Category Udemy

MikroTik Routing All-in-1 Video Bootcamp (RouterOS v7)

What you’ll learn: This is a bootcamp course containing my published 2 courses on udemy as follows: PS: If you have already purchased those 2 courses separately, please do not buy this course. Many students who want to learn Routing on MikroTik…

IT Systems Administrator Job Training Course (Entry Level)

IT Systems Administrator Job Training Course (Entry Level)

What you’ll learn: Install and Manage Windows Servers 2022 and Windows 11 WorkstationsInstall and Manage Windows Active Directory Services and Group Policy ManagementSetup Hybrid Infrastructure between On Prem Active Directory and Microsoft Azure (Office 365 Online)Automate Basic System Administrator Tasks…

CISSP CORE-CONCEPTS -Domain-6 | The Ultimate CISSP Course

CISSP CORE-CONCEPTS -Domain-6 | The Ultimate CISSP Course

What you’ll learn: Manoj is recognized as a distinguished Cybersecurity expert, holding esteemed certifications from globally recognized bodies such as PECB, TrecCert, (ISC)², and ISACA. He boasts over 7 years of rich experience in mentoring CISSP candidates and has successfully…

Udemy-Vulnerability Management

Udemy-Vulnerability Management

What you’ll learn Requirements Understanding of fundamental IT concepts, including computer systems, networks, and basic networking protocols (e.g., TCP/IP, HTTP).Basic knowledge of cybersecurity principles, such as confidentiality, integrity, and availability (CIA triad).Awareness of common cybersecurity terms and concepts, including malware,…

PfSense Firewall: Network and Server Infrastructure Security

PfSense Firewall: Network and Server Infrastructure Security

What you’ll learn I am a seasoned IT professional with over two decades of experience specializing in Network System Administration and Engineering. My passion for technology has been the driving force behind a successful career marked by expertise, innovation, and…

Linux Security – Basics and Beyond

Linux Security - Basics and Beyond

Table of contents Introduction Linux Security – Basics and Beyond: IntroductionModule 1: Linux User SecurityModule Introduction Lesson 1: User Security Basics Learning objectives 1.1 Introduction to Linux Users1.2 Principle of Least Privilege1.3 Accessing the Repository and Network Map1.4 The id…

IT Security Fundamentals

IT Security Fundamentals

What you’ll learn Hi, I’m Laszlo Bocso. I’m a Microsoft Trainer and System Architect I have designed, implemented, secured, and monitored global network and servers infrastructures for corporations in the private, public, and voluntary sectors for the last 15 years.…

Pearson – CISSP, 4th Edition

Pearson - CISSP, 4th Edition

Understand the objectives and topics of every CISSP exam domain Enhance your test-taking skills with Deep Dive quizzes and 3-second challenges throughout.Get real-world perspective and skills through Security-in-Action case studies presented in every lesson.The CISSP, 4th Edition video course is…

Learn Ethical Hacking & Reverse Engineering

Learn Ethical Hacking & Reverse Engineering

What you’ll learn If you want to learn ethical hacking  & also reverse engineering the fun and easy way like playing a computer game, then this course is for you. There exists on the Internet several websites which allows people to…

Kali Linux for Advanced Pen Testing and Ethical Hacking

Kali Linux for Advanced Pen Testing and Ethical Hacking

Kali Linux is the penetration-testing professional’s main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting. Learn…