from12.38USD/ h
Learn Linux Basics for LPI Linux Essentials Certification (010-160)
Translated by Google. Click to view original.
The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and rolesBasic requirements
Knowledge of operating systems may be helpful, but not necessary.
what will you learn
Working with Linux and open source software
Linux installation and boot management
Linux environment management
Working with Linux package managers
Understand the command line
Find system help
Working with the Linux file system
Location
Online via webcam
General info
Skills:
Age: | Children (7-12 years old) Teenagers (13-17 years old) Adults (18-64 years old) Seniors (65+ years old) |
---|---|
Student level: | Beginner Intermediate Advanced |
Duration: | 60 minutes |
The class is taught in: | Arabic, English |
About Me
Translated by Google. Click to view original.
Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.Education
Translated by Google. Click to view original.
Computer Science Engineer, 2010Professorship in Computer Science Applied to Disposition, 2008
2020 Full-Stack Web Development with React Specialization
2021 IBM Cybersecurity Analyst Professional Certificate
Experience / Qualifications
Translated by Google. Click to view original.
Operating systems, website programming, networks, computer maintenance, information security, graphic design,Technical Support Fundamentals
The Bits and Bytes of Computer Networking
Operating Systems and You: Becoming a Power User
System Administration and IT Infrastructure Services
IT Security: Defense against the digital dark arts
A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters.
Required software:
-Photoshop
- Illustrator
-InDesign
program duration:
Photoshop: 6 hours
Illustrator: 6 hours
- InDesign: 6 hours
This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.
requirements
Networking basics basics
what will you learn
Wireshark Basic Functions
Use Wireshark's advanced features
Visualize network traffic with Wireshark
Using Wireshark on the command line
Network protocol analysis with Wireshark
Troubleshoot slow networks with Wireshark
The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.
Objectives
The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:
• Implement technical strategies, tools, and techniques to secure data and information for your organization
• Adhere to ethical security behavior to analyze and mitigate risks
• Understand security in cloud computing architecture in depth
• Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
• Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
what will you learn
1. Inactive survey conduct
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.
2. Take an active survey
So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.
3. Gathering information and identifying weaknesses
Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.
4. Application testing
There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.
5. Digital Forensics
This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.
6. Digital Forensics: Getting Started with File Systems
Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.
7. Kali Linux Digital Forensics Tools: Imaging and Hash
Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.
8. Practical coding using Python
Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.
9. Social Engineering with Social Engineering Toolkit
The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.
10. Penetration testing with Metasploit Framework
Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
Ask a question
Send a message explaining your needs and امين will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"
Ex. "Hi, when are you available to meet for a lesson?"
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $12.38Online via webcam
100% Satisfaction Guarantee
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Online reputation
- Instructor since February 2022
- Phone number verified
- Linkedin connected
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $12.38Online via webcam
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Share
You are here
Private lessons
online via webcam
Similar classes
Nayankumar
IT Cyber Security, PAM (CyberArk), IAM (Okta), Microsoft windows, Azure, AWS, Linux Tutoring. Language Tutoring: Hindi, Gujarati, EnglishThis class is to provide in-depth tutoring on essential IT skills, including Cyber Security, Privileged Access Management (PAM) with CyberArk, and Identity and Access Management (IAM) using Okta. You will also gain a strong foundation in Microsoft Windows administration, cloud computing with Azure and AWS, and Linux systems.
Whether you are a beginner looking to establish fundamental IT skills or an experienced professional aiming to sharpen your knowledge, this course offers hands-on guidance across various levels. You will learn how to secure IT infrastructures, manage access rights, and handle operating systems and cloud platforms. Additionally, you will get practical insights on how to use key tools in today's IT environments, such as managing cloud services, securing data, and automating systems.
By the end of this class, you will be well-prepared to manage, secure, and configure various IT environments, building a skill set that is in high demand in today’s tech industry.
Tanu
Docker, Kubernetes and helm charts: devops key conceptsDocker is really important in today's world. As we are witnessing major shift from offline to online, from legacy server to cloud. In this major shift, cloud is important element. This transition is made really smooth with the help of docker and other containerisation tools. In this class we cover all the basic to advance topics of docker. We will have proper hands on sessions and complete practical knowledge along with fundamental topics. We will start using the images and then we will also build our own image. we can modify the topics as per requirement(basic, intermediate, advance).
Kubernetes is really important in today's world. As we are witnessing major shift from offline to online, from legacy server to cloud. In this major shift, cloud is important element. This transition is made really smooth with the help of Kubernetes. for this you should have at least basic knowledge of docker. In this class we will be covering the basic to advance concepts of Kubernetes, depending upon the requirement. We can start with fundamentals and then building up on top of it as per requirement.
