How to Prepare for and Navigate a Ransomware Attack

It’s often said there are two type of computers in the world—those that have been hit by ransomware and those that will. Ransomware attacks ar...

Free withPremium
36 lessons
CompTIA A+ (801/802)

This training course provides the knowledge necessary to support basic computer hardware and operating systems in today's business world. In this ...

Free withPremium
77 lessons
Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network com...

$4.504 lessons
Email Encryption

This video series examines using encrypted email communications. Many email servers store and transmit emails in a non-secure manner. This series c...

$8.102 lessons

These episodes are designed to demystify the world of cryptography. One will hear about the different aspects of cryptography, associated terminolo...

$44.1011 lessons
Windows 10 Security

There are a lot of different technologies that can be used to keep data more secure in Windows 10 including NTFS permissions, which controls the le...

$44.1021 lessons
Pentesting Tools

Virtualization plays a big role in putting pen testing tools into practice. One will hear from this course how a professional pen tester sets up a ...

$44.1011 lessons
Security Fundamentals

These episodes will provide the foundational knowledge needed get you started in the world of IT security, which covers a wide range of topics from...

$44.1018 lessons
MTA - Security Fundamentals

The Microsoft Technology Associate (MTA) validates building-block technology concepts and helps students explore, discover and pursue successful ca...

$53.1015 lessons

Metasploit is a popular penetration testing software, which is represented as a suite of tools, which can go through the whole penetration testing ...

$71.1031 lessons