Get $1 credit for every $25 spent!

The Complete Information Security Certification Bundle

Ending In:
Add to Cart - $31
Add to Cart ($31)
$1,150
97% off
wishlist
(12)
Courses
7
Lessons
652
Enrolled
113

What's Included

Product Details

Access
Lifetime
Content
10 hours
Lessons
78

NGINX: Beginner to Advanced 2019

Beginner's Guide to Master the HTTP Protocol & NGINX

By Zeal Vora | in Online Courses

NGINX is one of the top-grade HTTP servers, powering many top enterprise websites like Netflix, Dropbox, WordPress, GitHub, Discovery, and many others. This beginner-friendly course is designed to help you master NGINX, regardless of your previous experience.

  • Access 78 lectures & 10 horus of content 24/7
  • Build a solid foundation for HTTP Protocol
  • Master NGINX
  • Use NGINX in a high-performance enterprise environment

Instructor

Zeal Vora works as a DevSecOps Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Having taught to more then 50,000+ students, he currently enjoys being one of the top instructors in his field.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Requirements

  • Internet required

Course Outline

  • Setting Up Labs
    • Introduction to Dockers - 11:01
    • Setting up MobaXterm - 2:58
    • Setting up Docker Environment - 11:55
    • Introduction to Nginx Plus Offering - 4:27
    • Subscribing to NGINX Plus Subscription (New) - 6:16
  • HTTP Protocol
    • Introduction to Protocols (New) - 4:46
    • HTTP - Protocol (New) - 7:31
    • HTTP - GET (New) - 9:10
    • HTTP - Partial GET (New) - 13:10
    • HTTP - Conditional GET (New) - 6:06
    • HTTP POST - 5:32
    • HTTP - Head (New) - 4:45
    • HTTP Trace - 6:12
    • HTTP - OPTIONS Header (New) - 7:01
    • HTTP Request Methods (New) - 4:51
    • HTTP Response Status Code (New) - 6:50
  • Getting Started with NGINX
    • Installing Nginx on Docker (New) - 8:39
    • Understanding NGINX Architecture (New) - 11:53
    • NGINX Configuration - Events and HTTP (New) - 6:54
    • NGINX Configuration - Include directive (New) - 5:48
    • Creating Virtual Hosts in NGINX (New) - 9:49
    • MIME Types (New) - 17:16
  • Reverse Proxy
    • Introduction to Reverse Proxy (New) - 8:04
    • Configuring NGINX as a Reverse Proxy (New) - 13:37
    • Need for X-Real-IP (New) - 7:57
    • Atom Document
    • Proxy Host Header (New) - 7:26
  • Load Balancers
    • Introduction to Load Balancers - 3:55
    • Simple Load Balancer with NGINX Docker - Practical - 7:08
    • Health Checks in Load Balancer (New) - 6:34
    • Understanding Passive Health Monitoring (New) - 5:27
    • Parameter Configurations in Passive Health Checks (New) - 5:38
    • Active vs Passive Health Monitoring - 5:09
    • Understanding Active Health Monitoring (New) - 8:49
    • Match Condition (New) - 9:16
    • Shared Memory & Active Health Monitoring - 7:02
    • Load Balancer - Server Weights (New) - 3:49
    • Least Connect Method - 9:57
  • The Caching Subsystem
    • Introduction to HTTP Caching (New) - 10:53
    • Understanding the HTTP Cache Control Headers (New) - 6:56
    • Cache Control Headers: no-store (New) - 6:56
    • Adding no-store response header in Nginx (New) - 4:13
    • If-Modified-Since Header (New) - 7:06
    • Introduction to Cache-Control Headers - 10:04
    • The Q Factor - 10:01
    • Cache Control : no-cache and must-re validate - 8:07
    • Cache Control Headers : max-age & s-max-age - 10:49
    • Cache Time & Browser Analysis - 3:18
    • Expires Header - 7:51
    • Understanding the Keep Alive connections - 10:46
    • Date & Expires Header - 7:57
  • Static Assets
    • Understanding Static Assets - 6:31
    • Configure Reverse Proxy with Static Assets - 11:51
  • Access Control
    • White Listing - 5:59
    • limit_connection module - 14:38
    • Basic Authentication - 9:48
    • Basic Authentication Practical - 4:13
    • Understanding Hashing ( IHT ) - 17:06
    • Understanding Digest Authentication - 7:18
    • Digest Authentication Practical - 7:18
    • GeoIP - 15:35
  • Logging Subsystem
    • Access Logs - 11:32
    • Configuring Custom Access Logs - 6:04
    • Error Logs - 6:58
  • HTTP Compression
    • HTTP Compression - 7:00
    • Accept Content Encoding - 10:23
    • Getting started with Gzip for Nginx - 7:39
  • Yet To Decide
    • HTTP Referrer - 11:57
    • Accept Language & Content Language - 5:42
  • Web Application Firewall
    • Understanding the Modular NGINX Architecture - 6:58
    • Compiling Nginx from Source - 12:15
    • Web Application Firewall - 5:40
    • Installing & Configuring WAF on Nginx - 15:35
    • WAF - Custom Messages on Rule Matching Patterns - 2:14
  • Cryptography Module
    • Understanding Asymmetric Key Encryption ( IHT ) - 9:47
    • HTTPS Internal Working ( IHT ) - 6:55
    • SSL with Nginx - 13:16
    • SSL Termination - 6:39

View Full Curriculum


Access
Lifetime
Content
8 hours
Lessons
94

Docker Certified Associate 2019

Prepare for the Docker Certified Associate Certification Exam

By Zeal Vora | in Online Courses

This course is designed from scratch for anyone who is new to Docker and the concept of containers. With quizzes to fortify your learning, this extensive course will help you pass the Docker Certified Associate certification exam on your first try.

