Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
From baby monitors to printers, tablets and automobiles, home offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable. In the remote work era, it is more important than ever that cybersecurity teams ensure that their networks and critical infrastructure are well-secured, even when endpoints have been compromised.
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
The CertNexus Certified Internet of Things Practitioner examination will prepare an individual with the skills necessary to evaluate, design, and create an internet of things solution.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
As Canada continues to shift toward digital, fraudsters are following. In this session, LexisNexis Risk Solutions reveals proprietary cybercrime analysis conducted on over 3B Canadian transactions, as well as industry insights from leading Canadian fraud and risk management executives. With a double-digit increase in both human-initiated and bot attacks, is your organization prepared for an evolving Canadian fraud landscape?
ICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.
The proliferation of IoT devices, both at home and in the office, has significantly expanded the attack vectors for bad actors trying to gain a foothold on your network. Learn to pentest them today!
Panel featuring leaders Dhananjay Rokde, Jasbir Singh Solanki and Sujit Christy explore tactics and techniques for IoT/OT device security and risk remediation.
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Join John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.