We deploy the real environment, you take the scenario-based labs on us. Hands-on, from anywhere, at any time.
This course covers the fundamentals of cloud migrations. The student is guided through lessons covering legacy infrastructure and applications architectures, as well as advanced cloud computing architectures. This course provides best-practice for governance and frameworks for accelerating the adoption of public, private and hybrid cloud.
Download Interactive Diagram here: https://interactive.linuxacademy.com/diagrams/CloudMigrationsFundamentals.html
The cloud has brought about tons of innovation and features. One thing often forgotten about during implementation is security. This course is designed around introducing the prospective student to many of the cloud concepts and how to secure those through use of tools available to them.
Linux Academy has many innovative tools and services, like your own cloud lab, that cannot be found anywhere else. The robust offering we have developed, which is focused around student success, and how to use that offering can be found here within this course. Anybody looking to maximize their learning and the maximize the value they receive from a Linux Academy membership should go through this course.
Linux Academy provides more content, hands-on labs, your own cloud lab, and more value per dollar than any other training provider.
This course is a replacement for the older "Introduction To Linux Academy" course.
This course will prepare the prospective student to be more security minded with their architecture in AWS. In addition, you will find that the subjects and materials covered within this course will also equip the student with the knowledge and hands-on experience with various AWS services dealing with encryption, monitoring, and auditing.
This course will teach the core fundamentals necessary to properly secure your Google Cloud environment, and manage who has access to what resources. The concepts introduced in this course are necessary for any security considerations on Google Cloud.
Welcome to the Certified Ethical Hacker Course!
Have you always wanted to learn how to discover weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this exam is for you.
With the rapid development of information technology, almost every industry in the world has some sort of an information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become an imperative to protect these systems and information they contain.
If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then CEH certificate will be of great benefit to you and your organization.
This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.
This course is designed to prepare prospective students for the Security+ Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:
After taking this course, the student will feel confident in their abilities to undertake the certification exam.
Welcome to the CompTIA PenTest+ certification course!
What is a penetration tester? Maybe you've been exposed to the idea of being an ethical hacker through movies or television, and this profession intrigues you. Or maybe you already work in the security field and you'd like to move into a penetration tester (pentester) role. If either of these are true, you've come to the right place.
Pentesters specialize in identifying and exploiting weaknesses within organizations. Pentesters not only work to discover weaknesses in servers and applications, but also in people. To be a successful pentester, you must know how to use a variety of tools, and you should be able to write scripts in multiple languages, as this allows you to write your own tools and create time-saving scripts.
The CompTIA PenTest+ certification course will walk you through the process of performing a pentest. You'll also become familiar with many popular tools and scripting languages. Whether you're interested in becoming a pentester or simply curious about the profession, this course is for you. Not only will this course prepare you for the certification exam, but it will also arm you with the skills necessary for entering into the mysterious realm of pentesting.
Download The Shadow Chronicle: https://interactive.linuxacademy.com/diagrams/theshadowchronicle.html
Welcome to the Kali Linux Deep Dive course! This course is intended for individuals who already possess a good amount of general IT knowledge, so be sure to read the list of prerequisites before you get started. Over the span of the course, we will dive into the nature of hacking at the hardware level. This is how virtually all vulnerabilities were discovered — by individuals combing through source code or reverse engineering binaries.
This is what sets this course apart from the many others like it. In this course, you will learn how the vulnerabilities that are readily available in frameworks like Metasploit, BeEF, SET, and others are found, so that you will be able to deconstruct a program instead of just trying to figure out how to use something other people wrote! We’ll also cover subjects such as anonymity online and tackle the common misconception that VPN services guarantee anonymity. You’ll learn how to set up and operate your own anonymizing services — that way you can trust them more!
In the Social Engineering section of the course, you will learn how to think like a hacker. This is extremely important, as your behavior and thought process determine whether you are an easy target for attacks or a serious cybersecurity specialist no one wants to mess with.
After finishing this course, you will have learned quite a bit, and you will most likely have questions. I am always here to help, so feel free to reach out and let me guide you on your way to becoming an expert white hat hacker.
Here are the Kali Linux Deep Dive Interactive Guides:
Pt 2 - Reverse Engineering https://interactive.linuxacademy.com/diagrams/KaliLinux2.html
Pt 3 - Buffer Overflow https://interactive.linuxacademy.com/diagrams/KaliLinux3.html
Pt 4 - Password Cracking https://interactive.linuxacademy.com/diagrams/KaliLinux4.html
Pt 5 - Metasploit https://interactive.linuxacademy.com/diagrams/KaliLinux5.html
Pt 6 - SQL Injection https://interactive.linuxacademy.com/diagrams/KaliLinuxpt6.html
Pt 10 - Email Phishing and Tracking https://interactive.linuxacademy.com/diagrams/KaliLinux10.html
The AWS Certified Security Specialty is a certification based around securing applications in AWS. It is one one three specialty certifications offered by AWS. The certification focuses on five components or domains when designing and operating security in the cloud. These are:
This course has been developed to provide you with the requisite knowledge to not only pass the AWS Certified Security Specialty certification exam but also gain the hands-on experience required to become a qualified AWS security specialist working in a real-world environment.
Please connect with us at slack.linuxacademy.com in the #security channel if you have questions or feedback.
To access the Security Specialty Runbook: https://interactive.linuxacademy.com/diagrams/SecuritySpecialtyRunbook.html
This course is designed to prepare students to take the LPIC-3 Exam 303: Security certification. The course covers a wide variety of security topics and technologies in a platform agnostic manner. Students will gain practical insights and best practice regarding security on various Linux platforms.