Aaron Rosenmund
Pluralsight Author
Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation. Leveraging his administration and automation experience, Aaron actively contributes to multiple open and closed source security operation platform projects and continues to create tools and content to benefit the community. As an educator & cyber security researcher at Pluralsight, he is focused on advancing cyber security workforce and technologies for business and national enterprises alike. In support of the Air National Guard, he contributes those skills part time in various initiatives to defend the nation in cyberspace. Certifications: GIAC GCIA, GIAC GCED, CCNA Cyber Operations, Pentest+, CySa+, CASP
www.AaronRosenmund.com
@arosenmund
"ironcat"
Topics Authored
Technology Leader
Data Professional
Security Professional
IT Ops
Contents Authored
101
Total Ratings
4203
Avg Course Ratings
4.3
Courses by Aaron
-
LabsSecurityCreating Evasive MalwareSecurityBeginner1h 20mFeb 05, 2025LabsSecurityLinux Endpoint Security: LogsSecurityBeginner2h 20mJan 30, 2025(78)CourseAIGenerative AI for ResearchersAIBeginner30m 7sDec 21, 2024LabsSecurityLab - Ethical Hacking: System HackingSecurityIntermediate3h 15mDec 10, 2024(18)LabsSecurityModern Malware AnalysisSecurityAdvanced5h 15mOct 29, 2024(28)LabsCore TechLab 3 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner3h 45mOct 18, 2024(48)LabsSecurityLab 3 - Ethical Hacking: SQL InjectionSecurityIntermediate50mOct 17, 2024(35)LabsSecurityLab 1 - Ethical Hacking: EnumerationSecurityIntermediate1h 10mOct 17, 2024(15)LabsSecurityLab 3 - Ethical Hacking: EnumerationSecurityIntermediate2h 45mOct 16, 2024LabsSecurityLab 3 - Ethical Hacking: Hacking Web ApplicationsSecurityIntermediate3h 45mOct 16, 2024LabsCore TechLab 3 - CentOS Enterprise Linux 7 Service ManagementCore TechBeginner3h 5mOct 15, 2024(19)LabsCore TechLab 3 - CentOS Enterprise Linux 7 Storage ManagementCore TechBeginner4h 35mOct 15, 2024LabsCore TechLab 3 - CentOS Enterprise Linux 7 Network ManagementCore TechBeginner3h 45mOct 14, 2024(20)LabsCore TechLab 2 - Wireshark Traffic Analysis: Customizing the Interface, ARP, ICMP, and DNSCore TechIntermediate2h 5mOct 11, 2024LabsCore TechLab 2 - Troubleshooting Slow Networks Using WiresharkCore TechIntermediate1h 50mOct 11, 2024LabsSecurityLab 2 - Ethical Hacking: SQL InjectionSecurityIntermediate4h 15mOct 10, 2024LabsSecurityLab 2 - Ethical Hacking: EnumerationSecurityIntermediate2h 45mOct 09, 2024LabsCore TechLab 2 - CentOS Enterprise Linux 7 User and Group ManagementCore TechIntermediate2h 45mOct 09, 2024(24)LabsSecurityLab 2 - Ethical Hacking: Hacking Web ApplicationsSecurityIntermediate3h 45mOct 09, 2024LabsCore TechLab 1 - CentOS Enterprise Linux 7 Network ManagementCore TechIntermediate3h 15mOct 07, 2024(17)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Operation EssentialsCore TechIntermediate6hOct 07, 2024(29)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Service ManagementCore TechIntermediate1h 15mOct 07, 2024(11)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Network ManagementCore TechIntermediate3h 45mOct 03, 2024(18)LabsCore TechLab 1 - Troubleshooting Slow Networks Using WiresharkCore TechIntermediate2h 25mOct 02, 2024(17)LabsCore TechLab 1 - Wireshark Traffic Analysis: Customizing the Interface, ARP, ICMP, and DNSCore