLecture 572 Maintaining Accurate TimeLecture 573 Lab: Analyzing and Storing LogsLecture 574 Archiving and Compressing FilesLecture 575 Transferring Files Between Systems SecurelyLecture 576 Using 'at' PackageLecture 577 Scheduling Recurring Tasks with 'crontab'Lecture 578 Scheduling Recurring System JobsLecture 579 Guided Exercise: Scheduling Recurring System JobsLecture 580 Managing Temporary FilesLecture 581 Guided Exercise: Managing Temporary FilesLecture 582 Adjusting Tuning ProfilesLecture 583 Adjusting Process SchedulingLecture 584 Guided Exercise: Changing Process SchedulingLecture 585 Interpreting File ACLsLecture 586 Securing Files with ACLsLecture 587 Guided Exercise: Securing Files with ACLsLecture 588 Adding Partitions, File Systems, and Persistent MountsLecture 589 Guided Exercise: Adding Partitions, File Systems, and PerLecture 590 Managing Swap SpaceLecture 591 Lab: Managing Basic StorageLecture 592 Managing Logical VolumesLecture 593 Extending Logical VolumesLecture 594 Guided Exercise: Extending Logical VolumesLecture 595 Lab: Managing Logical VolumesLecture 596 Managing Layered Storage with StratisLecture 597 Guided Exercise: Managing Layered Storage with StratisLecture 598 Compresson and Deduplicating Storage with VDOLecture 599 Lab: Implementing Advanced Stirage FeaturesLecture 600 Accessing Network-Attached StorageLecture 601 Guided Exercise: Accessing Network-Attached StorageLecture 602 Describing the Boot ProcessLecture 603 Guided Exercise: Selecting the Boot TargetLecture 604 Guided Exercise:Resetting the Root Password. Using DebugLecture 605 Lab: Controlling the Boot ProcessLecture 606 Describing Networking ConceptsLecture 607 IPv4 settings. Defining subnetsLecture 608 IPv4 Guided Exercises. Public and Private AdressesLecture 609 Lab: Planning an IPv4 networkLecture 610 Using OpenSSL on Red Hat Linux to Create, Operate, and SeLecture 611 Creating Certificate Authority (Self-Signed)Lecture 612 Hands-On Lab on OpenSSLLecture 613 Administration and Monitoring with udevadmLecture 614 UDEV Configuration and Device ManagementLecture 615 Kernel Module Management: Using modprobe and rmmodLecture 616 Installation and Package Management TroubleshootingLecture 617 USB Device Detection and Management in Linux: Using lsusbLecture 618 Using dmesg for System Monitoring and Troubleshooting inLecture 619 Understanding Linux Run Levels: System Maintenance and TrLecture 620 Questions 1 -2: Using 'udevadm' and '/proc'Lecture 621 Questions 3 -4: udev Configuration Location. Loading kernLecture 622 Questions 5- 6. Querying udev database. Listing USB devicLecture 623 Question 7: Using dmesg to view kernel ring bufferLecture 624 Writing Simple Bash ScriptsLecture 625 Guided Exercise: Writing Your First ScriptLecture 626 Using LoopsLecture 627 Guided Exercise: Using LoopsLecture 628 Describing a Simple Regular ExpressionLecture 629 Guided Exercise: Using grep with RegExLecture 630 Using grep with RegExLecture 631 Lab: Your First ScriptLecture 632 Building Scripts: Using Variables and Redirecting Input/OLecture 633 Building Scripts: the if-then statementsLecture 634 Building Scripts: Trying the Test command. Using ComparisLecture 635 Building Scripts: Using File ComparisonLecture 636 Compound Testing. Working wit Advanced If-Then StatementsLecture 637 A Practical ExampleLecture 638 Looping with the 'for' statementLecture 639 Looping with the 'for' statement. Part 2Lecture 640 Using 'while' and 'until' commands. Using LoopsLecture 641 Using Loops. Part 2Lecture 642 Practical Examples Using