Wednesday, 28 November 2012


The Computing Technology Industry Association (CompTIA), a non-profit trade association, was created in 1982 as the Association of Better Computer Dealers, Inc. (ABCD) by representatives of five microcomputer dealerships. Over the course of a decade, ABCD laid the groundwork for many of CompTIA’s initiatives and member benefits.

The A+ certification demonstrates competency as a computer technician. Officially, CompTIA A+ certification is a vendor neutral certification that covers numerous technologies and operating systems from such vendors as Microsoft, Apple Inc., Novell and some of the Linux distributions.

CompTIA_A+_Intro_Session. (Download)
CompTIA_A+_Session_01. (Download)
CompTIA_A+_Session_02. (Download)
CompTIA_A+_Session_03. (Download)
CompTIA_A+_Session_04. (Download)
CompTIA_A+_Session_05. (Download)
CompTIA_A+_Session_06. (Download)
CompTIA_A+_Session_07. (Download)
CompTIA_A+_Session_08. (Download)
CompTIA_A+_Session_09. (Download)
CompTIA_A+_Session_10. (Download)
CompTIA_A+_Session_11. (Download)
CompTIA_A+_Session_12. (Download)
CompTIA_A+_Session_13. (Download)
CompTIA_A+_Session_14. (Download)
CompTIA_A+_Session_15. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Tuesday, 20 November 2012

CCNP Course Slides

Cisco Certified Network Professional (CCNP) certification validates knowledge and skills required to install, configure, and troubleshoot converged local- and wide-area networks with 100 to 500 or more end-devices. A valid CCNA certification is required to obtain a CCNP certification.
Here are the CISCO slides for CCNP course:

PART - 1  Building Cisco Multilayer Switched Networks (BCMSN) v3.0

Course Goal : In this course, learners will find out how to create an efficient and expandable enterprise network by installing, configuring, monitoring, and troubleshooting network infrastructure equipment according to the Campus Infrastructure module in the Enterprise Composite Network Model.

Introduction. (Download)
Network Design. (Download)
VLAN. (Download)
Spanning Tree. (Download)
Inter-VLAN Routing. (Download)
Layer 3 Redundancy. (Download)
Wireless LAN. (Download)
Voice over IP. (Download)
Switch Security. (Download)

Admin Guide. (Download)
Lab Guide. (Download)

PART - 2 Building Scalable Cisco Internetworks (BSCI) v3.0 

Course Goal : To train network administrators on the techniques to plan, implement, and monitor a scalable IP routing network.

Introduction. (Download)
Network Design. (Download)
Enhanced Interior Gateway Routing Protocol (EIGRP). (Download)
Open Shortest Path First (OSPF). (Download)
Intermediate System To Intermediate System (IS-IS). (Download)
Redistribution, DHCP. (Download)
Border Gateway Protocol (BGP). (Download)
IP Multicast. (Download)
IPv6. (Download)

Admin Guide. (Download)
Lab Guide. (Download)

PART - 3 Implementing Secure Converged Wide Area Networks (ISCW) v3.0

Course Goal : The goal of the ISCW course is to expand the reach of the enterprise network to teleworkers and remote sites. The theme of implementing a highly available network with connectivity options, such as VPN and wireless, is highlighted.

Introduction. (Download)
Network Design. (Download)
Teleworker Connectivity. (Download)
Multiprotocol Label Switching (MPLS). (Download)
Internet Protocol Security (IPsec). (Download)
Device Hardening. (Download)
IOS Threat Defenses. (Download)

Admin Guide. (Download)
Lab Guide. (Download)

PART - 4 Optimizing Converged Cisco Networks (ONT) v3.0

Course Goal : The goal of the ONT course is to teach learners how to optimize their converged enterprise networks.

Introduction. (Download)
Network Design. (Download)
Voice over IP. (Download)
QoS Overview. (Download)
QoS Details. (Download)
AutoQoS. (Download)
Wireless Scalability. (Download)

Admin Guide. (Download)
Lab Guide. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Sunday, 18 November 2012

Computer Security : Principles & Practice Book Slides

Introduction to the book

A comprehensive treatment of computer security technology, including algorithms, protocols, and applications. Covers cryptography, authentication, access control, database security, intrusion detection and prevention, malicious software, denial of service, firewalls, software security, physical security, human factors, auditing, legal and ethical aspects, and trusted systems. Received the 2008 TAA award for the best Computer Science and Engineering Textbook of the year. This book provides coverage of all the subject areas specified for CISSP (Certified Information Systems Security Professional) certification.

