Linkedin Learning – Linux Package Managers and Repositories

Linkedin Learning – Linux Package Managers and Repositories-XQZT
English | Size: 183.62 MB
Category: tUTORIAL

Software often comes bundled in packages, which makes managing the programs installed on your system a bit easier. When you need to add software to your Linux system, there are several paths you can take: you can compile source code, manually install software packages, or use package management software to automate most of the work. In this course, explore the basics of working with packages at the command line. Learn how to manage packages on RedHat and CentOS with RPM and the YUM package manager, as well as how to manage packages on Debian, Ubuntu, and related distros with dpkg and the APT tool. Plus, discover how to add software from third parties to your installation when official repositories don’t have all of the software you need

Linkedin Learning – Deep Learning Image Recognition

Linkedin Learning – Deep Learning Image Recognition-ZH
English | Size: 307.54 MB
Category: Tutorial

Thanks to deep learning, image recognition systems have improved and are now used for everything from searching photo libraries to generating text-based descriptions of photographs. In this course, learn how to build a deep neural network that can recognize objects in photographs. Find out how to adjust state-of-the-art deep neural networks to recognize new objects, without the need to retrain the network. Explore cloud-based image recognition APIs that you can use as an alternative to building your own systems. Learn the steps involved to start building and deploying your own image recognition system

Linkedin Learning – Ethical Hacking Sniffers

Linkedin Learning – Ethical Hacking Sniffers-ZH
English | Size: 155.43 MB
Category: Tutorial

Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark

Linkedin Learning – Learning Terraform

Linkedin Learning – Learning Terraform-ZH
English | Size: 293.18 MB
Category: Tutorial

Terraform is a DevOps tool for declarative infrastructure infrastructure as code. It simplifies and accelerates the configuration of cloud-based environments. In this course, instructor Josh Samuelson shows how to use Terraform to configure infrastructure and manage resources with Amazon Web Services (AWS). After demonstrating how to set up AWS for Terraform, Josh covers how Terraform manages your infrastructure, as well as how to use core Terraform commands. He also delves into more advanced topics including how to arrange Terraform code to be more maintainable and modular. Upon wrapping up this course, you’ll have the knowledge you need to efficiently define and mange infrastructure with this powerful tool

Linkedin Learning – Security for the SMB Implementing the NIST Framework

Linkedin Learning – Security for the SMB Implementing the NIST Framework-ZH
English | Size: 210.54 MB
Category: Tutorial

Cybersecurity incidents impact organizations of all sizes, in all sectors. Small and medium businesses (SMBs) may not have the same infrastructure or resources for security, but face the same risks. In this course, Ron Woerner explains how to secure SMB assets, systems, and networks, leveraging the five functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework identify, protect, detect, respond, and recover as a scaffold for creating a robust cybersecurity program. Learn how to identify your assets and necessary levels of access, set up defenses such as firewalls and encryption monitor your systems, create an effective incident response plan and use backups and cloud services to ensure you can recover and resume operations as quickly as possible