Jose
Experienced Software Engineer - Linux and Networking TeacherEager to learn Linux and infrastructure? Then do no hesitate in contacting me. We can start from the foundations of all these extremely important disciplines, if you consider you have knowledge on system administration is not a problem, we can study Security in Linux and Networks, virtualization and containers.
Himank
Computer Science Subjects and Projects : Operating Systems, Algorithms, Data Structures, Database Management System and Computer Networks.Currently, I am working at the MaaS department in Denso Corporation, Shinagawa, Tokyo.
I have done my masters from the Indian Institute of Technology Hyderabad India recently.
I can teach any subject of Computer Engineering. I will give you class from very basic to advanced level.
I have cracked Graduate Aptitude Teset (GATE) in India and score AIR 1456 among 100000 students. I have in-depth knowledge of Computer Science subjects.
I can teach you coding, Science and Math if you wish to learn new things contact me.
This class is for those who really want to use to learn computer subjects like Computer Networks and Algorithms in a more innovative manner.
I can help you in deciding on your final year project in Computer Science Domain as well.
I little bit know Nihon-Go as well.
Hamdy
Python and Linux training with training certificateDo you want to learn programming in Python? I am a qualified computer science teacher with a Swiss federal computer science certificate and training in adult education. I offer private lessons adapted to your specific needs.
During the training, you will learn to develop in Python, with an effective teaching method that will allow you to progress quickly. You will also receive projects to complete between each course, which will be corrected together during the next session.
At the end of the training, you will receive a Python programming training certificate.
The average duration is 10 lessons to reach a satisfactory level of skill.
Don't wait any longer to learn about programming in Python! Contact me for more information and to reserve your place now.
Maysam
Python programming language (basic and advance lessons)The Python programming language is one of the most powerful programming languages and is the basis for many fields such as Artificial Intelligence, Machine Learning, Web Development, desktop application development, and many others.
Through these lessons, we will learn the basics of programming and object-oriented programming (oop), and we will discuss advanced topics in the Python language.
Yurii
Code - Python - Linux - Bash - Devops - CybersecurityCybersecurity - VMware, Oracle VM VirtualBox, GRC, IP Forwarding, LDAP Linux, Nesus Kali, WireShark - basics nmap, WireShark HTTP and Netcat, WireShark Hunt and Exploration, WireShark_TCP and HTTP, Port-Mirroring and IDS, Linux CRON bash scripting cron-jobs, Netcat and SSH Traffic Analysis via Wireshark nmap, Snort, Vayos,
Vulnerability Scanning with Nessus, Python and Math, vyos Firewall basics vayos ufw nmtui change IP,
HTTP Intercept Proxies Kali OWASP, ZAPROXY, Mutillidae, Linux LAMP Setup CENTOS, ARPSpoof MITM,
LVM and_Linux_Processes, OpenVPN aws, SQL Injection and XSS, System Hardening, Linux Shell Aliases,
Certificates, Extended Attributes Linux, Linux CLI Security Python idle ssh group Chroot Jail, Socks 5 Proxy, SQL Injection, Windows, Configure DHCP and DNS vyos ssh, Linux Filesystems Samba, Linux Bash, Linux Log Mess, Python Regular Expression, Splank Install, Splunk Getting Data into the SIEM, Splunk Asset Discovery, Splunk Dashboards, Splunk Reporting, Splunk Alerting CRON, Splunk Better Data, Splunk Advanced Notifications, Encrypt Decrypt, Drivers, Splunk User and Process Monitoring, Splunk Constant Configuration, Wannacry, Cowrie Honeypot, Windows-Linux Data Visualization, Network Visualization, Splunk Advanced Configuration, Vulnerability Scanning, Incident Response, Spoofing and Threat Hunting, Digital Forensics.
Devops (Linux, Bash, Git, GitHub, GitLab, Python, Jenkins, CI\CD)
Get started with Python and modules: PyTest, (Flask, FastAPI, Django - API) Jinja2, Blueprint, wtforms, werkzeug.security, PyGitHub, Regular expression(re), Numpy, Pandas, Matplotlib, Openpyxl, csv, os, sys, Pdf, Docx, Pygame, Turtle, SQL-sqlite3. I suggest you study - Cource Data Structures and Algorithms in Python with presentation and practical exercises in Python.
Python, Linux, Bash, VMware, Git - from scratch.
Java from scratch.
Jose Pablo
Basic to advanced level of Linux - Practices for the RHCSA (Professional Linux Lessons)For english speakers please see below...
With more than 10 years of experience in the IT area, I have trained many students to develop in the world of the linux operating system.
