( ! ) Warning: Undefined array key "updates" in /home/1051224.cloudwaysapps.com/trjpmkwsmt/public_html/wp-content/plugins/wp-mail-smtp-pro/src/Pro/License/License.php on line 362
Call Stack
#TimeMemoryFunctionLocation
10.01161930296{main}( ).../index.php:0
20.01171931656require( '/home/1051224.cloudwaysapps.com/trjpmkwsmt/public_html/wp-blog-header.php ).../index.php:17
30.01181940800require_once( '/home/1051224.cloudwaysapps.com/trjpmkwsmt/public_html/wp-load.php ).../wp-blog-header.php:13
40.01191949968require_once( '/home/1051224.cloudwaysapps.com/trjpmkwsmt/public_html/wp-config.php ).../wp-load.php:50
50.01272035728require_once( '/home/1051224.cloudwaysapps.com/trjpmkwsmt/public_html/wp-settings.php ).../wp-config.php:92
61.251695568832do_action( $hook_name = 'plugins_loaded' ).../wp-settings.php:550
71.251695569048WP_Hook->do_action( $args = [0 => ''] ).../plugin.php:517
81.251695569048WP_Hook->apply_filters( $value = '', $args = [0 => ''] ).../class-wp-hook.php:348
91.4969111869376WPMailSMTP\Core->get_pro( '' ).../class-wp-hook.php:324
101.4969111869432WPMailSMTP\Pro\Pro->__construct( ).../Core.php:213
111.4969111869528WPMailSMTP\Pro\Pro->init( ).../Pro.php:55
121.5022112289640WPMailSMTP\Pro\Pro->get_license( ).../Pro.php:89
131.5035112378432WPMailSMTP\Pro\License\License->__construct( ).../Pro.php:176
141.5043112412264WPMailSMTP\Pro\License\License->maybe_validate_key( ).../License.php:80
Linux Essentials – Bundle for Beginners – edufyre.com

Linux Essentials – Bundle for Beginners

Want to impress your boss and colleagues with your super-human Linux skills? Then this is a great place to get started. Learn Linux Shell, GREP, SED, BASH along with other popular Linux topics. Become a master at handling Linux interface, and go impress everyone!

$19

$19   LIFETIME ACCESS DEAL !
13
COURSES
503
LESSONS
90
ENROLLED

LIFETIME ACCESS TO ALL THESE 13 COURSES
Learn GREP and SED on Linux for Beginners
Learn GREP and SED on Linux for Beginners

$99 Value

Linux Shell Course for Beginners
Linux Shell Course for Beginners            

$99 Value

BASH Programming Course Master the Linux Command Line!
BASH Programming Course: Master the Linux Command Line!

$199 Value

Learn Bash Shell in Linux for Beginners
Learn Bash Shell in Linux for Beginners

$99 Value

CentOS and Red Hat Linux to Certified System Administrator!
CentOS and Red Hat Linux to Certified System Administrator!

$199 Value

Perl Programming for Beginners Stone River eLearning
Perl Programming for Beginners                    

$10 Value

Linux System Administration for Beginners!
Ubuntu Linux: Go from Beginner to Power User!

$199 Value

Learn Linux Administration Through Practical Examples
Learn Linux Administration Through Practical Examples

$99 Value

Hackproof your Linux server
Hackproof your Linux server                                        

$99 Value

Learn The Linux Command Line Basic Commands
Learn The Linux Command Line: Basic Commands

FREE

Wireless Penetration Testing with Kali Linux & Raspberry Pi
Wireless Penetration Testing with Kali Linux & Raspberry Pi

$37 Value

Amazon Web Services - LAMP Setup - Step By Step
Amazon Web Services - LAMP Setup - Step By Step

$20 Value

Linux System Administration for Beginners!
Linux System Administration for Beginners!

$49 Value

community-learning2
Live Coaching Webinars and Online Q&A Community

Assisted Learning

DETAILS OF THE 13 COURSES IN THE BUNDLE
Learn GREP and SED on Linux for Beginners

Learn GREP and SED on Linux for Beginners

Instructor: EDUmobile Academy
OverviewDescriptionAbout
This course explores in details of two powerful tools grep and sed One of the most important tasks we undertake in Linux is processing text in files. This course explores two powerful tools we have to do this: grep and sed. Grep and sed find and manipulate text in files usingregular expressions, which use special characters for searching and replacing text.
One of the most important tasks we undertake in Linux is processing text in files. This course explores two powerful tools we have to do this: grep and sed. Grep and sed find and manipulate text in files usingregular expressions, which use special characters for searching and replacing text.
In the course, we’ll introduce regular expression syntax in the context of learning grep, then apply what we’ve learned as we work with sed. Topics include: - finding text with grep - regular expression syntax - meta characters - validating emails and phone numbers - intro to sed - replacing text in files - line number addressing - outputting only found lines - printing line numbers - adding text before and after lines - simple sed scripts The course is in two units, and runs just over an hour in length.

What are the requirements?

  • Any Linux Based Operating System
  • Knowledge of any Command Line is Helpful, but Not Necessary

What am I going to get from this course?

  • Over 13 lectures and 1 hour of content!
  • Use Grep Efficiently
  • Understand Switches Properly
  • Use Regular Expressions

What is the target audience?

  • Any Fresher Who Wants to Learn Basic Linux Shell Commands
  • Any Fresher Who Wants to Learn Basic Regex
  • Expert who Needs to Brush up Regex Skills

EDUmobile Academy

EDUmobile Academy develops high quality video training courses around topics in mobile development including iPhone, Android, Windows Phone, Java, Responsive Web Design and other emerging technologies.

Every course is created by an expert developer AND a trained mentor in the area of expertise.

Each course undergoes a rigorous planning, review and an internal quality check phase - to ensure that the teaching is of highest standards available online.

EDUmobile Academy was founded in 2008 when smart phones were just emerging into the market. Founder Vishal Lamba is experienced in multiple areas of digital design, mobile development and design, web technologies and digital marketing. He has a mathematics and computer science degree from Lawrence University, USA. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.

All course creators and trainers are currently based in the USA. Support for each course on Udemy is provided with quick turn around by a small team of developers and trainers.

1:50 Hours
13 Lessons
Lifetime Access
Course Curriculum
Preview Course
Intro to Grep Introduction to the Course (3:06) Learn Switches: -i, -v, -c (4:53) More on Switches: -I, -L, -n, -h (4:00) Other Command Line Switches (4:18) Piping Other Commands to Grep (4:12) Meta Characters in Regular Expressions (9:20) Example of Validating E-mail Addresses (7:05) Example of Validating US Phone Numbers (9:02) Intro to Sed SED Introduction (4:36) Suppressing Output with -n, And Back Expressions (7:20) Address Notation (7:13) Printing Line Numbers with the = Command (3:14) Other Commands ans Scripting Sed (6:11)
Linux Shell Course for Beginners

Linux Shell Course for Beginners

Instructor: EDUmobile Academy
OverviewDescriptionAbout
This course is teaches the basics of using the linux shell, and is intended as a first course in using the terminal. This course is teaches the basics of using the linux shell, and is intended as a first course in using the terminal.
This course is teaches the basics of using the linux shell, and is intended as a first course in using the terminal. In just under an hour, you’ll learn how to navigate the directory structure, show the contents of directories, how to understand and work with file permissions, how to copy, move, and remove files and directories, and more. Topics include: How to open the linux terminal All about directories Listing a directory’s contents Understanding file permissions Changing permissions How to make and remove directories Using the wildcard characters * and ? Copying, moving, and removing files. Removing non-empty directories Using redirection and piping. This is the first course in a new series of courses on the linux shell. Upcoming courses will explore various aspects of the shell, such as scripting, using utilities such as grep and sed, C and Perl programming in linux, and the file structure. I hope you join me as we explore linux together.  
EDUmobile Academy

EDUmobile Academy develops high quality video training courses around topics in mobile development including iPhone, Android, Windows Phone, Java, Responsive Web Design and other emerging technologies.

