Get an introduction to Linux bash scripting. Learn how to read and write Linux bash scripts, complete with local variables, functions, loops, and coprocesses, and use sed and AWK.
- IT (8)
- Security (6)
- Business Intelligence (1)
- Databases (1)
- Developer (1)
- IT and Hardware (1)
- Network Administration (1)
- Operating Systems (1)
- Appropriate for all (945)
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. This course is part of our Certified Ethical Hacking test prep series.
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Learn how to manipulate and format data with AWK, a Mac and Linux command-line tool.
“You guys have helped change my life forever. I'm so very grateful.” —Donni R.
more from our members »