Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (29)
  • Polish
  • ACI Learning 〈Firm〉,  (26)
  • Safari, an O'Reilly Media Company.
  • Internet videos  (29)
Datasource
Material
Language
  • English  (29)
  • Polish
Years
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835467503 , 1835467504
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by laying a solid foundation with an overview of capacity planning, ensuring you understand how to measure and optimize system resources effectively. It then dives into the technicalities of monitoring CPU, memory, disk, and network activity, crucial for maintaining system health and performance. The course focuses on deepening your understanding of Linux's core, including kernel components, modules, and the intricacies of compiling a kernel. You'll learn how to monitor and manage the kernel for peak efficiency, alongside exploring systemd and SysV init systems for better process management. Additionally, system recovery techniques, fstab configuration, and managing swap partitions are thoroughly covered to ensure system resilience. The course wraps up with practical skills in managing storage solutions, network configurations, and troubleshooting, alongside essential system administration tasks such as installing programs from source and effective backup strategies.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835885567 , 183588556X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with the basics of terminals and shells, setting the foundation for interaction with Linux at a fundamental level. It progresses to cover essential commands for navigating the filesystem and managing files, ensuring students can efficiently organize and manipulate data within the Linux environment. The journey continues through advanced topics such as process management, storage optimization, and package management across Debian and Red Hat systems, ensuring a well-rounded skill set. The course focuses on practical skills, including installing software from source, navigating text editors like vi, vim, and nano, and managing environment variables and file permissions. It emphasizes the importance of these skills in real-world scenarios, illustrating how they contribute to effective system administration and development practices. The course wraps up by exploring file systems, locating files, and utilizing other useful commands that streamline daily tasks. By the end of this course, students will have navigated through the most significant aspects of the Linux command line, equipped with the knowledge to apply these skills in a professional setting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835883525 , 1835883524
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by introducing you to the basics of terminals and shells, laying a solid foundation for command line proficiency. It methodically progresses through executing commands, offering three parts to ensure a thorough grasp of command functionalities and nuances. The course focuses on enhancing your Linux skills further with detailed explanations on filesystem management, permissions, and file editing with Vi, ensuring you can navigate and manipulate the Linux environment with ease. It covers essential topics such as finding files, managing processes, and executing scripts, providing you with the tools needed to optimize and automate your Linux tasks. The course wraps up by delving into advanced programming constructs, presented in two comprehensive parts to solidify your scripting and automation capabilities. Each section is designed to build on the previous, ensuring a seamless learning curve from beginner to advanced techniques. By the end of this course, you will have learned the art of leveraging Linux for powerful, efficient computing, making you an invaluable asset in tech-driven environments.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835883600 , 1835883605
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Computer science ; Systèmes d'exploitation (Ordinateurs) ; Informatique ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Linux, offering insights into its importance and widespread use in today's tech-driven world. You'll learn why Linux is the backbone of many servers, devices, and systems, and how its open-source nature fosters innovation and customization. The course focuses on choosing a Linux distribution, guiding you through the myriad of options available and helping you select the one that best fits your needs. This segment is crucial for understanding the diversity within the Linux ecosystem and how it caters to different user preferences and requirements. Next, we delve into choosing a desktop environment, emphasizing the significance of the user interface in your day-to-day interaction with Linux. You'll explore popular desktop environments, their features, and how to select one that aligns with your usability and aesthetic preferences. The course wraps up with a detailed walkthrough on installing software on Linux, covering various package managers and installation methods. This section is designed to equip you with the skills to extend the functionality of your Linux system and customize it to your liking.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887943 , 1835887945
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to mastering cybersecurity with our CompTIA CySA+ certification course, a pathway designed for those aspiring to become proficient cybersecurity analysts. This course comprehensively covers crucial topics like threat intelligence, vulnerability management, and incident response, ensuring you are well-prepared for the CompTIA CySA+ exam. As a globally recognized certification, CySA+ validates the essential skills and knowledge pivotal in the cybersecurity domain, making it a sought-after credential for professionals in the field. In this course, you will dive deep into practical aspects of cybersecurity, learning to analyze security logs, identify and address security incidents, and manage vulnerabilities effectively. A significant emphasis is also placed on the critical skill of effectively communicating security findings, a key component of a cybersecurity professional's role. By the end of this course, you will not only be prepared for the CySA+ exam but also equipped with the real-world skills needed to excel in the fast-evolving cybersecurity landscape, making the certification a valuable milestone in your career advancement. What you will learn Navigate the complexities of cybersecurity concepts and principles. Identify and mitigate malicious activities in network, host, and application security. Utilize a variety of cybersecurity tools for detection, analysis, and response. Master encryption mechanisms and IAM implementations for enhanced security. Understand the roles of DNS, IP reputation, and email security in cybersecurity. Engage in proactive threat hunting to pre-empt potential security breaches. Audience The CompTIA CySA+ (CS0-003) course is ideal for aspiring and current cybersecurity professionals, IT staff looking to specialize in security, and students in related fields. It's also perfect for compliance and risk management personnel, government or defense employees, and technical support staff seeking comprehensive cybersecurity knowledge. This course is a valuable resource for anyone aiming to pass the CySA+ certification exam or enhance their understanding of cybersecurity practices. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884768 , 1835884768
