Get $1 credit for every $25 spent!

The Complete Linux System Administrator Bundle

Ending In:
Add to Cart - $69
Add to Cart ($69)
$2,100
96% off
wishlist
(107)
Courses
7
Lessons
645
Enrolled
1,062

What's Included

Product Details

Access
Lifetime
Content
11 hours
Lessons
61

The Ultimate Red Hat Linux Training

Learn to Administrate This Popular Linux Based OS

By Corporate Bridge Group | in Online Courses

Red Hat Linux is a popular Linux based operating system used by more than 90% of Fortune Global 500 companies due to its extremely stable and secure platform, and flexibility to engage with a massive ecosystem of businesses. Through this course, you'll learn everything about how to construct and manage a Red Hat Linux system. Before you know it, you'll be qualified to administrate Linux systems at any company, big or small!

  • Access 61 lectures & 11 hours of content 24/7
  • Learn how to install Red Hat & Fedora Linux
  • Understand online information services, video & monitor information, hardware requirements & network configuration
  • Discover RAID & logical volumes
  • Execute commands, navigate the file system, create new users, modify permissions & more administrative tasks
  • Learn about laughing programs, Cinnamon, bundle applications & useful models w/ system setting
  • Manage files w/ Nemo
An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

Compatibility

  • Internet required

Course Outline

  • Section 1 : Introduction to Linux
    • Overview
    • Red Hat and Fedora Linux
    • The Fedora Project
    • Installing Linux
    • History of Linux and Unix Brief
    • Linux Overview
    • Open Source Software
    • Linux Software
    • Online Information Sources
    • Documentation
  • Section 2 : Installing Red Hat and Fedora Core
    • Hardware Requirements
    • Video and Monitor Information
    • Network Configuration Information
    • Partitions, RAID and Logical Volumns
    • Recommended Partitions
    • Software Installation
    • X Window System Configuration (Red Hat Only)
    • Login and Logout
  • Section 3 : Getting Acquainted With Cinnamon
    • Getting Familiar With Cinnamon
    • Launghing Programs
    • Notifications
    • File Management with Nemo
    • Most Usefull Models With System Setting
    • Changing the default search engine in Firefox
    • Why Should we use the terminal
  • Section 4 : An Introduction to the Terminal
    • Executing Commands
    • Navigating the File System
    • Managing Files
    • The nano text editor
    • Searching for files
    • Using watch command & Introduction to scripting
  • Section 5 : Managing Users and Permissions
    • Creating new Users
    • Changing Password
    • Temporarily Revoking Access
    • Administrative access via sudo and visudo
    • Understanding file and Directory Permissions
    • Modifiying Permissions
  • Section 6: Utilizing Storage and Media
    • Mounting and Unmounting Volumns
    • Automatically mounting volumns at boot time
    • Analyzing disk space
    • Managing packages in linux mint
    • Installing nmew applications like Filezilla
    • Configuring software sources
    • Advanced Package Management
    • Keeping your system up to date
    • Understanding issues concerning codecs
  • Section 7: Securing Linux Mint
    • Choosing Secure Passwords
    • Encrypting your home folder
    • Configuring And Testing The Iptables Firewall
    • Backing up and restoring important data
    • Creating and restoring snapshots
    • Creating Command
    • More Details on Creating Command
  • Section 8: Advanced Administration Techniques
    • Creating Command Aliases
    • More Details on Command Aliases
    • Killing Processes
    • Killing Command Processes
    • Preparing to move to a new release
    • Using Backup and Restore Tools
    • Monitoring Resource Usage

View Full Curriculum


Access
Lifetime
Content
17 hours
Lessons
93

Learn App Development Using Linux

Take Your Linux Abilities to the Next Level by Coding in a Virtual Machine

By Corporate Bridge Group | in Online Courses

Beginning with a quick crash course in Linux, this course will dive into using a Virtual Machine to code apps in Linux. From a module on the advantages of Bash to writing and debugging scripts, this course is ideal for anybody who would like to work with Linux on a daily basis. Considering many leading tech and data-driven companies use Linux, this is an excellent foundation for any aspiring professional programmer.

