Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH
English | Size: 223.38 MB
Category: Tutorial

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking password cracking, privilege escalation, spyware installation, and keylogging and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools

Linkedin Learning – Ethical Hacking Social Engineering

Linkedin Learning – Ethical Hacking Social Engineering-ZH
English | Size: 284.79 MB
Category: tUTORIAL

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.

Linkedin Learning – Azure Security Technologies Manage Identity and Access

Linkedin Learning – Azure Security Technologies Manage Identity and Access-ZH
English | Size: 139.54 MB
Category: Tutorial

Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security Technologies exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional and advanced auth controls, and implementing Privileged Identity Management for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security

Linkedin Learning – Visual Studio Source Control with Git and GitHub

Linkedin Learning – Visual Studio Source Control with Git and GitHub-ZH
English | Size: 316.31 MB
Category: Tutorial

Prefer working with an IDE instead of the command line? Discover how to use Git, the defacto distributed source control tool, effectively within Visual Studio. Throughout this course instructor Walt Ritscher delves into the mapping between Git and GitHub commands and the tools in Visual Studio. After going over key Git concepts, commands, and GUI tools, Walt shows how to initialize a new repository with PowerShell, Visual Studio, and GitHub. He then shows how to add, rename, move and delete files; add a remote repository; clone and fork a repository; and view and handle merge conflicts. Plus, see how to work with branches create, review and compare pull requests, and more

Linkedin Learning – Microsoft 365: Implement Modern Device Services

Linkedin Learning – Microsoft 365: Implement Modern Device Services-ZH
English | Size: 321.14 MB
Category: Tutorial

Mobile devices are a critical productivity tool for most organizations. But balancing mobile access with the need to protect company data and systems can be tricky. Microsoft 365 provides a comprehensive, modern solution for mobile device management, providing maximum flexibility and security. Learn how to manage your organization’s tenant mobile devices and applications in this intermediate course for Microsoft 365 administrators. Instructor and Microsoft MVP Liam Cleary shows how to implement mobile device management using Azure Active Directory and Intune; manage security and compliance profiles for iOS, Windows, and Android devices; deploy mobile applications; and plan Windows 10 deployments to Microsoft 365.