Some 66% of the 200 executives surveyed worldwide said they are not confident with the security of their networks and admit that their networks are vulnerable to hackers. Are you prepared to protect against a data breach? Our Security Courses are here to help you keep your cloud secure. Take a look at our new Hands-On Security Training Courses below!
Our Courses come with engaging features like Interactive Diagrams, Hands-On Labs in live cloud environments, customizable flash cards, study groups, direct access to our expert Training Architects, downloadable Course videos, and more. Get your team on the path to faster cloud transformation – starting with security!
Which Course are you taking first? Let us know with #ReleaseTheTraining and learn how you can win a FREE year of Linux Academy here!
New Security Training Courses
with Justin Mitchell
- 2.5 Hours of Learning
- 14 Course Videos
- 48 Flash Cards
The cloud has brought about tons of innovation and features, but one thing that’s often forgotten during implementation is security. In this Course, you’ll learn about security cloud concepts and the tools you can use to secure clouds. Topics covered in this course include roles and responsibilities, identity and access management, container security, maintaining compliance, and much more. This is the perfect Course for those starting out in cloud security – this short Course is broken up into even shorter lessons to help you learn even when you’re busy! Check out this Course
with Ermin Kreponic
- 19.1 Hours of Learning
- 101 Course Videos
- 72 Flash Cards
Take a step toward becoming a true white hat hacker in this course. Learn about the nature of hacking, and how to find vulnerabilities by examining source code and reverse engineering existing binaries.
In this Course, you’ll learn about:
- How the vulnerabilities are readily available in numerous frameworks (such as Metasploit, BeEF, SET, and many others) are found
- Anonymity online and attempts to dismantle your preconceived notions
- How to set up and operate your own anonymizing services
- The hacker’s state of mind and way of thinking: very important, as your behavior and way of thinking can either make you into an easy target or a hardcore cybersecurity specialist no one wants to mess with
with Bob Salmans
- 9.5 Hours of Learning
- 75 Course Videos
- 215 Flash Cards
- 199 Practice Exam Questions
What is a penetration tester? Maybe you’ve been exposed to the idea of being an ethical hacker through movies or television, and this profession intrigues you. Or maybe you already work in the security field and you’d like to move into a penetration tester (pentester) role.
Pentesters specialize in identifying and exploiting weaknesses within organizations. Pentesters not only work to discover weaknesses in servers and applications but also in people. To be a successful pentester, you must know how to use a variety of tools. You should be able to write scripts in multiple languages, as this allows you to write your own tools and create time-saving scripts.
The CompTIA PenTest+ Certification course will walk you through the process of performing a pentest. You’ll also become familiar with many popular tools and scripting languages. Not only will this course prepare you for the certification exam, but it will also arm you with the skills necessary for entering into the mysterious realm of pentesting.
Start this course now and solidify what you learn with the accompanying interactive diagram, The Shadow Chronicle.