  • Access 93 lectures & 17 hours of content 24/7
  • Learn how to manipulate the Bash environment
  • Understand Regexes
  • Use the Stream Editor to perform basic text transformations
  • Discover AWK programming to extract & report on data
  • Master interactive scripts, conditions & loops
An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Compatibility

  • Internet required

Course Outline

  • Section 1: The Basics
    • Overview of Bash
    • Introduction to Bash
    • Advantages of Bash over sh
    • Continuation of Advantages of Bash over sh
    • Built-in Shell Commands
    • Continuation of Built-in Shell Commands
    • Shell Structure,order and Logic
    • Continuation of Shell Structure,order and Logic
    • Echo vs printf and Initialization Scripts
    • Continuation of Echo vs printf and Initialization Scripts
  • Section 2: Writing and Debugging Scripts
    • Creating and Executing scripts
    • Continuation of Creating and Executing scripts
    • Debugging scripts
    • Continuation of Debugging scripts
  • Section 3: Manipulating Bash Environment
    • Modifying Startup Files
    • Continuation of Modifying Startup Files
    • Editing Bashrc files
    • Continuation of Editing Bashrc files
    • Global and Local variables
    • Continuation of Global and Local variables
    • Special Parameters and Backup Script App
    • Continuation of Special Parameters and Backup Script App
    • Backup Script Application
    • Continuation of Backup Script Application
    • Character Quoting and Parameter Expansion
    • Continuation of Character Quoting and Parameter Expansion
    • Command Substitution and Word Splitting
    • Defining and removing Aliases
  • Section 4: Regexes or Regular Expressions
    • Introduction to Regular Expressions
    • Character Classes and Wildcards
    • Continuation of Character Classes and Wildcards
  • Section 5: GNU Stream Editor
    • Steam Editor or SEd
    • Continuation of Steam Editor or SEd
    • Replacing fields with Stream Editor
    • Continuation of Replacing fields with Stream Editor
  • Section 6: GNU Awk Programming
    • Introduction to GAWK
    • Formatting Fields
    • Working with Regexes in Awk
    • Continuation of Working with Regexes in Awk
    • GAWK Scripting
    • Continuation of GAWK Scripting
  • Section 7: Conditional Statements
    • Using if Statements
    • Continuation of Using if Statements
    • Applications of if statement
    • Continuation of Applications of if statement
    • String comparisons and other constructs
    • Continuation of String comparisons and other constructs
    • Writing App scripts using if, else and then
    • Continuation of Writing App scripts using if, else and then
    • Elif construct
    • Continuation of Elif construct
    • Boolean Statement
    • Boolean Operations
    • Continuation of Boolean Operations
    • Case Syntax Section 8: Interactive Scripts
    • Introduction to Interactive Scripts
    • Writing Interactive Scripts
    • More on Writing the Script
    • Read Command
    • Scripts with User Input Prompt
    • Writing the Script
    • Redirection and File Descriptors
    • Redirecting the Errors
    • Reading and Executing File
    • Assigning File Descriptors to Files Section 9: Loops
    • The For Loop
    • The White Loop
    • Control While Loops with Keyboard Input
    • Script for Calculating the Average of User Input
    • The Until Loop
    • IO Redirection with Loops
    • Break Statements
    • Writing Break Statements
    • Continue Statements
    • Writing Continue Statements
    • Select Construct
    • Shift Built-in Construct
  • Section 10: Variables
    • More on Shift built-in Construct
    • Types of Variables
    • Variable Arrays
    • Practicals- AWS Script File
    • Creating Variable Arrays- Second Method
    • Calculating the Weak of the Year
    • Arithmetic Variables
  • Section 11: Functions
    • Exporting the String
    • Introduction to Functions
    • Displaying Functions
    • Installing and using SSH
    • Remote backups Script
  • Section 12: Catching Signals
    • Remote backups Script- Bupbash
    • Signals and Keyboard Interaction
    • Signal and Kill interaction
    • Signal and Kill interaction- Practical

View Full Curriculum


Access
Lifetime
Content
43 hours
Lessons
237

Comprehensive Training in Unix and Linux Fundamentals

Dive Into Alternative Operating Systems With This Massive Course

By Corporate Bridge Group | in Online Courses

You very likely know Windows or Mac OS X--you're probably visiting us from one of them now. However, Linux and UNIX are two operating systems that any self-respecting programmer needs to know. Both are powerful, flexible operating systems in use by many big companies, and are common OS choices for programmers. This comprehensive course will give you the lowdown on how to optimize both.