Every course is created by an expert developer AND a trained mentor in the area of expertise.

Each course undergoes a rigorous planning, review and an internal quality check phase - to ensure that the teaching is of highest standards available online.

EDUmobile Academy was founded in 2008 when smart phones were just emerging into the market. Founder Vishal Lamba is experienced in multiple areas of digital design, mobile development and design, web technologies and digital marketing. He has a mathematics and computer science degree from Lawrence University, USA. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.

All course creators and trainers are currently based in the USA. Support for each course on Udemy is provided with quick turn around by a small team of developers and trainers.

1:02  Hours
12 Lessons
Lifetime Access
Course Curriculum
Preview Course
Start Here Introduction (2:45) Starting with Terminal (1:51) Basic Directories Commands (5:46) File Listing (8:38) File Permissions (4:53) Changing File Permissions (7:11) More On Directories, Wilcards and More Making and Removing Directories (5:15) Usage of Wildcards (5:23) File Operations (8:01) Removing Non Empty Directories (5:36) Redirection and Piping (7:04)
BASH Programming Course Master the Linux Command Line!

BASH Programming Course: Master the Linux Command Line!

Instructor: Jerry Banfield

OverviewDescriptionAbout
Go from beginner to advanced with the Linux command line in this BASH programming course! Welcome! Here you can learn you how to master Linux command line ( BASH ). What do I mean by this? Ever seen a system admin in a movie or some devious hacker using a terminal? Do you want the same knowledge? Well you are in the right place!
Welcome! Here you can learn you how to master Linux command line ( BASH ). What do I mean by this? Ever seen a system admin in a movie or some devious hacker using a terminal? Do you want the same knowledge? Well you are in the right place! This course is designed to take you from beginner to advanced in the Linux command line using bash (Bourne-again shell), a Unix shell and command language. You get 10+ hours of HD videos full of useful tutorials founded on motivation and excitement for learning bash programming! You can count on an answer to every question you ask in the course from a linux command line expert which gives you peace of mind that you can get help with every challenge you have as you learn! I wish you the very best of luck with your studies and I hope that we shall have some fun together in this course!
Jerry Banfield with EDUfyre
In 2005 while I was in college at the University of South Carolina, I tried to start working online. I signed up for an MLM program and a survey website. A month later, I had refunds from both and figured working online was not possible because everything was a scam. The truth was I was afraid to fail again. In 2011, I moved in with my wife and launched an online business focusing on video game addiction in an attempt to avoid dealing with any of my other problems. In a few months, I changed my business to selling shirts because I realized there was no money in video game addiction. A year after starting my business, I dropped out of my criminology PHD program at the University of South Florida to run my business full time which by then had changed to helping clients with Facebook and Google ads based on my experience failing to do them successfully for myself. In 2013, I starting sharing everything I knew for free on YouTube because I hoped it would help me get more clients. By April 2014, I was nearly bankrupt after failing at 15+ different business models. I was also nearly dead from trying to drink the pain away and fortunately the fear of death motivated me to get into recovery. Being in recovery motivated me to focus more on being of true service to others and less on what I would get out of it. I started making courses online with Udemy which soon turned into my first real business. I partnered with as many talented instructors as I could and learned from top instructors how to get my courses the most sales. In 2015, I tried making some inspirational videos sharing what I learned in recovery and got an amazing response on YouTube. To make the background on my videos more interesting, I started making the inspirational videos while playing video games. To make a more helpful website, I hired a freelancer to convert the videos into blog posts including this about page originally.
10:50  Hours
51 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction Intro (11:13) Setting up the environment Set up part 1 (16:54) Set up part 2 (14:07) Unique Characters Terminal customization and hash character (19:49) Characters Hash SemiColon (14:50) Characters Dot Double quotes Single quotes Comma Double comma (18:58) Backslash Slash Backquote Null command (16:43) [exclamation mark] [asterix] [question mark] (10:53) Parenthesis and Curly braces (11:39) Characters OR AND Dash Modulo Tilde Plus Tilde Minus Caret Double Caret (15:59) Variables and Parameters Variables and Parameters part 1 (9:48) Variables and Parameters part 2 (19:28) Variables and Parameters part 3 (15:03) Variables and Parameters part 4 (9:48) Return Values Return Values part 1 (19:43) Return Values part 2 (16:21) Conditional statments Conditional Statments part 1 (18:26) Conditional Statments part 2 (20:20) Variables Continued Built in variables part 1 (16:38) Built in variables part 2 (18:19) Built in variables part 3 (19:19) Modifying the properties of variables (10:41) Random number generation (6:27) Loops For Loop (6:06) While Loop (11:48) Until Loop (3:48) Break and Continue Part 1 (6:46) Break and Continue Part 2 (12:18) Case Construct (6:42) Select Construct (5:00) Internal commands Printf (6:59) Read (8:35) Eval and Set (12:15) More on set + unset (5:02) getopts (8:16) shopt type jobs disown (8:20) fg kill and command (10:07) Regular Expressions Grep Demo (10:49) Demo for sed Extended regular expressions (6:39) Globing (7:59) Input Output Redirection STDOUT, STDIN, STDERR part 1 (11:52) STDOUT, STDIN, STDERR part 2 (11:38) Functions Functions part 1 (12:31) Functions part 2 (19:42) Arrays Arrays part 1 (15:29) Arrays part 2 (4:41) Arrays part 3 (19:51) Lists OR and AND lists (10:07) Debugging Debuging part 1 (9:55) Debuging part 2 (3:47) Debuging part 3 (12:42)

Learn Bash Shell in Linux for Beginners

Learn Bash Shell in Linux for Beginners

Instructor: EDUmobile Academy
OverviewDescriptionAbout
This course teaches beginning Linux shell scripting in the Bash shell This course teaches beginning Linux shell scripting in the Bash shell. The emphasis in the course is on the scripting language itself: using scripts to automate common tasks, and the logic within the language used to control the execution of the script.
This course teaches beginning Linux shell scripting in the Bash shell. The emphasis in the course is on the scripting language itself: using scripts to automate common tasks, and the logic within the language used to control the execution of the script. The course is in two units, and contains over an hour of demos and discussion. This is the second part of the Linux course series from EDUMobile Academy. In the first unit of the course, we’ll explore the shell environment itself, and cover such topics as: - a simple hello world script - making scripts executable - why we run a script with a ./ and how to remove it - running a script to act upon the currently running shell - variables and how to use them - the .bashrc file The second unit covers scripting commands, particularly control flow. Topics include: - exit status of shell commands - the if statement and tests - handling command line arguments - random numbers - loops (while, until, and for) - the case statement I hope you join me for this beginner’s guide to the bash scripting language!
EDUmobile Academy

EDUmobile Academy develops high quality video training courses around topics in mobile development including iPhone, Android, Windows Phone, Java, Responsive Web Design and other emerging technologies.

Every course is created by an expert developer AND a trained mentor in the area of expertise.

Each course undergoes a rigorous planning, review and an internal quality check phase - to ensure that the teaching is of highest standards available online.

EDUmobile Academy was founded in 2008 when smart phones were just emerging into the market. Founder Vishal Lamba is experienced in multiple areas of digital design, mobile development and design, web technologies and digital marketing. He has a mathematics and computer science degree from Lawrence University, USA. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.

