Multitask at the Linux command line and save time on common admin tasks. Learn how to switch between foreground and background tasks, control more than one process, and use tmux and screen.
- IT (10)
- Security (7)
- Network Administration (2)
- Operating Systems (2)
- Business Intelligence (1)
- Databases (1)
- Developer (1)
- IT and Hardware (1)
- Appropriate for all (959)
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
Get an introduction to Linux bash scripting. Learn how to read and write Linux bash scripts, complete with local variables, functions, loops, and coprocesses, and use sed and AWK.
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. This course is part of our Certified Ethical Hacking test prep series.
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Learn how to manipulate and format data with AWK, a Mac and Linux command-line tool.
“The site has given me an amazing renewal of long-lost inspiration. I feel I have my creativity back for the first time in many, many years.” —Louise L.
more from our members »