

This course will teach you how to detect and mitigate vulnerabilities in your environment by using, tweaking, and understanding a vulnerability management solutionNetworks aren’t what they used to be. They’re more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Vulnerability management systems are designed to recognize, rank, and remediate these vulnerabilities before an attacker gets ahold of them and exploits them to destabilize the privacy, integrity, or availability of your digital assets.In this course, Threat and Vulnerability Management for CompTIA CySA+,you’ll learn how to better defend your organization from threats by using, tweaking, and understanding a vulnerability management solution.First, you’ll explore how to design a vulnerability management program, execute vulnerability scans, and report and analyze the results from a scan. Next, you’ll discover how you can remediate some of the vulnerabilities that you detect.Finally, you’ll learn how to look at specialty systems including IoT, embedded and mobile devices for issues that might pop up on you. When you’re finished with this course, you’ll have the skills and knowledge of security analysis needed to detect and mitigate vulnerabilities in your environment.
Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam. You’ve chosen your target, now it’s time to gain intel about your target without their knowledge. In this course, Ethical Hacking: Reconnaissance/Footprinting, you’ll learn how attackers start profiling your organization. First, you’ll explore the concept of reconnaissance/footprinting and why it’s such an important phase of attack. Next, you’ll discover how to use search engines and web services to give you a better picture of your target and their resources. Finally, you’ll learn how to use some of the industry's top tools to gather and document your findings. When you’re finished with this course, you’ll have the skills and knowledge of reconnaissance/footprinting needed for the Certified Ethical Hacker Exam.
This course teaches you how to search and navigate in Splunk. It will show you how to get started using your machine data to provide actionable reports and dashboards for your organization.This course teaches you how to search and navigate in Splunk. It will show you how to get started using your machine data to provide actionable reports and dashboards for your organization.
Collaboration is in very high demand. This course will teach you how to deploy Cisco CUCM conferencing media resources, configure the Cisco ISR router to manage endpoints and the dial plan, set up Unity voicemail, and run traces and reports. More than ever, companies are relying on Cisco Collaboration solutions to ensure that they can communicate ubiquitously with their customers, employees, and everyone else. There is immense demand for administrators who have the knowledge and skills needed to manage and maintain their Cisco deployments.In this course, Cisco Collaboration Fundamentals: Managing Media Resources, ISR Call Control, Voicemail, and Reporting, you will see the step-by-step configurations to deploy media resources, manage IP phones using the ISR router, examine Cisco video technology, and run traces and reports.First, you will see how to give endpoints access to the CUCM and ISR audio conference bridges, music on hold, annunciator, and media termination point. Then, you will explore how to configure the Cisco ISR router to manage SCCP and SIP phones full-time using CME and, as a backup, SRST.Next, you will discover how to enable SIP URI dialing for endpoints and Jabber, so that users can place calls to email addresses. You will also learn about Cisco’s video conferencing technology. Finally, you will find out how to run reports and examine traces to help you troubleshoot your collaboration deployments.When you are finished with this course, you will have the skills and knowledge that today’s companies crave to manage and maintain their Cisco Collaboration solutions.
It has become popular that organizations call on their IT professionals and business analysts to determine which vendors to use and how to migrate and implement cloud services. Often times there are many questions left unanswered and topics that remain unclear. In this course, learn the management and technical operations component of the fundamentals of cloud computing. To benefit from rapid deployment, limitless scale and cost efficiency, many organizations are planning to move to the cloud. In this course, Cloud Computing Fundamentals: Management and Technical Operations, you’ll learn to tackle the challenges involved in developing applications in a cloud environment and provisioning and monitoring resources. First, you’ll explore the aspects of operating within the cloud. Next, you’ll discover DevOps and continuous integration/continuous delivery. Finally, you’ll learn how to review and report on financial expenditures related to cloud resources. When you’re finished with this course, you’ll have the skills and knowledge of management and technical operations needed to perform the day-to-day administration of cloud resources.