Here are the slides of the book:
" Computer Security: Principles and Practice " by William Stallings & Lawrie Brown, 1st Edition.

Chapter - 1 : Overview. (Download)
Chapter - 2 : Cryptographic Tools. (Download)
Chapter - 3 : User Authentication. (Download)
Chapter - 4 : Access Control. (Download)
Chapter - 5 : Database Security. (Download)
Chapter - 6 : Intrusion Detection. (Download)
Chapter - 7 : Malicious Software. (Download)
Chapter - 8 : Denial of Service. (Download)
Chapter - 9 : Firewalls and Intrusion Prevention Systems. (Download)
Chapter - 10 : Trusted Computing and Multilevel Security. (Download)
Chapter - 11 : Buffer Overflow. (Download)
Chapter - 12 : Other Software Security Issues. (Download)

Chapter - 13 : Physical and Infrastructure Security. (Download)
Chapter - 14 : Human Factors. (Download)
Chapter - 15 : Security Auditing. (Download)
Chapter - 16 : IT Security Management and Risk Assessment. (Download)
Chapter - 17 : IT Security Controls, Plans and Procedures. (Download)
Chapter - 18 : Legal and Ethical Aspects. (Download)

Chapter - 19 : Symmetric Encryption and Message Confidentiality. (Download)
Chapter - 20 : Public-Key Cryptography and Message Authentication. (Download)


Chapter - 21 : Internet Security Protocols and Standards. (Download)
Chapter - 22 : Internet Authentication Applications. (Download)

Chapter - 23 : Linux Security. (Download)
Chapter - 24 : Windows Security. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Saturday, 17 November 2012

Network Security Essentials Book Slides by William Stallings

Introduction to the book

A tutorial and survey on network security technology. The book covers important network security tools and applications, including S/MIME, IP Security, Kerberos, SSL/TLS, SET, and X509v3. In addition, methods for countering hackers and viruses are explored.

Here are the slides for the book:
" Network Security Essentials : Applications and Standards " by William Stallings, 4th Edition.

Chapter 1 - Overview. (Download)
Chapter 2 - Conventional Encryption and Message Confidentiality. (Download)
Chapter 3 - Public-Key Cryptography and Message Authentication. (Download)
Chapter 4 - Authentication Applications. (Download)
Chapter 5 - Electronic Mail Security. (Download)
Chapter 6 - IP Security. (Download)
Chapter 7 - Web Security. (Download)
Chapter 8 - Network Management Security. (Download)
Chapter 9 - Intruders and Viruses. (Download)
Chapter 10 - Firewalls. (Download)

The set of slides are prepared by Henric Johnson at Blekinge Institute of Technology, Sweden.

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Thursday, 15 November 2012

Antenna Theory Analysis and Design Book Slides by Balanis

An antenna (or aerial) is an electrical device which converts electric power into radio waves, and vice versa. It is usually used with a radio transmitter or radio receiver. In transmission, a radio transmitter supplies an oscillating radio frequency electric current to the antenna's terminals, and the antenna radiates the energy from the current as electromagnetic waves (radio waves). In reception, an antenna intercepts some of the power of an electromagnetic wave in order to produce a tiny voltage at its terminals, that is applied to a receiver to be amplified.    Source (Wikipedia)

Here are the slides containing lecture notes for the famous book about Antennas:
" Antenna Theory : Analysis and Design " by Constantine A. Balanis, 3rd Edition.

Chapter 1. Antennas. (Download)
Chapter 2. Fundamental Parameters of Antennas. (Download)
Chapter 3. Radiation Integrals and Auxiliary Potential Functions. (Download)
Chapter 4. Linear Wire Antennas. (Download)
Chapter 5. Loop Antennas. (Download)
Chapter 6. Arrays: Linear, Planar, and Circular. (Download)
Chapter 7. Antenna Synthesis and Continuous Sources. (Download)
Chapter 8. Integral Equations, Moment Method, and Self and Mutual Impedances. (Download)
Chapter 9. Broadband Dipoles and Matching Techniques. (Download)
Chapter 10. Traveling Wave and Broadband Antennas. (Download)
Chapter 11. Frequency Independent Antennas, Antenna Miniaturization and Fractal Antennas. (Download
Chapter 12. Aperture Antennas. (Download)
Chapter 13. Horn Antennas. (Download)
Chapter 14. Micro-strip Antennas. (Download)
Chapter 15. Reflector Antennas. (Download)
Chapter 16. Smart Antennas. (Download)
Chapter 17. Antenna Measurements. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Tuesday, 13 November 2012