All course creators and trainers are currently based in the USA. Support for each course on Udemy is provided with quick turn around by a small team of developers and trainers.

1:50  Hours
13 Lessons
Lifetime Access
Course Curriculum
Preview Course
Exploring Shell Environment Introduction (4:11) Writing and Running a Hello World Script (6:28) Removing the ./ Resolution (6:17) Running Scripts in the Current Open Shell (7:39) Intro to Variables (8:19) Saving Shell State in .bashrc (5:36) Shell Exit Status of Shell Commands (4:13) Tests and the if Statement (7:26) Command Line Arguments (9:12) Guessing Game (11:52) Loops (9:01) The Case Statement (8:59)
CentOS and Red Hat Linux to Certified System Administrator!

CentOS and Red Hat Linux to Certified System Administrator!

Instructor: Jerry Banfield

OverviewDescriptionAbout
Learn the basics of CentOS and Red Hat Linux! Prepare and pass the RedHat certified system administrator (RHCSA) exam! You can use this course immediately to inspire your learning with Red Hat Linux and your preparation for the RedHat Certified System Administrator Exam (RHCSA)! Ask any question you have about CentOS, Red Hat Linux, or the RHCSA and get an answer quickly! Watch the promo video to see what kind of learning experience you can expect in the course!
You can use this course immediately to inspire your learning with Red Hat Linux and your preparation for the RedHat Certified System Administrator Exam (RHCSA)! Ask any question you have about CentOS, Red Hat Linux, or the RHCSA and get an answer quickly! Watch the promo video to see what kind of learning experience you can expect in the course! Whether you have no experience with Red Hat Linux or any other type of Linux operating system, you can count on this course to get you started with the basics and show you what to do all the way into the advanced material. You get to see immediately why Linux is worth learning and using. Next, a basic familiarization with the graphic user interface leaves you feeling like you know your way around. Then, into the file system navigation and command lines. Finally, you experience the packet manager and are ready to dive deeper into the material! If you are a veteran already at Red Hat Linux and want to continue your Red Hat Linux certification training, you will get the essentials for the exam delivered through three chapters explaining the key functions and highlighting what you need to know for the test. The key with passing any exam is simply effort. This course gives you another excellent resource to use along with your existing study materials to make sure you pass the RHCSA exam! Thank you for reading this! Ermin and I look forward to serving you as a student in our course!
Jerry Banfield with EDUfyre
In 2005 while I was in college at the University of South Carolina, I tried to start working online. I signed up for an MLM program and a survey website. A month later, I had refunds from both and figured working online was not possible because everything was a scam. The truth was I was afraid to fail again. In 2011, I moved in with my wife and launched an online business focusing on video game addiction in an attempt to avoid dealing with any of my other problems. In a few months, I changed my business to selling shirts because I realized there was no money in video game addiction. A year after starting my business, I dropped out of my criminology PHD program at the University of South Florida to run my business full time which by then had changed to helping clients with Facebook and Google ads based on my experience failing to do them successfully for myself. In 2013, I starting sharing everything I knew for free on YouTube because I hoped it would help me get more clients. By April 2014, I was nearly bankrupt after failing at 15+ different business models. I was also nearly dead from trying to drink the pain away and fortunately the fear of death motivated me to get into recovery. Being in recovery motivated me to focus more on being of true service to others and less on what I would get out of it. I started making courses online with Udemy which soon turned into my first real business. I partnered with as many talented instructors as I could and learned from top instructors how to get my courses the most sales. In 2015, I tried making some inspirational videos sharing what I learned in recovery and got an amazing response on YouTube. To make the background on my videos more interesting, I started making the inspirational videos while playing video games. To make a more helpful website, I hired a freelancer to convert the videos into blog posts including this about page originally.
17  Hours
74 Lessons
Lifetime Access
Course Curriculum
Preview Course
Thank you for taking this course! Find out what value you get immediately! Introduction to the course. (8:53) Why learn Linux? (14:43) Installing RedHat or CentOS with minimal modifications to your current system. Downloading, installing and configuring VirtualBox on Windows 8. (12:21) Create a Red Hat virtual machine part 1. (18:05) Create a Red Hat virtual machine part 2. (14:36) Create a Red Hat virtual machine part 3. (17:40) Installing RedHat or CentOS with a dual boot approach on WIndows 8 How to dual boot Red Hat and windows 8 part 1. (18:42) How to dual boot Red Hat and windows 8 part 2. (8:15) Linux Graphical User Interface (GUI). Basic familiarization with Linux Graphical user interface part 1. (10:04) Basic familiarization with Linux Graphical user interface part 2. (13:36) Linux command line. File system navigation. Commands “ls, cd, pwd” part 1. (16:14) File system navigation. Commands “ls, cd, pwd” part 2. (14:08) Finding files. Commands “find, locate, updatedb, man.” (19:46) File and folder ownership and permissions. Commands “chown, chmod” part 1. (14:00) File and folder ownership and permissions. Commands “chown, chmod” part 2. (8:47) Move, delete and copy files. Commands “mv, rm, cp.” (12:58) Commands “grep, pipe, echo, cat.” (18:55) Yum packet manager part 1. (19:49) Yum packet manager part 2. (14:27) Rpm packet manager. (7:40) RedHat Certified System Administrator (RHCSA) exam preparation. What does the RedHat Certified System Administrator exam include? (16:32) Essential tools for using Red Hat Linux and passing the exam. Globbing ( wildcards ) part 1. Getting files fast without the entire name. (11:15) Globbing ( wildcards ) part 2. (15:13) I⁄O Redirection part 1. Input and output redirection with standard input/output. (10:46) I⁄ORedirection part 2. Redirect standard error to standard output or command. (13:13) I⁄ORedirection part 3 for redirecting standard error in more depth. (8:30) Vim text editor part 1. How to do text editing and use text editors. (8:35) Vim text editor part 2. Making changes in the Vim text editor. (11:49) Vim text editor part 3. How to search for text within a file. (7:37) Vim text editor part 4. (8:17) Vim text editor part 5. Combining commands together to build new files. (11:03) The Red Hat Linux file system explained and basic functions. Linux file system explained where all files are in the root directory. (18:42) Hard and soft links in the Linux file system. (8:07) Backups, recovery, and compression in Linux part 1. Introduction and use. (18:46) Backups part 2. How to uncompress files and restore backed up files. (9:18) Backups, recovery, and compression part 3. More about tar. (11:05) Automating tasks with cron part 1. Meet the crontab and schedule tasks. (6:59) Automating tasks with cron part 2. Creating a cron job and bash script. (18:05) Automating tasks with cron part 3. Commenting out a line and making notes. (13:54) Automating tasks with cron part 4. More about crontabs. (10:00) User and groups management. User properties and where are they stored on the system. (12:32) Creating a user. (18:11) Creating groups and assigning users to them. (19:49) Network configuration Intro to network interfaces. (11:12) Network manager. (18:31) Network manager and network configuration part 2 + some troubleshooting tools. (19:50) Establishing secure connections via SSH. Installing and configuring SSH server part 1. (20:05) Installing and configuring SSH server part 2. (14:47) SSH passwordless login and SCP ( secure copying of files between hosts ). (16:33) Partitioning. Partitioning and file systems. (9:16) Partitioning a new disk. (16:33) Formatting a partition using xfs file system. (7:29) Mounting the partitions. (20:28) Managing LVM Logical Volumes. Linux Volume Management (LVM) part 1. (12:04) Linux Volume Management (LVM) part 2. (16:25) Linux Volume Management (LVM) part 3. (12:31) Linux Volume Management (LVM) part 4. (7:45) Linux Volume Management (LVM) part 5. (8:31) Encrypted file systems. LUKS part 1. (13:55) LUKS part 2. (16:37) Servers under Red Hat: HTTP, FTP, VNC How to install and configure a web server part 1 (18:37) How to install and configure a web server part 2 (7:57) How to install and configure an FTP server part 1 (12:42) How to install and configure an FTP server part 2 (18:20) How to install and configure VNC (16:50) SELinux SELinux general talk part 1 (19:14) SELinux general talk part 2 (19:48) Basics (19:16) SELinux and Apache part 1 (20:18) SELinux and Apache part 2 (17:57) SELinux and Apache part 3 (11:27) SELinux and SSH (5:44)