  • Access 237 lectures & 43 hours of content 24/7
  • Study operating system concepts like concurrency, asynchronous processes, disk scheduling & more
  • Learn how operating systems are designed & constructed
  • Understand the boot process & basic configuration of Linux
  • Discover file, user & group management
  • Differentiate between Linux & UNIX & how each is useful
  • Learn Kernel & its features in Linux & UNIX
An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section 1: Unix Introduction
    • Basics of unix operating system
    • Unix Architecture
    • Commands and Utilities
    • Changing Password, Listing Directories
    • Logging in, Logout
  • Section 2: Files and directories
    • Unix File Management
    • Listing Files
    • LS Command
    • LS-L, Metacharacters
    • Hidden Files
    • Other LS Command Variants
    • Displaying Files Recursively by LS-R Command
    • Creating Files in Unix
    • Editing Files
    • Display Contents of a File
    • Copying Files in Unix
  • Section 3: Unix Directory Management
    • Standard Unix Streams
    • Absolute/Relative Path Names
    • Removing Directories
  • Section 4: Unix Permissions
    • Unix – File Permission / Access Modes
    • File Access Modes
    • Using chmod in Symbolic Mode
    • Use of chmod in with Absolute Permissions
  • Section 5: Permissions Environment
    • Permissions+Environment Part 1
    • Permissions+Environment Part 2
    • Permissions+Environment Part 3
    • Permissions+Environment Part 4
    • Permissions+Environment Part 5
    • Permissions+Environment Part 6
    • Permissions+Environment Part 7
    • Permissions+Environment Part 8
  • Section 6: Basic file utility pipes and Filters
    • Basic file utility+pipes and Filters Part 1
    • Basic file utility+pipes and Filters Part 2
    • Basic file utility+pipes and Filters Part 3
    • Basic file utility+pipes and Filters Part 4
    • Basic file utility+pipes and Filters Part 5
    • Basic file utility+pipes and Filters Part 6
    • Basic file utility+pipes and Filters Part 7
    • Basic file utility+pipes and Filters Part 8
  • Section 7: Unix Important Commands
    • Unix Important Commands Part 1
    • Unix Important Commands Part 2
    • Unix Important Commands Part 3
    • Unix Important Commands Part 4
    • Unix Important Commands Part 5
    • Unix Important Commands Part 6
    • Unix Important Commands Part 7
  • Section 8: Unix Processes
    • Unix Processes Part 1
    • Unix Processes Part 2
    • Unix Processes Part 3
    • Unix Processes Part 4
    • Unix Processes Part 5
    • Unix Processes Part 6
    • Unix Processes Part 7
    • Unix Processes Part 8
    • Unix Processes Part 9
    • Unix Processes Part 10
    • Unix Processes Part 11
    • Unix Processes Part 12
    • Unix Processes Part 13
    • Unix Processes Part 14
    • Unix Processes Part 15
    • Unix Processes Part 16
    • Unix Processes Part 17
    • Unix Processes Part 18
    • Unix Processes Part 19
    • Unix Processes Part 20
    • Unix Processes Part 21
    • Unix Processes Part 22
    • Unix Processes Part 23
    • Unix Processes Part 24
  • Section 9: Unix Networking
    • Unix Networking Part 1
    • Unix Networking Part 2
    • Unix Networking Part 3
    • Unix Networking Part 4
    • Unix Networking Part 5
    • Unix Networking Part 6
    • Unix Networking Part 7
    • Unix Networking Part 8
    • Unix Networking Part 9
    • Unix Networking Part 10
    • Unix Networking Part 11
  • Section 10: Unix Shell Programming
    • Unix Shell Programming Part 1
    • Unix Shell Programming Part 2
    • Unix Shell Programming Part 3
    • Unix Shell Programming Part 4
    • Unix Shell Programming Part 5
    • Unix Shell Programming Part 6
    • Unix Shell Programming Part 7
    • Unix Shell Programming Part 8
    • Unix Shell Programming Part 9
    • Unix Shell Programming Part 10
    • Unix Shell Programming Part 11
    • Unix Shell Programming Part 12
    • Unix Shell Programming Part 13
    • Unix Shell Programming Part 14
    • Unix Shell Programming Part 15
    • Unix Shell Programming Part 16
    • Unix Shell Programming Part 17
    • Unix Shell Programming Part 18
    • Unix Shell Programming Part 19
    • Unix Shell Programming Part 20
    • Unix Shell Programming Part 21
    • Unix Shell Programming Part 22
    • Unix Shell Programming Part 23
    • Unix Shell Programming Part 24
    • Unix Shell Programming Part 25
    • Unix Shell Programming Part 26
    • Unix Shell Programming Part 27
    • Unix Shell Programming Part 28
    • Unix Shell Programming Part 29
    • Unix Shell Programming Part 30
    • Unix Shell Programming Part 31
    • Unix Shell Programming Part 32
