Intermediate Hands-on Training for the Installation and Configuration of Microsoft Windows Server 2012 R2
Learn the fundamentals of database design, development and querying using the latest Microsoft SQL Server
Learn Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.
Do you need to learn how to plan and execute a server installation? Planning how you need your server to work can be even more important than the installation process itself. In this course, instructor Ed Liberman demonstrates the importance of planning the big-picture use of a new server and using that plan to install and configure a new Windows 2022 server that will accomplish specific goals. Ed goes over planning and preparing to install Windows Server 2022, then steps you through installing with either the full Desktop Experience or with just the Server Core. Once installation is complete, he shows you how to configure Windows Server and how to create and configure a variety of storage partitions. Ed covers extending and shrinking a volume, as well as converting from basic to dynamic disks. Ed demonstrates installing roles and features, configuring a role, and installing roles on a Server Core. Then he finishes up with a discussion on how to manage features on demand.
Learn practical skills for ethical hacking & penetration testing with this comprehensive course, no experience necessary
An Introduction to the Hacking Techniques of Hackers, Ethical Hackers, Pentesters and Cyber Security Professionals
Intermediate Ethical Hacking Hands-on Training, for learing intermediate and advance hacking techniques
Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 concerning malware.
MySQL to SQL Server Migration step by step
Learn to Practically connect a LAN, Troubleshoot a network, Networking Commands & the Fundamentals of networking.
Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark.
The Certified in Risk and Information Control (CRISC) certification is an established, well-recognized credential from ISACA, the organization that has issued over 200,000 certifications to cybersecurity professionals in 188 countries. A CRISC certification shows employers that you understand how to identify and manage IT risk in an enterprise and that you’re capable of implementing and maintaining the controls necessary to address risks.
In this course from ITProTV, instructors Daniel Lowrie and Justin Dennison take you through the process of setting up an Ubuntu-based OpenVPN server in AWS and an Ubuntu client, from start to finish.
Deliver a full AVD remote working solution including designing, scoping, planning, optimizing, sizing, and costing, more
A practical oriented guide for Devops people with DCA sample que. Learn how to create and use Docker Swarm in right way
Complete Domain and Hosting Masterclass for anybody who wants to completely understand what domain web hosting is.
The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain.
Migrating your applications to the cloud? Review the benefits and challenges of developing in the cloud with the top three cloud service providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit.
Windows Virtual Desktop is a desktop and app virtualization service in Azure that lets you do everything from deliver a few remote apps to deploying a full-blown Windows 10 desktop to any platform, including macOS or Android devices.
This course continues a series on preparing for the Microsoft 365 Fundamentals (MS-900) exam, a useful certification to have if you are in a technology, IT help desk, or software support role.
A Certified Ethical Hacker is a security professional who understands how to look for weaknesses in target systems and uses the same knowledge and tools as a malicious hacker. This course will teach you the foundations of this knowledge needed for the CEH 312-50 exam.