Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices.
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
The Cisco CCT Routing and Switching course is not for the complete novice to computing and networking but is designed to increase the level of competency in networking fundamentals, configuring devices remotely, basic troubleshooting (layer 1 and layer 2) and recognizing connectivity issues.
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification.
Cisco Firepower devices have become very popular in Enterprise environments and this course will provide the details you seek. This course also completely prepares you for the SNCF 300-710 exam!
The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.
The Cisco Modeling Labs 2 (CML2) is a redevelopment and rebranding of their VIRL1.x (Virtual Internet Routing Lab). This show is meant for those who may be familiar with VIRL 1.x or are brand new to it.
Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points.
Often the first technical AWS certification exam attempted by IT professionals, the AWS Solutions Architect - Associate certification addresses the skills and knowledge required to design secure, resilient, high-performing, and cost-optimized architectures in AWS.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Explore data's critical role in zero trust strategies with Hudl's CISO Robert LaMagna-Reiter and Dr. Lisa McKee of Protiviti. Learn about privacy and security coordination, overcoming challenges, and integrating zero trust to enhance organizational security and compliance.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Veracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.
Wahyu Agung Prasetyo, Thuraya Al-Harthi and Sujit Christy explore the evolving partnership between CIOs and CISOs in driving business enablement while maintaining robust cybersecurity.
PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.
Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.
Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.
Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.
Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.
Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.
Nity Singh, Umakant Tripathi, Lt Col Nishant Singh and Alok Shankar Pandey discuss how CISOs are evolving beyond risk reduction to become business enablers and catalysts for organizational change.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.
1 2 Next