Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube

Pluralsight
Why should you be interested in Linux Host Security, Linux is secure, isn't it? Those of us who are a little more paranoid understand that "nothing is secure" and will benefit from understanding how to lock up your host more securely than the default. Everyday we learn of new cyber attacks against, often large organizations, coming to the realization that nothing is secure in the modern world. In this course, Linux Host Security, you will gain the the skills needed to begin to lock your Linux server down and protect your precious data and resources. First, you will learn to tune the Linux Kernel using the procfs and sysctl. Next, you will discover how much traceability you lose where you have not installed the Linux Audit System. Finally, you will explore how to deploy the integrated Identity Management tool, FreeIPA Server on CentOS 7. When you’re finished with this course, you will have the skills and knowledge of Linux Security needed to harden your Linux Servers.

Udemy
Discover how to host podcasts professionally. Grow your podcast, reputation and your audience. Learn to prep your guest What you'll learn: Give excellent interviews Understand how to be a great Podcast show host Up to Date as of October, 2015.Podcasting is booming! There has never been a better time to get 'On the Air'. Low start up costs and the massive improvements in electronics and technology means that if you can talk, are passionate and know something about your topic, you can host your very own show.Fame and Fortune await, if you know how to run your show professionally.From one of our students:"Thanks for the shout out Martin, or should I say thanks for the endorsement smile emoticon We went from 25k downloads of our show a month to 50k in 9 months using your suggestions and your training was very concise and easy to understand. This series has got me all jazzed again look out here we go again."No prior experience or formal broadcast education is required to be a talk show host or produce your own show. Anyone can become a professional Podcast Host, if you have the proper guidance and mentoring. Scott Paton and Martin Wales have over 30 years experience, and thousands of episodes under their belts when it comes to hosting shows and interviewing guests.Let them share their expertise with you and shortcut the learning curve to becoming an exceptional host.Are you ready to become the next Larry King? Jay Leno? Oprah?In this fast-paced, fun course, you'll learn:The Do's and don'ts of being a HostWhat your job really isThe best way to prep your guestHow to interview and some great questions no one asksHow to control the conversationAnd much more! About this course:Full, free lifetime accessAll future extra lectures and changes are always yours for freeUnconditional Udemy 30 day money-back guarantee - that's our personal promise of your satisfaction!Click the "take this course" button, top right, now ... every hour you delay is costing you fame and fortune...

YouTube
Explore the intricate dynamics of host communities in this comprehensive lecture on disease ecology. Delve into the complex relationships between biodiversity, habitat change, and emerging infectious diseases. Examine how ecological and environmental processes influence the distribution, prevalence, and dynamics of diseases in animal populations. Gain valuable insights into the factors shaping disease emergence, spread, and impact on ecosystems and human societies. Learn about the integration of theories from various scientific disciplines, including ecology, evolution, and mathematics, to understand natural transmission cycles of pathogens. Discover the importance of studying disease ecology in light of global health challenges such as COVID-19 and Ebola. Investigate the role of sequencing techniques and data analysis in understanding and managing disease outbreaks. Benefit from expert knowledge shared by Dr. Umesh Srinivasan as part of the "Emerging Infectious Diseases: Ecology and Evolution" program organized by the International Centre for Theoretical Sciences.

YouTube
Explore a conference talk from CCS 2016 examining multiple host ambiguities in HTTP implementations. Delve into the intricacies of multiparty interactions in the current Internet, focusing on the critical HTTP Host field. Learn about techniques like multiple Host headers and absolute-URI as request-target, and how different implementations handle these scenarios. Discover potential attacks exploiting host ambiguity, including cache poisoning and firewall bypass. Examine the prevalence of upstream/downstream vulnerabilities through measurement results and discuss mitigation strategies. Gain insights from authors representing Tsinghua University, University of California, Berkeley, International Computer Science Institute, and Huawei Canada as they present their findings on this crucial aspect of web security.

YouTube
Explore the fascinating world of host-pathogen co-evolution in this comprehensive lecture by Jahnavi Joshi from the International Centre for Theoretical Sciences. Delve into the intricate relationships between hosts and pathogens, examining how they evolve together over time. Learn about the evolutionary arms race, genetic adaptations, and the impact of co-evolution on disease dynamics. Gain insights into cutting-edge research methodologies and real-world examples that illustrate the importance of understanding these interactions for public health and ecosystem management. This 1 hour and 37 minute talk is part of the "Emerging Infectious Diseases: Ecology and Evolution" program, offering valuable knowledge for students, researchers, and professionals interested in disease ecology, evolutionary biology, and epidemiology.

