All Courses

Try our all courses tutorials

— every online course includes free video tutorials. Become a member to keep learning, with unlimited access to the subscription library.
8 courses · 205 video tutorials
sort by:
  • view course page for Linux: Bash Shell and Scripts

    Linux: Bash Shell and Scripts

    with Kevin Dankwardt

    Get an introduction to Linux bash scripting. Learn how to read and write Linux bash scripts, complete with local variables, functions, loops, and coprocesses, and use sed and AWK.

    2h 46m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Session Hijacking

    Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. This course is part of our Certified Ethical Hacking test prep series.

    1h 10m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Enumeration

    Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.

    1h 43m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Scanning Networks

    Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

    1h 43m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Denial of Service

    Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.

    1h 28m
    Intermediate
     
    Viewers:

  • view course page for Ethical Hacking: Footprinting and Reconnaissance

    Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

    1h 20m
    Intermediate
     
    Viewers:

  • view course page for Introduction to Ethical Hacking

    What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.

    1h 12m
    Intermediate
     
    Viewers:

  • view course page for AWK Essential Training

    AWK Essential Training

    with David D. Levine

    Learn how to manipulate and format data with AWK, a Mac and Linux command-line tool.

    2h 1m
    Intermediate
     
    Viewers:

“I almost feel as if I am in a classroom but with the benefit of sitting at my home computer.” —Christine B.
more from our members »


Learn more, save more. Upgrade today!

Get our Annual Premium Membership at our best savings yet.

Upgrade to our Annual Premium Membership today and get even more value from your lynda.com subscription:

Testimonial“In a way, I feel like you are rooting for me. Like you are really invested in my experience, and want me to get as much out of these courses as possible this is the best place to start on your journey to learning new material.”— Nadine H.

Thanks for signing up.

We’ll send you a confirmation email shortly.


Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked
Terms and conditions of use

We've updated our terms and conditions (now called terms of service).Go
Review and accept our updated terms of service.