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the CompTIA Linux+ (XK0-005) course, your gateway to mastering the Linux operating system. Our comprehensive program equips learners with essential skills for navigating, securing, and administering Linux-based systems. Throughout this course, we cover an array of Linux essentials, ensuring a robust understanding of this powerful OS. You'll explore diverse topics, from installation and configuration to file management, storage setup, scripting, containerization, networking intricacies, and proficient troubleshooting techniques. The content presented is distribution-agnostic, ensuring applicability across various Linux distributions and fostering adaptability in any Linux environment. We will dive into the heart of Linux administration, gaining hands-on experience in installing, securing, and efficiently managing Linux systems. Uncover the power of the command-line interface, file, and directory operations, and navigate the Linux Filesystem Hierarchy Standard. Learn to troubleshoot performance issues, configure network settings, and implement robust security measures and alternative authentication methods. By the end of this course, you will not only be prepared for the CompTIA Linux+ certification but also equipped with practical skills for real-world Linux administration. What you will learn Understand fundamentals, installation, and configuration techniques Master navigation, editing, searching, and archiving in Linux Manage users, accounts, groups, and file permissions effectively Configure adapters, troubleshoot networks and secure remote connections Create and execute Bash scripts for task automation in Linux Learn partitioning, file system creation, mounting, and logical volume Audience This course is ideal for aspiring and current IT professionals, system administrators, and tech enthusiasts eager to deepen their Linux knowledge. A basic understanding of operating systems and familiarity with command-line interfaces are helpful but not mandatory. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Don Pezet: With over two decades in the IT domain and a spectrum of IT certifications, Don Pezet has dedicated over 12 years to IT education. Specializing in network and systems administration, Don's expertise extends into Linux, a topic he ardently teaches. His commitment extends to providing engaging, convenient, and impactful training, reflecting his aspiration to offer the guidance he wished for at the onset of his IT journey. Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9781835881446 , 1835881440
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with core cybersecurity concepts, creating a solid base for in-depth security management study. It dives into security principles, authentication factors, and control types, establishing fundamental cybersecurity knowledge. The course covers topics such as Zero Trust, physical security, and encryption complexities, including Public Key Infrastructure and digital certificates. The course also explores the diverse threat landscape, from social engineering to cloud and virtualization vulnerabilities, providing a comprehensive understanding of cyber threats. The course investigates various attack indicators, like malware and network attacks, boosting your threat identification and response capabilities. Key security infrastructure elements, including firewalls and secure communication, are discussed. The course also emphasizes practical applications in identity and access management, wireless security, and network device security. Vulnerability analysis and digital forensics are examined, readying you for both proactive and reactive cybersecurity roles. Concluding with governance, risk management, and compliance, this course prepares you for real-world cybersecurity challenges, making it a crucial tool for aspiring professionals. What you will learn Understand security control categories Learn Zero Trust and physical security Explore encryption and PKI solutions Identify and mitigate digital threats Secure networks and communication Implement comprehensive cybersecurity measures Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to specialize in cybersecurity. A foundational understanding of IT and basic security concepts is recommended. The course is perfect for those seeking to enhance their cybersecurity skills and apply them in various IT and network security roles. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT. Anthony Sequeira: Anthony Sequeira, our Edutainer, boasts a robust IT career since 1996 and a love for technology from various vendors. His extensive certifications cover CCIE R&S #15626, AWS, Cisco, CompTIA, Juniper, and Microsoft. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883068 , 1835883060
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Cloud computing Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course begins with a comprehensive exploration of cloud service models and deployment strategies, equipping professionals with the knowledge to navigate complex cloud environments. You'll deepen your understanding of cloud characteristics and remote connections, crucial for managing and executing cloud services effectively. This course also focuses on the intricate details of cloud network and storage concepts, ensuring you're well-versed in the technical underpinnings that make cloud computing so transformative. Learn to assess the financial implications of cloud technology and navigate vendor relationships, giving you an edge in cloud adoption and migration strategies. The course wraps up with a robust overview of cloud security and compliance, highlighting best practices in data protection and risk management. By integrating DevOps into your cloud repertoire, you'll emerge with a skill set that not only prepares you for the CompTIA Cloud Essentials+ exam but also for a successful career in cloud computing. What you will learn Enhance knowledge of cloud models Implement advanced cloud solutions Manage cloud security and compliance Strategize cloud financial planning Integrate DevOps in cloud practices Execute informed cloud migrations Audience Professionals with foundational cloud knowledge will find this course ideal for advancing their skills. It's suited for those with a grasp of basic IT principles, seeking to deepen their cloud expertise and prepare for the CompTIA Cloud Essentials+ exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Sophie Goodwin: Sophie Goodwin's background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. Distinctions: Bachelor of Science in Telecommunication, Voice-Over Talent Certification: (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883402 , 1835883400
