Your cart is empty!
Linux + introduces learners to Linux, an open-source operating system which is available to anyone seeking an alternative to mainstream operating systems. This course will cover Linux fundamentals such as; installing and configuring Linux, securing Linux, managing files and directories, configuring storage, scripting, containers, automating tasks, networking, and troubleshooting Linux. These topics are presented in a distribution agnostic manner which is suitable for all distributions of...
This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies. Learners will explore how to troubleshoot various network issues effectively. The course will examine critical aspects of network security necessary to protect against a wide range of threats.
PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification. In this course, you will learn how to assess the security posture of an enterprise environment, enabling you to recommend and implement appropriate security solutions. You will delve into the intricacies of monitoring and securing hybrid environments, covering cloud, mobile, and Internet of Things (IoT) technologies. Our...
In today’s world of complex IT systems and technologies it is essential that IT professionals and those new to IT are able to demonstrate how to use and understand vendor products and software. With this complete course you can develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. With the ease and convenience of the Internet we provide you with the knowledge and skills needed to successfully install, operate and...
In this time of growing technology and increased digital use, having a strong understanding of the basics of using a computer is essential. In this course, we will cover the fundamentals of operating systems including describing their importance and how you can best use them to be productive. We will discuss networking and the terminology most commonly used when discussing computers. Finally, we will explore working with software and introduce you to some of the basic troubleshooting steps to...
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual...
This course will show and help the learner to configure common TCP/IP settings in Windows clients. Following the course, the learner will be able to install, configure, manage as well as troubleshoot wired and wireless network settings on Windows clients.
This course will show and help the learner to configure local storage in Windows clients. Following the course, the learner will be able to configure, manage and optimize storage drives, as well as format Windows volumes with file systems such as NTFS, FAT32, and ReFS. Finally, the learner will be able to configure and manage file and folder permissions in Windows.
As the title suggests this series looks at customer service skills, specifically for those in a technical role. This series explores the world of interpersonal skills, as well as principles for effective communication and also takes a look at the most common issues reported to the Service Desk. This series is intented for those with a passion for good customer service; those who want to improve their communication skills, as well as those who are looking at a career in a service desk...
Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.
CyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. In this course you will be introduced to the program, competition and basic skills needed to compete. This course should be used as a supplement to tools provided by your Coach, Technical Mentor, and resources covered in these videos. There are a great deal resources available to prepare you. Please take advantage of them.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and...
This program, offered by our accredited school partners, consists of the following:Security +CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in Network Security, Compliance and Operational Security, Threats and Vulnerabilities, Application, Data and Host Security, Access Control and Identity Management...
This self-paced, online Data Analyst Career Certificate Program provides you a college career certificate and the knowledge, practical experience, competency and confidence to qualify for high-paying data analyst jobs. Data Analysts are professionals who collect, process, and perform analyses on enterprises’ huge quantities of data to help them make better and faster business decisions. Virtually all enterprises now have reached “data overload” and need data analysts to help them make sense of...
In this series, we take a look at common formats for saving, reading, and shuffling data around such as Comma Separated Values (CSV), JavaScript Object Notation (JSON), YAML Ain't Markup Language (YAML), and eXtensible Markup Language (XML). If you want to know more about these data formats as well as how to interact with these different data representation using Python, then we will see you there!
The demand for skilled IT professionals is rapidly growing. If you are interested in a dynamic career in a high paced technology profession, this course is for you. This course provides a look into becoming an IT professional and the day to day responsibilities of technology specialists. We will take a deep dive into the training and requirements for pursuing a successful career in this field. Lastly, this course will look at the evolution, current trends, and facts of working in the IT...
This series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services. Other topics addressed include DNS security, replication, and popular server software including BIND and Microsoft Windows DNS.
This is a non-technical course designed for every end user. Our experts explain very common security topics that are critical to be aware of in today’s work environment, but explains in the “end-users” non-technical language, so everyone can understand. Many stories are told as examples for easier understanding. One might think this is super easy and doesn’t go deep on topics, but you would be wrong, this course is a perfect fit for everyone to understand and prevent security risk.