YouTube
Learn about Graft-Versus-Host Disease (GVHD) in this comprehensive 43-minute lecture by Christine Duncan for OPENPediatrics. Explore the intricacies of hematopoietic stem cell transplantation, including stem cell sources and the pathophysiology of acute and chronic GVHD. Discover risk factors, HLA matching, and the National Institute of Health GVHD criteria. Examine the diagnostic features and manifestations of chronic GVHD in various organs, including skin, mouth, lungs, hair, eyes, genitourinary system, and liver. Understand acute GVHD grading and staging for cutaneous, gastrointestinal, and hepatic involvement. Delve into GVHD prevention, treatment options such as steroids and monoclonal antibodies, and secondary therapies. Gain insights into infectious prophylaxis and prognosis for both acute and chronic GVHD. This lecture provides essential knowledge for healthcare professionals caring for critically ill children undergoing stem cell transplantation.

Pluralsight
In an incident response scenario, gathering artifacts for analysis can be stressful. In this course, Incident Response: Host Analysis, you'll learn how to analyze host artifacts in a compromised environment. First, you'll evaluate an endpoint to determine root cause of an incident. Next, you'll perform memory dump analysis to look for volatile artifacts. Finally, correlate connection logs and extract addition artifacts to determine the incident's full scope. When you're finished with this course, you'll have the skills necessary to operate as an incident response host analyst and understand how to synchronize with the other phases of incident response.

YouTube
Learn how to secure the Docker host operating system and set up audit rules for various Docker artifacts in this 43-minute video. Explore the best OS options for hosting Docker, including minimal operating systems, and dive into the Linux audit framework. Discover essential auditing tools and watch a practical demonstration of implementing security measures. Gain valuable insights into Docker security essentials, including the use of Docker Bench for Security, Lynis, and the Docker CIS Benchmark. Follow along with timestamped sections covering introduction, topic overview, OS considerations, audit frameworks, and hands-on implementation.

YouTube
Learn how to host a Laravel project on Cloudways in this 23-minute tutorial video. Discover the benefits of using Cloudways for cloud hosting, including optimized stacks, managed servers, backups, staging environments, and integrated Git. Explore server and application setup, compare hosting platforms and pricing options, and gain an overview of server management. Follow step-by-step instructions for logging in via SSH, deploying through Git, and configuring your website for browser access. Gain valuable insights into cloud hosting solutions and streamline your Laravel project deployment process.

YouTube
Explore host hunting techniques on a budget in this 29-minute conference talk from GrrCON 2019. Learn cost-effective strategies for identifying and targeting hosts in cybersecurity operations, presented by cyberGoatPsyOps. Gain insights into affordable tools and methodologies for effective host discovery and analysis, suitable for security professionals working with limited resources.

YouTube
Explore techniques for attacking Host Intrusion Prevention Systems in this Black Hat USA 2004 conference talk presented by Eugene Tsyrklevich. Delve into the vulnerabilities and potential exploits of HIPS, gaining insights into how these critical security systems can be compromised. Learn about the methodologies used to bypass HIPS protections and understand the implications for network security. Discover strategies for improving HIPS defenses and staying ahead of potential threats in this comprehensive two-hour session that is essential for cybersecurity professionals and enthusiasts alike.

YouTube
Explore the fundamental principles of host-guest complexation in cyclodextrins through this 40-minute lecture that examines the physical and chemical properties of cyclodextrins, their unique complexation behavior with various guest molecules, and their diverse applications in pharmaceutical, food, and industrial sectors.

YouTube
Explore the intricate relationship between host traits and pathogen prevalence in this comprehensive lecture from the "Emerging Infectious Diseases: Ecology and Evolution" program. Delve into the complex world of disease ecology as Dr. Farah Ishtiaq from the International Centre for Theoretical Sciences examines how host characteristics influence the spread and prevalence of pathogens. Gain valuable insights into the factors shaping disease dynamics in animal populations and their potential impact on ecosystems and human health. Learn about cutting-edge research methodologies, including sequencing techniques and data analysis, used to understand and manage disease outbreaks. This 1-hour and 27-minute presentation is part of a broader course that integrates theories from ecology, evolution, and mathematics to address real-world challenges in disease ecology, making it essential viewing for students, researchers, and professionals interested in the intersection of biodiversity, environmental change, and public health.

YouTube
Join a comprehensive seminar from the National Human Genome Research Institute's DIR Series featuring Dr. Ran Blekhman, Associate Professor of Medicine at the University of Chicago, as he explores the fascinating field of host-microbiome interactions through genomics. Discover cutting-edge research that combines high-throughput genomics technologies with computational, statistical, machine learning, and population genetic analytical approaches to understand the complex relationship between human genomics and microbiome. Learn how the Blekhman Lab investigates human genomic factors controlling microbiome interactions, their impact on human disease, and the evolutionary aspects of host-microbe symbiosis. Gain insights into the latest developments in understanding how we interact with microbial communities and their implications for human health and disease.