Digital Fundamentals Book Slides by Floyd

Here are the slides for the book :
" Digital Fundamentals " by Thomas L. Floyd, 9th Edition

Chapter 1: Digital Concepts. (Download)
Chapter 2: Number Systems, Operations, and Codes. (Download)
Chapter 3: Logic Gates. (Download)
Chapter 4: Boolean Algebra and Logic Simplification. (Download)
Chapter 5: Combinational Logic Analysis. (Download)
Chapter 6: Functions of Combinational Logic. (Download)
Chapter 7: Latches, Flip-Flops, and Timers. (Download)
Chapter 8: Counters. (Download)
Chapter 9: Shift Registers. (Download)
Chapter 10: Memory and Storage. (Download)
Chapter 11: Programmable Logic and Software. (Download)
Chapter 12: Introduction to Digital Signal Processing. (Download)
Chapter 13: Introduction to Computers. (Download)
Chapter 14: Integrated Circuit Technologies. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.

Read more ...

Monday, 12 November 2012

Wireless Communications and Networks book slides by William Stallings

Here are the original slides for the book :
" Wireless Communications and Networks " by William Stallings

Chapter 1 - Introduction. (Download)
Chapter 2 - Transmission Fundamentals. (Download)
Chapter 3 - Communication Networks
. (Download)
Chapter 4 - Protocols and the TCP/IP Suite
. (Download)
Chapter 5 - Antennas and Propagation
. (Download)
chapter 6 - Signal Encoding Techniques
. (Download)
Chapter 7 - Spread Spectrum
. (Download)
chapter 8 - Coding and Error Control. (Download)
Chapter 9 - Satellite Communications. (Download)
Chapter 10 - Cellular Wireless Communications
. (Download)
Chapter 11 - Cordless Systems and Wireless Local Loop
. (Download)
Chapter 12 - Mobile IP and WAP
. (Download)
Chapter 13 - Wireless LAN Technology
. (Download)
Chapter 14 - IEEE 802.11 Wireless LAN Standard
. (Download)
Chapter 15 - Bluetooth
. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.

Read more ...

Friday, 9 November 2012

Certified Ethical Hacker - CEH V7 Slides

The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)
An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not. (Source : Wikipedia )

You can download CEH V7 Slides from the following links:

CEH V7 Module 01 - Introduction to Ethical Hacking. (Download)
CEH V7 Module 02 - Footprinting and Reconnaissance. (Download)
CEH V7 Module 03 - Scanning Networks. (Download)
CEH V7 Module 04 - Enumeration. (Download)
CEH V7 Module 05 - System Hacking. (Download)
CEH V7 Module 06 - Trojans and Backdoors. (Download)
CEH V7 Module 07 - Viruses and Worms. (Download)
CEH V7 Module 08 - Sniffers. (Download)
CEH V7 Module 09 - Social Engineering. (Download)
CEH V7 Module 10 - Denial of Service. (Download)
CEH V7 Module 11 - Session Hijacking. (Download)
CEH V7 Module 12 - Hacking Webservers. (Download)
CEH V7 Module 13 - Hacking Web Applications. (Download)
CEH V7 Module 14 - SQL Injection. (Download)
CEH V7 Module 15 - Hacking Wireless Networks. (Download)
CEH V7 Module 16 - Evading IDS, Firewalls and Honeypots. (Download)
CEH V7 Module 17 - Buffer Overflows. (Download)
CEH V7 Module 18 - Cryptography. (Download)
CEH V7 Module 19 - Penetration Testing. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Wednesday, 7 November 2012

Cryptography and Network Security Book Slides

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.(Source : Wikipedia)

Cryptography and Network Security Book Slides

Here are the original slides for the book :

" Cryptography and Network Security " by William Stallings.

Chapter 1 – Introduction. (Download)

Part One: Symmetric Ciphers

Chapter 2 – Classical Encryption Techniques. (Download)
Chapter 3 – Block Ciphers and the Data Encryption Standard. (Download)
Chapter 4 – Finite Fields. (Download)
Chapter 5 – Advanced Encryption Standard. (Download)
Chapter 6 – More on Symmetric Ciphers. (Download)
Chapter 7 – Confidentiality Using Symmetric Encryption. (Download)

