Want a custom domain name for your Linux server? Learn how to configure BIND DNS on a CentOS 7 server, including different zone types and security.
- IT (25)
- Security (10)
- Operating Systems (8)
- Network Administration (7)
- Developer (5)
- IT and Hardware (5)
- Databases (2)
- Servers (2)
- Business Intelligence (1)
- Desktop Apps (1)
- Development Tools (1)
- Games (1)
- Web Development (1)
- Open Source (14)
- Kali (11)
- EC-Council (8)
- Apache (2)
- MySQL (2)
- PHP (2)
- Apple (1)
- CentOS (1)
- Fedora (1)
- LAMP (1)
- Mac OS X (1)
- Microsoft (1)
- Steam (1)
- SteamOS (1)
- Ubuntu (1)
- Windows Server (1)
- Closed captioning
Learn how to identify vulnerabilities in your system and how to then take countermeasures to prevent unwanted access. Join cybersecurity expert Lisa Bock as she discusses the methods and tools hackers use to penetrate a network. She then explains how you can perform ethical hacking of your own system to detect and address susceptible areas.
Learn how to configure network interfaces and client-side services, including firewalls and routing, on Linux.
Multitask at the Linux command line and save time on common admin tasks. Learn how to switch between foreground and background tasks, control more than one process, and use tmux and screen.
Set up an environment for learning Linux. Learn how to install CentOS on a virtual machine and explore GNOME, the open-source desktop environment for Linux.
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
Malware is often the first line of attack. Learn how to detect and neutralize malware such as viruses and worms in this course from our Certified Ethical Hacker test prep series.
Hackers use sniffing to intercept network traffic. Explore sniffing and discover how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
Get an introduction to Linux bash scripting. Learn how to read and write Linux bash scripts, complete with local variables, functions, loops, and coprocesses, and use sed and AWK.
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. This course is part of our Certified Ethical Hacking test prep series.
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Master the fundamentals of configuring and troubleshooting the Linux kernel. Learn how to read and write proc files, work with loadable kernel modules and source code, and configure the kernel.
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
Learn the fundamentals of administering and managing DNS servers on Windows, Linux, and Mac machines using dig and other DNS server technologies.
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Meet Kali Linux, the operating system for ethical hackers, digital forensics experts, and penetration (pen) testers. Learn how to use and install Kali Linux and its toolsets for vulnerability assessment, password cracking, and more.
Find out how to use the Linux command line and Bash shell. Learn Linux commands to navigate through the file and folder structure, edit text, set permissions, and install and update software on Linux machines.
Migrating to Linux from Mac or Windows? Get up and running with Fedora, a popular desktop Linux distribution. Learn how to get around the interface, work with files and folders, perform basic computing tasks, and even configure a simple server.
Learn how to install and configure Apache, MySQL, and PHP, known collectively as the AMP stack, on a local development computer. These tutorials work with Windows, Mac OS X, and Linux systems.
Learn how to install CentOS, perform common admin tasks from the command line, and get popular services running.
Learn how to install and set up Ubuntu as your main operating system or on a virtual machine, navigate the desktop, and work with popular Linux desktop programs.
Need a powerful development environment? Learn how to quickly install and configure a virtual Linux web server on your Mac or Windows computer.
Learn what SteamOS, the Linux-powered operating system from the popular game distributor Steam, has to offer for game players and developers.
Learn how to manipulate and format data with AWK, a Mac and Linux command-line tool.
“I absolutely love the quality and diversity of the training. It is my go-to site for answers.” —Maryanne F.
more from our members »