Showing 2305–2316 of 4028 results

IT Professional Fundamentals: Software Troubleshooting
IT technicians must be proficient not only in hardware troubleshooting, but they must also be able to solve software related problems. This course will teach you approach software issues using a structured approach that minimizes downtime.

IT Professional Fundamentals: Virtualization and Cloud Computing
Virtualization and cloud computing are at the core of every organization’s IT strategy. This course will teach you the basics and benefits of how to efficiently utilize both virtualization and cloud computing.

IT Security Champion: Cyber Threat Intel and Emerging Threats
In this course you’ll explore key cyber threats and prevention strategies, including an overview of cyber threat intelligence, emerging cyber risks, practical cyber hygiene tips, basic incident response, and more.

IT Security Champion: DNS
In this course, we will dive into the essentials of DNS and its security implications. This course will teach you how to protect and optimize your network's DNS infrastructure.

IT Security Champion: Encryption
Delve into encryption, a basic of IT security, through our beginner-friendly course. This course will teach you the foundational principles of encryption, which enhances security in your organization.

IT Security Champion: Network Security Monitoring
Security is everyone’s job now more than ever. This course will teach you what Network Security Monitoring (NSM) is, what tools are used, and how it can help you become a more effective IT administrator.

IT Security Champion: Patch Management
This course will teach you how patch management applies to IT security.

IT Security Champion: Pen Tests
This course will provide a brief overview of how a security pen test is used to discover systems which may be compromised by an unauthorized hacker.

IT Security Champion: Zero Trust
This course will teach you what Zero Trust is, the key tenets of Zero Trust, and a common use case to deploy it. The marketing fluff will be left aside, leaving you empowered to champion Zero Trust to your team.

Ivanti Avalanche Vulnerability: What You Should Know
Q&A session discussing the Ivanti Avalanche Vulnerabilities, covering a wide range of CVE’s mostly related to buffer overflow, Denial of Service, Server Side Request Forgery, (SSRF), and Remote Code Execution (RCE).

Ivanti Connect Secure VPN Vulnerability: What You Should Know
Q&A session discussing the Ivanti Connect Secure VPN Vulnerabilities, covering CVE-2023-46805 (authentication bypass) and CVE-2024-21887 (RCE/command injection).

Jaeger for distributed tracing with MicroProfile Telemetry
Learn how to use Jaeger for distributed tracing in microservices with MicroProfile Telemetry. Understand how to track and visualize microservice interactions, identify performance bottlenecks, and ensure seamless operation of complex systems with distributed tracing.