Perl Programming for Beginners Stone River eLearning

Perl Programming for Beginners

Instructor: Stone River eLearning

OverviewDescriptionAbout
Code with Perl even if you're a beginner. Master this complex scripting language easily. This course will give students both a conceptual understanding of Level of development as well as the practical skill to construct your own levels.
This course will give students both a conceptual understanding of Level of development as well as the practical skill to construct your own levels. Students will be able to design their own levels of Perl applications with the concepts of what makes good.
  • Learn how to download, install the software, and create your first Perl application.
  • Learn about working with different kinds of data such as: strings, numbers, variables, getting the user input and much more.
  • Learn about creating and using array in your Perl applications.
  • Learn about how to create your own subroutines you can use in your Perl applications.
  • Learn about handling user input, getting input from different sources such as a text file and filehandles.
  • Learn about how to use hashes and use them in your Perl applications to uniquely identify keys and values within the hash.
  • Learn about how to work with regular expressions and the difference from strings.
Stone River eLearning
Stone River eLearning is owned and operated by Mark Trego and his support and development staff of outstanding eLearning enthusiasts from around the world. Mark originally hails from Bismarck, North Dakota in the U.S., but now resides in the little town of Sheldon, Iowa where he lives with his wife and 3 children on a working farm just outside of town.
Mark's passions are entrepreneurship and online learning, so it was only natural that he gravitated towards what became the Stone River family of companies. Mark received his Master's Degree in Business Administration/Entrepreneurship from Benedictine University in Chicago. His early career found him in finance, but he really found his passion as an education technology professional, instructional designer and teacher before starting Stone River eLearning in 2011.
7:50  Hours
71 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction to the Course Course Introduction (4:36) Introduction to Perl Intro (3:06) Getting and Installing Perl (4:47) Creating a First Perl Program (8:16) More Advanced Perl Examples-1 (8:24) More Advanced Perl Examples-2 (9:36) Outro (1:50) Working with Scalar Data Intro (4:36) Working with Scalar Data (5:45) Working with strings (8:31) Working with numbers (8:55) Working with variables (9:24) Getting user input (6:54) The chomp operator (6:15) Decision-making with if statements (10:40) Looping with while statements (6:31) Outro (5:10) Working with Arrays and Lists Intro (3:20) Creating arrays (7:59) Accessing arrays via indices (8:11) Creating lists (7:43) Performing assignment with lists (8:15) Converting arrays into strings (5:48) Using the foreach loop on arrays and lists (5:46) Understanding scalar and list context (8:05) Understanding in scalar context (5:09) Outro (3:31) Working with Subroutines Intro (4:16) Subroutine definitions (3:14) Calling subroutines (7:18) Working with subroutine return values (6:20) Subroutine arguments (6:54) Using variable-length parameter lists (7:19) Using the return operator (8:34) Private variables in subroutines (7:22) Outro (3:56) Perl Input and Output Intro (4:30) Receiving input from standard input (7:46) Working with input from the diamond operator (7:57) Sending output to standard output (6:44) Using printf to format output (9:19) Working with filehandles (10:28) Handling fatal errors with die (7:07) Outro (5:02) Hashes Intro (2:17) Hashes defined and demonstrated (7:56) Accessing hash elements (6:59) Working with hash functions (9:58) Outro (2:11) Working with Regular Expressions Intro (2:02) Regular expressions defined (9:12) Working with simple patterns (7:53) Working with character classes (6:24) Matching using m// (8:50) Working with match modifiers (9:22) Working with the binding operator (6:20) Working with match variables (9:42) Outro (2:51) More on Regular Expressions Intro (1:26) Matching in list context (10:41) Performing substitutions using s/// (8:18) Working with the split function (8:43) Working with the join function (10:20) Outro (3:05) Final Project Final Project Overview (7:44) Final Project Explanation Part 1 (7:52) Final Project Explanation Part 2 (9:15) Final Project Explanation Part 3 (5:51) Conclusion Conclusion (5:17) Closing Message (1:36)

Linux System Administration for Beginners!

Ubuntu Linux: Go from Beginner to Power User!