TechIntermediate1h 50mOct 02, 2024LabsSecurityLab 1 - Ethical Hacking: SQL InjectionSecurityIntermediate4h 15mOct 01, 2024(15)LabsCore TechLab 1 - CentOS Enterprise Linux 7 User and Group ManagementCore TechIntermediate2hSep 25, 2024(32)LabsSecurityLab - Attacks, Threats, and Vulnerabilities for CompTIA Security+SecurityBeginner50mSep 25, 2024(509)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Storage ManagementCore TechIntermediate3h 5mSep 24, 2024(21)LabsCore TechLab - Using Intermediate Wireshark FeaturesCore TechIntermediate1h 40mSep 23, 2024LabsCore TechLab - Using Wireshark Command Line ToolsCore TechIntermediate2h 20mSep 23, 2024LabsCore TechLab - Visualizing Network Traffic with WiresharkCore TechIntermediate2h 30mSep 23, 2024(11)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Service ManagementCore TechIntermediate3h 5mSep 23, 2024(20)LabsCore TechLab - Processing and Filtering Text Data with Bash and Z ShellCore TechIntermediate4h 45mSep 19, 2024(41)LabsSecurityLab - Performing Non-Technical Tests for CompTIA PenTest+SecurityIntermediate4h 45mSep 18, 2024(11)LabsCore TechLab - Mastering TCP Analysis with WiresharkCore TechAdvanced4h 15mSep 16, 2024LabsCore TechLab - Foundational TCP Analysis with WiresharkCore TechIntermediate4h 15mSep 11, 2024(15)LabsSecurityDiscover and Enumerate Targets with NmapSecurityIntermediate2h 35mSep 11, 2024(283)LabsSecurityLab - Ethical Hacking: SniffingSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Malware ThreatsSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Session HijackingSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Hacking Web ServersSecurityIntermediate4h 15mSep 10, 2024(11)LabsSecurityLab - Ethical Hacking: CryptographySecurityIntermediate1h 45mSep 09, 2024(12)LabsSecurityLab - Conducting Passive Reconnaissance for CompTIA PenTest+SecurityIntermediate4h 45mSep 09, 2024(30)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Operation EssentialsCore TechIntermediate1h 10mSep 04, 2024(41)LabsCore TechLab - Analyzing Network Protocols with WiresharkCore TechIntermediate3h 15mSep 04, 2024(22)LabsCore TechLab 2 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner2h 50mSep 03, 2024(74)LabsSecurityLinux Endpoint Security: ProcessesSecurityBeginner1h 55mAug 28, 2024(159)LabsSecurityLinux Endpoint Security: NetworkingSecurityBeginner2h 5mAug 28, 2024(115)LabsSecurityWindows Endpoint Security: ProcessesSecurityBeginner1h 50mAug 27, 2024(96)LabsSecurityAssess Password Policy ComplianceSecurityAdvanced2h 10mAug 12, 2024(70)LabsSecurityApache Commons Text: Emulation and DetectionSecurityAdvanced1h 30mAug 09, 2024(59)CourseSecuritySecurity Hot Takes: CrowdStrike Outage Post-mortemSecurityIntermediate31m 6sAug 08, 2024(17)LabsCore TechLab 1 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner3h 5mAug 01, 2024(196)LabsSecurityActive Directory Security Hands-on SandboxSecurityIntermediate4h 30mJul 25, 2024(75)LabsSecurityVelociraptor Hands-on SandboxSecurityIntermediate3h 10mJul 03, 2024(17)LabsCore TechLab - Docker and Kubernetes: The Big PictureCore TechBeginner1h 5mJun 26, 2024(897)CourseSecurityRed Team Operations: Target and Capability DevelopmentSecurityIntermediate1h 11m 11sJun 03, 2024CourseSecurityXZ Backdoor Supply Chain Vulnerability: What You Should KnowSecurityIntermediate21m 22sApr 04, 2024CourseSecurityConnectWise