Part Two: Public-Key Encryption and Hash Functions

Chapter 8 – Introduction to Number Theory. (Download)
Chapter 9 – Public-Key Cryptography and RSA. (Download)
Chapter 10 – Key Management; Other Public-Key Crypto-systems. (Download)
Chapter 11 – Message Authentication and Hash Functions. (Download)
Chapter 12 – Hash and MAC Algorithms. (Download)
Chapter 13 – Digital Signatures and Authentication Protocols. (Download)

Part Three: Network Security Applications

Chapter 14 – Authentication Applications. (Download)
Chapter 15 – Electronic Mail Security. (Download)
Chapter 16 – IP Security. (Download)
Chapter 17 – Web Security. (Download)

Part Four: System Security

Chapter 18 – Intruders. (Download)
Chapter 19 – Malicious Software. (Download)
Chapter 20 – Firewalls. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Tuesday, 6 November 2012

Computer Architecture and Organization Book Slides

In computer science and engineeringcomputer architecture refers to specification of the relationship between different hardware components of a computer system.

Here are the slides for the great book :
"Computer Architecture and Organization : Designing For Performance", by William Stallings, 7th Ed.

Chapter 1 - Introduction. (Download)
Chapter 2 - Computer Evolution and Performance. (Download)
Chapter 3 - System Buses. (Download)
Chapter 4 - Cache Memory. (Download)
Chapter 5 - Internal Memory. (Download)
Chapter 6 - External Memory. (Download)
Chapter 7 - Input/Output. (Download)
Chapter 8 - Operating System Support. (Download)
Chapter 9 - Computer Arithmetic. (Download)
Chapter 10 - Instruction Sets : Characteristics and Functions. (Download)
Chapter 11 - Instruction Sets : Addressing Modes and Formats. (Download)
Chapter 12 - CPU Structure and Function. (Download)
Chapter 13 - RISC (Reduced Instruction Set Computers). (Download)
Chapter 14 - Instruction Level Parallelism and Super Scalar Processors. (Download)
Chapter 15 - IA - 64 Architecture. (Download)
Chapter 16 - Control Unit Operation. (Download)
Chapter 17 - Micro-programmed Control. (Download)
Chapter 18 - Parallel Processing. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.

Read more ...

Sunday, 4 November 2012

Digital Design Using VHDL Course

Course Outlines

  • Introduction to VHDL
  • Statements in VHDL
  • Sequential Statements
  • Concurrent Statements
  • Data Objects
  • Data Operators
  • Data types
  • FSM finite state machines
  • Structural Description
  • Testbench
  • Introduction to FPGA
  • Implementation on FPGA

Tools Used during course

You can download this course here :

- Introduction to VHDL
- ASIC & FPGA Design flow
- How to read and write VHDL code
- Library and package
- Entity
- Basic data types
- Architecture

- Combinational vs Sequential 
- Data Objects
     - Signals
VHDL Statements
     - Sequential Statements
        - What is Process 
        - IF Statement
        - CASE Statement
- Combinational Logic
- Sequential Logic

- Concurrent Statements
      1-Assign Statement 
- Data Objects

- Data Operators
      - Aggregate
      - Concatenation
      - Attributes

- Data Types
      - Scalar
      - Composite
      - User defined

- Finite State Machine
      - What is FSM?
      - Moore machine
      - Mealy machine
      - FSM in VHDL

- Structural Description
- Generic Statements
- Packages
- Generate Statements
            -For Generate

- Arithmetic Circuits
- Tutorial [2] 
        - IP Cores
        - ISIM Simulator
        - Language Templates
- VHDL Coding TIPS

- Sequential Statements
      - Loops For-While
      - Next-Exit Statements
      - Wait Statement
      - Null Statement
      - Assert Statement
      - Functions
      - Procedures 
- Test Benches
- Dealing with Files
- Modelsim and Do Files

- Test bench example
- ASIC & FPGA Design flow
- implementation phases 
- FPGA Architecture
      - Demo programming FPGA SP3

Please feel free to leave a comment if there is a dead link or a problem with the links.

Read more ...

Saturday, 3 November 2012

CISCO CCNA Networking Courses

CCNA (Cisco Certified Network Associate) is a certification from Cisco. CCNA certification is a first-level Cisco Career certification. CCNA certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN.