Instructor: Jerry Banfield with EDUfyre

OverviewDescriptionAbout
Get started using the #1 Linux distribution and take your tech skills to the next level! If you want to learn Ubuntu Linux, you can use this course to give you motivation and 7+ hours of practical tips for using Ubuntu Linux! You can take this course and enjoy it with no experience on Linux or previous experience on another operating system that you want to expand with knowing Ubuntu.
If you want to learn Ubuntu Linux, you can use this course to give you motivation and 7+ hours of practical tips for using Ubuntu Linux! You can take this course and enjoy it with no experience on Linux or previous experience on another operating system that you want to expand with knowing Ubuntu. With 10 years of experience as a Linux administrator & developer, you can count on Nick to explain what is worth knowing in a simple and practical way that is easy to understand. When you watch Nick show you commands, you will feel comfortable trying them and confident you can become a power user in Ubuntu Linux! This is one of the few Linux courses fully subtitled in English, and we will happily assist you every step of the way as you familiarize yourself with Ubuntu, Linux administration, networking, and development! Thank you for reading this and we hope to see you introducing yourself in the course soon!  
Jerry Banfield with EDUfyre
In 2005 while I was in college at the University of South Carolina, I tried to start working online. I signed up for an MLM program and a survey website. A month later, I had refunds from both and figured working online was not possible because everything was a scam. The truth was I was afraid to fail again. In 2011, I moved in with my wife and launched an online business focusing on video game addiction in an attempt to avoid dealing with any of my other problems. In a few months, I changed my business to selling shirts because I realized there was no money in video game addiction. A year after starting my business, I dropped out of my criminology PHD program at the University of South Florida to run my business full time which by then had changed to helping clients with Facebook and Google ads based on my experience failing to do them successfully for myself. In 2013, I starting sharing everything I knew for free on YouTube because I hoped it would help me get more clients. By April 2014, I was nearly bankrupt after failing at 15+ different business models. I was also nearly dead from trying to drink the pain away and fortunately the fear of death motivated me to get into recovery. Being in recovery motivated me to focus more on being of true service to others and less on what I would get out of it. I started making courses online with Udemy which soon turned into my first real business. I partnered with as many talented instructors as I could and learned from top instructors how to get my courses the most sales.   In 2015, I tried making some inspirational videos sharing what I learned in recovery and got an amazing response on YouTube. To make the background on my videos more interesting, I started making the inspirational videos while playing video games. To make a more helpful website, I hired a freelancer to convert the videos into blog posts including this about page originally.
7:22  Hours
86 Lessons
Lifetime Access
Course Curriculum
Preview Course
Getting started with Ubuntu Linux Introduction to Ubuntu Linux and getting started as a power user! (7:44) What are Linux distributions? (7:11) Installing Ubuntu in a Virtual Machine Installing VirtualBox and setting up your virtual machine. (7:50) Installing Ubuntu Linux on your virtual machine (pt.1) (6:38) Installing Ubuntu Linux on your virtual machine (pt.2) (6:00) Disabling the ISO & first boot up. (2:14) Optimizing Ubuntu for a Better User Experience & Customizing your Desktop Installing Guest Additions for a better user experience. (7:33) Customizing our Ubuntu desktop. (8:27) Installing the Unity Tweak Tool for Ubuntu. (12:06) Installing Ubuntu Linux Alongside your Primary Operating System Installing Ubuntu along side Windows on your actual hard drive (pt.1) (6:05) Installing Ubuntu along side Windows on your actual hard drive (pt.2) (10:16) Getting Started with the Linux Command Line Getting started with the Linux command line (pt.1) (5:32) Getting started with the Linux command line (pt.2) (7:35) Administrative privileges in the Linux terminal. (5:57) Using the package manager to install new applications. (4:02) Searching through the repository to find new applications to download. (2:05) What if we want to install a package that is not in the repository? No problem! (4:46) Keeping programs updated in Ubuntu Linux. (4:39) File permissions and ownership explained (pt.1) (4:26) File permissions and ownership explained (pt.2) (8:10) How to create a new file in the terminal and recap. (4:58) Creating new directories and moving files. (4:34) Copying, renaming, and removing files. (4:44) Moving on to more Advanced Commands in the Terminal Getting started with the FIND command and it’s practical uses (pt.1) (3:30) Getting started with the FIND command and it’s practical uses (pt.2) (4:32) Getting started with the FIND command and it’s practical uses (pt.3) (3:24) Introduction to the GREP command. (2:59) Using GREP in conjunction with the FIND command. (3:15) How to redirect the output of a command. (3:16) Using the TOP command to view applications on your Linux machine in real-time. (1:18) How to view the entire list of processes and closing applications. (5:35) What is a service? (2:07) Configuring services using the command line. (4:35) Using CRONTABS to schedule tasks. (2:58) What are the practical applications of CRONTABS? (2:37) Ubuntu Linux Developer Tools: Get Started as a Freelancer Today! Choosing an integrated development environment (IDE). (3:33) Eclipse installation and set-up. (3:57) PyCharm Installation and set-up. (4:34) PyCharm installation problem resolved. (1:49) Introduction to GitHub, installation, and how to set-up a repository. (4:15) How to pull/push information from our repository. (6:07) How to remove/ignore directories in our repository. (5:12) How to resolve merge conflicts from the command line. (7:17) How to set-up and manage branches. (7:12) Correction from the previous lecture. (0:42) Getting ed with Meteor. Installation and how to add packages. (5:54) Meteor tutorial pt. 1: Setting up your first project. (5:34) Meteor tutorial pt. 2: Setting up our router and React components. (5:54) Meteor tutorial pt. 3: Watch as our project begins to take shape! (6:30) Meteor tutorial pt. 4: Working on the actual programming. (13:14) Meteor tutorial pt. 5: Rendering our posts. (8:51) Meteor tutorial pt. 6: Putting the finishing touches on our project. (6:28) Apache 2, PHP 5, and MySQL installation. (3:29) Getting started with our server configuration. (5:38) Hosting our own Web Server & Deploying our Meteor App What is the hosts file on a Linux system? (3:25) Deploying our Meteor app to an Apache 2 server. (5:23) Setting up our MongoDB NoSQL database. (5:17) Creating our virtual host. (3:35) Using a shell script to set our environment variables. (7:49) Installing & configuring phpMyAdmin. (3:14) Let’s take a tour around the phpMyAdmin panel. (4:48) Creating a basic virtual host. (8:10) Setting up a WordPress installation on top of our Apache 2 environment. (7:24) Before we begin using WordPress, we need to set-up our database. (6:22) Python installation & command line interface. (4:29) What are the practical applications of Python? (6:17) Managing Users, Permissions, and Groups Adding/removing users through the system settings graphical user interface (GUI) (3:34) Adding new users through terminal. (4:03) How to delete users through terminal. (0:57) How to change an existing users password. (0:45) Adding users to a group and why this is valuable. (3:55) Linux Network Administration Tools Introduction to networking. (1:38) How does the internet work? (5:11) What is a local network? (7:26) Practical networking commands (pt.1) (5:32) Practical networking commands (pt.2) (4:59) Using the netstat command to tack detailed network statistics. (4:59) An in-depth look at the Linux hosts file (pt.1) (4:31) An in-depth look at the Linux hosts file (pt.2) (4:48) Using traceroute to track the servers a request passes through. (3:57) Using Network Mapper to track the activity on your network (pt.1) (7:36) Using Network Mapper to track the activity on your network (pt.2) (6:56) Setting up a SSH Host on our local and Course Wrap-up Using ssh to access the command line of a remote host. (2:37) Let’s use sftp to transfer files to and from machines. (3:36) Setting up an ssh host on our local machine. (5:27) Using the man command to learn info about the programs on your Linux machine. (3:40)

Learn Linux Administration Through Practical Examples

Learn Linux Administration Through Practical Examples

Instructor: Gabriel Avramescu

OverviewDescriptionAbout
First steps into becoming a successful Linux system administrator Requirements Have passion to learn and improve You should be able to perform basic commands in Linux. This course is not for absolute beginners.
Requirements
Have passion to learn and improve
You should be able to perform basic commands in Linux. This course is not for absolute beginners. However, you only need to have a basic understanding of what Linux is and to be able to open a terminal and use simple commands as changing the directory and listing files.
Have at least one Linux virtual machine (Ubuntu, Debian, CentOS, RHEL ..)
Description
This course was designed to share my experience as a Linux system administrator through practical examples and scenarios. If you would like to start a career in Linux or simply improve your knowledge, this course is for you. Throughout the course, I will show you many of the tasks you would encounter when administering a Linux server.
Since being a system administrator, I know you might need to deal with more than only one Linux distribution, what I teach in this course, applies to many of them.
I know that the best way to learn something is by actually doing it, so I created this course by showing how to accomplish the tasks rather than just explaining how to do them in theory. Moreover, along with the video lectures, you will also find exercises to help you improve your hands-on experience. You will benefit for free from any new lectures and updates on the course.
Who is the target audience?
People who would like to take up their Linux knowledge to an upper level
Those who want to start a career as a Linux system administrator
Developers who need to administrate a Linux server
Gabriel Avramescu
Senior Information Security Consultant
  • I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
  • Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
  • Make recommendations on security weaknesses and report on activities and findings.
  • Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
  • Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
  • Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
  • Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
  • Assist with the development of remediation services for identified findings
  • Customize, operate, audit, and maintain security related tools and applications
IT Trainer 
  • CEH, ECSA, CHFI from EC-Council
  • Cisco CCNA, CCNA Security, Linux Essentials
Certifications
  • OSCE
  • OSWE
  • OSWP
  • CREST Registered Penetration Tester (CRT)
  • OSCP
  • CHFI (Computer Hacking Forensic Investigator)
  • ISO 270001 Lead Auditor
  • ECSA (EC-Council Security Analyst)
  • CEH (Certified Ethical Hacker)
  • CCNA and CCNA Security
  • CCNP Routing and CCNP Switching
  • Advanced Linux&InfoSEC
  • VMWare vSphere Install, Configure, Manage
  • Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
5  Hours
68 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction Tips&Tricks (11:14) System Startup Introduction (0:37) Understanding runlevels and targets (2:56) Current and default runlevel (1:30) Default runlevel Ubuntu – init (0:37) Listing services in certain runlevels (1:58) Enable/disable a process from starting at boot – init (6:10) Default target – systemd (1:10) Dealing with processes – systemd (1:16) Exercise 1 – System Startup Disk Management What is LVM? (2:11) Steps on how to create a volume group (1:18) Steps on how to extend an existing volume group (0:22) Steps on how to decrease disk space by reducing the volume gruop (0:59) Add virtual disk in VMware Workstation Player (0:41) Add virtual disk in Oracle VM VirtualBox (1:05) Create volume group and logical volume (5:39) Extend existing volume group and logical volume (2:31) Reduce logical volume (3:13) Resize filesystem and logical volume (1:22) Quiz – Extend Disk Space Exercise 2 – Disk Management Network & Security Introduction (0:51) Change the hostname (0:48) DNS nameservers (3:11) Resolve queries locally eith /etc/hosts (1:34) Determine the order for DNS queries (0:47) Setup a static ip Debian/Ubuntu (4:11) Exercise 3.1 – Network configuration Setup alias ip (1:30) ip vs ifconfig commands (6:15) Adding routes (6:33) Network configuration for CentOS/RHEL (3:48) Connect remotely with SSH (6:56) Servers fingerprints (2:57) Exercise 3.2 – Generate ssh keys Setup firewalls with iptables (7:02) iptables-persistent (6:02) Exercise 3.3 – Setup iptables Quiz – DNS Configuration Network Troubleshooting Introduction (1:50) Ping command (4:13) What happens behind the ping command (1:03) Traceroute command (1:20) Open connections netstat&ss (6:43) Capturing network traffic with tcpdump (5:46) Deciphering the output of tcpdump (3:49) Exercise 4 – Capture packets with tcpdump Quiz – Identify open connections System Troubleshooting Introduction (1:05) Swap&Swappiness (3:08) Identify the system’s resources (6:50) Check system’s resources usage (4:28) Keep an eye on something – the watch command (1:57) Real-time view tools (8:44) Get historical data (5:00) Check running processes (2:52) Check open files (4:04) Exercise 5.1 – System Resources Log messages and rsyslogd daemon (3:59) Checking log files (10:14) Rotate logs (9:08) Schedule jobs with at (8:14) Schedule jobs with cron (9:43) Exercise 5.2 – Schedule jobs Anacron (4:28) Quiz – System Troubleshooting Network File System NFS Introduction (3:19) Setup NFS (7:43) Mount filesystem permanently (3:43) Exercise 6 – Network File System User Management Adding users (4:15) Manage groups & delete users (2:36) Lock accounts (4:07) Limit disk space for users with quota (7:46) Disk limit wit quota – practical example (4:14) Conclusions & Final Quiz Change root password Interview questions Congrats! Final Quiz