    • Unix Shell Programming Part 33
    • Unix Shell Programming Part 34
    • Unix Shell Programming Part 35
    • Unix Shell Programming Part 36
    • Unix Shell Programming Part 37
    • Unix Shell Programming Part 38
    • Unix Shell Programming Part 39
    • Unix Shell Programming Part 40
    • Unix Shell Programming Part 41
  • Section 11: Quoting Mechanism
    • Quoting Mechanism Part 1
    • Quoting Mechanism Part 2
    • Quoting Mechanism Part 3
  • Section 12: Decision Making
    • Decision Making Part 1
    • Decision Making Part 2
    • Decision Making Part 3
    • Decision Making Part 4
    • Decision Making Part 5
    • Decision Making Part 6
    • Decision Making Part 7
    • Decision Making Part 8 Section 13: Loop Control
    • Loop Control Part 1
    • Loop Control Part 2
    • Loop Control Part 3
  • Section 14: Shell Substitution
    • Shell Substitution Part 1
    • Shell Substitution Part 2
    • Shell Substitution Part 3
    • Shell Substitution Part 4 Section 15: Unix Overview
    • Unix Overview Part 1
    • Unix Overview Part 2
    • Unix Overview Part 3
    • Unix Overview Part 4
    • Unix Overview Part 5
    • Unix Overview Part 6
    • Unix Overview Part 7
    • Unix Overview Part 8
  • Section 16:Unix Commands Overview
    • Unix Commands Overview Part 1
    • Unix Commands Overview Part 2
    • Unix Commands Overview Part 3
    • Unix Commands Overview Part 4
    • Unix Commands Overview Part 5
    • Unix Commands Overview Part 6
    • Unix Commands Overview Part 7
    • Unix Commands Overview Part 8
    • Unix Commands Overview Part 9
    • Unix Commands Overview Part 10
  • Section 17: Unix communication Commands
    • Unix communication Commands Part 1
    • Unix communication Commands Part 2
    • Unix communication Commands Part 3
    • Unix communication Commands Part 4
    • Unix communication Commands Part 5
    • Unix communication Commands Part 6
    • Unix communication Commands Part 7 Section 18: Vaccation Command
    • Vaccation Command Introduction
    • Cu Command
    • Cu Command Completed With Options
    • Tar Command
    • Compress and Uncompress Command
    • Cpio Command Section 19: Interprocess Communication
    • Interprocess Communication Part 1
    • Interprocess Communication Part 2
    • Interprocess Communication Part 3
    • Interprocess Communication Part 4
    • Interprocess Communication Part 5
    • Interprocess Communication Part 6 Section 20: The Review of Unix Commands
    • The Review of Unix Commands at A Glance
    • Owner Permission Commands
    • Crontab Command
    • Df Command in Detail and Env Command
    • System Utilities
    • Shutdown and Ruptime Commands
    • Tty and Stty Command
    • Who and At Commands
    • Clear and Nohup Command
    • Bourne Shell
    • Korn Shell
    • C Shell
  • Section 21: Unix Programming
    • Review of Unix Important Commands
    • Shell Programming Tips
    • Before Tips of Unix Shell Programming
    • Directory Trees Section 22: Commands in Details
    • Paths and Combination of Commands
    • Quote Variables and Escape Sequences
    • Grouping Commands in A List
    • Use of Xargs
    • Using Grep Properly
    • Match Certain Fields In Output
    • Stop Piping Cats
  • Section 23: Unix Help and Functions
    • Unix Man Help
    • Unix Functions Part 1
    • Unix Functions Part 2
  • Section 24: Input and Output
    • Basics of Input Output Part 1
    • Basics of Input Output Part 2
    • File Streams of Os
    • Redirections of Std In,Out and Err Part 1
    • Redirections of Std In,Out and Err Part 2
  • Section 25: Unix Expression
    • Unix Regular Expression Part 1
    • Unix Regular Expression Part 2
    • Unix Add Substitution
  • Section 26: Directory Structure, Mounting and Unmounting
    • Unix Directory Structure Part 1
    • Unix Directory Structure Part 2
    • File Navigation Commands
    • Mounting Unmounting Part 1
    • Mounting Unmounting Part 2
    • Unix User Admin Part 1
    • Unix User Admin Part 2 Section 27: Unix Performance
    • Unix Performance Part 1
    • Unix Performance Part 2
    • Facilities
    • Logging Directories
  • Section 28: Signals in Unix
    • Unix Signals Introduction Part 1
    • Unix Signals Introduction Part 2
    • Interrupt
    • Trap
    • Env Values Variables Part 1
    • Env Values Variables Part 2
  • Section 29: File Directories and Networking
    • Unix Files Directories Part 1
    • Unix Files Directories Part 2
    • Command
    • Unix Networking Part 1
    • Unix Networking Part 2
    • Unix Misc Commands Part 1
    • Unix Misc Commands Part 2
    • Complete Review Part 1
    • Complete Review Part 2