ScreenConnect Vulnerability: What You Should KnowSecurityBeginner18m 25sFeb 27, 2024CourseSecurityBuilding a Strong Cyber Security FoundationSecurityBeginner8m 10sNov 03, 2023(14)CourseSecuritySecurity Hot Takes: Rackspace BreachSecurityBeginner12m 2sOct 31, 2023CourseSecuritySecurity Hot Takes: Buzzwords and PredictionsSecurityBeginner13m 44sOct 27, 2023CourseSecuritySecurity Hot Takes: ChatGPTSecurityBeginner14m 58sOct 27, 2023(29)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Storage ManagementCore TechIntermediate4h 5mOct 05, 2023(24)CourseSecuritySecurity Hot Takes: LastPass BreachSecurityBeginner33m 15sSep 06, 2023LabsSecurityLab - Denial of Service TestingSecurityIntermediate2h 45mSep 05, 2023(18)CourseSecuritySecurity Hot Takes: SBOMsSecurityBeginner18m 32sAug 30, 2023CourseSecurityMOVEit Vulnerability: What You Should KnowSecurityBeginner17m 34sJul 28, 2023LabsCore TechLab 3 - CentOS Enterprise Linux 7 Operation EssentialsCore TechBeginner4h 45mJun 08, 2023(43)CourseSecurityIncident Response: Containment, Eradication and RecoverySecurityIntermediate1h 6m 21sMay 12, 2023(12)LabsCore TechLab 3 - CentOS Enterprise Linux 7 User and Group ManagementCore TechBeginner3h 45mApr 25, 2023(17)CourseSecuritySecurity Hot Takes: Federal Network BreachSecurityBeginner19m 33sJan 30, 2023(11)CourseSecurityThreat Hunting: Hypothesize and PlanSecurityIntermediate44m 34sDec 06, 2022(14)CourseSecurityLinux Endpoint Security: ProcessesSecurityBeginner25m 33sNov 03, 2022(27)CourseSecurityTalking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell ExploitSecurityIntermediate57m 37sOct 31, 2022CourseSecurityIncident Response: Host AnalysisSecurityIntermediate1h 37m 21sJun 14, 2022(15)CourseSecurityIncident Response: Detection and AnalysisSecurityIntermediate2h 19m 3sDec 16, 2021(40)CourseSecurityGetting Started in the Lab EnvironmentSecurityIntermediate6m 8sOct 07, 2021(18)CourseSecurityDridex Banking TrojanSecurityIntermediate1h 57m 46sMay 11, 2021CourseSecurityBusiness Email CompromiseSecurityIntermediate1h 54m 22sDec 09, 2020(13)CourseSecurityBlue Team Tools: Defense against Adversary Activity Using MITRE TechniquesSecurityIntermediate19m 39sDec 09, 2020(34)CourseSecurityThreat Hunting with PySparkSecurityIntermediate16m 18sNov 24, 2020(16)CourseSecuritySet Up PySpark for Data AnalysisSecurityBeginner9m 49sNov 24, 2020(32)CourseSecurityCommand and Control with CovenantSecurityIntermediate19m 50sNov 04, 2020(18)CourseSecurityTrickbot Banking TrojanSecurityIntermediate1h 29m 46sOct 23, 2020(25)CourseSecurityFileless MalwareSecurityIntermediate1h 40m 56sOct 23, 2020(34)CourseSecurityOS Analysis with HELKSecurityIntermediate29m 41sJul 21, 2020(12)CourseSecurityRed Team Tools for Emulated Adversary Techniques with MITRE ATT&CKSecurityIntermediate17m 12sApr 30, 2020(23)CourseSecuritySecurity Event Triage: Revealing Attacker Methodology in Web Application EventsSecurityAdvanced2h 9m 1sFeb 12, 2020(13)CourseSecuritySetting Up a Malware Analysis LabSecurityIntermediate1h 25m 31sNov 21, 2019(28)CourseSecuritySecurity Event Triage: Operationalizing Security AnalysisSecurityBeginner54m 10sSep 03, 2019(40)CourseSecuritySecurity Event Triage: Detecting System AnomaliesSecurityAdvanced1h 47m 54sJul 22, 2019(22)CourseSecuritySecurity Event Triage: Detecting Network Anomalies with Behavioral AnalysisSecurityAdvanced2h 1m 7sMay 07, 2019(24)