  • Access 94 lectures & 8 hours of content 24/7
  • Get a crash course in Docker
  • Work w/ Docker images & registries
  • Get an overview of Docker networking & container orchestration
  • Discuss Docker storage drivers

Instructor

Zeal Vora works as a DevSecOps Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Having taught to more then 50,000+ students, he currently enjoys being one of the top instructors in his field.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Getting Started with Dockers
    • Overview of the Course - 4:32
    • Introduction to Docker Containers - 11:01
    • Installing Docker - 6:26
    • Installing Docker in Linux - 2:37
    • Document - Linux Installation Commands
    • Docker Image vs Docker Containers - 8:21
    • Container Identification - 5:33
    • Port Binding - 5:49
    • Attached and Detached Modes - 3:38
    • Removing Docker Containers - 3:58
    • New Docker CLI Commands - 2:40
    • docker container exec - 9:53
    • Importance of IT flags - 5:25
    • Default Container Commands - 5:15
    • Overriding Default Container Commands - 6:02
    • Restart Policies in Docker - 5:52
    • Removing Docker Container Images - 1:05
    • Disk Usage Metrics for Docker Components - 4:29
    • Automatically Delete Container on Exit - 3:06
  • Image Creation, Management, and Registry
    • Working with Docker Images - 5:58
    • Overview of Dockerfile - 13:43
    • Document - Dockerfile
    • COPY vs ADD Instructions - 9:30
    • Dockerfile - HEALTHCHECK Instruction - 6:13
    • Dockerfile - ENTRYPOINT Instruction - 4:15
    • Tagging Docker Images - 4:21
    • Docker Commit - 7:25
    • Layers of Docker Image - 15:03
    • Managing Images with CLI - 5:38
    • Inspecting Docker Images - 7:15
    • Pruning Docker Images - 4:58
    • Flattening Docker Images - 5:09
    • Overview of Docker Registries - 10:31
    • Pushing Images to Central Repository - 5:08
    • Applying Filters for Docker Images - 3:53
  • Networking
    • Overview of Docker Networking - 11:49
    • Understanding Bridge Networks - 7:45
    • Implementing User-Defined Bridge Networks - 12:18
    • Understanding Host Network - 8:24
    • Implementing None Network - 2:53
    • Publish All Argument for Exposed Ports - 3:55
    • Legacy Approach for Linking Containers - 3:12
  • Orchestration
    • Overview of Container Orchestration - 10:57
    • Overview of Docker Swarm & Building Labs - 4:50
    • Document - Docker Script
    • Initializing Docker Swarm - 6:39
    • Services, Tasks and Containers - 7:09
    • Document - Replicated Service CLI Command
    • Scaling Swarm Service - 7:09
    • Document - Scaling Service CLI Command
    • Multiple Approaches to Scale Swarm Services - 5:19
    • Replicated vs Global Service - 3:49
    • Document - Global Service CLI Command
    • Draining Swarm Node - 4:16
    • Document - Drain CLI Commands
    • Inspecting Swarm Service and Nodes - 4:00
    • Adding Network and Publishing Ports to Swarm Tasks - 4:01
    • Overview of Docker Compose - 9:43
    • Document - Docker Compose YAML
    • Deploying Multi-Service Application in Swarm - 4:59
    • Document - Docker Stack CLI commands
    • Locking Swarm Cluster - 4:45
    • Document - AutoLock Commands
    • Troubleshooting Swarm Service Deployments - 3:55
    • Mounting Volumes via Swarm - 3:54
    • Document - Mount Volumes with Swarm
    • Control Service Placement - 6:46
    • Overview of Overlay networks - 5:42
    • Creating Custom Overlay Networks for Swarm - 4:49
    • Secure Overlay Networks - 3:43
    • Creating Swarm Services using Templates - 4:59
    • Split Brain & Importance of Quorum - 8:19
    • High Availability of Swarm Manager Nodes - 11:14
    • Running Manager-Only nodes in Swarm - 4:22
    • Recover from losing the quorum - 7:28
    • Document - Forcing New Cluster
    • Docker System Commands - 5:50
  • Storage and Volumes
    • Overview of Docker Storage Drivers - 18:29
    • Block vs Object Storage - 7:17
    • Changing Storage Drivers - 6:10
    • Document - Changing Storage Drivers
    • Overview of Docker Volumes - 16:01
    • Bind Mounts - 8:43
    • Document - Bind Mounts
    • Automatically Remove Volume on Container Exist - 7:03
    • Overview of Device Mapper - 6:24
  • Exam Preparation Section
    • Overview of DCA & Exam Experience - 11:12
    • Overview of Important Pointers for Exams - 4:53
    • Important Pointers for Exams - Domain 1 - 10:09
    • Important Pointers for Exams - Domain 2 - 11:39
    • Important Pointers for Exams - Domain 3 - 6:29
    • Important Pointers for Exams - Domain 4 - 8:20
    • Important Pointers for Exams - Domain 5 - 4:01
    • Important Pointers for Exams - Domain 6 - 2:43