View Full Curriculum


Access
Lifetime
Content
22 hours
Lessons
120

The Ultimate Kali Linux and Penetration Testing Training

Master the Leading Penetration Testing Platform & Take the First Step Towards Becoming an Ethical Hacker

By Corporate Bridge Group | in Online Courses

Kali Linux is one of the premiere distros for penetration testing: the infiltration of networks in a practical environment to test the reliability and security of systems. It is extremely portable--able to run on hardware devices like Raspberry Pi and USB Armory as well as desktops and laptops--and specifically designed for pentesting. Given that pentesters are in enormous demand these days, this course will give you an outstanding foundation in this lucrative profession.

  • Access 120 lectures & 22 hours of content 24/7
  • Become aware of the multitude of malicious attacks perforated by Black Hat Hackers
  • Break into or DDOS your own infrastructure to test its security
  • Use essential Kali Linux tools like Setoolkit, Android Malware App, Aircrack-ng & John the Ripper
  • Develop trojans & backdoors for Windows using Metasploit
An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section 1:What is Ethical hacking and Penetration testing
    • Introduction Part 1
    • Introduction Part 2
  • Section 2: Installation and Configuration
    • Kali Linux
    • Operating systems_part 01
    • Operating systems_part 02
    • Installing Operating Systems
    • Installing vmware tools
    • Configuring Kali Linux
    • Installing Kali Linux on MacBook
  • Section 3: Footprinting and Reconnaisance
    • What is Footprinting
    • Footprinting Objectives
    • Footprinting Tools
    • Google Hacking part 1
    • Google Hacking continued
    • Google Hacking further continued
    • WhOIS lookup Section 4: Phishing Attacks
    • DNS footprinting_part 01
    • DNS footprinting_part 02
    • Determining Operation System
    • Phishing Attacks_part 01
    • Phishing Attacks_part 02
    • Connecting information database
    • Nmap and ZenMap
    • Nmap and ZenMap continued Section 5: Social Engineering and information Gathering
    • Nmap and ZenMap further continued
    • The Harvester Part 1
    • The Harvester Part 2
    • WHOIS and dnsenum Part 1
    • WHOIS and dnsenum Part 2
    • Urlcrazy and dnsdict6 Part 1
    • Urlcrazy and dnsdict6 Part 2
    • Dnsrecon
    • Dnsmapping Section 6: Social Engineering and information Gathering
    • Introduction
    • Types of Social Engineering
    • Social Engineering attacks
    • Spear-phishing Attack
    • Phishing Attack Part 1
    • Phishing Attack Part 2
    • Mass mailer Attack Section 7: Trojans and Backdoors
    • Types of Computer Malwares Part 1
    • Types of Computer Malwares Part 2
    • Dangerous viruses of all time Part 1
    • Dangerous viruses of all time Part 2
    • Installing Rootkit Hunter
    • command prompt backdoor Part 1
    • Command prompt backdoor Part 2
    • Backdoor – Gaining Access
    • Backdoor – Maitaining Access Part 1
    • Backdoor – Maitaining Access Part 2
  • Section 8: Meterpreter Commands