-
CourseAIGenerative AI for ResearchersAIBeginner30m 7sDec 21, 2024CourseSecuritySecurity Hot Takes: CrowdStrike Outage Post-mortemSecurityIntermediate31m 6sAug 08, 2024(17)CourseSecurityRed Team Operations: Target and Capability DevelopmentSecurityIntermediate1h 11m 11sJun 03, 2024CourseSecurityXZ Backdoor Supply Chain Vulnerability: What You Should KnowSecurityIntermediate21m 22sApr 04, 2024CourseSecurityConnectWise ScreenConnect Vulnerability: What You Should KnowSecurityBeginner18m 25sFeb 27, 2024CourseSecurityBuilding a Strong Cyber Security FoundationSecurityBeginner8m 10sNov 03, 2023(14)CourseSecuritySecurity Hot Takes: Rackspace BreachSecurityBeginner12m 2sOct 31, 2023CourseSecuritySecurity Hot Takes: Buzzwords and PredictionsSecurityBeginner13m 44sOct 27, 2023CourseSecuritySecurity Hot Takes: ChatGPTSecurityBeginner14m 58sOct 27, 2023(29)CourseSecuritySecurity Hot Takes: LastPass BreachSecurityBeginner33m 15sSep 06, 2023CourseSecuritySecurity Hot Takes: SBOMsSecurityBeginner18m 32sAug 30, 2023CourseSecurityMOVEit Vulnerability: What You Should KnowSecurityBeginner17m 34sJul 28, 2023CourseSecurityIncident Response: Containment, Eradication and RecoverySecurityIntermediate1h 6m 21sMay 12, 2023(12)CourseSecuritySecurity Hot Takes: Federal Network BreachSecurityBeginner19m 33sJan 30, 2023(11)CourseSecurityThreat Hunting: Hypothesize and PlanSecurityIntermediate44m 34sDec 06, 2022(14)CourseSecurityLinux Endpoint Security: ProcessesSecurityBeginner25m 33sNov 03, 2022(27)CourseSecurityTalking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell ExploitSecurityIntermediate57m 37sOct 31, 2022CourseSecurityIncident Response: Host AnalysisSecurityIntermediate1h 37m 21sJun 14, 2022(15)CourseSecurityIncident Response: Detection and AnalysisSecurityIntermediate2h 19m 3sDec 16, 2021(40)CourseSecurityGetting Started in the Lab EnvironmentSecurityIntermediate6m 8sOct 07, 2021(18)CourseSecurityDridex Banking TrojanSecurityIntermediate1h 57m 46sMay 11, 2021CourseSecurityBusiness Email CompromiseSecurityIntermediate1h 54m 22sDec 09, 2020(13)CourseSecurityBlue Team Tools: Defense against Adversary Activity Using MITRE TechniquesSecurityIntermediate19m 39sDec 09, 2020(34)CourseSecurityThreat Hunting with PySparkSecurityIntermediate16m 18sNov 24, 2020(16)CourseSecuritySet Up PySpark for Data AnalysisSecurityBeginner9m 49sNov 24, 2020(32)CourseSecurityCommand and Control with CovenantSecurityIntermediate19m 50sNov 04, 2020(18)CourseSecurityTrickbot Banking TrojanSecurityIntermediate1h 29m 46sOct 23, 2020(25)CourseSecurityFileless MalwareSecurityIntermediate1h 40m 56sOct 23, 2020(34)CourseSecurityOS Analysis with HELKSecurityIntermediate29m 41sJul 21, 2020(12)CourseSecurityRed Team Tools for Emulated Adversary Techniques with MITRE ATT&CKSecurityIntermediate17m 12sApr 30, 2020(23)CourseSecuritySecurity Event Triage: Revealing Attacker Methodology in Web Application EventsSecurityAdvanced2h 9m 1sFeb 12, 2020(13)CourseSecuritySetting Up a Malware Analysis LabSecurityIntermediate1h 25m 31sNov 21, 2019(28)CourseSecuritySecurity Event Triage: Operationalizing Security AnalysisSecurityBeginner54m 10sSep 03, 2019(40)CourseSecuritySecurity Event Triage: Detecting System AnomaliesSecurityAdvanced1h 47m 54sJul 22, 2019(22)CourseSecuritySecurity Event Triage: Detecting Network Anomalies with Behavioral AnalysisSecurityAdvanced2h 1m 7sMay 07, 2019(24)