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Electronic data processing personnel Certification ; Computer technicians Study guides Certification ; Microcomputers Study guides Maintenance and repair ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with a comprehensive look at mobile and desktop operating systems, delving into Windows, macOS, and Linux, setting you up with a versatile foundation in OS management. You'll explore installation requirements, system utilities, and command-line tools essential for today's IT professionals. The course focuses on enhancing your security knowledge, covering the spectrum from malware to social engineering, and enforcing best practices in workstation and mobile security. It also addresses the intricacies of securing web browsers and handling OS issues. The course wraps up by equipping you with critical skills for change management, backup strategies, and developing robust incident response capabilities, ensuring you're prepared to handle the complexities of IT environments. What you will learn Configure diverse operating systems Enhance system security protocols Resolve software application issues Secure network and web environments Organize IT documentation efficiently Implement backup and recovery methods Audience The course is ideal for individuals venturing into the IT field, requiring a foundational grasp of system operations and security. Suitable for those seeking CompTIA A+ certification, enhancing their troubleshooting and operational prowess. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882443 , 1835882447
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computer science Study guides Examinations ; Information technology Study guides Examinations ; Computer technicians Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course covers a wide array of foundational topics, providing a thorough understanding of the diverse aspects of IT. It starts with the basics of operating systems, delving into the intricacies of Microsoft Windows, Apple macOS, and GNU/Linux. As you progress, you'll explore the requirements for various business and productivity software, alongside essential collaboration tools. The course also demystifies the complexities of web browser settings and programming concepts, focusing on Python development. The journey continues with an in-depth look at hardware, including CPUs, common and peripheral devices, and storage solutions. You'll gain insights into basic networking concepts and learn to configure wireless routers, understanding different connection and service types. The course also covers vital database and security principles, offering a comprehensive view of table design, querying databases, and security best practices. As you delve into the intricacies of troubleshooting methodology and examples, you'll not only prepare for the FC0-U61 exam but also acquire skills crucial for real-world IT challenges. This course is designed to empower you with the knowledge and confidence needed to excel in today's tech-driven landscape. What you will learn Understand diverse Operating Systems Navigate Business Software requirements Learn about CPUs and Hardware essentials Explore Peripheral and Display Devices Acquire Basic Networking skills Explore Database Design and Querying Audience This course is ideal for beginners and professionals keen on IT fundamentals. Basic computer literacy is beneficial. Perfect for those preparing for the CompTIA IT Fundamentals+ exam or seeking a solid foundation in IT principles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886120 , 1835886124
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computer networks Examinations ; Electronic data processing personnel Certification ; Telecommunications engineers Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by grounding you in the OSI and TCP/IP models, network topologies, and types, ensuring you understand the backbone of modern networking. You'll delve into the world of virtualization, learn about different cable technologies, and explore IP addressing for both IPv4 and IPv6, laying the foundation for advanced networking concepts. The course focuses on enhancing your skills in network services, wireless standards, and security. It guides you through datacenter architecture, cloud concepts, and the tools for network troubleshooting, which are pivotal in today's technology-dependent businesses. The course wraps up by reinforcing security policies, disaster recovery planning, and the latest in cryptography. It equips you with strategies for safeguarding network environments, ensuring you can confidently tackle complex networking challenges and maintain system integrity. What you will learn Comprehend OSI and TCP-IP models Implement virtualization technologies Secure networks with encryption Apply disaster recovery principles Troubleshoot using network tools Execute advanced network solutions Audience This course is ideal for IT professionals seeking to expand their networking knowledge. Familiarity with basic networking concepts is recommended. It's perfect for those pursuing CompTIA Network+ certification and desiring to enhance their networking skill set in line with industry best practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883723 , 1835883729
