Cybersecurity
Showing 697–708 of 1317 results
Legal and Ethical Considerations for Digital Forensics
Legally sound digital forensics investigations are critical in today’s world of cybercrime. This course will give you the critical knowledge you need to understand legal and ethical concepts pertaining to digital forensics investigations.
Legal, Risk, and Compliance for CCSP®
Adhering to legal requirements while consuming cloud services can be a challenge as requirements differ with geography. This course will teach you legal, risk, and compliance frameworks needed for the CCSP® exam.
Leverage PowerShell Tools for Pen Testing
This course will teach you to leverage one of the most powerful built-in tools, PowerShell, for penetration testing.
Leveraging Advanced Networking and Load Balancing Services on the GCP
The GCP offers several services related to networking and load balancing that is used to obtain a highly optimized and scaling infrastructure. Such as Cloud CDN for fast serving of web content and GCP-optimized load balancing for container clusters.
Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API
This course focuses on the design and implementation of security scanning, protection against Distributed Denial of Service (DDoS) attacks and security auditing. The course also covers the use of the Data Loss Prevention API in protecting sensitive data.
Leveraging Network Interconnection Options on the GCP
This course focuses on network interconnections where one or both of the connected networks are on the GCP. This includes understanding peering and interconnect as well as how shared VPCs and static and dynamic VPN are implemented.
Linux Command Line Terminal Basic for Beginners (In Hindi)
This is an introductory course to the Linux command line & Learn from the Scratch (In Hindi) - Created in 2021
Linux Host Security
Why should you be interested in Linux Host Security, Linux is secure, isn't it? Those of us who are a little more paranoid understand that "nothing is secure" and will benefit from understanding how to lock up your host more securely than the default.
Linux Network and Host Security
Take your Linux sysadmin skills to the next level and keep moving along your LFCS/RHCSA and LFCE/RHCE path. This course introduces you to a deeper level of network and system administration. Topics include security concepts and architectures, securing networks and services with Linux, and remote access tools and techniques such as OpenSSH.
Linux Operating System: A complete Linux guide for Beginners
Linux Command Line, Ubuntu, shell scripting, bash shell, Linux Administration, Linux Operating system, IT job essentials
Linux Security Foundations
Linux Security
Linux: System Security (LPIC-2)
Security is an ever growing concern no matter which operating system you employ. This course will not only get you ready for your LPIC-2 202 exam but prepare you in securing your Linux Server.