Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
AZ-801: Configuring Windows Server Hybrid Advanced Services certification teaches advanced management of hybrid environments. Learn to configure security, troubleshoot, and optimize workloads across on-premises and cloud-based Windows Server infrastructure.
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
This comprehensive CCNA 200-301 Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam
Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation.
Cisco CCNP Security SCOR course at ITProTV is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data.
The Cisco CCT Routing and Switching course is not for the complete novice to computing and networking but is designed to increase the level of competency in networking fundamentals, configuring devices remotely, basic troubleshooting (layer 1 and layer 2) and recognizing connectivity issues.
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification.
This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies found in the CompTIA Network+ (N10-009)
This series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.
Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points.
The Cisco Modeling Labs 2 (CML2) is a redevelopment and rebranding of their VIRL1.x (Virtual Internet Routing Lab). This show is meant for those who may be familiar with VIRL 1.x or are brand new to it.
The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices.
Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Learn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.
This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform.
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.
Master Windows Admin Center to simplify server and infrastructure management. Enroll today!
The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.
Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.