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 28 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Computing Technology Industry Association Study guides Examinations ; Electronic data processing personnel Certification ; Computer technicians Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with a deep dive into the essentials of laptop and mobile device hardware, where you'll learn to identify, use, and connect a wide range of components and accessories. You'll become proficient in distinguishing between different ports, protocols, and networking hardware, grounding your knowledge in practical, real-world IT scenarios. The course focuses on building a robust foundation in wireless standards and networking principles. You'll also gain critical skills in configuring and managing network connections, understanding IP addresses, and mastering internet connectivity nuances. The course wraps up with an essential segment on troubleshooting methodologies. You'll learn to diagnose and resolve common hardware issues, ensuring devices operate smoothly. This end-to-end journey from hardware basics to practical troubleshooting equips you with the skills to tackle a variety of IT challenges confidently. What you will learn Learn network configurations Troubleshoot hardware issues Decode wireless protocols Manage IP and DNS settings Understand cloud services Apply effective troubleshooting Audience Ideal for aspiring IT professionals, this course lays a solid foundation for a career in tech support. Basic computer knowledge is recommended. This course is perfect for those pursuing CompTIA A+ certification as it provides a comprehensive understanding of modern IT infrastructures. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887424 , 1835887422
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 51 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Penetration testing (Computer security) Study guides Certification ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Informatique ; Personnel ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is meticulously designed to transform learners into skilled professionals in the field of penetration testing and vulnerability management. The course kicks off with an overview of the latest penetration testing skills and vulnerability assessment techniques. It progresses to unravel the complexities of regulations and compliance in the industry, discussing key mandates like PCI-DSS and GDPR. The course further delves into practical aspects of penetration testing such as legal concepts, documentation, standards, and methodologies. It covers critical elements like DNS and target reconnaissance, host discovery, and the use of various tools for defense detection and avoidance. You'll gain hands-on experience in vulnerability scanning, network segmentation testing, and exploring the intricacies of wireless and cloud attacks, among others. Beyond technical skills, the course emphasizes professionalism, integrity, and the significance of effective communication during engagements. It culminates in mastering the art of report writing and recommended remediations, ensuring a comprehensive understanding of the entire penetration testing process. From understanding the basics of penetration testing to analyzing scripts and automating tasks, you'll to be adept at identifying, exploiting, and mitigating security weaknesses. What you will learn Understand the fundamentals and challenges of application security Master risk management strategies and security analysis techniques Conduct penetration testing and exploit vulnerabilities Implement runtime protection in applications Apply security standards, requirements, and maturity models Create a comprehensive roadmap for application security Audience The ideal target audience for the CompTIA PenTest+ course includes cybersecurity professionals, IT security analysts, vulnerability testers, network security professionals, and anyone aspiring to build a career in penetration testing or enhance their skills in identifying and mitigating network vulnerabilities. It's also well-suited for individuals preparing for the CompTIA PenTest+ certification exam. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Ronnie Wong: Ronnie brings over 20 years of experience in the field of computers and technology, coupled with more than a decade dedicated to technical instruction. This extensive background is complemented by an impressive array of certifications: Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Technology Specialist (MCTS), and CompTIA's A+, Security+, Network+. Ronnie is also a certified IT Technician, holding the CCNA Security.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887349 , 1835887341
    Language: English
    Pages: 1 online resource (1 video file (26 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: "Mastering CASP+ Security Architecture and Operations"" is an extensive course designed for professionals seeking to deepen their knowledge in advanced security concepts and prepare for the CASP+ exam. The course journey begins with a thorough exploration of Security Architecture, covering crucial topics like network services, segmentation, and Zero Trust models, to build a robust security foundation. As you progress, you'll delve into Security Operations, learning to manage threats, vulnerabilities, and incident responses effectively. The course then transitions into Security Engineering and Cryptography, where you'll learn about managed configurations, deployment scenarios, and hardening techniques. This section also covers cryptographic protocols, offering insights into PKI, hashing, and asymmetric algorithms. The Governance, Risk, and Compliance module further enriches your understanding by diving into risk assessments, vendor management, legal considerations, and disaster recovery planning. Throughout this journey, you'll engage in practical scenarios and discussions, synthesizing theory and application. This course not only prepares you for the CASP+ exam but also equips you with skills transferrable to real-world IT security challenges. What you will learn Analyze and implement secure network architectures. Synthesize threat management strategies. Apply vulnerability assessment methods and tools. Execute effective incident response and forensic analysis. Configure and deploy secure cloud technologies. Implement and troubleshoot cryptographic solutions. Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone preparing for the CASP+ certification. It is suited for those looking to deepen their understanding of cybersecurity, improve their risk management skills, and stay updated with the latest in compliance and security architecture. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Adam Gordon: Adam Gordon, our edutainer, brings over three decades of IT instruction experience in both private and public sectors. With a remarkable record of holding more than 160 IT certifications, he has played a pivotal role in training thousands of IT professionals throughout his illustrious career. Mike Rodrick: Mike Rodrick, the host, boasts over 15 years of expertise in IT instruction. His journey includes a decade as a Microsoft Certified Trainer, and he joined the ITProTV Edutainer team in 2014. Mike's certifications include GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.".
