This course is the first course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security...
Course Description
Students will learn how to protect each asset type and learn how to achieve asset protection. The course will also cover the different assets between small and medium businesses and larger corporations.
Before you are able to create these security standards, you must first...
Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.
Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics...
The learning path is divided into courses corresponding to the eight domains of the CISSP CBK. Each course contains videos and short quizzes on foundational topics (or sets of topics) within the domain. The quizzes go beyond the material covered in videos to introduce other topics covered in the...
What you’ll learn:
How to protect your home or business with a pfSense Firewall
Introduction to pfSense
Firewall Refresher
pfSense as a Perimeter Firewall
pfSense Installation Options
pfSense Hardware Requirements
Initial Setup
Adding DNS Servers to DHCP
Enabling SSH
Adding a User
Disabling...
You only need to pass one exam to get the MTA designation and the Microsoft Security Fundamentals is a great certification to earn when you’re just getting started.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You...
Security Fundamentals 10H 56M
You only need to pass one exam to get the MTA designation and the Microsoft Security Fundamentals is a great certification to earn when you’re just getting started.
Welcome to the Microsoft MTA Security Fundamentals series. This series is intended to explore the...
12 courses // 54 videos // 8 hours of training
Information Security Fundamentals training
This learning path builds on your existing IT knowledge and introduces you to fundamental information security concepts and areas. You’ll gain confidence in your cybersecurity skills as you progress...
ICS/SCADA Security Fundamentals training
This learning path introduces the challenges related to securing industrial control systems. You’ll build your ICS/SCADA knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion...
The content of the learning path is divided into Courses corresponding to four domains of Mobile Forensics. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics.
Link:
*** Hidden text: You do not have sufficient rights to...
What you’ll learn
Learn about all SDN tiers – applications, controllers and switches
Applications – Wireshark, Bash scripts, FlowMaker, HP Network Protector, HP Network Visualizer
Controllers – Learn OpenDaylight (ODL), ONOS, RYU and the HP VAN SDN Controllers.
OpenFlow Infrastructure –...
3.5 Hours of Video Instruction
Prepare for Exam MS-900 Microsoft 365 Fundamentals and demonstrate your foundational-level knowledge of cloud services and the Software as a Service (SaaS) cloud model.
Overview
This engaging, self-paced instructional video course introduces you to...
The bonus course is full of the basic concepts you need to truly understand TCP/ IP? an integral part of networking. We will help you gain a general comfort level for what TCP/ IP is and how to configure it on a basic network computer.
Video 1: What is a protocol?
Definition of a protocol
OSI...
In this Kali Linux training course you will learn about the industry standard tool for penetration and security testing.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the...
This cyber security architecture class aims to give an appreciation of the various aspects of consideration that goes into a proper security architecture.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
This course will enable students to install and configure a basic GNS3 network lab that could later be used for other networking courses such as ICND1 and ICND2. GNS3 is an open source, free software option for graphical network simulations that support a variety of vendor devices.
Link:
***...
In this online Microsoft Azure Fundamentals training course, students will learn basic cloud computing concepts and how these concepts are applied specifically to Microsoft Azure. Upon completion, students will be prepared to take the AZ-900 certification exam.
Link:
*** Hidden text: You do not...
In this course, you will learn the fundamentals of networking through the lens of a security practioner. More specifically, we will cover topics like network protocols, architecture, devices, and topology, which are vital for any entry level IT/Security professional.
Link:
*** Hidden text: You...
Linux Fundamentals for Security Practitioners provides an overview on how to properly configure a Linux OS to provide a secure computing environment for end users. We’ll cover a combination of materials, focusing on Linux architecture, permissions, commands, directories, and shells to achieve a...
In this course, you’ll learn various controls that need to be put in place to ensure that CIA triad of security is maintained while running a business. With threat expanding with time and more advanced attacks and data breaches being discovered, it is important for organizations to have proper...
In Secure Coding Fundamentals, Ayokunle Olaniyi takes you through the best coding practices, which ensures that the application developed as a result stick to the CIA triad and are not riddled by the OWASP top 10. Various aspects of code security and risk assesments across the OWASP top 10 are...
This course is about basics in Endpoint Security. In it, you will learn why endpoint security today is of such importance and basic terminology used in this field. Also, you will learn about threats that are existing today related to endpoints and what solutions and tools exist on the market...
In this course, the instructor covers the basics about wireless protocols which includes LTE, Bluetooth, Z-Qave, and zigbee. The instructor also goes more in-depth with Aircrack-NG by discussing the tools used to test the wifi networks, explaining how to install the tools on various OS, and...
