Start learning with our library of video tutorials taught by experts. Get started

Lisa Bock

Lisa Bock Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.

Lisa Bock is an assistant professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses Lisa has taught during the past 12 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and requirements analysis. She holds a MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities and has evaluated professional journals and manuscripts. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
10 courses
sort by:
  • view course page for Ethical Hacking: Social Engineering

    Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.

    1h 18m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: System Hacking

    Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

    1h 18m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Scanning Networks

    Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

    1h 43m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Footprinting and Reconnaissance

  • view course page for Introduction to Ethical Hacking

    What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.

    1h 12m
    Intermediate
     
    Viewers:

  • view course page for Foundations of IT Security: Network Security

  • view course page for Foundations of IT Security: Operating System Security

  • view course page for Foundations of IT Security: Core Concepts

    Prepare for MTA Exam 98-367. Learn the core concepts of operating system and network-level security to avoid threats and eliminate system vulnerabilities.

    1h 13m
    Beginner
     
    Viewers:

  • view course page for Essentials of Cryptography and Network Security

  • view course page for Troubleshooting Your Network with Wireshark

    Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions.

    2h 35m
    Intermediate
     
    Viewers:

“I am in love with the After Effects program and have already started to apply some animation on our web pages. Even at this baby-steps stage, it looks awesome. You guys are the best thing that ever happened.” —Ida P.
more from our members »

Try our tutorials

— every online course includes free video tutorials. Become a member to keep learning, with unlimited access to the subscription library.

Thanks for signing up.

We’ll send you a confirmation email shortly.


Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.