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 39 min.)
    Edition: 1st edition.
    DDC: 006.3/1
    Keywords: Streaming video ; Internet videos ; Vidéo en continu ; Vidéos sur Internet ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: Join us for an event focused on the many aspects of designing, deploying, and maintaining responsible AI. Event chair and responsible AI expert Rumman Chowdhury offers overarching context, stitching together shorter tech talks and conversations with industry leaders. What you'll learn and how you can apply it Discover what responsible AI includes (and what it doesn't) See what responsible AI looks like in action, from data to deployment to debugging Learn how to debug your ML model Explore real-world applications of responsible AI Understand what industry leaders think about when they think about responsibility This course is for you because... You're a machine learning engineer or data scientist interested in responsible AI. You're engaged in conversations about ethics and AI. You're wondering how to improve your own AI and machine learning. You're responsible for implementing fair or ethical AI practices in your role or project and looking for hands-on examples. Recommended follow-up: Read Responsible Machine Learning (report) Read AI and the Law (report) Read Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow (book)
    Note: Online resource; Title from title screen (viewed June 16, 2021)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson | Boston, MA : Safari
    ISBN: 9780136875185 , 0136875181
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 20 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Electronic videos ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. C++20 Fundamentals LiveLessons with Paul Deitel is a code-oriented presentation of C++, one of the world,Äôs most versatile and powerful programming languages. C++ remains hugely popular for the development of systems software, embedded systems, operating systems, real-time systems, communications systems and other high performance computer applications. C++20 Fundamentals LiveLessons is comprehensive and covers all major versions of C++, including: C++11, C++17, and C++20. The code repository for this LiveLesson is kept at https://github.com/pdeitel/CPlusPlus20FundamentalsLiveLessons and will be kept up to date as lessons are added and as changes are made.
    Note: Online resource; Title from title screen (viewed June 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780136823483 , 0136823483
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 30 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 9 Hours of Video Instruction The Exam AZ-104 Microsoft Azure Administrator (Video) offers full coverage of the MS AZ-104 exam so you can learn everything you need to know to pass the exam. Coverage includes cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust, with the goal of passing the AZ-104 Exam. Description The Exam AZ-104 Microsoft Azure Administrator (Video) offers 9 full hours of video training on all core concepts in the AZ-104 exam so you can fully understand cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust. It will prepare Azure Administrators to implement, monitor, and maintain Microsoft Azure solutions, including major services related to compute, storage, network, and security. With 9 hours of hands-on demonstrations, it will provide the knowledge necessary to pass the exam and become Microsoft Certified: Microsoft Azure Administrator. With years of IT experience, numerous publications under his belt, and a wealth of expertise teaching in the field, Michael Shannon is uniquely qualified to prepare students for the Microsoft Azure Administrator AZ-104 exam. Topics include: Module 1: Manage Azure subscriptions and resources Module 2: Implement and manage storage Module 3: Deploy and manage virtual machines (VMs) Module 4: Configure and manage virtual networks Module 5: Manage identities About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, and Pearson, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He is the senior technical instructor for Skillsoft Corporation, specializing in all things cloud and security. Skill Level Intermediate/Advanced Learn How To Manage Azure subscriptions and resources Implement and manage storage Deploy and manage virtual machines (VMs) Configure and manage virtual networks Manage identities Who Should Take...
    Note: Online resource; Title from title screen (viewed June 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...