Hackproof your Linux server

Hackproof your Linux server

Instructor: Gabriel Avramescu

OverviewDescriptionAbout
Linux security guide with practical hardening tips Linux Servers provide many user transactions, which are constantly vulnerable to security threats, due to data sensitivity. To bring an application up and running on a server is an important thing, but without taking security measures, it can end up in a disaster.
Linux Servers provide many user transactions, which are constantly vulnerable to security threats, due to data sensitivity. To bring an application up and running on a server is an important thing, but without taking security measures, it can end up in a disaster. Although Linux is immune to some of the dangers Windows servers encounters, Internet is still a dangerous place. Therefore it's important to apply security measures to prevent malicious attacks like brute force attack, etc. This course was designed to show some practical tips on how to protect your server, that once applied, they will increase the level of security on your system and decrease the chances of it being compromised. Along with the video lectures, you will also find exercises to help you improve your hands-on experience.
Gabriel Avramescu
Senior Information Security Consultant
  • I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
  • Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
  • Make recommendations on security weaknesses and report on activities and findings.
  • Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
  • Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
  • Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
  • Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
  • Assist with the development of remediation services for identified findings
  • Customize, operate, audit, and maintain security related tools and applications
IT Trainer 
  • CEH, ECSA, CHFI from EC-Council
  • Cisco CCNA, CCNA Security, Linux Essentials
Certifications
  • OSCE
  • OSWE
  • OSWP
  • CREST Registered Penetration Tester (CRT)
  • OSCP
  • CHFI (Computer Hacking Forensic Investigator)
  • ISO 270001 Lead Auditor
  • ECSA (EC-Council Security Analyst)
  • CEH (Certified Ethical Hacker)
  • CCNA and CCNA Security
  • CCNP Routing and CCNP Switching
  • Advanced Linux&InfoSEC
  • VMWare vSphere Install, Configure, Manage
  • Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
2:40  Hours
25 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction Tips & Tricks (11:14) GRUB Protection and Security Patching Intro Protect GRUB with password (3:12) Exercise – Protect GRUB with password Security Patching (5:00) Third-party packages User Management and PAM What is PAM? (4:50) Check if a service uses PAM (1:23) Common-auth file explained (2:26) Restrict users from using the same old passwords (3:25) Exercise – Restrict users from using the same old password Set password expiration for users (2:48) Enforce strong passwords (5:15) Exercise – Enforce strong passwords sudo access (7:50) Disable root login (2:42) /etc/securetty file (1:05) Limit scheduling jobs with cron (5:18) PAM Quiz Control remote connections SSH banner before & after the login (3:09) SSH keys Exercise – Generate ssh keys Server’s fingerprint (2:17) Disable root connection (1:02) Blacklist users from ssh (6:25) SSH Quiz Firewalls & TCP Wrappers Iptables (5:45) Iptables-persistent (4:47) Exercise – Iptables Fail2ban (10:39) fail2ban-client command (3:59) TCP Wrappers (10:47) Fail2ban Quiz Auditing & Virus Scanning Lynis audit tool (6:58) Exercise – Lynis audit tool Virus scanning – ClamAV (5:26) Final Section Conclusions Final Quiz

Learn The Linux Command Line Basic Commands

Learn The Linux Command Line: Basic Commands

Instructor: Adam Eubanks

OverviewDescriptionAbout
Get Started with the Unix Command Line The command line is an incredibly useful tool for developers and regular computer users. If you want to get into Ruby on Rails, Django, Unix customization and so much more, learning the command line will help you immensely.
The command line is an incredibly useful tool for developers and regular computer users. If you want to get into Ruby on Rails, Django, Unix customization and so much more, learning the command line will help you immensely. Many technologies and frameworks rely on command line inputs. This course will get you up and be running with the command line quickly.
In this course Learn The Command Line: Everything You Need To Know you will quickly learn and become familiar with many essential UNIX commands. We will go over everything from opening up the command line to making our very own commands for the command line. This command line course is mainly for Linux users but Mac users are welcome to join (just realize not everything may work).
For beginners, the command line may seem overly complex and it may be hard to sit down and learn it. This course will teach you how to use the command line and skip the boring, unnecessary stuff that you may never use. However, this course gives an excellent command line foundation, so if you want to learn more, you can do so easily on your own.
I used to be very intimidated by the command line. I designed this course for people like me who may be struggling to figure out all of the commands. This course would've been perfect for me 2 years ago.
So what are you waiting for, now is the best time to learn the command line. Don't procrastinate it any further.
And if you aren't satisfied with this course, just remember you have a 30-day money back guarantee.
Thank you so much for showing interest in this command line course, and I hope to see you soon!
Adam Eubanks,
Adam Eubanks
I am a self taught programmer and learning enthusiast. My expertise is mainly in Artificial Intelligence, Ruby on Rails web development, Python and Linux. I hope that my courses will help students learn things that I had difficulty with in an easier and more fun way. These courses are meant to be short, sweet and quick to the point.
1:10  Hours
13 Lessons
Lifetime Access
Course Curriculum
Preview Course
Getting Started In Case You Missed The Promo (1:24) What is the Command Line and why is it (2:03) Opening the Command Line (1:28) Copying and Pasting (1:46) Terminal Commands Using the Calendar (1:08) The pwd Command (1:32) Changing Directories in the Command Line (3:03) Changing Directories in the Command Line (3:46) The ls Command And A Bunch Else (10:03) Making and Deleting Directories in the (2:01) Copying Files (3:55) Finale Making Custom Commands In The Terminal (6:14) Final test What’s Next? (1:19)