LoopsLecture 643 Passing ParametersLecture 644 Using Special Parameter VariablesLecture 645 Working with OptionsLecture 646 Using Read CommandLecture 647 A Practical ExampleLecture 648 Understanding Input and OutputLecture 649 Redirecting Output in ScriptsLecture 650 Read/Write file descriptorsLecture 651 Supressing Command Output. Using temp files. Logging MessLecture 652 A practical example: using input and outputLecture 653 Signaling the Bash shellLecture 654 Using trapsLecture 655 Running scripts in backgroundLecture 656 Running Scripts without a Hang-upLecture 657 Controlling the Job. Viewing JobsLecture 658 Your First Bash Script. Part 1Lecture 659 Your First Bash Script. Part 2Lecture 660 Bash Syntax Fundamentals. Part 1Lecture 661 Bash Syntax Fundamentals. Part 2Lecture 662 Bash Syntax Fundamentals. Part 3Lecture 663 Working with Files and Permissions. Part 1Lecture 664 Working with Files and Permissions. Part 2Lecture 665 Working with Files and Permissions. Part 3Lecture 666 Script Example: File Operations and Bash ConceptsLecture 667 'if' Statement. Part 1Lecture 668 'if' Statement. Part 2Lecture 669 Loops in Bash. Part 1Lecture 670 Loops in Bash. Part 2Lecture 671 Hands-on Lab: Interactive Menu Script. Part 1Lecture 672 Hands-on Lab: Interactive Menu Script. Part 2Lecture 673 Hands-on Lab: Linux Administration Interactive Menu ScripLecture 674 Hands-on Lab: Linux Administration Interactive Menu ScripLecture 675 Functions in Bash. Part 1Lecture 676 Functions in Bash. Part 2Lecture 677 Error Handling and Debugging in Bash. Part 1Lecture 678 Error Handling and Debugging in Bash. Part 2Lecture 679 Error Handling and Debugging in Bash. Part 3Lecture 680 Advanced Bash Scripting Techniques - Examples Explained.Lecture 681 Advanced Bash Scripting Techniques - Examples Explained.Lecture 682 Advanced Bash Scripting Techniques - Examples Explained.Lecture 683 Advanced Bash Scripting Techniques - Practical Example WaLecture 684 Bash Script Optimization and Performance. Part 1Lecture 685 Bash Script Optimization and Performance. Part 2Lecture 686 Bash Script Optimization and Performance. Part 3Lecture 687 Bash Script Optimization and Performance. Part 4Lecture 688 Bash Script Optimization and Performance. Practical ExampLecture 689 Intro to VagrantLecture 690 Getting InstalledLecture 691 Using VagrantLecture 692 Using Vagrant. Part 2Lecture 693 Using Vagrant. Part 3Lecture 694 Using Vagrant. Part 4Lecture 695 Using Vagrant. Part 5Lecture 696 Using Vagrant. Part 6Lecture 697 Using Vagrant. Part 7Lecture 698 Using Vagrant. Part 8Lecture 699 Creating VM in RHEL cockpitLecture 700 Configuring VMsLecture 701 Configuring the prerequisites on managed hostsLecture 702 Setting up SSH Key-based AuthenticationLecture 703 What is an Ansible Inventory?Lecture 704 Building an Ansible InventoryLecture 705 Using Ansible Ad-Hoc CommandsLecture 706 Ansible Ad-Hoc Commands: A Practical DemonstrationLecture 707 Guided Exercise: Ansible Ad-Hoc Commands in PracticeLecture 708 Intro to AnsibleLecture 709 Getting InstalledLecture 710 Configuring SSHLecture 711 Getting inventoryLecture 712 Using modulesLecture 713 Starting with PlaybooksLecture 714 Starting with Playbooks. Part 2Lecture 715 Starting with Playbooks. Part 3Lecture 716 Starting with Playbooks. Part 4Lecture 717 Building Ansible Lab EnvironmentLecture 718 Describing Ansible Inventory FilesLecture 719 Guided Exercise: Ansible Inventory FilesLecture 720 Managing Ansible Configuaration FilesLecture 721 Managing Connectivity and Configuaration FilesLecture 722 