Protecting Your Network with Open Source Software
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network
Ethical Hacking: Introduction to Ethical Hacking (Updated)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.
Network address translation is used to allow devices on a private network and access resources on the global Internet. This course introduces you to NAT, examines different types of NAT, and teaches you how to implement and troubleshoot them.
TCP is a core protocol driving business applications, but is often a blind spot in IT organizations. A thorough understanding of TCP can speed up network and application troubleshooting, empowering engineers to quickly resolve problems.
The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the IP address does and why it is critical in a successful network. He goes into the structure of IPv4 and IPv6 addresses. Anthony shows you how to work with the classful addressing system for IP addresses, then goes over subnet masks and subnet addressing. He covers how variable length subnet masking (VLSM) permits the creation of optimal "right-sized" network segments. Anthony walks you through CIDR and IP address aggregation. He explains special use addresses, then concludes with how IP services such as DHCP, DNS, and NAT can benefit your network.
If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.
Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It's designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.
Lynda - Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, detailing how firewalls work in both Windows and Linux, as well as how to set up a firewall simulation in a GNS3 network. Next, he goes over web application firewalls, API gateway threat mitigation solutions, and how to use honeypots to detect intruders. Finally, he covers the main ways to manage a suspected intrusion, including how to use the Security Onion intrusion detection system (IDS).
Lynda - Wireshark: Malware and Forensics
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.
The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.
Lynda - CISSP Cert Prep: 2 Asset Security
CISSP is the industry's gold standard certification, necessary for many mid- and senior-level information security positions. Learn about best practices needed to complete the second domain of the 2021 Certified Information Systems Security Professional (CISSP) exam: Asset Security. Instructor Mike Chapple explains the importance of data governance policies and roles, and how you can develop security baselines that leverage industry standards. Learn how to avoid liability by limiting data collection, and control your exposure with file encryption, and cloud storage security options. Plus, find out how to properly retain and dispose of sensitive information.Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Windows Command Line Complete Course(CMD, Batch Script) 2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch | English | Duration: 24 lectures (2h 41m) | Size: 2 GB
Sistema de control de Asistencias en Visual basic.Net (2020)
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz | Language: Spanish | VTT | Size: 3.60 GB | Duration: 4h 41m
Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.
In this course we are going to look real world hacking scenarios and how to deal with it we will be doing Scenario based MitM attacks using Raspberry PI as our Attacking device. We will start this course by installing Kali Linux on Raspberry PI then we will look how we can create Remote Based Connection on Raspberry PI without using any keyboard mouse or monitor.
Kali Linux for new comer in cyber security field, is the most important course for you if you are going to make your career in cybersecurity. Because, Kali Linux is most advanced and foremost used platform for the Penetration testers, ethical hackers, security analysts, bug bounty hunters, security administrators and so on.
Lynda - Networking Foundations: Networking Basics
When someone begins to study networking, they’re challenged with knowing where to start. This is due to the wide spectrum of technologies falling under the umbrella of networking. This course provides an overview of the foundational topics any networking professional should know, as well as an introduction to emerging technologies. Instructor Kevin Wallace delves into the purpose of networks, as well as how networking technologies benefit us in both our personal and business lives. He covers network addresses, including the structures of Internet Protocol (IP) version 4 and version 6 addresses. Plus, learn about switches, routers, fiber-optic cabling, and other essential pieces and parts that make networks work; the OSI model; common network services; wireless networks; and more.
Learn the Art of System Hacking, Website Hacking, Mobile Hacking and Forensics with Linux Course as Bonus,Cyber Security
Lynda - Cisco Network Security: Core Security Concepts
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers.This course corresponds to the security fundaments portion of the 200-301 CCNA exam.