Red Hat Enterprise Specialist in Diagnostics and Troubleshooting...
Red Hat Enterprise Specialist in Diagnostics and Troubleshooting Virtualization Classroom Setup & Videos...
View ArticleFundamentals of Cloud Computing and Quantum Computing | Udemy
Learn the core concepts of Cloud Computing and Quantum Computing Learn the types of clouds. Learn about IaaS, SaaS, PaaS Learn Cloud Computing Planning, Cloud Security and Cloud Operations Amazon Web...
View ArticlePostgreSQL 9.4 Administration | Linux Academy
Understanding open source RDBMS systems is an important skill for a successful system administrator or engineer. This course will help you gain a deep understanding of how to install and coonfigure...
View ArticlePractical Threat Hunting – Applied Network Defense
Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out...
View ArticleMySQL Fundamentals Part 2 | Pluralsight
Part 2 of the Fundamentals of MySQL series, covering stored procedures, user-defined functions, triggers and more. MySQL is a popular choice of database for use in web applications, and is a central...
View ArticleUsing ATT&CK to Advance Cyber Threat Intelligence Training
The goal of this training is for students to understand the following: What ATT&CK is and why it’s useful for cyber threat intelligence (CTI) How to map to ATT&CK from both finished reporting...
View ArticleCybersecurity : A beginner’s guide to IT and system development, cybersecurity
Because this is a complete guide that will give you every bit of information you were looking for. This book will teach you about zodiac signs and astrology, how astrology and tarot are corelated? How...
View ArticleTOR DARKNET: Master the Art of Invisibility
The ULTIMATE Guide on the Art of InvisibilityWant to surf the web anonymously? Cloak yourself in shadow? I will show you how to become a ghost in the machine – leaving no tracks back to your ISP....
View ArticleMySQL Fundamentals Part 1 | Pluralsight
Fundamentals of MySQL, an essential part of the LAMP stack. MySQL is a popular choice of database for use in web applications, and is a central component of the widely used LAMP open source web...
View ArticleHands-On Network Scanning with Nmap for Network Security | Packt
Learn how to perform internal network scans to audit and secure your network Understand how to use Nmap to perform network scanning with basic and advanced options Get familiar with host discovery and...
View Article30-day Windows Security Crash Course
WHY ARE WE DOING THIS? The cybersecurity industry grows and demands talent like no other. But talent should come with an up-to-date skill set. We’re here to save you from learning stuff that neither...
View ArticleCisco SD-WAN Softwares 19.x
Cisco Viptela + CSR1000v SD-WAN Collection 19.x qcow2 and ova. https://nitroflare.com/view/7625CE7F4F142E9/Cisco-SD-WAN-Softwares-19.x.1.4.part01.rar...
View ArticleLearning Hadoop | LinkedIn
Hadoop is indispensable when it comes to processing big data—as necessary to understanding your information as servers are to storing it. This course is your introduction to Hadoop; key file systems...
View ArticleLinux Interview Questions and Answers with Explanations | Udemy
Learn basic command line Linux usage and commands This course will focus on Linux Interview Questions and their answers along with their explanation. If you go through all the lectures along with the...
View ArticleSQL Master Class | Cloud Academy
In this course, we go beyond the basics to empower you with the skills, how-to knowledge, and hands-on expertise to work through and solve complex business issues with SQL. We go deep and hands-on with...
View ArticleThe Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Few national-security threats are as potent-or as nebulous-as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know...
View ArticleCyber Security in India
This book of ‘directions’ focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur’s Computer Science...
View ArticleData Security in Cloud Computing, Volume I
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications...
View ArticleApplied Incident Response
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident...
View ArticleCyber Security Intelligence and Analytics
This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research...
View Article