Guided Exercise: Managing Ansible Configuaration FilesLecture 723 Running Ad Hoc CommandsLecture 724 Guided Exercise: Running Ad Hoc CommandsLecture 725 Lab: Deploying AnsibleLecture 726 Implementing PlaybooksLecture 727 Guided Exercise: Implementing PlaybooksLecture 728 Multiple PlaysLecture 729 Guided Exercise: Multiple PlaysLecture 730 Lab: Implementing PlaybooksLecture 731 Managing VariablesLecture 732 Guided Exercise: Managing VariablesLecture 733 Managing SecretsLecture 734 Guided Exercise: Managing SecretsLecture 735 Managing FactsLecture 736 Guided Exercise: Managing FactsLecture 737 Lab: Managing Variables and FactsLecture 738 Writing Loops and Conditional TasksLecture 739 Guided Exercise: Writing Loops and Conditional TasksLecture 740 Implementing HandlersLecture 741 Handling Task FailureLecture 742 Guided Exercise: Handling Task FailureLecture 743 Guided Lab:Implementing Task ControlLecture 744 IntroLecture 745 Getting InstalledLecture 746 Configuring GitLecture 747 Your First CommitLecture 748 Using PushLecture 749 Clone and PullLecture 750 Use IgnoreLecture 751 HistoryLecture 752 Use BranchesSection 8: PowershellLecture 753 Course overviewLecture 754 Overview of Part 1Lecture 755 Powershell OverviewLecture 756 Powershell VersionsLecture 757 Get to know Two Host ApplicationsLecture 758 What Version are You UsingLecture 759 Always Run the Shell as AdministratorLecture 760 Tips and TricksLecture 761 Configuring the ConsoleLecture 762 Configuring the Console (demo)Lecture 763 Configuring the ISELecture 764 Configuring the ISE (demo)Lecture 765 LAB 1 Exercise 1Lecture 766 LAB 1 Exercise 1 Answer VideoLecture 767 LAB 1 Exercise 2Lecture 768 LAB 1 Exercise 2 Answer VideoLecture 769 LAB ReviewLecture 770 Part 2 OverviewLecture 771 Commands that Seem FamiliarLecture 772 Learning Commands SyntaxLecture 773 Viewing Help (demo)Lecture 774 Finding CommandsLecture 775 Finding Commands (demo)Lecture 776 Interpreting HelpLecture 777 Updating HelpLecture 778 Updating and saving help filesLecture 779 Demo: Updating and saving help filesLecture 780 About FilesLecture 781 About Files (demo)Lecture 782 Part 3 OverviewLecture 783 Full Command SyntaxLecture 784 Specifying Multiple Parameter ValueLecture 785 Shortened Command SyntaxLecture 786 Show-Command CommandLecture 787 Commands that Modify the SystemLecture 788 Show-Command (demo)Lecture 789 Commands that Modify the System (demo)Lecture 790 Lab B: Finding and Running Basic Commands TasksLecture 791 Lab B Solution: Finding and Running Basic CommandsLecture 792 Module Review and TakeawaysLecture 793 Course overviewLecture 794 Part 1 OverviewLecture 795 Understanding the Pipeline. Part 1. Lesson 1Lecture 796 Understanding the Pipeline. Part 1. Lesson 2Lecture 797 Understanding the Pipeline. Part 1. Lesson 3Lecture 798 Understanding the Pipeline. Part 1. Lesson 4Lecture 799 Understanding the Pipeline. Part 1. Lesson 5Lecture 800 Understanding the Pipeline. Part 1. Lesson 6T professionals and aspiring system administrators looking to advance their careers by mastering both Windows Server and Linux administration skills.,Recent IT graduates or career changers aiming to build a strong foundation in enterprise-level server administration across multiple operating systems.,Experienced Windows administrators looking to add Linux skills to their repertoire, or Linux admins wanting to become proficient in Windows Server environments.,Network administrators seeking to expand their expertise to include cross-platform server management and automation