    • Command prompt backdoor continued
    • Command prompt backdoor further continued
    • Meterpreter Backdoor
    • I am Root
    • Forensic escaping
    • Hacking win7 SAM database
    • Jack the ripper
    • Meterpreter commands
  • Section 9: DNS Spoofing
    • PDF embedded Trojan Horse
    • Java Applet Attack Method_part01
    • Java Applet Attack Method_part02
    • MITM Attack
    • ARP Poisoning
    • DNS spoofing vs DNS poisoning
    • DNS spoofing
    • DNS spoofing…continued
    • DHCP Spoofing
    • Port Stealing
  • Section 10: ICMP Redirection
    • ICMP redirection
    • ICMP redirection…part 2
    • ICMP redirection…part 3
    • Killing a Network
    • Ddosing unauthorised Network
    • Driftnet
    • EvilGrade
    • EvilGrade…continued
  • Section 11: Denial of Service Attack
    • Introduction to DoS
    • DoS vs DDoS
    • Levels of Ddos Attacks
    • Preventing DDoS Attacks
    • DDoSing Windows 7 method 1
    • DDoSing Windows 7 method 2
  • Section 12: Hacking Android
    • Hacking through Android part_1
    • Hacking through Android part_2
    • Hacking Android via Kali Linux
  • Section 13: Password Cracking
    • Introduction to Password Cracking
    • Password cracking Strategy
    • Password cracking Strategy..continued
    • Windows Password cracking_part 01
    • Windows Password cracking_part 02
    • Linux Hash Cracking
    • Linux Hash Cracking…continued
    • Generating wordlist
    • Generating wordlist…continued
    • CeWL cracking
  • Section 14: Wireless Hacking
    • WEP and WPA
    • WPA2
    • 1X standard
    • Wireless cracking via Kali
    • Wireless cracking via Kali…continued
  • Section 15: Meterpreter
    • Activating payloads
    • Activating payloads…continued
  • Section 16: Metasploit
    • Msfconsole explained
    • Msfconsole commands
    • Exploits
    • Payloads
    • Generating payloads
    • Generating payloads…continued
  • Section 17: SQL injection
    • Intro to SQL injection
    • SQL injection to google dorks
    • SQL mapping via Kali Linux
    • Gathering Password and cracking the hash
  • Section 18: Cryptography
    • Introduction_part01
    • Introduction_part02
    • Hash Func and Oracle Method
    • Birthday Theorem and Digital Signature
    • Pros and Cons of Cryptography
  • Section 19: Metasploit Database
    • Importing Databases
    • Exporting Databases_part01
    • Exporting Databases_part02

View Full Curriculum


Access
Lifetime
Content
5 hours
Lessons
25

Bash Scripting in Linux

Complete Complex Programming Tasks With Just a Few Lines of Code

By Corporate Bridge | in Online Courses

A Bash script is a plain text file which contains a series of commands that allows a programmer to combine multiple simple tools to solve a more complex problem on Linux or UNIX servers. Learning how to write Bash script is essential for system administrators as it dramatically reduces the time needed to solve a problem. Considering most IT companies use Linux or UNIX, this course will give you a leg up on the competition to become a well-paid system administrator.