View Full Curriculum


Access
Lifetime
Content
11 hours
Lessons
93

Splunk: Beginner to Architect 2019

The All-in-One Course to Mastering Splunk

By Zeal Vora | in Online Courses

Splunk captures, indexes, and correlates real-time data in a searchable repository, making it easy to visualize data in graphs, dashboards, and more. This course is specifically designed for beginners who want to master Splunk. Starting from the ground up, you'll build a solid foundation in Splunk step by step.

  • Access 93 lectures & 11 hours of content 24/7
  • Master various aspects rated to writing SPL queries
  • Build Splunk dashboards
  • Explore distributed Splunk architectures
  • Build a highly-available clustered setup for Splunk

Instructor

Zeal Vora works as a DevSecOps Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Having taught to more then 50,000+ students, he currently enjoys being one of the top instructors in his field.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Getting Started
    • Introduction to the Course - 2:40
    • Download Links - Tutorial Data, Samples and Logs
  • Introduction to Splunk & Setting Up Labs
    • Introduction to Splunk - 6:50
    • Introduction to Docker Containers - 9:47
    • Setting up Docker Environment - 11:55
    • Installing Splunk - Docker Approach - 6:16
    • Installation Manual - Docker and RPM - 6:32
    • Installing Splunk - RPM Approach - 6:32
    • Data Persistence for Container Volumes - 7:26
    • Important Pointer for Docker in Windows - 3:15
    • Document - Persistent Docker Volume
    • Splunk Licensing Model - 4:56
    • Splunk Developer 10GB License - 2:35
    • Importing License into Splunk - 2:02
  • Getting Started with Splunk
    • Importing Data to Splunk - 12:03
    • Sample Tutorial Logs
    • Security Use-Case - Finding Attack Vectors - 14:45
    • Search Processing Language (SPL) - 18:35
    • Splunk Search Assistant - 4:24
    • Splunk Reports - 6:39
    • Splunk Report - Email Clarification (Followup) - 1:22
    • Understanding Add-Ons and Apps - 12:42
    • Splunk Add-On for AWS - 10:14
    • Splunk App for AWS - 11:29
    • Overview of Dashboards and Panels - 7:41
    • Building Dashboard Inputs - Time Range Picker - 7:29
    • Building Dashboard Inputs - Text Box - 5:34
    • Building Dashboard Inputs - Drop down - 5:48
    • Building Dashboard Inputs - Dynamic DropDown - 3:24
  • Splunk Architecture
    • Directory Structure of Splunk - 10:48
    • Splunk Configuration Directories - 11:44
    • Splunk Configuration Precedence - 6:09
    • Splunk Configuration Precedence - Apps and Locals - 4:05
    • Introduction to Indexes - 12:36
    • Bucket Lifecycle - 17:18
    • Warm to Cold Bucket Migration - 7:28
    • Archiving Data to Frozen Path - 8:14
    • Thawing Process - 6:21
    • Splunk Workflow Actions - 5:58
  • Forwarder & User Management
    • Overview of Universal Forwarders - 4:49
    • Installing Universal Forwarder in Linux - 14:47
    • Installation Manual - Splunk Universal Forwarder
    • Challenges in Forwarder Management - 6:57
    • Introduction to Deployment Server - 8:43
    • ServerClass and Deployment Apps - 11:27
    • Creating Custom Add-Ons for deployment - 11:51
    • Pushing Splunk Linux Add-On via Deployment Server - 8:54
  • Post Installation Activities
    • Understanding Regular Expressions - 15:49
    • Regex - Exercise
    • Parsing Web Server Logs & Named Group Expression - 10:05
    • Sample - Web Server Logs
    • Importance of Source Types - 7:41
    • Interactive Field Extractor (IFX) - 5:50
    • props.conf and transforms.conf - 16:43
    • Sample Log - MySQL Error Logs
    • Splunk Event Types - 6:15
    • Tags - 6:53
    • Splunk Events Types Priority and Coloring Scheme - 7:12
    • Splunk Lookups - 13:51
    • Splunk Alerts - 7:17
  • Security Primer
    • Access Control - 10:26
    • Creating Custom Roles & Capabilities - 10:51
  • Distributed Splunk Architecture
    • Overview of Distributed Splunk Architecture - 7:14
    • Understanding License Master - 5:06
    • Implementing License Master - 5:43
    • License Pools - 6:12
    • Indexer - 4:51
    • Masking Sensitive Data at Index Time - 6:17
    • Search Head - 3:50
    • Splunk Monitoring Console - 6:32
  • Indexer Clustering
    • Overview of Indexer Clustering - 4:19
    • Deploying Infrastructure for Indexer Cluster - 7:18
    • Document - Deploying Indexer Cluster Docker Containers
    • Master Indexer - 7:45
    • Peer Indexers - 6:21
    • Testing Replication and Failover capabilities - 9:29
    • Configuration Bundle - 10:32
    • Configuration Bundle - Part 02 - 4:37
    • Forwarding Logs to Indexer Cluster - 11:34
    • Indexer Discovery - 10:02
    • Indexer Discovery - Document
  • Searching Head Clustering
    • Overview of Search Head Clusters - 3:50
    • Deploying Infrastructure for Search Head Cluster - 6:43
    • Configuring Cluster Setup on Search Heads - 12:00
    • Search Head Clustering Setup - Document
    • Validating Search Head Replication - 2:18
    • Pushing Artifacts through Deployer - 6:50
    • Connecting Search Head Cluster to Indexer Cluster - 6:02
    • SH to IDX Cluster Document
  • Advanced Splunk Concepts
    • Using Btool for Troublshooting - 8:53
    • Overview of Data Models - 5:08
    • Creating Data Model - Practical - 13:31
    • Splunk Support Programs - 8:06

