Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities.
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
The CertNexus Certified Internet of Things Practitioner examination will prepare an individual with the skills necessary to evaluate, design, and create an internet of things solution.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
This course is designed for aspiring or current IT professionals who want to learn how to fulfill the role of an entry or associate-level cybersecurity analyst. Start today!
CASP+ covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The certification is designed for advanced security professionals that have knowledge of Security+
The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification
CyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. Get Started Today!
The Certified Ethical Hacker(CEH) v12 course is designed to give the student a foundational knowledge base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.
The GIAC Security Essentials (GSEC) is designed for Security Professionals who want to demonstrate that they are qualified for IT systems hands-on roles with respect to security tasks.
Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization's critical assets
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.
Master Microsoft Endpoint Manager and Intune to streamline device management and enhance security.
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.
This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
SC-200: Microsoft Security Operations Analyst certification focuses on managing and mitigating security threats using Microsoft tools.
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.
This course will acquaint learners with the new Windows Terminal Application.
The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.