A Cloud Guru
This is the first course of a four-course learning path related to securing containers. This course will teach you how to prepare and harden the operating system so it is secured as much as possible before we actually deploy containers. We will go over various configurations and see how we can use the operating system’s security mechanisms to best protect and harden our system.In the first part of the course, we provide knowledge regarding firewalld and SELinux. firewalld is a Linux tool used for managing iptables. We need a firewall so we can control what kind of traffic is let through and what kind of traffic is denied. We will go over the firewalld installation and overall setup. Here we teach several basic firewalld commands and how to utilize them regarding zones, ports, services, and other related system aspects. We will also talk about traffic control where we learn how we can allow traffic from one IP to a port, how to allow traffic from a list of IPs (whitelisting), and how to create a list of IPs we do not want to have access (blacklisting), etc. After firewalld, we will move on to SELinux. SELinux is a tool that allows fine control over access to files, controls, processes, or other things on the system. It is used by practically all Red Hat-based distributions. In this section, we will start off by talking about SElinux states, the SELinux context, and context adjustments. We will then go over some useful commands that enable us to list restricted ports and protocols, talk about booleans, port labels, SELinux modules, and logs. Later on in the course, we will also have a section dedicated to firewalld and SElinux automated scripts.When we have learned the basics of firewalld and SELinux, we will move on to learn about server access and authentication configuration. At this point, we are going to play around with access to the system. In addition to doing some base configuration by just changing the default port we use to connect via an SSH service port, we will also perform changes such as adding extra layers of authentication and creating a jump point server which is similar to a VPN with SSH. We will show how to set up different authentication methods to work simultaneously: standard key-based authentication, password-based authentication, plus a third layer of authentication where we integrate Google Authenticator. We will need our phone in order to log in to the server. This significantly improves our security since it is highly unlikely someone has access to our key, our phone, and our password. We will also get acquainted with jump points. We show what jump points are and what they are used for. A jump point is a place where we connect. It allows us to connect to the rest of our infrastructure. They can greatly improve the security of our front-facing and infrastructure servers.Furthermore, we also talk about seccomp (Secure Computing Mode). This is an important tool that we will use along with containers and properly impose some additional limitations. We use it to restrict system calls. Basically, it participates in jailing a process and limiting what can be done from the process itself. It gives us the ability to dictate what the process cannot do. After dealing with seccomp, we will move on to a section regarding logs, where we will learn some useful commands to help navigate through large log files. We will also learn about notification systems. In the last section of the course, we will talk about vulnerability scans and reports.

YouTube
Discover advanced methods for integrating diverse data sources into the amass engine in this 20-minute conference talk from NahamCon2021. Learn how to transform amass into a customizable, all-in-one reconnaissance tool that caters to individual needs and enhances host discovery capabilities. Gain insights from @ITSecurityGuard on leveraging amass to streamline and improve your cybersecurity reconnaissance efforts.

Pluralsight
Take your Linux sysadmin skills to the next level and keep moving along your LFCS/RHCSA and LFCE/RHCE path. This course introduces you to a deeper level of network and system administration. Topics include security concepts and architectures, securing networks and services with Linux, and remote access tools and techniques such as OpenSSH. Looking to boost your knowledge of Linux abilities as a system administrator? This course, Linux Network and Host Security, introduces you to a deeper level of network and system administration. First, you will look at managing system services with systemd. Next, you will dive deep into system and network performance, where you will learn techniques and tools to monitor system performance. Finally, you will jump into how to manage software on your system and in your data center with advanced packages management and wrap up with sharing data among your systems with NFS and Samba. By the end of this course, you'll know how to drive the most value out of your Linux systems by providing advanced network services and keeping your systems online and performing well.

YouTube
Explore the conformational analysis and cation recognition mechanisms in calixarenes through this 34-minute educational video that examines host-guest complexation processes, covering the structural flexibility of calixarene molecules and their ability to selectively bind cations through specific molecular recognition patterns.

YouTube
Explore the Linux kernel driver for the new GIC architecture (GICv5) developed by Arm in this 29-minute presentation. Learn detailed information about the implementation and functionality of the GICv5 Linux kernel host driver, based on the architecture described in Arm's documentation (AES0070). The talk provides technical insights for developers working with the latest Generic Interrupt Controller architecture in Linux environments.