  • Access 25 lectures & 5 hours of content 24/7
  • Learn to take input from USER or FILE & output it on screen
  • Create your own commands using Bash script
  • Automate tasks for more streamlined programming
  • Discover essential uses of Linux
An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

Compatibility

  • Internet required

Course Outline

  • Section 1 : Introduction
    • Bash Scripting Introduction
  • Section 2 : Linux Uses
    • Uses of Linux
    • How to use shell
  • Section 3 : Bash Variables
    • Permission to Bash File
    • System Defined Variables
    • Practical Demo
    • Practical Demo Continue
    • Second Script
    • Important Commands
    • Grep and Read Command
    • Command Line Argument
    • Command Line Argument Continue
    • Input Output
    • Input Output Continue
    • Pipe and Filter
    • Pipe and Filter Continue
    • If Else Statement
    • If Else Statement Nested
    • For Loop
    • For Loop Continue
    • While Loop Case Statement
    • While Loop Case Statement Continue
    • Bash Redirect Output Bash Console
    • User Interface Dialog Utility
    • User Interface Dialog Utility Continue

View Full Curriculum


Access
Lifetime
Content
2 hours
Lessons
11

Linux OS OpenSUSE

Learn Linux's Best Open-Source Tools On Your Way to Becoming a System Administrator

By Corporate Bridge | in Online Courses

OpenSUSE is a general purpose operating system built on top of Linux Kernel, and the best open-source tool from the Linux community. Over this course, you'll cover general Linux concepts, learn openSUSE system administration and delve into computer networking concepts and HP-UX administration tasks. If you've ever considered Linux system administration, this course is calling your name!

  • Access 11 lectures & 2 hours of content 24/7
  • Discuss basic principles of Linux openSUSE & learn its applications
  • Use command-line utilities & YaST in openSUSE Linux
  • Understand hard disk partitioning
  • Discover system setup, RPM package management, online updates, network & firewall configuration, user administration & more in an integrated interface
  • Prepare for the openSUSE certification exam
  • An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

    Details & Requirements

    • Length of time users can access this course: lifetime
    • Access options: web streaming, mobile streaming
    • Certification of completion included
    • Redemption deadline: redeem your code within 30 days of purchase
    • Experience level required: intermediate

    Compatibility

    • Internet required

    Course Outline

    • Section 1: Introduction
      • Introduction To Linux Operating System
      • Introduction To Linux Operating System continued
      • Installing openSUSE
      • Installing openSUSE continued
      • Overview of KDE
    • Section 2: OpenSUSE File System Hierachy and Directory stucture
      • OpenSUSE File System Hierachy
      • OpenSUSE Directory stucture
      • Navigating Man Pages
      • Managing Files and Directories
      • Creating Links on files and directories
      • Managing software packages with RPM utility

    View Full Curriculum


    Access
    Lifetime
    Content
    18 hours
    Lessons
    98

    Learn Linux Administration With Python

    Use Python to Accomplish Complicated Administration Tasks With Less Code

    By Corporate Bridge | in Online Courses

    Python is a server-side interpreted, open-source, non-compiled scripting language that offers an extremely efficient way of scripting in Linux. It's widely regarded as one of the easiest programming languages to learn and can accomplish complicated tasks with minimal coding, making it an excellent tool for Linux system administration. If you are, or are aspiring to be, a system administrator, network engineer or pentester, then this course is right up your alley.

    • Access 98 lectures & 18 hours of content 24/7
    • Go from basics to advanced in Python
    • Discover OS Soup & its uses
    • Build GUIs w/ Python
    • Learn about security related tasks, performing network scanning & open port scanning
    • Gain the skills you need to be a Linux system administrator
    An initiative by IIT IIM Graduates, eduCBA is a leading global provider of skill based education addressing the needs 500,000+ members across 40+ Countries. Our unique step-by-step, online learning model along with amazing 1700+ courses prepared by top notch professionals from the Industry help participants achieve their goals successfully. All our training programs are Job oriented skill based programs demanded by the Industry. At eduCBA, it is a matter of pride to us to make job oriented hands on courses available to anyone, any time and anywhere. Therefore we ensure that you can enroll 24 hours a day, seven days a week, 365 days a year. Learn at a time and place, and pace that is of your choice. Plan your study to suit your convenience and schedule. For more details on this course and instructor, click here.