techniques.Homepagehttps://www.udemy.com/course/master-windows-linux-ultimate-admin-bootcamp-2024/https://rapidgator.net/file/836f3ca94047998ae1dae35354df124ehttps://rapidgator.net/file/4200656d41eaef9b3c0736f98ab404cdhttps://rapidgator.net/file/c62bbf62de5881dd7621b38fd39a473chttps://rapidgator.net/file/5a7ee2dae0bf6dc899ded8e785a47377https://rapidgator.net/file/060e0fb4a639fc7a3c53bf0cd5b0a122https://rapidgator.net/file/e3eaaf34fa6512b54adbc329ef63c32ahttps://rapidgator.net/file/04b43372741ec9d7870257c22835e9d8https://rapidgator.net/file/2cf7bfae3a622d6161648a544a183661https://rapidgator.net/file/76af77f826c7736a591d332242e9087chttps://rapidgator.net/file/90206ff2d024c01337f3ab7cacf779a3https://rapidgator.net/file/4bf98115b76247f1bc42b6dda00f168ehttps://rapidgator.net/file/0618b896d7688d2b71e13dedd3308bbfhttps://rapidgator.net/file/70a509d227554bec472557eefea4bdcchttps://rapidgator.net/file/867e424f7827a5b69d46f34966fe4926https://rapidgator.net/file/2b3c2a9e302794c61259913a292728cfhttps://rapidgator.net/file/7a85e5729fafc3750b061246827b4e3chttps://rapidgator.net/file/3c9597dda8658a117a480111500d052dhttps://rapidgator.net/file/fe8d1c8a9a32cc1a1de01df81bcf60d7https://rapidgator.net/file/98f2e220ab290d5fd98638ed88955244https://rapidgator.net/file/302133dc74e2e9bcf753a4f89a337c4chttps://rapidgator.net/file/6f0ce88827b6fe25608d5a79255daa88https://rapidgator.net/file/ab824e73f8e8a8b6ca1ccd95b54a5326https://rapidgator.net/file/ed6e38759fbed712d5350d637c79aa29https://rapidgator.net/file/1b9345fc196f0af0d14edd6a7036c62ehttps://rapidgator.net/file/272500241f8110e107751a627b7388c6https://rapidgator.net/file/2a8c4fe85eb101232c8ddab5d48a02aahttps://rapidgator.net/file/a2861c30fa0029b7aa36c12e60d4f1bdhttps://rapidgator.net/file/38e139999bbff6fc4504449abb4a21cfhttps://ddownload.com/9nwwhumqyu8whttps://ddownload.com/jtkanxn4bpf4https://ddownload.com/pev4qyiol8ythttps://ddownload.com/bkmvcl03kgurhttps://ddownload.com/gl0s898ulbtbhttps://ddownload.com/oyd2qhkh1mlqhttps://ddownload.com/k826b5ujpprbhttps://ddownload.com/az646weqbb8thttps://ddownload.com/q4m7atosjnz7https://ddownload.com/6nnehzqvqt61https://ddownload.com/cbjiyz04d64hhttps://ddownload.com/cl98t4lifkzuhttps://ddownload.com/lk0g2kxkyb4chttps://ddownload.com/hdle5ljkqgpihttps://ddownload.com/ncl5mlvfqx4ihttps://ddownload.com/9lk9gfra906phttps://ddownload.com/im529wpvs5q6https://ddownload.com/v2agt8gn8ginhttps://ddownload.com/a0m01c4y39s1https://ddownload.com/vanxdiq6kz70https://ddownload.com/jav7jzlmpy9zhttps://ddownload.com/1klja0yppzkhhttps://ddownload.com/6kydejt7jsbxhttps://ddownload.com/yacgaq44ul1khttps://ddownload.com/ry98yo9rzmcchttps://ddownload.com/rzo716h9kbgihttps://ddownload.com/9uugygecw9gnhttps://ddownload.com/ffgamrp4eza0 Related News It Security Fundamentals (2024)Mastering Microsoft Configuration Manager (SCCM) TrainingUdemy - The Ultimate React Course (2024) React, Next js, Redux & MoreCCNA Networking | Complete Cisco CCNA 200-301 Prep CourseCBTNuggets Cisco CCNP Data Center 350-601 DCCOR Comments (0)Add comment Submit NEWEST RELEASES 08.10: Awesome Miner Ultimate 10.1.3 Multilingual 08.10: AutoClose Pro 3.4.5 Multilingual 08.10: Softwarenetz Rechnung 11.08 Multilingual 08.10: TunesBank Disney+ Downloader 1.5.6 (x64) Multilingual 08.10: IDimager Photo Supreme 2024.2.2.6668 (x64) Multilingual 08.10: Soundevice Digital Voxessor v3.0 08.10: Ableton Live Suite 11.3.35 (x64) Multilingual 08.10: Radiant Photo 2.0.0.523 Multilingual 08.10: Wise ImageX Pro 1.2.6.8 Multilingual 08.10: Red Rock Sound Comp 609 v4.0.4 Recommended Filehosts Freinds Site