Your cart is empty!
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system. Upon completing the course you will be familiarized with open source software, the Linux operating system and executing commands from the Linux command line. You will also gain foundation skills in Linux networking, security and administration. This course serves as a stepping stone to the LPIC-1 Linux Administrator certification.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system. This course is intended for users who are interested in learning about Linux, but have no previous exposure to the operating system. The series starts with a description of Linux and its history and then moves on to cover the graphical user interface and basic operations of the OS.
The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment. Companies are relying less and less on dedicated hardware and are instead turning to shared hardware to optimize resource utilization and increase deployment flexibility. The hosts demonstrate virtualizing Linux using technologies like KVM and Docker as well as public cloud deployments using Amazon EC2 and Microsoft Azure.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 101-500 exam focuses on understanding the Linux system architecture, managing software, basic GNU commands, and the Linux file system hierarchy.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 102-500 exam expands upon the topics covered in 101-500 with more detailed usage of many commands, scripting, troubleshooting and security.
The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks. The 201-450 exam focuses on measuring and scaling system performance, configuring the Linux bootloader, advanced storage and network configurations, and other system maintenance tasks.
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment. Topics covered configuring Linux to act as a web server, name server, email server, file server, or VPN server. This course is accompanied by the 201-450 course which combine to cover the LPIC-2 exam.
This course will show and help the learner to install, deploy and the Windows client operating system. Following the course, the learner will be able to install, configure and manage Hyper-V on Windows clients as well as how to configure and customize Windows client settings.
This course will show and help the learner to manage Windows client operating systems. Following the course, the learner will be able to configure, manage and recover the Windows client operating system, as well as configure Windows updates and remote management technologies. Finally, the learner will be able to examine performance monitoring, event logging, and automate tasks.
The Managing Microsoft Teams course is designed for Microsoft Teams Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other. The Teams Administrator must be able to plan, deploy, and manage Teams chat, apps, channels, meetings, audio conferencing, live events, and...
Microsoft Endpoint Manager is a very powerful option for managing your end devices from a cloud-based management system. Microsoft Endpoint Manager houses two important platforms - Microsoft Endpoint Configuration Manager (formerly SCCM) and Microsoft Intune. These two products can work together to provide co-management to all of your endpoint devices. Endpoint devices include desktops, laptops, phones, tablets, televisions, and more. Thanks to Microsoft Endpoint Manager and Microsoft Intune,...
In this course, you will learn foundational-level knowledge of the considerations and benefits of adopting cloud services in general and the Software as a Service (SaaS) cloud model. You will also learn about available options and benefits gained by implementing Microsoft 365 cloud service offerings.
The Azure Administrator Associate certification is a way to validate your knowledge in implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment. This course will cover the objectives outlined by Microsoft to prepare you to take the Microsoft Azure Administrator exam.
This series will help you prepare for the Exam AZ-900: Microsoft Azure Fundamentals. This exam is designed for candidates looking to demonstrate foundational-level knowledge of cloud services and how those services are provided with Microsoft Azure.
This course will prepare learners that implement, manage and monitor security for Azure, hybrid and multi-cloud environments. In this course we will explore managing identity and access in Azure, planning and implementing and securing networking. We will explore and prepare the learner to securing, Azure Compute, Azure Storage and Azure Databases.
This course will help the learner implement and configure Windows client deployments using various tools such as Autopilot, the Microsoft Deployment Toolkit and more. Following the course, the learner will be able to plan and implement Window operating system deployment, provisioning, configuration, and remote management.
This course, offered by our accredited school partners, covers the basics of using SharePoint for end users in Office 365. Students will first get an overview of SharePoint and then learn how to create their first site. They will then learn about adding content to the team sites and searching for content.In this course you will learn:*SharePoint Overview*Creating Your First Site*Adding Content to the Team Site | Searching for ContentEach class session is presented in full motion audio/video,...
Power BI is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Your data may be an Excel spreadsheet, or a collection of cloud-based and on-premises hybrid data warehouses. Power BI lets you easily connect to your data sources, visualize and discover what's important, and share that with anyone or everyone you want. Want to learn more about how to use Power BI and the...
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.
This course covers the basic functions and features of Word 2016. Students will learn about formatting text and paragraphs, managing lists, adding tables, and inserting graphicobjects. They will also learn how to control page appearance and prepare to publish a document. This course covers the intermediate functions and features of Word 2016. In this series students will learn about organizing with tables and charts, customizing with styles and themes, and controlling the flow of a document....
This course is for anyone interested in getting started in networking. The course will introduce the viewer to a wide range of networking concepts such as infrastructure, hardware, standards, specifications, and addressing.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data. In this course, you will apply the NIST Cybersecurity and Risk...
In this series we will be covering the use of network mapper utility aptly called Nmap. This series aims to give the viewer a firm grasp of the concepts and applications inherent to Nmap, such as Host Discovery, Port Scanning, Service/OS/Version Detection, and the Nmap Scripting Engine(NSE) for the purposes of security and general network administration.
In this series, Mark and Justin walk you through the hoops and hurdles of the Java syntax by providing examples and common mistakes and shortcuts you'll be faced with. By the end you'll have an understanding of all of the syntax as well as common Java tools. You will have built feature-filled programs to simplify your life and wrangle the challenges of junior programming jobs, so if you're ready to learn Java as a first or second programming language then join us!