Wireless Penetration Testing with Kali Linux & Raspberry Pi

Wireless Penetration Testing with Kali Linux & Raspberry Pi

Instructor: Cristian Gradisteanu

OverviewDescriptionAbout
Use this small but powerful Raspberry Pi device in order to perform pen testing on your network or for clients. Are you into network security or just want to get started in this field? This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also.
Are you into network security or just want to get started in this field? This course is an excellent introduction to Network and Systems security. We will use a Raspberry Pi device throughout this course but you can also follow along by installing Kali Linux on your computer, a process described in the course also. Ever wanted to know how hackers are breaking into your network and what you can do to stop them? Then this course is right for you! We will play the role of a Pen Tester or White Hat Hacker in order to discover network and system vulnerabilities and then see how we can protect against them. Scan your network for vulnerabilities before hackers are taking action against your system. Learn how to protect against common vulnerabilities that are present in Operating Systems and how to better understand how Computer Security works. Don't be caught off-guard and protect your network before hackers discovers the vulnerabilities in your system. Take action today!
Cristian Gradisteanu
As a software developer, I am responsible for the development of management software products produced by the company. My area of expertise includes programming languages like Java, Objective-C, C#, C++, PHP, Ruby and system administration. With more than 15 years of Desktop software development experience, I discovered that mobiles application programming is something that I would love to do for the rest of my life :) I am very passionate about teaching everyday people topics that they are interested in. I think that in order to keep up with the latest technology trends your leaning process should be a continuous one. The biggest goal for me right now is to motivate and inspire others through the form of knowledge. If I can inform someone of ways to achieve a healthy mindset or production solution that makes their life easier, I can officially say that I've done my job.
3:26 Hours
26 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction Course Introduction (1:39) Hardware Requirements (6:57) Downloading and installing Kali Linux on Raspberry Pi (8:56) Downloading and installing Kali Linux in VirtualBox on Windows (8:42) Downloading and installing Kali Linux in VirtualBox on Mac OS X (6:20) Connecting to Kali Linux for the first time – VirtualBox Connecting to Kali Linux for the first time – Raspberry Pi (8:45) Updating Kali Linux (3:37) Setting up your wireless adapter (19:51) Conclusions (1:24) Bypassing Wireless LAN Authentication Bypassing Hidden SSIDs (7:05) Bypassing MAC Address filtering (13:19) Bypassing Shared Key Authentication (6:55) Bypassing Open System Authentication (2:35) Cracking WEP (8:44) Cracking WEP with fern-wifi-cracker (8:00) Cracking WPA & WPA2 (11:37) Cracking WPA2 with Wifite and Cowpatty (8:42) Connecting to a WPA/WPA2 wireless network (4:04) MITM – Man in the middle attack (15:31) MITM with Ettercap (9:17) Conclusions

Amazon Web Services - LAMP Setup - Step By Step

Amazon Web Services - LAMP Setup - Step By Step

Instructor: Skillbakery Studios

OverviewDescriptionAbout
This course helps you in creating a Linux instance and installing PHP,MySQL and more stuff on Amazon EC2 instance. What you'll learn Learn how to work with AWS Serverless architecture Learn what is Lambda function
What you'll learn
  • Learn how to work with AWS Serverless architecture
  • Learn what is Lambda function
  • Learn how to create a Lambda function using Node .js and ASP .Net Core MVC C#
  • Learn how to connect with RDS - MS SQL Server
  • Learn how to connect with DynamoDB and work with Lambda Function
  • Learn how to work with Visual Studio 2019 IDE and deploy Lambda to AWS environment
Requirements
  • Knowledge of Node .JS
  • Knowledge of ASP .Net Core and C#
  • Knowledge of SQL Server and SQL Query
Description The serverless is the "in thing" today and if you are a web developer you should have knowledge of what exactly serverless is all about? This course takes you through the basics of creating a serverless application using industry leader Amazon Web Services platform. In this course we will be covering the following things
  • AWS Services Overview
  • Covering Lambda, S3, DynamoDB and API Gateway
  • Client and Server Setup
  • Working with AWS Account
  • Setting up Lambda Compute and testing with Postman
  • API and Database Setup
  • Working with DynamoDB and Lambda Function
  • Working with Visual Studio 2019 and ASP.Net Core MVC using C#
  • Hosting static websites on S3
Let's start learning AWS Serverless Apps
Who this course is for:
  • Web Developers
  • Aspiring Web Developers
  • Software Developers
  • Aspiring Software Developers
  • System Administrators
SkillBakery Studios
SkillBakery is one of the fastest growing online education company. Our vision is to provide high quality education which is affordable and accessible to everyone We believe that every one has their own way of learning and grasping things and that's why we provide self-paced HD quality contents,so you can learn what you love at your convinience We currently offer courses in web development and will soon be publishing new courses in other categories as well We are committed to bring courses on new topics and we try to release one new course every month So keep visiting us, you will surely find something for yourself here.
1  Hour
17 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction Introduction to Amazon Web Services – EC2 (3:42) EC2 Instances Creating a Linux Instance (6:26) Connecting to an instance – Windows OS (5:52) Connecting to an instance – Mac OS (3:00) Installing a LAMP Web Server Installing PHP (5:14) Installing MySQL and PhpMyAdmin (7:02) Enabling mod_rewrite and .htaccess (6:33) Enabling short open tag for PHP (3:07) Installing Google PageSpeed (3:52) Installing PHP GD Library (1:23) Settings permissions to upload directories (2:17) Installing SSL Certificate (7:13) Mapping Elastic IP to Domain Mapping Elastic IP to Domain (1:40) Mapping Elastic IP to running EC2 Instance Mapping Elastic IP to running EC2 Instance (1:30) Hosting Multiple Sites on EC2 Instance Hosting Multiple Sites on EC2 Instance (4:22) Setting up CRON job Setting up CRON job (6:26) Conclusion Conclusion and download (0:26)

Linux System Administration for Beginners!

Linux System Administration for Beginners!

