Home
Courses
About Us
Blog
Contacts
Login
Sign up
John Smith
Log out
Login
Sign up
John Smith
Settings
Log out
go back
My courses
/
CASI
Completed
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
20%
5/47
01. Module 1
3 lectures
25 min
02. Module 2
3 lectures
25 min
03. Module 3
3 lectures
25 min
04. Module 4
3 lectures
25 min
05. Module 5
3 lectures
25 min
06. Module 6
3 lectures
25 min
07. Module 7
3 lectures
25 min
08. Module 8
3 lectures
25 min
09. Module 9
3 lectures
25 min
10. Module 10
3 lectures
25 min
11. Module 11
3 lectures
25 min
12. Module 12
3 lectures
25 min
13. Module 13
3 lectures
25 min
14. Module 14
3 lectures
25 min
15. Module 15
3 lectures
25 min
16. Video Collection
3 lectures
25 min
00. Network Security Fundamentals
01. Bash Scripting microlesson
4:14 min
01. Blockchain technology
01. Business Continuity and Disaster Recovery Planning
01. Communication Strategy
2:23 min
01. Computer Peripherals
10:33 min
01. DEFI and Core concepts
2:12 min
01. Data Backup Part 1
0:28 min
01. Edited Create a Blockchain 01 Made with Clipchamp
45:09 min
01. Edited Create a Blockchain 01 Made with Clipchamp
45:09 min
01. History and evolution of blockchain technology
01. ISO 27001
01. Keylogger
20:46 min
01. Knowledge Article Updates
2:10 min
01. Network Security Fundamentals
01. Overview of Active Directory (Azure and Windows)
01. Practical Cryptography
01. Security and wallet drains
1:11 min
01. Security in blockchain explained
1:12 min
01. Smart Contracts Explained
1:21
01. Smart Contracts Explained
1:21 min
01. TCP/IP model layers
1:38 min
01. Understanding the DoD Risk Management Framework (RMF)
01. What is Cloud Computing
4:49 min
02. Best Practices in Identity and Access Management (IAM)
02. Data Backup Part 2
0:30 min
02. Designing Secure Architectures
1:39 min
02. Essential Tools, Safety Measures, and Online Resources for Building a Computer
02. History of Cloud Computing
5:27 min
02. Incident Response Planning and Execution
02. Key concepts of blockchain
2:17 min
02. OSI model
2:18 min
02. Remote Desktop
2:54 min
02. Researching Blockchain Projects and Tokenomics
1:12 min
02. Rust and Solidity
1:40 min
02. Sandboxing
02. Securing JavaScript Applications
02. Service Strategy
2:30
02. Service Strategy
2:30 min
02. Understanding and Analyzing Threat Actors
02. Understanding the DoD Risk Management Framework (RMF)
03. Best Practices for Remoting into Someone's Workstation
03. Blockchain Security
03. Blockchain Security Tools
03. Blockchain Technology
4:12 min
03. Building Resilient Systems
03. Cloud Networking
3:04 min
03. Data Backup Part 3
0:16 min
03. Implementing Risk
03. Network Topologies
1:23 min
03. Overview of IT teams leads
03. Security in blockchain explained
1:11
04. Brief Overview of Operating Systems
04. Comparison with the OSI Model
0:40 min
04. Data Backup Part 4
0:30 min
04. Major Cloud Service Providers
2:40 min
04. Proof of Work (POW) vs Proof of Stake (POS)
0:57 min
04. Rust and Solidity
1:40
05. Cloud Watch video
8:34 min
05. Different Cloud Environments
05. POS VS POW
0:57
05. Storage
3:08 min
05. Understanding Print Queues, Printer Configurations, and Adding/Removing Printers
06. Data animated video
4:14 min
06. Knowledge Article Updates
2:10
06. Network Audio and Video
1:21 min
06. The Importance of Data Backups: Safeguarding Information and Ensuring Continuity
07. Bash scripting microlesson
4:14 min
07. Core Cloud Services Computer
4:59 min
07. Designing Secure Architectures
1:39
07. Key Processes and Practices
08. Alternatives to microsoft office
08. DEFI and Core Concepts
2:12
08. Overview of Active Directory
09. COMMAND / ADMIN TOOLS
09. Communication Strategy
2:23
1. Security Audits
10. Blockchain
2:17
10. Innovation
11. Blockchain Technology
4:12
12. TCP IP Model and its layers
1:38
13. Security and wallet drains
1:11
14. OSI MODEL
2:18
15. Network topologies
1:23
16. Comparison with the OSI Model
0:40
2. Defense in Depth
2. Security Audits part 2
Audio: Dealing with Bad leads
5:47 min
Audio: Interviewing
23:51
Audio: Interviewing
19:30
Audio: Leading projects
3:15 min
Audio: Learning opportunities
3:44 min
Audio: Networking Cables
0:07 min
Audio: Operating Systems
26:52 min
Audio: Security Policies
24:37
End of Module
Donate
10. Blockchain
Your browser does not support the audio tag.
Download Course Files
file
.zip
Give Feedback
John Smith
Thank you! Your feedback has been received!
Oops! Something went wrong while submitting the form.