View Full Curriculum


Access
Lifetime
Content
22 hours
Lessons
146

AWS Certified Solutions Architect - Associate Certification 2019

Study to Earn One of Today's Most Important Cloud Computing Certifications

By Zeal Vora | in Online Courses

Amazon Web Services (AWS) is the leading cloud computing platform and this course is designed for anyone who is aspiring to enter the cloud computing field. This industry is booming and lucrative jobs are opening up every day. In this course, you'll study to ace the AWS associate-level certification exam, giving you a leg up to break into the business.

  • Access 146 lectures & 22 hours of content 24/7
  • Build a foundation in cloud computing & AWS
  • Master concepts related to infrastructure, storage, security, identity management, & many more

Instructor

Zeal Vora works as a DevSecOps Engineer, and his domain of expertise lies in Linux & Information Security. He holds many professional certifications, including Certified Ethical Hacker, RedHat Certified Engineer, VMware Certified Associate for Cloud Computing, Data Center Virtualization, Workforce Mobility. Having taught to more then 50,000+ students, he currently enjoys being one of the top instructors in his field.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Fundamentals of Cloud Computing Platform
    • Introduction to Cloud Computing - 11:50
    • Cloud Computing Models - 6:26
    • Architecture of Cloud Environment - 10:17
    • On-Demand & Self Service - Characteristics of Cloud - 2:45
    • Characteristic of CSP - Elasticity - 8:12
    • Characteristic of CSP - Elasticity 02 - 7:03
  • Infrastructure & Networking
    • Introduction to Amazon Web Services - 11:03
    • AWS Global Infrastructure - 11:39
    • Setting up LAB environment - 5:08
    • Launching our first EC2 instance - 12:02
    • Introduction to Network Switches & Virtual Private Cloud - 20:46
    • VPC - Part 2 ( Routing ) - 10:26
    • VPC & Subnetworks - 9:53
    • Internet Gateways - 10:59
    • Public & Private Subnets - 5:39
    • Public & Private Subnets - Practical - 14:01
    • IP Addressing in AWS - 16:40
    • Deploying full VPC based EC2 Infrastructure - 13:19
    • Understanding EC2 Instance Types - 8:58
    • EC2 Pricing Models - 18:54
    • Understanding VPC Peering - 4:56
    • VPC Peering - Part 02 - 8:50
    • Inter Region VPC Peering - 7:40
    • EC2 Placement Groups - 19:43
    • Understanding basics of Firewalls - 15:31
    • Understanding AWS Firewall - Security Groups - 5:09
    • Network ACL (NACL) - 9:17
  • Storage
    • Introduction to Block & Object storage mechanism - 7:17
    • Introduction to Elastic Block Store - 6:21
    • Feature of EBS - Portability - 14:03
    • Understanding NAS Solutions - 5:24
    • Feature of EBS - Elasticity - 14:06
    • Understanding Virtualization Snapshots - 10:18
    • EBS Snapshots - 8:05
    • EBS - Volume Types - 16:48
    • Instance Store Volumes - 16:39
    • Introduction to Simple Storage Service (S3) - 16:38
    • Features of S3 - Storage Classes - 11:55
    • Features of S3 - Version Control - 6:02
    • Feature of S3 - Lifecycle Management - 8:25
    • Features of S3 - Cross Region Replication - 8:01
    • Understanding AWS Storage Gateway - 13:10
    • Snowball - 9:35
  • High Availability
    • Understanding High Availability Configuration - 13:52
    • RTO & RPO - 6:35
    • Getting started with Elastic Load Balancers - 7:37
    • ELB Configuration - Health Checks - 12:14
    • Configuring our first ELB - 8:23
    • ELB - Nodes & Availability Zones - 9:31
    • ELB Configuration - Cross Zone Load Balancing - 5:59
    • Overview of Elastic File System (EFS) - 6:43
    • Creating our First EFS - 10:31
  • Characteristic of Cloud - Elasticity
    • Introduction to Auto Scaling - 9:45
    • Auto Scaling - Practical - 10:25
    • Auto Scaling - Scaling Up Operations - 6:51
    • Auto Scaling - Scaling Down Operations - 3:45
    • Auto Scaling Plans - 8:37
  • Identity & Access Management
    • Understanding the principle of least privilage - 10:40
    • POLP - It starts with ROOT - 5:09
    • Introduction to Identity & Access Management (IAM) - 9:23
    • Understanding the IAM Policies - 15:25
    • IAM Policy Evaluation Logic - 11:57
    • AWS CLI - 11:54
    • IAM Role - 11:32
    • EC2 Instance Metadata - 8:13
    • IAM - Credential Reports - 7:44
    • Understanding working of an IAM role - 8:03
    • AWS STS - 7:46
  • Cryptography Kung Fu
    • Introduction to Cryptography - 12:14
    • Understanding communication Protocols - 4:46
    • Plain Text vs Encrypted Protocols - 7:07
    • Challenge with storing encryption keys & Intro to CloudHSM - 6:36
  • Serverless Architecture
    • Introduction to Serverless Computing - 8:52
    • Getting started with AWS Lambda - 11:16
    • Introduction to API - 15:30
    • Understanding working of API - 9:54
    • Building the function for our API - 4:18
    • Building our API with API Gateway - 6:03
  • Database Primer
    • Introduction to Relational Databases - 13:33
    • Installing an RDMS system in an EC2 instance - 5:17
    • Creating our first database structure in MySQL - 11:10
    • Understanding the INSERT statements - 5:44
    • Primary Key & Null Values - 7:39
    • Getting started with AWS RDS - 11:50
    • Connect to RDS via CLI and MySQL Workbench - 6:29
    • Understanding the Parameter & Subnet Groups in RDS - 12:29
    • Creating our first blog and connect it with RDS - 13:07
    • Exploring the Wordpress database structure in RDS - 6:40
    • Implementing Read replicas - Part 01 - 8:24
    • Implementing Read replicas - Part 02 - 10:47
    • Understanding RDS Snapshots - 5:40
    • Multi-AZ Architecture for RDS - 6:39
    • Understanding NoSQL Database - 7:59
    • Getting started with DynamoDB - 12:22
    • DynamoDB queries with CLI - 11:58
    • DynamoDB - Consistency Models - 5:43
    • Real World Use Case for NoSQL Database - 7:13
    • DynamoDB - Read & Write Capacity Units - 7:32
  • Building Scalable Applications
    • Introduction to Message Brokers - 11:48
    • Message Broker - Practical - 5:22
    • Introduction to SQS - 10:48
    • SQS - Understanding "Visibility Timeout" parameter - 6:34
    • SQS - Understanding different polling methods - 6:41
    • SQS - Understanding different queue types - 4:53
    • Understanding Simple Notification Service (SNS) - 6:01
    • Implementing SNS - Practical - 6:42
  • Domain Name System
    • Introduction to DNS - 7:56
    • Traffic packet capture of DNS packets - 9:20
    • Understanding DNS Records - 9:39
    • DNS Records - A & AAAA - 8:28
    • Introduction to Route53 - 5:40
    • Integrating Route53 with VPC - 4:30
    • DNS Records - CNAME & Alias - 9:29
    • DNS Records - Mail Exchange - 4:29
    • DNS Records - TXT records - 3:27
    • Advanced Route53 Configurations - 6:40
    • Route53 - Health Checks - 8:09
    • Implementing Health Checks with Route53 for Nginx - 9:30
    • Understanding Route53 FailOver Routing Policy - 5:47
  • Analytics
    • Understanding Streaming Data - 6:16
    • Configuring our first streams in AWS Kinesis - 11:41
    • AWS Kinesis - Practical - 11:41
    • AWS Import / Export - 16:47
    • Elastic Map Reduce - 13:11
    • Business Intelligence & Data Warehouse - 15:06
    • Understanding RedShift - 12:54
    • AWS SWF - 5:57
  • The DevOps Section
    • Introduction to Infrastructure as a Code - 14:56
    • Understanding CloudFormation - 6:16
    • AWS Elastic Beanstalk - 10:08
    • AWS Elastic Beanstalk - Part 02 - 3:50
    • AWS Code Commit - 9:16
  • Content Delivery Networks
    • Introduction to Reverse Proxies - 10:15
    • Understanding the Content Delivery Networks - 5:30
    • Understanding Edge Locations - 7:47
    • Deploying CloudFront Distribution - Part 01 - 7:22
    • Deploying CloudFront Distribution - Part 02 - 5:22
    • Understanding the Origin Access Identity - 7:02
    • S3 Transfer Acceleration - 8:08
  • Monitoring
    • Understanding CloudWatch - 6:04
    • Auditing AWS environment with CloudTrail - 9:28
    • AWS Trusted Advisor - 8:47
    • AWS Well Architected Framework - 16:58
    • Personal Health Dashboard - 17:36
  • AWS Risks and Compliance
    • Shared Responsibility Model - 13:26
    • Client Security Responsibility Model - 8:38

View Full Curriculum


Access
Lifetime
Content
7 hours
Lessons
76

Information Security Management Fundamentals

Learn How to Protect Yourself & Corporate Information from Hackers

By Alton Hardin | in Online Courses

Dive into the fundamentals of information security and essential cyber security principles with this immersive course! The world is constantly interconnected by networks, and companies have a vested interest in keeping the information on those networks secure. Therefore, they're willing to pay big bucks to information security professionals, and this course will teach you how to break into those elite ranks.

  • Access 76 lectures & 7 hours of content 24/7
  • Understand the fundamentals of information security management
  • Learn about hardening systems, basic network zones, IT personnel policies, & more
  • Discover disaster recovery basics
  • Discuss fundamental security threats, network security devices, access control concepts, & more
  • Better protect your business & IT infrastructure

Instructor

Alton Hardin is an educator, poker coach, self-published & best-selling author, and full-time IT and Business professional. Alton is the founder of MicroGrinder Poker School and the best-selling author of Essential Poker Math for No Limit Holdem; moreover, he is the creator of numerous online poker courses. Alton has been playing poker for over a decade both live and online. He helped pay his way through college playing live low stakes games in the early 2000's. Today, Alton enjoys playing the micro stakes for enjoyment and a teaching instrument, where he has racked up over $1,000 in earnings playing mainly 5nl & 10nl.

Outside of poker, Alton is a full-time business and IT professional, where he works in the field of cyber security. He has earned two graduate degrees, an M.B.A. and M.S. in IT Network Management; moreover, he currently holds multiple IT industry certifications.

Alton also has a fond love for teaching. As an undergraduate he group tutored chemistry students and as a graduate student he taught a GMAT prep course. Upon graduating from his MBA program, he began teaching as an adjunct professional for the School of Business & Public Administration at his local state university in the field of Information Systems and IT Management.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Section 1: Course Introduction
    • Welcome to the Course! - 4:50
    • What This Course Is & What It Isn't - 4:45
    • Instructor Introduction - 2:24
  • Section 2: Getting Started In Information Security
    • The Many Areas of Information Security - 8:25
    • Beginning Point Certifications & Degrees - 13:03
  • Section 3: The Need for Information Security
    • The Need for Information Security - 12:19
    • Optional Student Activity: Vimeo & Youtube Videos to Watch - 12:01
    • Links: Videos to Watch
  • Section 4: Information Security Principles
    • Section Introduction - 0:55
    • The CIA Triad - 7:57
    • More Concepts - 6:41
    • Authentication Basics - 12:42
    • Identify Proofing - 3:44
    • General Password Rules - 8:26
    • Designing an Authentication Strategy with Microsoft Technet - 11:11
    • Information Security Principles Quiz
  • Section 5: Access Control
    • Section Introduction - 0:46
    • Access Control - 14:29
    • Physical and Logical Access Controls - 16:59
    • Defense in Depth - 6:02
    • Access Control Models - 13:28
    • Access Control Quiz
  • Section 6: Basic Network Zones
    • Basic Network Zones - 0:52
    • Internet - 1:53
    • DMZ - 3:27
    • Extranet - 3:22
    • Intranet - 3:26
    • Mini-Case Scenario: Secure Network Design - 11:55
    • Basic Network Zones Quiz
  • Section 7: Network Security Devices
    • Section Introduction - 1:31
    • Firewalls - 5:53
    • Proxy Servers - 7:01
    • Intrusion Detection & Prevention Systems - 7:38
    • Virtual Private Networks - 8:22
    • Network Security Devices Quiz
  • Section 8: Hardening Systems
    • Hardening a System - 10:13
    • Patch and Change Management - 5:31
    • Hardening Systems Quiz
  • Section 9: Network Threats & Vulnerabilities
    • Transmission Media Security Concerns - 12:31
    • Wireless Networking Security Concerns - 18:45
    • Network-Based Threats and Attacks - 19:54
    • Student Activity: Locking Down Your Home's Wi-Fi
    • Network Threats & Vulnerabilities Quiz
  • Section 10: Network Scanning Tools
    • SuperScan Port Scanner - 8:22
    • Nmap Zenmap Network Scanner - 6:42
    • Tenable Nessus Vulnerability Scanner - 10:54
  • Section 11: Security Malware Threats
    • Introduction to Malware - 0:35
    • Viruses - 4:27
    • Worms - 2:32
    • Trojan Horses - 2:13
    • Logic Bombs - 2:40
    • Spyware and Adware - 2:58
    • Protecting Against Malware - 4:47
    • Social Engineering Attacks - 8:02
    • Why Social Engineering Succeeds - 3:56
    • Security Malware Threats Quiz
  • Section 12: Introduction to Crytography
    • Introduction to Crytography - 9:23
    • Symmetric Encryption - 3:42
    • Asymmetric Encryption - 4:26
    • Hashing Algorithms - 4:45
    • Introduction to Crytography Quiz
  • Section 13: Disaster Recovery
    • Disaster Recovery - 3:25
    • Disaster Planning and Testing - 4:24
    • Disaster Recovery and Redunancy - 8:33
    • The Disaster Recovery Planning Process - 11:35
    • Disaster Recovery Quiz
  • Section 14: Personnel Policies
    • Section Introduction - 2:02
    • Acceptable Use - 2:49
    • Code of Ethics - 3:27
    • Mandatory Vacations - 2:39
    • Separation of Duties - 3:40
    • Job Rotation - 2:06
    • Education and Training - 4:00
    • Personnel Policies Quiz
  • Class Mini-Case Scenario
    • Mini-Case Scenario: Small Tax Accounting Office - 18:59
  • Section 16: Congratulations!
    • Congratulations! - 2:05

View Full Curriculum


Access
Lifetime
Content
19 hours
Lessons
105

Ethical Hacker Boot Camp

Get a Hands-On Hacking Education & Break Into a Booming Industry

By Joseph Delgadillo | in Online Courses

This course was designed for information security professionals who wish to become certified and move on to a career as a professional pentester. Here, you'll not only get study materials but gain insight into the day to day workflow of an ethical hacker. Through live hacking demonstrations, a blueprint for conducting your own penetration test, and lessons on how to think like a hacker, you'll get everything you need to break into this lucrative career.

