Udemy

UdemyDOWNLOADFirewallFree IT CoursesNetwork MonitoringNetwork SecuritySecurity

MikroTik Routing All-in-1 Video Bootcamp (RouterOS v7)

What you'll learn: Understand why we need routing in our network Understand how and where to apply static route and default static route Understand the difference between IGP vs EGP routing Understand the difference between Distance vector vs Link state routing protocols Understand how to configure static floating route for...
IT Systems Administrator Job Training Course (Entry Level)
UdemyActive DirectoryDOWNLOADFree IT CoursesMicrosoftWindows Server 2022Windows Server 2025

IT Systems Administrator Job Training Course (Entry Level)

What you'll learn: Install and Manage Windows Servers 2022 and Windows 11 WorkstationsInstall and Manage Windows Active Directory Services and Group Policy ManagementSetup Hybrid Infrastructure between On Prem Active Directory and Microsoft Azure (Office 365 Online)Automate Basic System Administrator Tasks on Active Directory using PowerShell Requirements: At least some Entry...
Udemy-Vulnerability Management
SecurityFirewallFree IT CoursesNetwork SecurityUdemy

Udemy-Vulnerability Management

What you'll learn Learners will gain a thorough understanding of the fundamental concepts of vulnerability, threat, and risk in the context of cybersecurity. Learners will be able to identify various types of vulnerabilities within software, hardware, and human factors. Learners will acquire the skills to evaluate different types of threats...
PfSense Firewall: Network and Server Infrastructure Security
UdemyFirewallFree IT CoursesNetwork SecuritySecurity

PfSense Firewall: Network and Server Infrastructure Security

What you'll learn pfSense Firewall Network and Server Infrastructure Server Infrastructure Security How to Install and Configure I am a seasoned IT professional with over two decades of experience specializing in Network System Administration and Engineering. My passion for technology has been the driving force behind a successful career marked...
Linux Security - Basics and Beyond
UdemyDOWNLOADFree IT CoursesLinux

Linux Security – Basics and Beyond

Table of contents Introduction Linux Security - Basics and Beyond: IntroductionModule 1: Linux User SecurityModule Introduction Lesson 1: User Security Basics Learning objectives 1.1 Introduction to Linux Users1.2 Principle of Least Privilege1.3 Accessing the Repository and Network Map1.4 The id Command Lesson 2: Working with Passwords Learning objectives 2.1 Secure...
IT Security Fundamentals
Free IT CoursesNetworkNetwork MonitoringNetwork SecuritySecurityUdemy

IT Security Fundamentals

What you'll learn Cybersecurity Principles and Frameworks: Understand the fundamental principles of cybersecurity, including confidentiality, integrity, and availability. Threat Modeling and Risk Assessment: Learn techniques for identifying and analyzing potential threats to an organization's information assets. Cryptography and Secure Communication: Gain knowledge of cryptographic concepts, including encryption, hashing, and digital...
Pearson - CISSP, 4th Edition
SecurityCISSPeBooksFree IT CoursesNetworkUdemyUdemy

Pearson – CISSP, 4th Edition

Understand the objectives and topics of every CISSP exam domain Enhance your test-taking skills with Deep Dive quizzes and 3-second challenges throughout.Get real-world perspective and skills through Security-in-Action case studies presented in every lesson.The CISSP, 4th Edition video course is your complete study tool to successfully prepare for the latest...
Learn Ethical Hacking & Reverse Engineering
UdemyDOWNLOADFree IT CoursesIT auditLinuxNetworkSecurity

Learn Ethical Hacking & Reverse Engineering

What you'll learn HTML tag information leak Javascript code and function information leak Client code modification vulnerability Javascript code exposure and decryption File redirection vulnerability MDF decryption File extension manipulation exploit Dumpster diving Secure agent browser spoofing Reversing encryption Cracking Steganography, and more... Convert Trial Software to Fully Functional Software...
Kali Linux for Advanced Pen Testing and Ethical Hacking
UdemyDOWNLOADFree IT CoursesNetworkNetwork MonitoringNetwork SecuritySecurity

Kali Linux for Advanced Pen Testing and Ethical Hacking

Kali Linux is the penetration-testing professional's main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting. Learn how to use the basic toolset and extend Kali, integrating...
1 4 5 6 7 8 9
Page 6 of 9
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO