Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Network Security
YouTube
education
#Firewalls
#Network Scanning
#Nmap
#DDoS Attacks
#Fortinet
#Network Traffic Analysis
#Packet Sniffing
#SSH
#Snort
#TLS 1.3
#SSL
#TLS
#ARP Poisoning
#Packet Capturing
#Perimeter Security
#Wireless Security
#Data Center Security
#Wi-Fi Security
#Network Resilience
#Kerberos
Showing:
3,128
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
IBM
Cloud Security
32
rewiews
Explore key cloud security concepts, from confidential computing to DDoS attacks, and learn about IBM's solutions for data protection, DevSecOps, and emerging technologies.
Add to list
16
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - Network Devices - Day 1 - CCNA 200-301 Complete Course
27
rewiews
In this video you will learn about the kinds of devices you will find in modern networks, their functions in the network, and their differences.
Add to list
16
Lesons
30 minutes
On-Demand
Free-Video
HackerSploit
Penetration Testing Bootcamp
24
rewiews
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Add to list
49
Lesons
10 hours
On-Demand
Free-Video
Learn Ethical Hacking - CEH Journey
13
rewiews
Explore ethical hacking techniques, from Google hacking to password cracking, network vulnerabilities, and social engineering, with hands-on labs and real-world examples.
Add to list
10
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Fortinet NSE 4 Training
4
rewiews
Comprehensive Fortinet NSE 4 training covering FortiGate setup, routing, troubleshooting, and advanced features like Cloud Sandbox and traffic shaping for network security professionals.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Joseph Delgadillo
Ethical Hacking Tutorials
3
rewiews
Learn ethical hacking techniques, from beginner to advanced, covering Python, Metasploit, Kali Linux, and system hacking. Gain practical skills to become a proficient ethical hacker.
Add to list
6
Lesons
18 hours
On-Demand
Free-Video
Wireshark Masterclass
3
rewiews
Learn essential Wireshark skills: setup, traffic capture, filtering, analysis, and advanced features like file extraction and IP geolocation. Master network packet analysis for improved troubleshooting and security.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Linode
HackerSploit Blue Team Series - Network Traffic Analysis with Wireshark
3
rewiews
Comprehensive introduction to network traffic analysis using Wireshark for blue team operations. Covers Wireshark interface, filters, packet analysis, and practical exercises for security analysts and SOC teams.
Add to list
25
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Stephane Maarek
AWS Certified Developer Associate
4
rewiews
Comprehensive guide for AWS Certified Developer Associate exam, covering key services, security, deployment, and best practices through hands-on tutorials and in-depth explanations.
Add to list
31
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Linode
Blue Team Hacking - Intrusion Detection with Snort
2
rewiews
Learn to implement Snort, a leading open-source intrusion detection system. Covers installation, configuration, rule creation, and practical usage for effective network security monitoring.
Add to list
25
Lesons
1 hour 12 minutes
On-Demand
Free-Video
CCNA Routing & Switching Packet Tracer Labs
2
rewiews
Comprehensive hands-on labs covering CCNA Routing & Switching topics, from basic router configuration to advanced protocols like OSPF and BGP, with troubleshooting exercises.
Add to list
76
Lesons
11 hours
On-Demand
Free-Video
Hussein Nasser
HAProxy
1
rewiews
Comprehensive guide to HAProxy, covering load balancing, scaling, security, and advanced configurations for high-performance web infrastructure.
Add to list
13
Lesons
5 hours
On-Demand
Free-Video
HostGator
WordPress 101 - Tutorials for Beginners
1
rewiews
Learn WordPress basics, from installation to customization. Explore themes, plugins, and e-commerce. Build and optimize your website with step-by-step tutorials for beginners.
Add to list
13
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Cyber Security Crash Course
1
rewiews
Learn essential cybersecurity concepts, from network security to DoS attacks. Gain practical skills and knowledge suitable for beginners, aligned with CompTIA Security+ certification.
Add to list
6
Lesons
14 hours
On-Demand
Free-Video
Complete Metasploit Tutorial from Basics
1
rewiews
Comprehensive guide to Metasploit: from installation to advanced penetration testing. Learn to exploit Windows 10 and Metasploitable machines using Kali Linux and essential tools like Nmap and Zenmap.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
The Complete Kali Linux Course - Beginner to Advanced
1
rewiews
Comprehensive guide to ethical hacking using Kali Linux, covering installation, network security, WiFi cracking, social engineering, and advanced exploitation techniques with hands-on demonstrations.
Add to list
72
Lesons
16 hours
On-Demand
Free-Video
Linode
CI-CD Pipeline with GitLab and K8s - Jérôme Petazzoni LKE Helm Workshop
1
rewiews
Learn to set up a CI/CD pipeline using GitLab and Helm on Linode Kubernetes Engine. This workshop covers installation, configuration, and troubleshooting for efficient DevOps workflows.
Add to list
8
Lesons
36 minutes
On-Demand
Free-Video
Tech Tutorials - David McKone
How to Patch a Standalone ESXi Host
1
rewiews
Learn to patch a standalone ESXi host: download and upload the patch, prepare the server, apply updates via CLI, and safely reboot. Essential skills for VMware administrators to maintain and secure their virtualization infrastructure.
Add to list
8
Lesons
22 minutes
On-Demand
Free-Video
Paul Browning
CompTIA Network+ Full Course
1
rewiews
Comprehensive networking guide covering theory, hardware, protocols, security, and troubleshooting. Ideal for CompTIA Network+ exam preparation and IT professionals seeking in-depth knowledge.
Add to list
92
Lesons
23 hours 10 minutes
On-Demand
Free-Video
HackerSploit
Intrusion Detection With Snort
1
rewiews
Learn to use custom and community Snort rules for effective intrusion detection. Discover how to capture network traffic, identify malicious activity, and set up logging and notifications for enhanced security.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
HackerSploit
Host Discovery and Vulnerability Scanning With Nessus
1
rewiews
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Security BSides London
Exploring the Dark Web: Forums, Markets, and Scam Insights
1
rewiews
Dive into the hidden corners of the internet, exploring dark web forums, markets, and scams. Gain insights into this secretive digital underworld and its operations.
Add to list
1
Lesons
13 minutes
On-Demand
Free-Video
University of Iceland
High Performance Computing
1
rewiews
Comprehensive exploration of advanced parallel computing techniques, covering MPI, OpenMP, GPU acceleration, and applications in scientific domains. Includes hands-on exercises for practical skill development.
Add to list
35
Lesons
1 day 2 hours
On-Demand
Free-Video
Professor Messer
CompTIA Network+ Training Course
1
rewiews
Comprehensive training for CompTIA Network+ certification, covering networking concepts, protocols, security, and troubleshooting. Ideal for IT professionals seeking to enhance their networking skills and pass the N10-008 exam.
Add to list
93
Lesons
14 hours
On-Demand
Free-Video
IEEE
A Tale of Sea and Sky - On the Security of Maritime VSAT Communications
2
rewiews
Explores security vulnerabilities in maritime VSAT communications, revealing potential threats and demonstrating practical attacks using affordable equipment. Discusses implications and challenges for maritime cybersecurity.
Add to list
15
Lesons
17 minutes
On-Demand
Free-Video
Ubuntu OnAir
Python for Offensive Security in Ubuntu
1
rewiews
Explora el uso de Python para desarrollar herramientas de seguridad ofensiva en Ubuntu, enfocándose en Ethical Hacking y Penetration Testing. Aprende a crear scripts personalizados para identificar y explotar vulnerabilidades.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Embedded Linux Step by Step on Beaglebone
1
rewiews
Learn to develop embedded Linux systems using Beaglebone, covering AM335x functionality, eMMC booting, and networking in a comprehensive step-by-step guide.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Kali Linux - Penetration Testing
1
rewiews
Learn penetration testing with Kali Linux: explore tools like Metasploit, Nmap, Armitage, and more for network scanning, vulnerability analysis, and ethical hacking techniques.
Add to list
49
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Paul Browning
CompTIA PenTest+ Full Course - PT0-002
1
rewiews
Comprehensive penetration testing training covering planning, reconnaissance, vulnerability analysis, exploitation techniques, and reporting, with hands-on labs using industry-standard tools and frameworks.
Add to list
26
Lesons
11 hours 32 minutes
On-Demand
Free-Video
Wireshark Training
1
rewiews
Learn to capture, analyze, and troubleshoot network traffic using Wireshark. Master packet capture, audio issues diagnosis, and codec conversion techniques for effective network analysis.
Add to list
5
Lesons
2 hours 30 minutes
On-Demand
Free-Video
secwestnet
Hunting the Adversary - Applying Cyber Threat Intelligence
1
rewiews
Learn techniques for applying cyber threat intelligence and hunting adversaries in digital environments with expert John Bambenek.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Stanford University
Stanford Seminar - The Current State of Cybersecurity
0
rewiews
Explore the current state of cybersecurity, including protection strategies, real-world cases, and defense mechanisms against advanced threats, phishing, and data breaches.
Add to list
42
Lesons
1 hour 10 minutes
On-Demand
Free-Video
NPTEL
Cryptography and Network Security
0
rewiews
Explore modern cryptography, network security, and cryptanalysis techniques. Learn about symmetric and asymmetric encryption, hash functions, and secure communication protocols.
Add to list
41
Lesons
1 day 12 hours
On-Demand
Free-Video
Santa Fe Institute
Provably-Secure Proof-of-Stake Blockchains - From Bitcoin to Ouroboros
0
rewiews
Explore proof-of-stake blockchains as an energy-efficient alternative to Bitcoin's proof-of-work, focusing on the Ouroboros protocol's security and implementation in Cardano cryptocurrency.
Add to list
23
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Santa Fe Institute
The Complex Science of Cyberdefense - Computer Immunology
0
rewiews
Exploring cyberdefense through immunology concepts, adapting biological defense mechanisms to address digital threats and vulnerabilities in complex computational systems.
Add to list
25
Lesons
1 hour 24 minutes
On-Demand
Free-Video
New York University (NYU)
Democracy Confronts Cyber Insecurity - Lecture 9
0
rewiews
Explore democracy's challenges in the digital age, examining cyber threats to elections, political parties, and government institutions.
Add to list
16
Lesons
2 hours 22 minutes
On-Demand
Free-Video
New York University (NYU)
Cybersecurity: Keeping the Lights On - Practical Challenges in Utilities - Keynote
0
rewiews
Explore practical challenges in providing cybersecurity services to utilities, focusing on industrial network protection and critical infrastructure security.
Add to list
18
Lesons
56 minutes
On-Demand
Free-Video
New York University (NYU)
Security Challenges in 5G Wireless and Beyond
0
rewiews
Experts discuss security challenges in NextG networks, exploring threats, detection, isolation, data exploitation, and privacy concerns while envisioning secure and efficient future communication infrastructures.
Add to list
27
Lesons
1 hour 10 minutes
On-Demand
Free-Video
NDC Conferences
Hub-Spoke Virtual Networks in Azure - Design and Implementation
0
rewiews
Explore the intricacies of Azure virtual network integration in this 45-minute conference talk from NDC Oslo 2024. Delve into the challenges and complexities of Vnet integration for Azure services, gaining a comprehensive understanding of key concepts an…
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Devoxx
Building a Lightning Fast Firewall with Java and eBPF - Devoxx
0
rewiews
Explore the cutting-edge intersection of eBPF and Java in this 52-minute Devoxx conference talk. Dive deep into the world of cloud-native technology as speakers Mohammed Aboullaite and Johannes Bechberger demonstrate how to build a high-throughput firewa…
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Software Engineering Courses - SE Courses
Enable VPN for a Single App Using Cloudflare Zero Trust Free Warp VPN - Split Tunneling
0
rewiews
Configure Cloudflare Warp VPN for specific apps using Zero Trust's split tunneling. Learn installation, setup, and security measures for targeted VPN usage on Windows.
Add to list
18
Lesons
13 minutes
On-Demand
Free-Video
Cloud Security Alliance
Preparing a Career Path in Cybersecurity: A High School Perspective
0
rewiews
Explore diverse cybersecurity opportunities, essential skills, and industry insights. Learn from professionals, discover certification programs, and gain resources for a rewarding career in digital security.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Security Service Edge (SSE): Secure Access Everywhere, Even the Cloud
0
rewiews
Explore innovations in Security Service Edge (SSE) platforms, redefining cloud security paradigms and simplifying secure access for enhanced user experience across cloud and datacenter environments.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Cloud Security Alliance
Championing Zero Trust for Critical Infrastructure - Protecting Our Most Critical Assets
0
rewiews
Explore zero trust implementation challenges and opportunities in critical infrastructure, focusing on holistic security approaches for OT and IT systems.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Cloud Security Alliance
Mastering Zero Trust with CISA's Zero Trust Maturity Model - Expert Analysis and Implications
0
rewiews
Explore CISA's Zero Trust Maturity Model, focusing on five pillars and cross-cutting capabilities. Gain expert insights on implementing zero trust architecture for enhanced cybersecurity in agencies and critical infrastructure.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Cloud Security Alliance
Internationalizing Zero Trust Security
0
rewiews
Explore zero trust security's global adoption, including IEEE standards and ISO/IEC engagement plans. Learn about its evolution and impact on cybersecurity practices.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Cloud Security Alliance
Protect Every Application on Any Cloud
0
rewiews
Discover automated solutions for securing multi-cloud applications and workloads. Learn steps to improve security posture and explore Fortinet's edge-to-edge protection approach.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Dynatrace
Leveraging Davis AI for System Analysis and Optimization
0
rewiews
Leverage Davis AI for proactive system analysis and optimization. Learn how to use context-sensitive AI to identify and resolve potential issues before they impact your critical services.
Add to list
10
Lesons
53 minutes
On-Demand
Free-Video
Dynatrace
Databases App: DBA Insights Across All Databases - Dynatrace App Spotlight
0
rewiews
Explore Dynatrace's new Databases app, offering DBA insights across all databases. Learn about integration, database instance insights, behavior analysis, query performance, and AI-detected anomaly reactions.
Add to list
3
Lesons
14 minutes
On-Demand
Free-Video
Jeremy's IT Lab
Loop Guard in STP Toolkit - CCNA 200-301 Day 21 Part 4
0
rewiews
Explore Loop Guard in STP Toolkit for CCNA 200-301. Learn about unidirectional links, problem-solving, CLI demonstration, and comparison with Root Guard.
Add to list
9
Lesons
19 minutes
On-Demand
Free-Video
Cloud Security Alliance
Security Service Edge: Zero Trust Access Everywhere, Even in the Cloud
0
rewiews
Explore innovations in Security Service Edge (SSE) for cloud security. Learn how SSE enhances user experience, simplifies security measures, and redefines secure access in the cloud era.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Cloud Security Alliance
AI/ML and Zero Trust - Driving Business Success
0
rewiews
Explore AI/ML and zero trust's role in combating cyber threats, enhancing network security, and driving business innovation through visibility, control, and automation.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Cloud Security Alliance
Mitigating Risks and Threats in the Cloud
0
rewiews
Explore cloud security risks and threats, learning effective mitigation strategies from Trend Micro experts to enhance your organization's cloud protection.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
Satish C J
Wireless Network Security Protocols: WEP, WPA, WPA2, and Four-Way Handshake
0
rewiews
Explore wireless network security protocols, including WEP, WPA, and WPA2. Understand their evolution, vulnerabilities, and the importance of staying updated for better Wi-Fi protection.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Practical Networking
Diffie-Hellman Key Exchange and Forward Secrecy
0
rewiews
Explore Diffie-Hellman key exchange and forward secrecy. Learn simplified and real-world math behind this secure cryptographic method, enhancing your understanding of modern encryption techniques.
Add to list
8
Lesons
13 minutes
On-Demand
Free-Video
Rahul Wagh
Network Subnetting vs Supernetting - Concepts and Practical Applications
0
rewiews
Dive into network subnetting and supernetting concepts, from basic principles to practical applications in VPCs. Learn to efficiently manage IP addresses, improve network security, and optimize routing in cloud environments.
Add to list
6
Lesons
21 minutes
On-Demand
Free-Video
Rahul Wagh
Network Address Translation (NAT) - Concepts and Types
0
rewiews
Uncover the essentials of Network Address Translation (NAT), its types, and its crucial role in modern networking. Learn how NAT conserves IPv4 addresses and enhances network security.
Add to list
7
Lesons
14 minutes
On-Demand
Free-Video
John Hammond
Hackers Abuse MeshCentral for Remote Access Trojan (RAT)
0
rewiews
Uncover how hackers exploit MeshCentral as a Remote Access Trojan (RAT), exploring cybersecurity vulnerabilities and threat intelligence techniques to enhance your defensive strategies.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Conf42
Reduce Cost by $M with Strategic Financial Security Initiatives
0
rewiews
Discover strategic financial security initiatives to reduce costs by millions. Explore risk assessment, network security, AI integration, and proactive management for aligning cybersecurity with business goals.
Add to list
15
Lesons
32 minutes
On-Demand
Free-Video
Conf42
Network Incidents - What to Know Before the Chaos Strikes
0
rewiews
Gain insights into network incident management, from preparation to resolution. Learn strategies for handling crises, avoiding pitfalls, and implementing post-incident reviews to enhance system resilience.
Add to list
18
Lesons
28 minutes
On-Demand
Free-Video
Conf42
Securing Kubernetes: Best Strategies for the Modern Era - Conf42 IM 2024
0
rewiews
Explore best practices for securing Kubernetes clusters, covering control plane, node-level, application, and network security strategies. Gain insights into real-world incidents and essential tools for robust K8s protection.
Add to list
20
Lesons
35 minutes
On-Demand
Free-Video
Conf42
A Data-Driven Approach to Mitigating Cyber Threats - Zero Trust Architecture
0
rewiews
Explore Zero Trust Architecture's principles, implementation strategies, and future in cybersecurity. Gain insights into AI's role, challenges, and industry trends for mitigating cyber threats effectively.
Add to list
11
Lesons
13 minutes
On-Demand
Free-Video
Conf42
Routing and Switching Foundations for Incident Management
0
rewiews
Explore foundational concepts of routing and switching for incident management, covering Layer 2 fundamentals, key technologies, core protocols, and advanced network design concepts.
Add to list
10
Lesons
11 minutes
On-Demand
Free-Video
Satish C J
Mastering Nessus Scans - A Guide to Host Discovery, Basic Network Scan and Web Application Tests
0
rewiews
Discover essential Nessus scanning techniques for network security, including host discovery, basic network scans, and web application tests. Learn step-by-step instructions and best practices.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Visual Studio Code
Getting Started with Remote Development in VS Code
0
rewiews
Discover seamless remote development with VS Code, from SSH connections to debugging and port forwarding. Enhance your workflow for efficient remote server management and coding.
Add to list
6
Lesons
12 minutes
On-Demand
Free-Video
Cloudera Hadoop Administration
0
rewiews
Learn Hadoop administration with Cloudera, covering installation, configuration, security, high availability, and performance tuning for enterprise-level data management and analytics.
Add to list
64
Lesons
14 hours
On-Demand
Free-Video
Great Learning
Network Security
0
rewiews
Learn essential network security concepts, tools, and best practices to protect devices from unauthorized access and cyber threats. Gain insights into security solutions and career opportunities.
Add to list
10
Lesons
40 minutes
On-Demand
Free-Video
Great Learning
Types of Cyber Security
0
rewiews
Explore various cybersecurity types including network, information, application, cloud, IoT, and mobile security. Learn their importance, implementation, and industry applications.
Add to list
12
Lesons
32 minutes
On-Demand
Free-Video
Great Learning
Firewall
0
rewiews
Explore cybersecurity fundamentals, including firewalls, threats, and vulnerabilities. Learn about firewall types, their importance, and how they differ from antivirus software.
Add to list
15
Lesons
43 minutes
On-Demand
Free-Video
Tech with Tim
Linux for Programmers
0
rewiews
Master essential Linux skills for programmers: file systems, users, permissions, networking, SSH, text editors, shell scripting, and web server deployment.
Add to list
15
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Hussein Nasser
HTTP
0
rewiews
Comprehensive exploration of HTTP protocols, web servers, and related technologies, covering implementation, security, and performance optimization techniques.
Add to list
57
Lesons
23 hours
On-Demand
Free-Video
Hussein Nasser
WebSockets
0
rewiews
Comprehensive exploration of WebSocket technology, covering implementation, scaling, security, and integration with modern protocols. Includes practical examples and real-world applications.
Add to list
10
Lesons
10 hours
On-Demand
Free-Video
Hussein Nasser
HTTP/2
0
rewiews
Comprehensive exploration of HTTP/2, covering its workings, performance benefits, and implementation challenges. Includes comparisons with other HTTP versions and related protocols.
Add to list
24
Lesons
8 hours
On-Demand
Free-Video
Hussein Nasser
Everything Related to Transport Layer Security - TLS
0
rewiews
Comprehensive exploration of TLS, covering protocols, handshakes, security features, and real-world applications. Ideal for those seeking in-depth understanding of secure communication.
Add to list
30
Lesons
8 hours
On-Demand
Free-Video
Hussein Nasser
Wiresharking All Protocols
0
rewiews
Dive deep into network protocols using Wireshark, exploring CURL, WebSockets, TLS, RabbitMQ, PostgreSQL, HTTP/2, Server-Sent Events, MongoDB, SSH, and NodeJS HTTP Server for enhanced understanding.
Add to list
10
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Stephane Maarek
AWS Certified Solutions Architect Associate
0
rewiews
Comprehensive preparation for AWS Solutions Architect Associate certification, covering key services, architecture discussions, and hands-on tutorials for essential AWS concepts.
Add to list
40
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Bogdan Stashchuk
SSL, TLS and HTTPS Overview
0
rewiews
Comprehensive overview of SSL, TLS, and HTTPS protocols, covering encryption methods, key exchange algorithms, and practical analysis using Wireshark.
Add to list
20
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Cyber Security Course - Learn Internet Security
0
rewiews
Master internet security with a comprehensive 12-step method covering network protection, user education, physical security, password management, patch updates, antivirus, access control, data encryption, and backup strategies.
Add to list
24
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Microsoft
Azure SQL Network Security and Connectivity - Episode 4
0
rewiews
Comprehensive guide to Azure SQL Database network security, covering public and private connectivity options, access controls, and best practices for securing database connections.
Add to list
13
Lesons
56 minutes
On-Demand
Free-Video
Microsoft
Visual Studio Code - Remote Dev with SSH, VMs, and WSL - Tabs vs Spaces
0
rewiews
Explore remote development in VS Code using SSH, VMs, and WSL. Learn to set up, debug, and leverage remote environments for efficient cross-platform development and collaboration.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
Microsoft
First Experiences with Azure Database for PostgreSQL Flexible Server - Lessons Learned
0
rewiews
Explore Azure Database for PostgreSQL Flexible Server's capabilities, deployment, and real-world experiences at Mercedes Benz, covering network security, costs, high availability, and lessons learned.
Add to list
13
Lesons
33 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - Dynamic ARP Inspection - CCNA 200-301 Complete Course
0
rewiews
Learn Dynamic ARP Inspection (DAI) for network security, including ARP review, DAI operations, configuration, rate limiting, optional checks, and ARP ACLs. Includes quizzes to reinforce understanding.
Add to list
20
Lesons
33 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - Port Security - CCNA 200-301 Complete Course
0
rewiews
Learn port security concepts, implementation, and troubleshooting for CCNA certification. Covers enabling, violation modes, MAC address aging, and practical commands.
Add to list
22
Lesons
34 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA Security Fundamentals
0
rewiews
Comprehensive overview of network security fundamentals, including common threats, attack types, authentication methods, and best practices for protecting IT infrastructure.
Add to list
25
Lesons
39 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - SSH - CCNA 200-301 Complete Course
0
rewiews
Learn SSH and Telnet protocols for network device management, including configuration steps, security measures, and best practices for remote access in Cisco environments.
Add to list
20
Lesons
31 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - NTP - CCNA 200-301 Complete Course
0
rewiews
Learn Network Time Protocol (NTP) for CCNA certification, covering importance, configuration, hierarchy, authentication, and practical implementation in network environments.
Add to list
24
Lesons
43 minutes
On-Demand
Free-Video
Jeremy's IT Lab
Extended ACLs - CCNA 200-301 Complete Course
0
rewiews
Learn extended ACLs for CCNA: configuration, advantages, matching protocols, IP addresses, and port numbers. Includes practice exercises and quizzes to reinforce understanding.
Add to list
18
Lesons
41 minutes
On-Demand
Free-Video
Jeremy's IT Lab
Standard ACLs - CCNA 200-301 Complete Course
0
rewiews
Learn about standard Access Control Lists (ACLs) for network security, including their types, functionality, and implementation in Cisco networks. Includes quizzes to reinforce understanding.
Add to list
15
Lesons
47 minutes
On-Demand
Free-Video
Jeremy's IT Lab
CCNA - Spanning Tree Protocol Part 2 - CCNA 200-301 Complete Course
0
rewiews
Detailed exploration of Spanning Tree Protocol operations, including port states, timers, BPDU, toolkit features, configuration, and load-balancing, with quizzes to reinforce learning.
Add to list
26
Lesons
42 minutes
On-Demand
Free-Video
Traversy Media
Linux Server Setup & MERN Deployment
0
rewiews
Learn to set up a Linux server, configure SSH keys, and deploy a MERN app using PM2 and Nginx reverse proxy. Covers server creation, security, Node.js installation, MongoDB setup, and SSL configuration.
Add to list
18
Lesons
39 minutes
On-Demand
Free-Video
Cyber Mentor
How to Be an Ethical Hacker in 2021
0
rewiews
Comprehensive guide to becoming an ethical hacker, covering essential skills, techniques, and certifications. Offers practical advice for beginners and professionals looking to advance their cybersecurity careers.
Add to list
16
Lesons
47 minutes
On-Demand
Free-Video
Cyber Mentor
How to Build an Active Directory Hacking Lab
0
rewiews
Learn to create and configure an Active Directory lab environment for practicing ethical hacking techniques and understanding network vulnerabilities.
Add to list
16
Lesons
48 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for N00bs - Nibbles
0
rewiews
Learn practical pentesting techniques for beginners, including nmap scanning, exploit searching, port 80 exploitation, and Linux privilege escalation in this hands-on tutorial.
Add to list
5
Lesons
32 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Noobs - Devel
0
rewiews
Learn practical pentesting techniques for the Devel machine, including scanning, enumeration, payload generation, and privilege escalation, with hands-on demonstrations and expert guidance.
Add to list
10
Lesons
29 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for N00bs - Blue
0
rewiews
Learn to exploit the MS17-010 vulnerability using Metasploit and AutoBlue, covering scanning, exploitation, payload types, and post-exploitation techniques in a hands-on penetration testing tutorial.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for N00bs - Lame
0
rewiews
Learn to enumerate and exploit SMB vulnerabilities on a Linux machine, with practical demonstrations of scanning, exploitation, and post-exploitation techniques for ethical hacking.
Add to list
8
Lesons
32 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Enumeration - Kioptrix & Hack The Box
0
rewiews
Learn enumeration techniques for penetration testing using Kioptrix and Hack The Box. Covers network discovery, vulnerability scanning, and port enumeration. Includes Q&A on various cybersecurity topics and career advice.
Add to list
45
Lesons
2 hours 49 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Scanning Tools and Tactics
0
rewiews
Comprehensive tutorial on penetration testing tools and techniques, covering Nmap, Nessus, Metasploit, and BurpSuite. Includes practical demonstrations, Q&A session, and industry insights for aspiring cybersecurity professionals.
Add to list
59
Lesons
3 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
HackTheBox - Fighter Walkthrough
0
rewiews
Comprehensive walkthrough of exploiting HackTheBox's Fighter, covering reconnaissance, web exploitation, privilege escalation, and reverse engineering techniques for ethical hacking practice.
Add to list
14
Lesons
47 minutes
On-Demand
Free-Video
HackerSploit
Nmap - Scan Timing and Performance
0
rewiews
Optimize Nmap scans for different network environments. Learn timing templates, parallelism, host group sizes, timeouts, delays, and packet rates to enhance scanning efficiency and effectiveness.
Add to list
7
Lesons
30 minutes
On-Demand
Free-Video
load more...