Instructor: Joseph Delgadillo

OverviewDescriptionAbout
Get started with Linux, app development, server configuration, networking, and become a system administrator! Welcome to A Beginner's Guide to Linux System Administration! In this course we will begin by covering the very basics of using the Linux operating system, and move on to the advanced system and networking skills necessary to become a Linux administrator!
Welcome to A Beginner's Guide to Linux System Administration! In this course we will begin by covering the very basics of using the Linux operating system, and move on to the advanced system and networking skills necessary to become a Linux administrator! We will cover the following topics in this course: Linux installation Command line usage Development tools including choosing an IDE GitHub setup Complete Meteor.js web project LAMP stack setup and app deployment User management Network administration Enroll now to receive 7.5+ hours of HD video tutorials and 1 on 1 help from experienced Linux administrators! This course is fully subtitled in English. Thank you for taking the time to read this and we hope to see you in the course!  
Joseph Delgadillo
Joseph Delgadillo is the founder of JTDigital Courses, an education technology company. He has been active in the online learning community since 2015 and has worked with multiple startups. As of 2020, over 1 million students across the globe have enrolled in his courses covering ethical hacking, Python programming, web development and more. He graduated with honors from Central Washington University.
7:36  Hours
86 Lessons
Lifetime Access
Course Curriculum
Preview Course
Introduction to Linux Introduction to Linux (7:44) Linux distributions explained (7:11) Ubuntu Linux Installation VirtualBox installation and virtual machine setup (7:50) Ubuntu Linux installation in a virtual machine (6:38) Ubuntu Linux setup in a virtual machine continued (6:00) First boot up into Linux (2:14) VirtualBox Guest Additions (7:33) Ubuntu desktop customization (8:27) Unity Tweak Tool (12:06) Installing Linux alongside Windows (dual boot) (6:05) Dual boot setup continued (10:16) Linux Command Line Interface (CLI) Essentials Introduction to the Linux command line interface (CLI) (5:32) Navigating directories with the ls command (7:35) Administrator privileges in terminal (5:57) Using the package manager to install new applications (4:02) Searching through the repositories to find new applications to download (2:05) Installing packages which are not located in the repositores (4:46) Keeping programs updated via terminal (4:39) File permissions and ownership explained (4:26) File permissions and ownership continued (8:10) Creating new files using the touch command (4:58) Creating new directories and moving files (4:34) Copying, renaming, and removing files (4:44) Advanced CLI Usage The find command and it’s practical uses (3:30) The find command and it’s practical uses continued (4:32) Find command final thoughts (3:24) Using the grep command to find information within files (2:59) Using grep in conjunction with the find command (3:15) How to redirect the output of a command (3:16) Using the top command to view applications in real time (1:18) Viewing running process and closing applications via terminal (5:35) Services explained (2:07) Service configuration via terminal (4:35) Using crontab to schedule tasks (2:58) Crontab practical applications (2:37) Linux Development Tools Choosing an integrated development environment (IDE) (3:33) Eclipse installation and setup (3:57) PyCharm installation and setup (4:34) PyCharm installation problem resolved (1:49) GitHub installation and how to setup a repository (4:15) How to push/pull information from a repository (6:07) How to remove and ignore directories in a repository (5:12) Resolving merge conflicts (7:17) How to setup and manage branches (7:12) Correction from the previous lecture (0:42) Meteor.js Project Getting Started with Meteor.js (5:54) Setting up our Meteor project (5:34) Router setup and React components (5:54) Watch as our project begins to take form! (6:30) Getting into the programming of our application (13:14) Rendering blog posts (8:51) Putting the finishing touches on our Meteor app (6:28) Web Server Setup, Host Configuration, and App Deployment Apache 2, PHP, and MySQL setup (3:29) Server configuration (5:38) Linux hosts file (3:25) Deploying our Meteor app to the Apache 2 server (5:23) Setting up a MongoDB NoSQL database (5:17) Virtual host setup (3:35) Using a shell script to set our environment variables (7:49) Installing and configuring phpMyAdmin (3:14) Let’s take a tour around the phpMyAdmin panel (4:48) Creating a basic virtual host (8:10) Setting up a WordPress installation on top of Apache 2 environment (7:24) Before using WordPress we need to setup our database (6:22) Python installation and command line interface (4:29) Why is Python worth learning? (6:17) Linux User Management Adding/removing users through GUI (3:34) Adding new users via terminal (4:03) How to delete users through terminal (0:57) Changing an existing user’s password (0:45) Adding users to a group (3:55) Linux Network Administation Introduction to networking (1:38) How does the internet work? (5:11) What is a local area network (LAN)? (7:26) Practical networking commands (5:32) Networking commands continued (4:59) Netstat to track detailed network statistics (4:59) An in-depth look at the Linux hosts file (4:31) Linux hosts file continued (4:48) Using traceroute to track the servers a request passes through (3:57) Network mapper to track the activity on your network (7:36) Network mapper continued (6:56) Using SSH to access the command line of a remote host (2:37) SFTP to transfer files between machines (3:36) Setting up an SSH host on our local machine (5:27) Using the man command to learn about our programs (3:40) Introduction to Linux Introduction to Linux (7:44) Linux distributions explained (7:11) Ubuntu Linux Installation VirtualBox installation and virtual machine setup (7:50) Ubuntu Linux installation in a virtual machine (6:38) Ubuntu Linux setup in a virtual machine continued (6:00) First boot up into Linux (2:14) VirtualBox Guest Additions (7:33) Ubuntu desktop customization (8:27) Unity Tweak Tool (12:06) Installing Linux alongside Windows (dual boot) (6:05) Dual boot setup continued (10:16) Linux Command Line Interface (CLI) Essentials Introduction to the Linux command line interface (CLI) (5:32) Navigating directories with the ls command (7:35) Administrator privileges in terminal (5:57) Using the package manager to install new applications (4:02) Searching through the repositories to find new applications to download (2:05) Installing packages which are not located in the repositores (4:46) Keeping programs updated via terminal (4:39) File permissions and ownership explained (4:26) File permissions and ownership continued (8:10) Creating new files using the touch command (4:58) Creating new directories and moving files (4:34) Copying, renaming, and removing files (4:44) Advanced CLI Usage The find command and it’s practical uses (3:30) The find command and it’s practical uses continued (4:32) Find command final thoughts (3:24) Using the grep command to find information within files (2:59) Using grep in conjunction with the find command (3:15) How to redirect the output of a command (3:16) Using the top command to view applications in real time (1:18) Viewing running process and closing applications via terminal (5:35) Services explained (2:07) Service configuration via terminal (4:35) Using crontab to schedule tasks (2:58) Crontab practical applications (2:37) Linux Development Tools Choosing an integrated development environment (IDE) (3:33) Eclipse installation and setup (3:57) PyCharm installation and setup (4:34) PyCharm installation problem resolved (1:49) GitHub installation and how to setup a repository (4:15) How to push/pull information from a repository (6:07) How to remove and ignore directories in a repository (5:12) Resolving merge conflicts (7:17) How to setup and manage branches (7:12) Correction from the previous lecture (0:42) Meteor.js Project Getting ed with Meteor.js (5:54) Setting up our Meteor project (5:34) Router setup and React components (5:54) Watch as our project begins to take form! (6:30) Getting into the programming of our application (13:14) Rendering blog posts (8:51) Putting the finishing touches on our Meteor app (6:28) Web Server Setup, Host Configuration, and App Deployment Apache 2, PHP, and MySQL setup (3:29) Server configuration (5:38) Linux hosts file (3:25) Deploying our Meteor app to the Apache 2 server (5:23) Setting up a MongoDB NoSQL database (5:17) Virtual host setup (3:35) Using a shell script to set our environment variables (7:49) Installing and configuring phpMyAdmin (3:14) Let’s take a tour around the phpMyAdmin panel (4:48) Creating a basic virtual host (8:10) Setting up a WordPress installation on top of Apache 2 environment (7:24) Before using WordPress we need to setup our database (6:22) Python installation and command line interface (4:29) Why is Python worth learning? (6:17) Linux User Management Adding/removing users through GUI (3:34) Adding new users via terminal (4:03) How to delete users through terminal (0:57) Changing an existing user’s password (0:45) Adding users to a group (3:55) Linux Network Administation Introduction to networking (1:38) How does the internet work? (5:11) What is a local area network (LAN)? (7:26) Practical networking commands (5:32) Networking commands continued (4:59) Netstat to track detailed network statistics (4:59) An in-depth look at the Linux hosts file (4:31) Linux hosts file continued (4:48) Using traceroute to track the servers a request passes through (3:57) Network mapper to track the activity on your network (7:36) Network mapper continued (6:56) Using SSH to access the command line of a remote host (2:37) SFTP to transfer files between machines (3:36) Setting up an SSH host on our local machine (5:27) Using the man command to learn about our programs (3:40)

$19

$19   LIFETIME ACCESS DEAL!