Are you looking to improve your understanding of how to use a computer and get up to speed quickly on the newest version of Microsoft Office? This course offers easy instructions to help you master the Office software and gives you the fundamental skills needed to use a computer for either professional or personal tasks. In the first portion of this course you will explore the basics of computer use including how to pick the right computer for your needs, determine what equipment you need,...
El curso de fundamentos de la informática capacita al usuario en los conceptos básicos del uso de la computadora. Esto incluye describir los diferentes equipos que se encuentran más comúnmente en el uso diario, configurar una conexión de red, explorar los navegadores web populares, definir y configurar un sistema operativo y cubrir el panel de control de la computadora donde los usuarios pueden personalizar la configuración de sus máquinas. Con este curso, los estudiantes obtendrán un curso...
In this series, we are going to learn the basics of using the command-line interface. If you have ever been scared when the cursor shows up on a seemingly blank screen or wondered what the Terminal or cmd application can accomplish, then stay tuned to learn the basics and increase your productivity.
In this course, Getting your Data into Splunk Effortlessly, you will learn about the many ways there are to configure data inputs into your Splunk Enterprise deployment. These methods include monitoring folders or files, using network inputs (UDP/TCP), using scripted inputs, and even using agentless solutions like the HTTP Event Collector. This course is critical to your understanding and use of Splunk as clearly Splunk is only as valuable as it is complete with its data from your...
GIAC is a registered trademark of the Escal Institute of Advanced Technologies, Inc. SANS is not affiliated with these courses. GIAC has been an industry leader in information security certifications for years. The GIAC Security Essentials (GSEC) is designed for Security Professionals who want to demonstrate that they are qualified for IT systems hands-on roles with respect to security tasks. GSEC is one of the DoDD Approved 8140 / 8570 Baseline Certifications for IAT Level II.
The Google Cloud Platform - Associate Cloud Engineer course targets those individuals looking to learn to deploy applications in the Google Cloud Platform. The course also assists learners in how to monitor operations and manage enterprise-scale solutions. This course also ensures the learner understands how to use both the Google Cloud Console as well as the command-line interface to perform solution deployment, maintenance, and monitoring. While it thoroughly prepares its students for the...
BGP is the protocol that routes the internet. This show will introduce you to BGP as the protocol of the internet, how to get it up and running and then verify that you have BGP working. Though the configuration is simple. The choices you have to route are all dependent upon policy decisions you make.
When you are planning, creating, and managing networks, some of the tasks can be repetitive and time consuming. Scripting allows you to automate these tasks to allow for reproducibility, scaling to larger systems, and collaborating with others use versioning. In this series, we will see how to utilize Python to make your life as a networking professional a little easier. See you there.
The GNS3 Essentials short series that will help you to get GNS3 up and running so that you get networking devices virtualized so that you can simulate a lab environment or a production scenario. You will learn what is required, as well as how to install it for your best use. Using Dynamips images (Cisco IOS) and Cisco VIRL images, you'll see how to add devices to make GNS3 more functional.
The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other. Microsoft now brings together the most important collaboration capabilities that your enterprise needs in order to enable you to invite everyone you work...
The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Microsoft now brings together Configuration Manager and Intune, without a complex migration, and with simplified licensing, allowing you to manage your devices anytime and from anywhere, on-prem,...
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
HTML5 Canvas elements bring art and animation to the browser. In this series, we explore the capabilities of the HTML5 Canvas element in conjunction with JavaScript. This includes simple "pen" drawings, image displaying, image manipulation, and animations. Knowing HTML5 Canvas provides a great way to start with in-browser games as well as expressing those artistic desires. Hope to see you there!
The Implement Enterprise Spunk for your Business course seeks to get students up and running quickly with Splunk Enterprise. This course begins with a look at the fundamentals of Splunk as an important component in the business processes of a modern organization. We review the main components of Splunk and just how remarkable this product can become for your business. This course then dives deep into the configuration, maintenance, and support of Splunk operations for a modern company. This is...
In this series, Justin takes a look at AngularJS, a web framework that has been around for a while. He demonstrates the use of the basics of AngularJS as well as discusses preferred practices for creating application code as well as organizing code. Some of the topics that he discusses are: the use of controllers, what is $scope and how to eliminate the use of $scope, using the built-in directives to render lists, handle events, and dynamically style your application. If you are interested in...
