Browse most popular courses
-
Ensuring system security59s
Ensuring system security
From: IT Security Foundations: Operating System Security
Video
-
Inclusive security leadership for positive change50s
Inclusive security leadership for positive change
From: Strategic Security Leadership: Cultivating Growth, Inclusivity, and Collaboration
Video
-
Locking down the organization51s
Locking down the organization
From: Ethical Hacking: Introduction to Ethical Hacking
Video
-
Get prepped for ethical hacking cloud computing certification1m
Get prepped for ethical hacking cloud computing certification
From: Ethical Hacking: Cloud Computing
Video
-
Understanding semiconductor devices1m
Understanding semiconductor devices
From: Electronics Foundations: Semiconductor Devices
Video
-
Exploring various Information functions: ISTEXT, ISFORMULA, ISBLANK, and more…6m
Exploring various Information functions: ISTEXT, ISFORMULA, ISBLANK, and more…
From: Excel Tips Weekly
Video
-
Understanding session hijacking50s
Understanding session hijacking
From: Ethical Hacking: Session Hijacking
Video
-
Introduction6m
Introduction
From: Implementing Cisco Software-Defined Wan (SD-WAN) for your Enterprise and Cloud
Video
-
Welcome to the course4m
Welcome to the course
From: IT Service Management Foundations: Measures and Metrics
Video
-
Understanding the needs of a hybrid team1m
Understanding the needs of a hybrid team
From: IT Support for a Hybrid Workforce
Video
-
Transform your service management2m
Transform your service management
From: IT Service Desk: Service Management
Video
-
Monitoring service management success58s
Monitoring service management success
From: IT Service Desk: Monitoring and Metrics Fundamentals
Video
-
IT service desk careers and certifications52s
IT service desk careers and certifications
From: IT Service Desk Careers and Certifications
Video
-
Understanding how SQL injections work46s
Understanding how SQL injections work
From: Ethical Hacking: SQL Injection
Video
-
Hacking IoT and OT systems56s
Hacking IoT and OT systems
From: Ethical Hacking: Hacking IoT Devices
Video
-
Scouting the target36s
Scouting the target
From: Ethical Hacking: Footprinting and Reconnaissance
Video
-
Taking the next step in your ethical hacking career50s
Taking the next step in your ethical hacking career
From: Stealth Penetration Testing with Advanced Enumeration
Video
-
Taking the project local with Codex CLI8m
Taking the project local with Codex CLI
From: Build and Deploy Anywhere with OpenAI GPT-5-Codex
Video
-
Conclusion1m
Conclusion
From: Ethical Hacking for Smart Contracts: Preventing Attacks and Securing Blockchain Code
Video
-
Hacking the blockchain: Smart contracts44s
Hacking the blockchain: Smart contracts
From: Ethical Hacking for Smart Contracts: Preventing Attacks and Securing Blockchain Code
Video
-
Better manage the challenges of cybersecurity51s
Better manage the challenges of cybersecurity
From: Emotional Intelligence for Cybersecurity Professionals
Video
-
Leveling up with Codex in the IDE8m
Leveling up with Codex in the IDE
From: Build and Deploy Anywhere with OpenAI GPT-5-Codex
Video
-
Prepare for the RHCE EX30059s
Prepare for the RHCE EX300
From: Red Hat Enterprise Linux 8 Essential Training
Video
-
Need a central point of analysis for security events?1m
Need a central point of analysis for security events?
From: Implementing and Administering Microsoft Sentinel
Video
-
Securing your supply chain43s
Securing your supply chain
From: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
Video
-
The importance of static testing49s
The importance of static testing
From: Static Application Security Testing
Video
-
Learn how to protect your wireless network1m
Learn how to protect your wireless network
From: Ethical Hacking: Wireless Networks
Video
-
Code reviews and issues with Codex cloud2m
Code reviews and issues with Codex cloud
From: Build and Deploy Anywhere with OpenAI GPT-5-Codex
Video
-
Why discuss the future of work and the metaverse?50s
Why discuss the future of work and the metaverse?
From: The Future of Work and Cybersecurity on the Metaverse
Video
-
Gather system information in Linux36s
Gather system information in Linux
From: Linux: System Information and Directory Structure Tools
Video
-
Let me interrupt you50s
Let me interrupt you
From: Threat Modeling: Denial of Service and Expansion of Authority
Video
-
Network threat hunting essentials: Staying proactive49s
Network threat hunting essentials: Staying proactive
From: Threat Hunting: Network Data
Video
-
The importance of enforcing security best practices1m
The importance of enforcing security best practices
From: Defending Against and Recovering From Cybersecurity Attacks: Top Safety Practices
Video
-
Protect your enterprise with the four disciplines of cybersecurity1m
Protect your enterprise with the four disciplines of cybersecurity
From: Cybersecurity Foundations: Security Architecture
Video
-
Learn to secure applications40s
Learn to secure applications
From: Cybersecurity Foundations: Application Security
Video
-
Starting your testing with enumeration1m
Starting your testing with enumeration
From: Ethical Hacking: Enumeration
Video
-
Build and Deploy Anywhere with OpenAI GPT-5-Codex28m
Build and Deploy Anywhere with OpenAI GPT-5-Codex
By: Ray Villalobos
Course
-
What GPT-5-Codex unlocks for developers47s
What GPT-5-Codex unlocks for developers
From: Build and Deploy Anywhere with OpenAI GPT-5-Codex
Video
-
Introduction1m
Introduction
From: Machine Learning in Telecommunication: From Basics to Real-World Cases
Video
-
Principles of basic electronic circuits1m
Principles of basic electronic circuits
From: Electronics Foundations: Basic Circuits
Video