Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Join Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.
The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.
Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation.
Cisco CCNP Security SCOR course at ITProTV is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data.
Cisco Firepower devices have become very popular in Enterprise environments and this course will provide the details you seek. This course also completely prepares you for the SNCF 300-710 exam!
The Cisco CCT Routing and Switching course is not for the complete novice to computing and networking but is designed to increase the level of competency in networking fundamentals, configuring devices remotely, basic troubleshooting (layer 1 and layer 2) and recognizing connectivity issues.
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification.
This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies found in the CompTIA Network+ (N10-009)
This series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.
As Canada continues to shift toward digital, fraudsters are following. In this session, LexisNexis Risk Solutions reveals proprietary cybercrime analysis conducted on over 3B Canadian transactions, as well as industry insights from leading Canadian fraud and risk management executives. With a double-digit increase in both human-initiated and bot attacks, is your organization prepared for an evolving Canadian fraud landscape?
Fundamentals of Cybersecurity Part 4 is an introduction to Cloud and Web Security.
Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.
Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points.
The Cisco Modeling Labs 2 (CML2) is a redevelopment and rebranding of their VIRL1.x (Virtual Internet Routing Lab). This show is meant for those who may be familiar with VIRL 1.x or are brand new to it.
The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices.
Join Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Dive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.
The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.
The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.
The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Learn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.
Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.
Join Prashant Chugh, Group Leader, C-DOT (Centre for Development of Telematics) in this seminar about quantum threats to security and a need for a new post-quantum cryptography.
Eric Hyman, Sr. Director at GTT, discusses the rise of Secure Access Service Edge (SASE) amidst remote work and multi-cloud adoption. Learn how managed service providers can help navigate these complex migrations. Act now to secure your network.
Join Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.
Join Theresa Lanowitz in a discussion of healthtech, edge computing, and cybersecurity on the edge.
This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.
Master Windows Admin Center to simplify server and infrastructure management. Enroll today!
Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.
The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.
Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.