Number of Videos: 6.5 hours – 96 lessons
Ships on: DVD-ROM
User Level: Beginner
Works On: Windows 7,Vista,XP- Mac OS X
In this Red Hat Certified Systems Administrator Exam EX200 training course, expert author Ric Messier will teach you everything you need to know to become a Red Hat Certified System Administrator (RHCSA). This course is designed for users that are familiar with Red Hat Enterprise Linux environments. You will start by learning the fundamentals, such as basic shell commands, creating and modifying users, and changing passwords. Rick will then teach you about the shell, explaining how to manage files, use the stream editor, and locate files. This video tutorial will also cover system management, including booting and rebooting, network services, and installing packages. Other topics that are covered include storage management, server management, virtual machines, and security. Once you have completed this computer based training course, you will be fully capable of taking the RHCSA EX200 exam and becoming a Red Hat Certified System Administrator.
Number of Videos:11 hours – 90 lessons
Ships on: DVD-ROM
User Level: Beginners
Works On: Windows 8, 7, Vista, XP – Mac OS X
In this training course expert Ric Messier introduces you to the concept of Computer Forensics, and teaches you how to get started in this industry. Computer Forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field. Because Computer Forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from. By the conclusion of this computer based tutorial for Computer Forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for.
Computers hold our treasured photographs, private emails, and all of our personal information. This data is preciousand cybercriminals want it. From the sleuths who decoded the worlds most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge scienceall to stay one step ahead of the hackers.