  • Access 105 lectures & 19 hours of content 24/7
  • Discuss hacking terminology
  • Understand the difference between passive & active reconnaissance
  • Learn about scanning & enumeration, networking mapping, social engineering basics, and more
  • Explore Windows & Linux hacking
  • Cover website cloning, anti-virus evasion, credential harvesting, & more
  • Get hacking demonstrations w/ tools like Maltego, FOCA, Harvester, Recon-ng, Nmap, Wireshark, Scapy, & more

Instructor

Joseph Delgadillo teaches skills ranging from computers and technology, to entrepreneurship and digital marketing. Take a course with him to get an over-the-shoulder view of how experts are successful in their respective fields.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Requirements

  • Internet required

Course Outline

  • Introduction to Ethical Hacking
    • What is an ethical hacker? - 7:22
    • Terminology crash course pt.1 - 9:24
    • Terminology crash course pt.2 - 13:29
    • Terminology crash course pt.3 - 8:25
    • Confidentiality, integrity, and availability - 13:18
    • Legal considerations - 11:29
    • Section 1 Powerpoint
  • Reconnaissance: Surveying the Attack Surface
    • Surveying the attack surface - 10:24
    • Recon types - 7:44
    • Passive recon pt.1 - 7:21
    • Passive recon pt.2 - 10:02
    • Active recon - 15:01
    • Recon walk-through and tools summary - 14:08
    • Section 2 Powerpoint
    • DEMO - Maltego real world example - 7:04
    • DEMO - FOCA to examine metadata - 4:57
    • DEMO - Harvester - 2:02
    • DEMO - Information collection using Recon-ng - 6:24
  • Scanning and Enumeration: Getting Down to Business
    • Scanning & enumeration - 8:10
    • Identifying active hosts pt.1 - 9:45
    • Identifying active hosts pt.2 - 13:17
    • Identifying active services - 18:23
    • OS and services fingerprinting - 14:41
    • Network mapping - 9:46
    • Final thoughts - 11:04
    • Section 3 Powerpoint
    • DEMO - Nmap syntax pt.1 - 14:21
    • DEMO - Nmap syntax pt.2 - 15:32
    • DEMO - Nmap hosts discovery - 12:19
    • DEMO - Nmap service discovery - 17:10
    • DEMO - Nmap scripts - 11:17
    • DEMO - masscan - 10:57
  • Network Presence
    • Network insecurity - 4:01
    • Sniffing and spoofing - 12:45
    • Sniffing tools - 8:57
    • Spoofing, crypto, and wifi - 15:00
    • Section 4 Powerpoint
    • DEMO - tcpdump - 10:53
    • DEMO - Wireshark - 11:24
    • DEMO - Ettercap - 12:55
    • DEMO - SSL Burp Suite - 15:12
    • DEMO - Scapy - 10:15
  • Attacking
    • Security overview windows architecture - 17:51
    • Security overview credentials security - 15:32
    • Security overview memory corruption and exploitation - 15:31
    • Windows hacking basics - 20:08
    • Local access and privilege escalation - 20:13
    • Dumping hashes and cracking passwords - 18:12
    • Linux attacking basics pt.1 - 12:44
    • Linux attacking basics pt.2 - 13:50
    • References - 5:25
    • Section 5 Powerpoint
    • DEMO - Windows msf exploit pt.1 - 13:05
    • DEMO - Windows msf exploit pt.2 - 15:20
    • DEMO - Post exploitation - 13:13
    • DEMO - Mimikatz - 7:09
    • DEMO - Dumping hashes - 3:23
    • DEMO - Hashcat - 8:21
    • DEMO - Konboot - 12:57
    • DEMO - Post exploitation Windows cmd - 14:08
    • DEMO - Post exploitation Windows powershell - 13:09
    • DEMO - Online password cracking pt.1 - 14:51
    • DEMO - Online password cracking pt.2 - 12:02
    • DEMO - Attacking Linux targets pt.1 - 10:07
    • DEMO - Attacking Linux targets pt.2 - 12:35
  • Web Hacking
    • Introduction to web hacking - 2:47
    • Web security architecture overview pt.1 - 16:40
    • Web security architecture overview pt.2 - 12:20
    • Attacking the web server pt.1 - 10:28
    • Attacking the web server pt.2 - 10:59
    • Attacking the platform pt.1 - 18:33
    • Attacking the platform pt.2 - 8:13
    • Attacking the technology pt.1 - 21:00
    • Attacking the technology pt.2 - 17:20
    • OWASP top 10 pt.1 - 9:21
    • OWASP top 10 pt.2 - 21:12
    • Attacking the business logic pt.1 - 10:37
    • Attacking the business logic pt.2 - 15:07
    • Tools and methodology - 20:15
    • References - 7:41
    • Section 6 Powerpoint
    • DEMO - OWASP Mutillidae - 8:50
    • DEMO - SQL injection - 7:04
    • DEMO - SQLMAP intro - 8:21
    • DEMO - SQLMAP practice - 25:04
    • DEMO - Burpsuite - 37:03
    • DEMO - Burpsuite xsshunter - 16:12
    • DEMO - mitmproxy - 10:27
    • DEMO - Skipfish pt.1 - 4:30
    • DEMO - Skipfish pt.2 - 4:29
  • Social Engineering: Hacking Humans
    • Social engineering basics - 14:41
    • Social engineering methods - 15:44
    • Tools and techniques pt.1 - 14:35
    • Tools and techniques pt.2 - 11:49
    • Tools and techniques pt.3 - 9:04
    • Physical security considerations - 12:53
    • Final thoughts - 5:15
    • Section 7 Powerpoint
    • DEMO - Social engineering intro - 10:43
    • DEMO - Social engineering toolkit prep - 9:01
    • DEMO - Credential harvesting - 2:06
    • DEMO - Website cloning - 6:19
    • DEMO - Automating an attack - 2:59
    • DEMO - Antivirus evasion pt.1 - 8:17
    • DEMO - Antivirus evasion pt.2 - 11:43

View Full Curriculum


Access
Lifetime
Content
4 hours
Lessons
60

Certified Cloud Security Professional: CCSP

Pass the CCSP Exam On Your First Try

By Mohamed Atef | in Online Courses

Cloud computing is essential to organizations, which makes understanding its information security risks and mitigation strategies even more critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSPs. Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.

  • Access 60 lectures & 4 hours of content 24/7
  • Explore the 5 domain of the CSSP exam
  • Pass the CCSP exam on your first try

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

  • Certified Information System Security Professional (CISSP) ID #517943
  • Microsoft Certified Trainer (MCT) ID #3022752
  • EC Council Certified Instructor (CEI) ID #ECC51750391761
  • CEH: Certified Ethical Hacking ID #ECC64515022319
  • Certified Cisco System Instructor (CCSI)
  • Microsoft Certified System Engineer (MCSE)
  • Microsoft Certified IT Professional (Windows Server Administration 2008)
  • CompTIA Certified (Network +) ID #
  • CompTIA Certified (Server +)
  • CompTIA Certified (Linux +)
  • CompTIA Certified (Security +)
  • Cisco Certified Network Associate (CCNA)ID #CSCO11273248
  • Cisco Certified Network Professional (CCNP)
  • Project Management Professional (PMP) )ID #1772374

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Requirements

  • Internet required

Course Outline

  • Introduction
    • Welcome - 0:42
    • Introduction - 3:26
  • Domain 1: Architectural Concepts and Design Requirements
    • Domain 1: Architectural Concepts and Design Requirements - 1:40
    • NIST SP 800 -145 - 1:50
    • Managed Service Provider - 1:47
    • Why Cloud Computing ? - 5:02
    • IaaS vs PaaS vs SaaS - 2:20
    • SaaS - 4:20
    • PaaS - 1:59
    • IaaS
    • Cloud Deployment - 0:44
    • Public Cloud - 8:00
    • Private Cloud - 2:58
    • Hybrid Cloud - 1:25
    • Community Cloud - 2:13
    • Select the right solution - 6:08
  • Domain 2: Cloud Data Security
    • Introduction to Cloud Data Security - 0:26
    • Storage Architecture - 1:20
    • Data Life Cycle Security - 4:22
    • Information Rights Management - 1:38
    • IMR Demonstration
    • Data Loss Preventions (DLP) - 1:44
    • DLP Demonstration - 14:55
    • Database Security - 1:14
    • Data Encryption - 5:26
    • Managment Control - 8:01
    • Event Managment - 3:30
  • Domain 3: Cloud Platform and Infrastructure Security
    • Introduction to Platform and Infrastructure security - 0:52
    • Hypervisor - 4:44
    • Virtualization Security - 5:21
    • Perimeter Security - 6:00
  • Domain 4: Cloud Application Security
    • Introduction to Cloud Application Security - 2:10
    • Software Development Life Cycle - SDLC - 4:31
    • OWASP Top 10 - 3:48
    • What is SQL Injection Attack - 9:48
    • SQL Injection attack - 2:23
    • Cross Site Scripting - 6:49
    • Software Defense - 6:13
    • Cryptography on the Cloud - 8:38
    • Common Computer Architecture - 4:51
    • Access Management - 10:46
    • Cloud Threats - 3:49
    • BCP and DRP - 3:47
    • Business Continuity Plans - 14:32
    • Disaster Recovery Plans - 3:29
    • MTD-RTO-RPO - 11:39
    • VA and PT - 7:27
  • Domain 5: Operations K2:M2
    • Introduction to Operations - 0:37
    • Physical Security - 5:27
    • HR Security - 5:37
    • Network Secuirty - 4:20
    • ntroduction to Risk - 9:17
    • Risk - 11:59
    • Asset Evaluation - 18:28
  • Domain 6: Legal and Compliance
    • Domain 6: Introduction - 1:00
    • Incident Response - 8:37
    • Computer Forensic - 4:18
    • Type of Evidencee - 0:53
    • Types of Law - 6:49
    • Liability - 3:52

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.