In this series, Vonne and Justin explore the intricate world of Object-Oriented Programming(OOP), particularly in the context of the Python programming language. Starting with the basics of OOP, Justin demonstrates the creation of classes and associated objects from those classes. Moreover, Justin demonstrates the use of Inheritance of classes to reduce code repetitiveness in an effort to adhere to the Don't Repeat Yourself (DRY) principle. Lastly, Justin builds a simple OOP centric text-based...
The PC Maintenance 2020 course is designed with the average non-technical user in mind. The goal of this course is to demystify the language of basic PC maintenance, while empowering the viewer with the ability to perform basic tasks to help maintain their PC without all of the technical jargon that is usually associated computing technology. The viewer will look at maintaining storage devices, reducing dust and debris, firmware updates, component replacement, startup and networking issues and...
This show covers the basics of pfSense, the "World's Most Trusted Open Source Firewall". It will help IT professionals to install, configure and manage & maintain the rich features in pfSense 2.4.4 for a production environment. It will also be helpful to the novice IT professional who needs to start working with a firewall
This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks. We will start with the basics, getting PowerShell installed and configured. Then we will cover basic PowerShell scripting concepts and various PowerShell statements make up the foundational knowledge needed to write PowerShell scripts. After this we will apply the skills you've learned in some practical applications.
In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You'll see what it takes to properly pre-engage for an assessment, explore the necessary legal documents, scope the client's systems, build the right engagement toolkit, perform vulnerability assessment and exploitation, collaborate and...
Have you wanted to see what this programming thing is all about? Do you have issues figuring out where to start? Well, this course will show you how to get things set up and start with the basics of programming using the Python programming language. If you want to set up your machine, understand the basics of Python, and start understanding the basic tenets of programming, then please join us!
Python has a set of protocols that the language internally adhere to which provides the functionality for features such as iteration, context manager behavior, string representation of an object, and many other things. When you create custom classes in Python and make use of these protocols then you can create custom behavior in the context of iterations, types, comparison of objects, operator overloading, and much more. Knowing about these will help level up your Python skills. If you are...
This self-paced online Python Developer Career Certificate Program provides you the knowledge, practical experience, competency, and confidence to qualify for high-paying Python Programmer jobs. The program is suitable for anyone seeking to enhance their career or looking for a new career in a high-demand occupation. Python development is a rapidly growing field where the demand for qualified candidates far outstrips the supply. Python is the most popular programming language for applications...
Python is a great language for learning, writing web applications, and manipulating data. However, Python can be used for security testing as well. In this series, we will explore the use of Python in such concepts as brute force password cracking, making SSH connections programmatically, creating socket connections and port scanner a particular host, banner grabbing from open ports, and more. If that sounds interesting to you, then please join us!
In this series, Daniel and Justin walk you through an in-depth primer on the Python programming language. Whether you have some other programming experience or you are completely new to coding, you will be given the tools necessary to get started writing programs with Python. They cover topics like printing output to the screen, assigning and utilizing variables, getting input from the user, decision making, iteration/loops, creating lists, dictionaries, and tuples, using and creating...
The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform. The course is targeted towards systems administrators tasked with supporting Linux and expects the viewer to already have a working understanding of the Linux operating...
Welcome to the Red Team Blue Team Fundamentals Practice Lab. After completing this title, you will have gained an understanding of cybersecurity fundamentals and how to protect IT systems from common cyberattacks. This knowledge will also help you prepare for Capture the Flag, or CTF, events using cyber ranges. This title covers topics like: Nmap Network Scanning Techniques; Man-in-the-Middle Exploits; Malware Protection; and more. During the first 15 modules, you will gain practical...
In this series, we creates a RESTful API using the Express web application framework. Justin review the process of setting up a Node-based project as well as installing the Express Node module. After that, Justin discusses important concepts and processes that are key in developing a RESTful API such as creating routes that correspond to data resources, data modeling of those resources, use of middleware to make the API a little more robust, and adding a persistence layer to the API. RESTful...
In this series the learner will be introduced to concepts in cybersecurity, such as the core principles of security, wired and wireless network security. The learner will explore topics like operating system security and security software and more.
What kind of activities do data scientists do? What roles are there are what skills do they require? This overview gives you a high level introduction to the terms, tools and activities used in data science as well as a description of the job roles open to a data scientist in the workplace.
ATTENTION ... This is an ACCELERATED VERSION of our SSCP course. What that means for you is that we assume that you have a certain level of prior knowledge, and we move faster through the material We encourage you to try this format and see if it works well for you. The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets....
Part of the power of Python is the array of tools that come built into the language, known as the Python Standard Library. In this series, we take a look at the Standard Library, import from the Standard Library, as well as take a view of some of the more common modules, or parts, of the Standard Library. If you want to dive a little deeper, then we will see you there.
In this series, we will explore the use of community code, or code written by others that to solve a particular problem or provide a particular functionality. We will explore how you can obtain these created solutions to increase your problem solving speed. In order to do so, we will explore the use of tools like pip, pipenv, and conda which are solutions to the fetching and managing of outside dependency requirements. If you are looking to solve bigger and bigger problems or just explore...
In this series, we take a look what version control is as well as the use of version control when creating software. After an overview of various software
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. You will explore the features that build a foundation for a truly scalable infrastructure, and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere...