We deploy the real environment, you take the scenario-based labs on us. Hands-on, from anywhere, at any time.
The cloud has brought about tons of innovation and features. One thing often forgotten about during implementation is security. This course is designed around introducing the prospective student to many of the cloud concepts and how to secure those through use of tools available to them.
One of the largest limiting factors for organizations considering migrating to the cloud is: "How do we maintain regulatory compliance in a cloud environment?" This course is designed to give a brief introduction to some of the tools and techniques the student can use to help answer that very question.
You can find the interactive diagram used in the course right here - https://interactive.linuxacademy.com/diagrams/ComplianceinCloud.html
Welcome to the Certified Information Systems Security Professional (CISSP) certification course! To obtain the CISSP certification, candidates need to pass an exam that consists of mostly multiple choice questions. The purpose of this course is to prepare you for the certification exam by introducing you to the concepts and terminology you need to know to pass. This course is designed to provide you with extensive knowledge, learning strategies, and instructor support along the way. In addition to the exam, you must meet a few other requirements in order to become a Certified Information Systems Security Professional. You must demonstrate that you follow the CISSP Code of Ethics, have a minimum of five years’ full-time paid work experience in the systems security field, and hold an IS or IT degree. With that in mind, before enrolling in this course, be sure that this is the right course for you. This course is designed for people who want to become certified security professionals and are looking for jobs that require the CISSP certification. Sometimes companies also require their systems security employees to obtain this certification. The prerequisites for this course are basic knowledge in networking and some knowledge of systems operations. Throughout this course, you will learn about the basics of asset security, cryptography, security and risk management, and various threats and attacks. This is a theoretical course — not a practical one — and we will cover many regulations, laws, policies, standards, and encryption protocols. With the flash cards, interactive diagrams, video lessons, and instructor support included with this course, you should be equipped with everything you need to successfully pass the exam and earn your CISSP certification.
Download the interactive diagram here: https://interactive.linuxacademy.com/diagrams/CISSPStudyBook.html
Linux Academy has many innovative tools and services, like your own cloud lab, that cannot be found anywhere else. The robust offering we have developed, which is focused around student success, and how to use that offering can be found here within this course. Anybody looking to maximize their learning and to maximize the value they receive from a Linux Academy membership should go through this course.
Linux Academy provides more content, hands-on labs, your own cloud lab, and more value per dollar than any other training provider.
This course is a replacement for the older "Introduction To Linux Academy" course.
Welcome to the Encryption Fundamentals course! In this course, we'll explore the basic concepts of cryptography and encryption and discuss the history of the subject from ancient times to the modern day. We will also take a detailed look at how encryption works in practice and learn how we can use it to keep our data secure.
Interactive Diagram: https://interactive.linuxacademy.com/diagrams/EncryptionFundamentals.html
This course will prepare the prospective student to be more security minded with their architecture in AWS. In addition, you will find that the subjects and materials covered within this course will also equip the student with the knowledge and hands-on experience with various AWS services dealing with encryption, monitoring, and auditing.
This course will teach the core fundamentals necessary to properly secure your Google Cloud environment, and manage who has access to what resources. The concepts introduced in this course are necessary for any security considerations on Google Cloud.
Welcome to the Certified Ethical Hacker Course!
Have you always wanted to learn how to discover weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this exam is for you.
With the rapid development of information technology, almost every industry in the world has some sort of an information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become an imperative to protect these systems and information they contain.
If you wish to learn how you can improve the security of any system, or even if you have some experience working as a security professional and now wish to advance your skills and knowledge, then CEH certificate will be of great benefit to you and your organization.
This course will help you prepare for the exam. You will learn about the tools, methods, and technologies used. The goal of this course is to help you master the topics required for passing the exam and becoming an ethical hacker.
This course is designed to prepare prospective students for the Security+ Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:
After taking this course, the student will feel confident in their abilities to undertake the certification exam.
Welcome to the CompTIA PenTest+ certification course!
What is a penetration tester? Maybe you've been exposed to the idea of being an ethical hacker through movies or television, and this profession intrigues you. Or maybe you already work in the security field and you'd like to move into a penetration tester (pentester) role. If either of these are true, you've come to the right place.
Pentesters specialize in identifying and exploiting weaknesses within organizations. Pentesters not only work to discover weaknesses in servers and applications, but also in people. To be a successful pentester, you must know how to use a variety of tools, and you should be able to write scripts in multiple languages, as this allows you to write your own tools and create time-saving scripts.
The CompTIA PenTest+ certification course will walk you through the process of performing a pentest. You'll also become familiar with many popular tools and scripting languages. Whether you're interested in becoming a pentester or simply curious about the profession, this course is for you. Not only will this course prepare you for the certification exam, but it will also arm you with the skills necessary for entering into the mysterious realm of pentesting.
Download The Shadow Chronicle: https://interactive.linuxacademy.com/diagrams/theshadowchronicle.html
Welcome to the Kali Linux Deep Dive course! This course is intended for individuals who already possess a good amount of general IT knowledge, so be sure to read the list of prerequisites before you get started. Over the span of the course, we will dive into the nature of hacking at the hardware level. This is how virtually all vulnerabilities were discovered — by individuals combing through source code or reverse engineering binaries.
This is what sets this course apart from the many others like it. In this course, you will learn how the vulnerabilities that are readily available in frameworks like Metasploit, BeEF, SET, and others are found, so that you will be able to deconstruct a program instead of just trying to figure out how to use something other people wrote! We’ll also cover subjects such as anonymity online and tackle the common misconception that VPN services guarantee anonymity. You’ll learn how to set up and operate your own anonymizing services — that way you can trust them more!
In the Social Engineering section of the course, you will learn how to think like a hacker. This is extremely important, as your behavior and thought process determine whether you are an easy target for attacks or a serious cybersecurity specialist no one wants to mess with.
After finishing this course, you will have learned quite a bit, and you will most likely have questions. I am always here to help, so feel free to reach out and let me guide you on your way to becoming an expert white hat hacker.
Here are the Kali Linux Deep Dive Interactive Guides:
Pt 2 - Reverse Engineering https://interactive.linuxacademy.com/diagrams/KaliLinux2.html
Pt 3 - Buffer Overflow https://interactive.linuxacademy.com/diagrams/KaliLinux3.html
Pt 4 - Password Cracking https://interactive.linuxacademy.com/diagrams/KaliLinux4.html
Pt 5 - Metasploit https://interactive.linuxacademy.com/diagrams/KaliLinux5.html
Pt 6 - SQL Injection https://interactive.linuxacademy.com/diagrams/KaliLinuxpt6.html
Pt 10 - Email Phishing and Tracking https://interactive.linuxacademy.com/diagrams/KaliLinux10.html
This course is a 'Deep Dive' into Kubernetes Security. The student is guided through the concepts and best practices of Kubernetes Security, and hands-on examples are provided to apply what is covered.
Interactive Diagram: https://interactive.linuxacademy.com/diagrams/KubernetesSecurity.html
Welcome to the CompTIA Cybersecurity Analyst (CySA+) certification course!
Cybersecurity Analysts are the protectors of our networks. They perform many duties which include analysis of data to identify vulnerabilities, threats, and risks to an organization. Configuration and tuning of threat-detection tools, and ecuring applicaitons and systems within an orgnization.
As the skills of cyber attackers continues to grow, so should the skills of cybersecurity analysts. These attackers are finding new ways to bypass our tool sets and controls. Therefore, we must continue to adapt and advance our skills in order to combat the attackers and defent our networks.
If you're wanting to advance your cybersecurity defensive skills, the CompTIA CySA+ certificaiton is a great place to start your journey.
The AWS Certified Security Specialty is a certification based around securing applications in AWS. It is one one three specialty certifications offered by AWS. The certification focuses on five components or domains when designing and operating security in the cloud. These are:
This course has been developed to provide you with the requisite knowledge to not only pass the AWS Certified Security Specialty certification exam but also gain the hands-on experience required to become a qualified AWS security specialist working in a real-world environment.
Please connect with us at slack.linuxacademy.com in the #security channel if you have questions or feedback.
To access the Security Specialty Runbook: https://interactive.linuxacademy.com/diagrams/SecuritySpecialtyRunbook.html
This course is designed to prepare students to take the LPIC-3 Exam 303: Security certification. The course covers a wide variety of security topics and technologies in a platform agnostic manner. Students will gain practical insights and best practice regarding security on various Linux platforms.