Starting from basic level to advanced levels, each of the classes are focused towards the certification that you want to achieve (RHCSA/LFCS/LPIC).
I have worked as an instructor providing courses in companies and individual courses remotely.
My specialty is Red Hat, it is an operating system that I love and I would like them to learn all the good things that this operating system has to offer and the job opportunities that can be opened by developing this skill in their curriculum.
My certifications / Certifications:
Red Hat Certified System Administrator (RHCSA)
LPIC-1: Linux Administrator
IBM Mainframe Specialist - Linux Operations and Programming
Cisco Certified Network Routing and Switching Associate (CCNA)
AWS Certified Cloud Practitioner (CLF)
Oracle Solaris System Administrator Certified Professional (OCP) II
My courses / Courses:
Automation with Ansible Red Hat Enterprise
Linux Automation III with Ansible
Red Hat OpenShift I: Containers & Kubernetes
Red Hat System Administration I
Red Hat System Administration II
VMware vSphere: Install, Configure, Manage [V7]
——————————————————————
More than 10 years of experience in the IT area. I have trained many students to develop in the world of the Linux OS.
The classes are from basic to advanced level according to the student's needs. Each of the classes are focused towards the certification that you want to achieve (RHCSA / LFCS / LPIC).
I have served as an instructor providing courses in companies and individuals remotely courses.
My main skill is Red Hat, it is an operating system that I love and I would like you to learn all the benefits that this OS can offer you and the job opportunities that you can get developing this skill.
Lea
IT courses: Linux/Cloud/kubernetes/terraform/gitMethodology
- first step of linux/terraform/kubernetes/cloud using a powerpoint
- examples to clarify things
and of course a lot of exercises and I will help you solve your problems, do not hesitate to ask your questions and contact me
Tahir Ahmed
Learn linux operating system and get confident to use it in your daily life and jobMy goal is to teach my students is to make them Linux speciliest. starrting from the installation of operating system on differennt platforms, to creating users, network creation, remote access, file transfer, secure tunnels, dhcp, static IP, backing up drives and etc.
Akshat
Linux,Cyber security,Linux servers,Windows, System Administration,VA/PTLinux and cybersecurity are the most emerging fields in computer science since all the work is also done from a remote location the risk of cybercrime also has increased, to get into the field of cybersecurity you must know the basic knowledge of How the operating system works let it be Linux distro or windows, I will teach you the basics of OS and working with Linux and deploying servers which are used by many MNC's and also to secure your network and many more.
Divyanshu
Ethical hacking and Linux classes from scratch to proHey guys this is Divyanshu, a ethical hacker working in cyber security domain since last three years . I am very good at reconnaissance , foot printing and Linux . I am here to share my knowledge and skill with you. I will also provide theory notes and practical videos with proper guidance . Ping me for trail class.
Giulio
Learn programming, linux and clidet-server applicationsI'm an experienced programmer and I've also been tutoring engineering students to help them pass their exams.
I can teach programming in the following programming languages:
- python (with various scientific libraries)
- javascript, also nodejs and vue.js
- c
- julia
- bash
- basics of html and css
Also I can teach the following skills:
- mastering linux
- docker
- client-server applications
- git
If the skill you want to learn is not listed but somewhat related just ask :)
I design my classes according to the student's need. Usually I find the learn-by-doing approach to be extremely effective but I also dedicate time just explaining theory (such as algorithms design and computer memory management).
Timothé
linux system course (debian) / virtualbox virtualizationduring this course I will teach you the basics of linux (ubuntu and debian) through virtualization
you will learn how to create a virtual machine and the basics of virtualization then we will move on to practice under linux
we can go further if you want according to your desires
Sivasubramanian
Linux, Bash , Python Programming Beginner Class : 101Python is a popular programming language known for its simplicity and ease of use. This beginner course is designed to provide a solid foundation in Python programming for those who are new to programming or have some programming experience but are new to Python.
The course is series of lectures that cover a wide range of topics, including Python syntax, data types, loops, functions, modules, and object-oriented programming. You'll start by learning the basics of Python syntax, including how to write basic programs, work with variables, and control flow. You'll then move on to more advanced topics like functions and modules, which are key building blocks in any Python program.
One of the key features of Python is its extensive library of modules and packages. You'll also learn how to work with files, handle exceptions, and debug your code.
Another important aspect of programming is understanding how to work with data. This course covers several data types in Python, including strings, lists, dictionaries, and sets. You'll learn how to manipulate these data types using built-in functions and operators, and you'll also learn how to create your own functions to manipulate data.
By the end of the course, you'll have a good understanding of how to use Python to create basic programs and applications, and you'll be well on your way to becoming a proficient Python programmer.