Administering and configuring infrastructure is a necessary but sometimes very difficult undertaking. Manual configuration of infrastructure is a full time job that takes away from other valuable activities that is prone to errors and difficulties in reproducing system state. Ansible allows one to create plans for managing infrastructure using an agentless (no outside system required) approach. During this show we will cover what Ansible is, how to set up Ansible, and use Ansible to create...
Docker is a set of tools that provide a runtime for creating, managing and orchestrating containers. Docker provides the ability for developers, system admins, or hobbyists to provision a container that can be configured as similarly to a virtual machine without all of the resource intensity. This series introduces the usage of the Docker client to run containers, managing the Docker daemon, using Docker Machine for provisioning runtime environments for the Docker toolset, Docker Compose for...
Version control is a cryptic yet essential part of a software development team. Git is a distributed version control system that allows collaboration and management of large scale software products (as well as other types of projects). In this series, you will get started with Git. You will be shown how to create a repository, save changes in the repo, link to a remote server (GitHub), and finally a basic collaboration workflow. If you are just getting started in software development or you...
The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. You may find some of these gadgets on your corporate network even though they don’t always have the same level of built-in security you’d require for your traditional endpoints. By penetration testing these devices, you’re able to more effectively assess potential vulnerabilities, thus improving your overall security posture....
NodeJS has brought JavaScript to the server as well as the desktop programming environments. With this escape from the browser, JavaScript provides the ability to leverage your understanding of JavaScript to create new and powerful applications. If you want to power up your understanding of JavaScript using the NodeJS platform then join us!
In this series, we cover the basics of using NumPy for basic data analysis. Some of the things that are covered are as follows: installing NumPy using the Anaconda Python distribution, creating NumPy arrays in a variety of ways, gathering information about large datasets such as the mean, median and standard deviation, as well as utilizing Jupyter Notebooks for exploration using NumPy. If you are looking to get started with NumPy then join us!
When it comes to developing websites, one of the most popular languages is PHP. Over 80% of the websites that you regularly visit are created using PHP. With popular frameworks, such as WordPress and Laravel, continuing to gain popularity, now is a great time to begin learning this fast, flexible, and easy to learn language.
In this series, Justin and John walk through the beginning of learning ReactJS. John focuses on the prerequisite knowledge such as features of the JavaScript language that you should be familiar with, usage of build tools such as Webpack to develop and produce builds, as well as the nuance features of React. Over the course of the series, John takes a simple, plain JavaScript application and shows how to construct that same application using React.
Redux is the implementation of the Flux pattern which is best know as a proposal by Facebook for organizing complex web applications. However, getting started with Redux in the context of building complex applications can be a little intimidating. In this series, Redux architecture will be treated from the ground up, starting with a simple Node application that demonstrates the use of a single reducer, a simple store, and a basic set of operations using the store. As the series progresses, we...
Ruby on Rails is a web development framework built upon the Ruby programming language. This series covers the basics of Ruby on Rails including but not limited to: what is Ruby on Rails, getting the environment set up, creating a simple web application the Ruby on Rails way, and diving a little deeper into the methodology used in a Rails application. If you are looking to get started with Ruby on Rails, then we will see you there!
WordPress powers over 29% of all the websites on the internet. WordPress powers everything from blogs and company sites to SAAS apps and mobile apps. With WordPress only growing in popularity each year, now is a great time to get started with this CMS and framework!
This program is an introduction to the top programming languages including Python, C++, C#, JavaScript, Java, and Ruby. In this course, learners will explore the fundamentals and tools of each of these languages. This course also includes training in CompTIA's entry-level certification A+, which will provide learners without previous experience or exposure to the fundamentals of computers the knowledge and skills required for any career in IT. This includes skills with computer hardware and...
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again. The progression of this course follows the Practice Labs environment for the same certification so there are supplements to each of those labs. Some of the topics that we are going to cover are: using basic data types and assigning those to variables, learning operations that can be applied to each of...
Markdown is a alternative to other markup languages such as HTML. There is a version that is a little more 'fancy' called GitHub Flavored Markdown. In this series, you will find out what GitHub-Flavored Markdown is as well as how to accomplish quick format tasks that simplify creating structure and some styling.