If you maintain an old large codebase, there's a good chance you don't understand parts of it. This course will show you how to update code to a more readable, understandable, and maintainable state by taking full advantage of modern C++ techniques.C++ has been a popular programming language for decades, which means there’s some really old code out there. Some of it is very hard to read and maintain. Capabilities have been added to the language and standard library that could simplify this code, and possibly make it faster or eliminate nagging intermittent bugs. In this course, Beautiful C++: Updating Legacy Code, you’ll learn how to approach a large and unfamiliar codebase and make changes to modernize code. First, you'll learn some strategies for deciding exactly what to change. Then, you'll be introduced to language features and library capabilities that may not have existed when your code was first written, and can make it better now. Finally, you'll discover how to evaluate your progress and spread your gains through the rest of the code. By the end of this course, you'll be prepared for your code to last another generation or two and take full advantage of what modern C++ has to offer.Topics:Course OverviewWhat Target Are You Trying to Reach?The Big PictureThe Compiler Is Your FriendUse C++ as C++Language Changes in C++ 11, 14, and 17The Standard Library Will Save You Time and TroubleReorganizing for TransparencyWhen Are You Done?
Model-driven apps offer a no-code way to develop rich, responsive apps on top of your data. This course will teach you how to develop an end-to-end model-driven app using Power Apps.Companies need to rapidly develop business applications that leverage data from a variety of sources. That’s what Power Apps is all about—offering a no-code solution for developing rich, responsive apps on top of business data. In this course, Getting Started with Model-driven Apps in Power Apps, you’ll learn to develop an end-to-end model-driven app using Power Apps.First, you’ll see how to set up a development environment and a Power Apps solution. Next, you’ll explore the data model in Dataverse, working with tables and relationships, and then compose the model-driven app, customizing the user interface. Finally, you’ll learn how to share the app with others and embed it in Microsoft Teams. When you’re finished with this course, you’ll have the skills and knowledge of model-driven Power Apps needed to rapidly develop business applications on top of your data.
This course, which is based on the book called Murach’s Mainframe COBOL, will teach the essentials of the COBOL language, reports, file handling, CICS (for transactions) and DB2 (for databases). Are looking for employment opportunities with COBOL development? In this course, the learner will get comprehensive instruction on three main themes of COBOL development.First, there will be a look at using the VS Code editor and how to connect this to a live mainframe.This platform will allow for a better understanding of thefundamentals of the language, such as the commands, data structures, and the use of tools like JCL to compile and launch programs.Next, there will be a look at tables, reports and file handling.These are critical for COBOL development since the focus is on business applications.And finally, the course will look at specialized use cases.These include CICS, which allows for real-time processing of user input, and DB2, which is a relational database.At the end of this course, the learner will have the skills and knowledge needed to be a successful entry-level COBOL developer.
This course will teach you how to approach selecting testing tools for your organization and prepare you for taking the ISTQB® Foundation Level exam.Acquiring and using a tool potentially brings unforeseen risks. In this course, ISTQB® Foundation: Tool Support for Testing, you'll learn about different tool types and approaches for tool classification. First, you'll see different approaches when it comes to tool classification and explore classification by test activities they support. Next, you'll learn about the benefits and risks of test automation and look at the additional considerations for choosing test execution and test management tools. Finally, you'll discover the success factors for a tool and learn how to approach introducing a tool in an organization. By the end of this course, you'll have the skills and knowledge to put all of this into practice in a real-world situation and have greater confidence in taking and passing the ISTQB® Foundations level exam.
VPNs secure business traffic over the unprotected internet. Learn how to deploy either site-to-site VPNs using Cisco routers, or remote access VPNs using an ASA, or FTD.The internet is an insecure way of transmitting confidential information, but dedicated circuits can be very expensive. In this course, Cisco Core Security: Describing and Configuring VPNs, you will gain the ability to understand and deploy various types of VPNs. First, you will learn about cryptography components, and how to configure cryptography on Cisco devices. Next, you will discover how to deploy various site-to-site VPNs using Cisco routers. Finally, you will explore how to configure a headend device to accept remote access VPNs using either Cisco’s Adaptive Security Appliance or Firepower Threat Defense. When you’re finished with this course, you will have the skills and knowledge of cryptography needed to deploy various types of VPNs.
In this course, you'll explore and learn how you can combine and filter multiple areas of the relational database to build an efficient result for end users. MariaDB is one of the most sophisticated relational databases in the RDBMS world. It is critical that, in the relational database, multiple columns, fields, and tables work together to provide meaningful results for end users.In this course, Combining and Filtering Data with MariaDB, you’ll gain the ability to work with complex business logic using various SQL and relational database features of MariaDB.First, you’ll learn how to aggregate results with Group By.Next, you’ll learn how to manipulate string and numeric column fields, as well as about Common Table Expressions, Union queries, and Join to combine various results into a single resultset.Finally, you’ll explore how to work with windowing functions to return meaningful results from your database. When you’re finished with this course, you’ll have the skills and knowledge of various SQL features of MariaDB to solve complex business problems.
This course teaches you the basic skills required for using Power BI to acquire and transform data, enhance the data for analysis, and produce reports and dashboards.Power BI is a fantastic tool from Microsoft that helps you understand your data with interactive, easy-to-use visualizations. In this course, Getting Started with Power BI, you'll gain a fundamental understanding of the capabilities of Power BI. First, you'll learn how to work with reports and dashboards to develop an understanding of the model and reports that you’ll be building throughout the course. Then, you’ll discover how to quickly and easily gather data from a variety of sources, and cleanse and transform that data with just a few clicks. Next, you'll explore how you can enhance the results by integrating disparate data sources and adding simple calculations. Finally, you'll learn how to enable data exploration with visualizations in reports and the necessary steps to keep your data up-to-date. By the end of this course, you'll have a firm understanding of the basic skills required for using Power BI to acquire and transform data, enhance the data for analysis, and produce reports and dashboards.
One of the most important phases in a red team engagement is the information gathering prior to the attack. In this course, we explore the Maltego CE tool, which will help you to collect technical and people information from your target.Performing an extensive information gathering about your target is crucial in a red team engagement. You should have as most information as possible about the technology and people in your target organization. In this course, Technical Information Gathering with Maltego CE, you will explore one of the most well-known information gathering tools amongst red team professionals, the Maltego framework. First, you will learn the basics about the tool and how Maltego uses its Transforms to collect data about our targets. Next, you will explore how to collect technical information such as DNS subdomains, IP addresses, and even the location of your target servers. Finally, you will see how to collect information about the people that work in the company, including collecting email addresses from employees as well as researching if accounts from the company were leaked in previous data breaches. When you are finished with this course, you will have the skills and knowledge of the Maltego CE needed to gather technical and people information from your target organization, covering three important tactics from the MITRE PRE-ATT&CK framework: Determine domain and IP address space (T1250), Conduct passive scanning (T1253), and Identify People of Interest (T1269).
This course will teach you how to recognize and handle different types of difficult personalities in order to be able to work and communicate with them effectively, especially during feedback sharing sessions.Difficult people can make the feedback sharing process hard. In this course, Sharing Feedback with Difficult Personalities, you’ll learn to conduct feedback giving effectively with a difficult persona. First, you’ll explore the ways to recognize and categorize the types of difficult personalities. Next, you’ll discover how to manage the conversation productively and the tips to apply in order to reach the desired goal. Finally, you’ll learn how to work with these people on a regular basis and perform a self-evaluation. When you’re finished with this course, you’ll have the skills and knowledge of sharing feedback with difficult personalities needed to work and communicate with them on a regular basis.
Cloud services often still depend on on-premises data. This course will teach you to connect a variety of Microsoft services to your on-premises data.Many Microsoft cloud services need on-premises data to function. In this course, Implementing On-premises Data Gateways for the Power Platform, Azure Analysis Services and Logic Apps, you’ll learn to tie cloud services to local data. First, you’ll explore how data gateways work. Next, you’ll discover how to install and configure them. Finally, you’ll learn how to how to connect them to a variety of Microsoft cloud services. When you’re finished with this course, you’ll have the skills and knowledge of managing on-premises data gateways needed to have timely access to your data.