    Details & Requirements

    • Length of time users can access this course: lifetime
    • Access options: web streaming, mobile streaming
    • Certification of completion included
    • Redemption deadline: redeem your code within 30 days of purchase
    • Experience level required: all levels

    Compatibility

    • Internet required

    Course Outline

    • Section 1:Introduction to Python Programming in Linux
      • Installing vmware and linuxmint
      • Introduction to Linux
    • Section 2: Learning about Python Interpreter
      • Python Interpreter
      • Continuation of Python Interpreter
      • Python vs Bash
      • System Information script
      • Indentations and tabs
      • Functions
    • Section 3: Ipython
      • Installing vmware tools and Ipython Part 1
      • Installing vmware tools and Ipython Part 2
      • Ipython
      • Ipython vs Unix Shell
      • Directories and Bookmarks
      • Variable expansion and string processing Part 1
      • Variable expansion and string processing Part 2
      • Information gathering
      • Who functions and History
    • Section 4: Text
      • More history and automation
      • Built-ins and Modules-Part 1
      • Built-ins and Modules-Part 2
      • Built-ins and Modules-Part 3
      • Built-ins and Modules-Part 4
      • Regular expressions
      • Working with files
      • Writing Files
    • Section 5: Documentation and Reporting
      • Standard input output
      • Automated info gathering
      • Receiving Email
      • Information Formatting Part 1
      • Information Formatting Part 2
      • PDFs- part 1
      • PDFs- part 2
    • Section 6: Networking
      • Sockets
      • Sockets (continued)
      • Sockets (continued further)
      • SSH protocol
    • Section 7: Data
      • Twisted
      • Modifying directories
      • Working with directories
      • Comparing datas
      • Merging and checksums_part 01
      • Merging and checksums_part 02
      • Metadata
      • Tar archives
    • Section 8: SNMP
      • bzip2 files
    • Section 9: OS Soup
      • Installing SNMP
      • Multiple Operating Systems
      • Fingerprinting
      • Cross-platform build
      • Pyinotify
      • OSX
    • Section 10: Package Management
      • Virtualization and Cloud Management
    • Section 11: Processes and Concurrency
      • EPM package management
      • Subprocesses
      • Platform Module part _1
      • Platform Module part _2
      • Platform Module…continued
      • Threads
      • Threading ping sweep
      • Thread Handler
      • Thread Handler…continued
      • Processes part _1
      • Processes part _2
      • Scheduling process
      • Daemonizer part _ 2
    • Section 12: Building GUIs
      • Daemonizer part _1
      • Intro to GUIs
      • IPyGTK App
      • Apache Log Viewer script part_1
      • IApache Log Viewer script part_2
    • Section 13: Data Persistence
      • Apache Log Viewer script explained
      • Pickle files
      • Pickle files…continued
      • Pickle files…continued 2
      • Pickle files…continued 3
      • YAML
      • YAML…continued
      • ZODB
      • Financial funds code
      • Serialising custom classes
      • SQlite3
    • Section 14: Command Line
      • SqlAlchemy and Storm Part 1
      • Intro to CLI
      • OptParse for simple scripts
      • True False usage pattern
      • Choices usage pattern
      • Multiple arguments usage pattern
      • Kudzu Usage Pattern
      • Hybrid Kudzu Design pattern
    • Section 15: Pragmmatic Examples
      • Integrating configuration files
      • Managing DNS with Python
      • Ldap
      • Apache Log parser
      • Apache Log parser…continued
      • Apache Log parser…continued 2
      • FTP mirror Script_part 01
      • FTP mirror Script_part 02
      • FTP mirror Script…continued

    View Full Curriculum



    Terms

    • Instant digital redemption

    15-Day Satisfaction Guarantee

    We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.