In Pentest Fundamentals: Scanning Networks, we explain what scanning is and why its important for a security assessment or maintence. He also discusses NMAP and covers the various types of NMAP techniques to scan a target effectively. Hping, a cmd packet-crafting tool generally used as a network...
In this course, you will learn the fundamentals of Web Defense and Web Application security, with a focus on the Open Web Application Security Project OWASP Top 10 and how they approach the various vulnerabilities that can be found in said web applications.
Link:
*** Hidden text: You do not...
Course Description
The course will be divided into 6 modules, 2 labs and 2 case studies which will cover the mobile malware landscape, mobile architectures, static and dynamic analysis techniques and building your mobile analysis lab.
Course Goals
By the end of this course, students should be...
Course Description
Students will learn about basic ICS protocols and SCADA systems. Students will then be introduced to the threats and risks that are associated with ICS systems. This course will also teach students how ICS technology differs from the traditional enterprise networking...
Course Description
This course will also explore some of the benefits of privileged access management and best practices. The course will then discuss privileged access management in the context of Active Directory (AD) and perform hands-on labs.
Prerequisites
Students should have 1-2 years...
This course is designed for users looking for an understanding of how to navigate the internet securely. You will learn about Social Media, Public Cloud Storage and IoT, what they are, what the risks are and how to use your security and privacy settings on these platforms to better protect...
If you are into Cybersecurity, especially Social Engineering, you have probably come across OSINT, which stands for Open Source Intelligence. In this course, we will try to lay a good foundation on going forward with the subject. Firstly, we will go through what OSINT is and who actually uses...
Welcome to the Encryption Fundamentals course! In this course, we’ll explore the basic concepts of cryptography and encryption and discuss the history of the subject from ancient times to the modern day. We will also take a detailed look at how encryption works in practice and learn how we can...
Welcome to the Network Routing Fundamentals course! Network routing is the process of enabling computers to transfer data over networks, including the internet. This is an introductory course that is designed to give you a solid foundation in the basics of network routing. We will begin by...
Lab Guide of Kubernetes Fundamentals (LFS258)
English | Size: 1.72 MB
This course will give you a strong operating knowledge of Kubernetes, including how to deploy a containerized application and manipulating resources via the API. This course is designed as preparation for the Kubernetes...
Gain a profound understanding of cyber threats with our comprehensive course on “Cybersecurity: DoS and DDoS Attacks.” Delve into the world of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, exploring the techniques employed by malicious actors to disrupt critical...
Supercharge Your PC Mastery: Microsoft Windows System & User Administration Fundamentals Course!
Are you ready to elevate your tech game and become the ultimate Windows 10/11 wizard? Dive into the Microsoft Windows System & User Administration Fundamentals Course and unlock a world of...
If you are completely new to reverse engineering and malware analysis, then this course is for you. I will take you from zero to proficient level in reverse engineering and analyzing malware. You will learn using plenty of practical walk-throughs. We will learn the basics first then gradually...
Project Risk Management Fundamentals
Practical Risk Management for Tech Teams, with a Peek into Investment Front Office
Current Price: Free
Discount: 100% off
Original Price: $19.99
What you will learn:
Introduction to Project Risk Management
Understanding Positive vs Negative Risks
The Risk...
Market fundamentals are the backbone of currency valuation in the global financial system. While technical analysis focuses on charts and price patterns, fundamental analysis explains why currencies move. For traders, investors, and analysts in the Forex market, understanding market fundamentals...
Swing trading is one of the most balanced Forex trading styles, offering the perfect middle ground between fast-paced scalping and long-term position trading. In 2026, swing trading has become even more effective due to increased market volatility, clearer institutional structure, and improved...
In 2026, forex markets react instantly to economic news. While many traders fear news trading, professional traders understand that fundamentals move the market and technicals refine the entry. The key is not to gamble—but to trade news with structure, preparation, and risk control.
This post...
EUR/USD’s path toward parity isn’t just technical—it is fundamentally driven. The November 11, 2025 COT report highlights institutional positioning, but understanding macroeconomic forces explains why the euro is weakening and why parity is a logical outcome by January 20, 2026.
1. Eurozone...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Many traders focus exclusively on charts, indicators, or price action, ignoring the broader context of the market. Others rely solely on news and economic reports without understanding how markets behave technically. Strategic Forex trading lies in combining fundamentals with technicals...
What Drives Currency Values? The Big Picture
Think of a currency's value like a "grade" for its country's economic health and stability relative to others. Money tends to flow towards countries with stronger economies, higher returns, and greater stability, increasing demand for their currency...