Cisco CCNA Networking 1

Module 1 – Introduction to Networking. (Download)
Module 2 – Networking Fundamentals. (Download)
Module 3 – Networking Media. (Download)
Module 4 – Cable Testing. (Download)
Module 5 – Cabling LANs and WANs. (Download)
Module 6 – Ethernet Fundamentals. (Download)
Module 7 – Ethernet Technologies. (Download)
Module 8 – Ethernet Switching(Download)
Module 9 – TCP/IP Protocol Suite and IP Addressing(Download)
Module 10 – Routing Fundamentals and Subnets(Download)
Module 11 – TCP/IP Transport and Application Layer(Download)

Cisco CCNA Networking 2

Module 1 - Wans(Download)
Module 2 – Introduction To Routers(Download)
Module 3 – Configuring A Router(Download)
Module 4 – Learning About Other Devices(Download)
Module 5 – Managing Cisco IOS Software(Download)
Module 6 – Routing and Routed Protocols(Download)
Module 7 – Distance Vector Routing Protocols(Download)
Module 8 – TCP/IP Suite Error and Control Messages(Download)
Module 9 – Basic Router Troubleshooting(Download)
Module 10 – Intermediate TCP/IP(Download)
Module 11 – Access Control Lists (ACL)(Download)

Cisco CCNA Networking 3

Module 1 – Introduction to Classless Routing(Download)
Module 2 – Single Area OSPF(Download)
Module 3 – EIGRP(Download)
Module 4 – Switching Concepts(Download)
Module 5 – Switches(Download)
Module 6 – Switch Configuration(Download)
Module 7 – Spanning-Tree Protocol(Download)
Module 8 – Virtual Lans(Download)
Module 9 – VLAN Trunking Protocol(Download)

Cisco CCNA Networking 4

Module 1 – Scaling IP Addresses(Download)
Module 2 -  WAN Technologies(Download)
Module 3 – PPP(Download)
Module 4 – ISDN and DDR(Download)
Module 5 – Frame Relay(Download)
Module 6 – Introduction to Network Administration(Download)

Miscellaneous Power-points

Classless Sub-netting. (Download)
Discard Routes. (Download)
ICMP Ping Trace. (Download)
The Routing Table. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

Friday, 2 November 2012

Vodafone GSM & GPRS Overview

Vodafone GSM Course Contents :

Vodafone GSM Course

Chapter-1 : Introduction.
Chapter-2 : Basic GSM Network Structure.
Chapter-3 : Radio Coverage.
Chapter-4 : Radio Transmission Problems.
Chapter-5 : Air Interface.
Chapter-6 : Traffic Cases.
Chapter-7 : GSM Services.

Download Here

Vodafone GPRS Course Contents :

Vodafone GPRS Course

Chapter-1 : Introduction.
Chapter-2 : GPRS Air Interface.
Chapter-3 : GPRS BSS.
Chapter-4 : GPRS backbone Network.
Chapter-5 : Traffic Cases.
Chapter-6 : GPRS Charging.

Download Here

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...

VHDL Course

introduction to VHDL

The VHSIC (Very High Speed Integrated Circuits) Hardware Description Language is an industry standard language used to describe hardware from the abstract to the concrete level. In 1986, VHDL was proposed as an IEEEstandard. It went through a number of revisions and changes until it was adopted as the IEEE 1076 standard in December 1987, Then VHDL 1076-1993 and the latest VHDL 1076-2002.

Here I introduce an easy introduction Course to VHDL divided in 6 parts :

Part-1 : Introducing VHDL. (Download Here)
  • Introduction.
  • Levels of representation.
  • Structure of a VHDL file.
Part-2 : Modeling in VHDL. (Download Here)
  • Behavioral Modeling.
  • Sequential Modeling.
Part-3 : Concurrent Statements. (Download Here)
  • Simple Concurrent Signal Assignments.
  • Conditional Signal Assignments.
  • Selected Signal Assignments.
  • Structural Modeling.
  • Component Declaration.
  • Component Instantiation.
Part-4 : Data objects. (Download Here)
  • Constants.
  • Variables.
  • Signals.
  • Signals vs. Variables.
Part-5 : Combinational Circuit Design Example. (Download Here)
  • Full Adder Circuit.
Part-6 : Sequential Circuit Design Example. (Download Here)
  • Counter using JK Flip-Flops.

ALTERA VHDL Online Course

Altera made a nice presentation for learning the basics of the VHDL language in just 1.5 hours and it's for free, you need only to register and you can run the course online .

>> Objectives of the course :
  1. Construct complete VHDL models .
  2. Generate Logic functions using the VHDL .
  3. Create hierarchical VHDL designs.
>> Course outlines:
  1. VHDL introduction.
  2. Design units.
  3. Architecture modeling fundamentals.
  4. VHDL logic synthesis.
  5. Hierarchical designing.

Please feel free to leave a comment if there is a dead link or a problem with the links.
Read more ...