-
LabsSecurityCreating Evasive MalwareSecurityBeginner1h 20mFeb 05, 2025LabsSecurityLinux Endpoint Security: LogsSecurityBeginner2h 20mJan 30, 2025(78)LabsSecurityLab - Ethical Hacking: System HackingSecurityIntermediate3h 15mDec 10, 2024(18)LabsSecurityModern Malware AnalysisSecurityAdvanced5h 15mOct 29, 2024(28)LabsCore TechLab 3 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner3h 45mOct 18, 2024(48)LabsSecurityLab 3 - Ethical Hacking: SQL InjectionSecurityIntermediate50mOct 17, 2024(35)LabsSecurityLab 1 - Ethical Hacking: EnumerationSecurityIntermediate1h 10mOct 17, 2024(15)LabsSecurityLab 3 - Ethical Hacking: EnumerationSecurityIntermediate2h 45mOct 16, 2024LabsSecurityLab 3 - Ethical Hacking: Hacking Web ApplicationsSecurityIntermediate3h 45mOct 16, 2024LabsCore TechLab 3 - CentOS Enterprise Linux 7 Service ManagementCore TechBeginner3h 5mOct 15, 2024(19)LabsCore TechLab 3 - CentOS Enterprise Linux 7 Storage ManagementCore TechBeginner4h 35mOct 15, 2024LabsCore TechLab 3 - CentOS Enterprise Linux 7 Network ManagementCore TechBeginner3h 45mOct 14, 2024(20)LabsCore TechLab 2 - Wireshark Traffic Analysis: Customizing the Interface, ARP, ICMP, and DNSCore TechIntermediate2h 5mOct 11, 2024LabsCore TechLab 2 - Troubleshooting Slow Networks Using WiresharkCore TechIntermediate1h 50mOct 11, 2024LabsSecurityLab 2 - Ethical Hacking: SQL InjectionSecurityIntermediate4h 15mOct 10, 2024LabsSecurityLab 2 - Ethical Hacking: EnumerationSecurityIntermediate2h 45mOct 09, 2024LabsCore TechLab 2 - CentOS Enterprise Linux 7 User and Group ManagementCore TechIntermediate2h 45mOct 09, 2024(24)LabsSecurityLab 2 - Ethical Hacking: Hacking Web ApplicationsSecurityIntermediate3h 45mOct 09, 2024LabsCore TechLab 1 - CentOS Enterprise Linux 7 Network ManagementCore TechIntermediate3h 15mOct 07, 2024(17)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Operation EssentialsCore TechIntermediate6hOct 07, 2024(29)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Service ManagementCore TechIntermediate1h 15mOct 07, 2024(11)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Network ManagementCore TechIntermediate3h 45mOct 03, 2024(18)LabsCore TechLab 1 - Troubleshooting Slow Networks Using WiresharkCore TechIntermediate2h 25mOct 02, 2024(17)LabsCore TechLab 1 - Wireshark Traffic Analysis: Customizing the Interface, ARP, ICMP, and DNSCore TechIntermediate1h 50mOct 02, 2024LabsSecurityLab 1 - Ethical Hacking: SQL InjectionSecurityIntermediate4h 15mOct 01, 2024(15)LabsCore TechLab 1 - CentOS Enterprise Linux 7 User and Group ManagementCore TechIntermediate2hSep 25, 2024(32)LabsSecurityLab - Attacks, Threats, and Vulnerabilities for CompTIA Security+SecurityBeginner50mSep 25, 2024(509)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Storage ManagementCore TechIntermediate3h 5mSep 24, 2024(21)LabsCore TechLab - Using Intermediate Wireshark FeaturesCore TechIntermediate1h 40mSep 23, 2024LabsCore TechLab - Using Wireshark Command Line ToolsCore TechIntermediate2h 20mSep 23, 2024LabsCore TechLab - Visualizing Network Traffic with WiresharkCore TechIntermediate2h 30mSep 23, 2024(11)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Service ManagementCore TechIntermediate3h 5mSep 23, 2024(20)LabsCore TechLab - Processing and Filtering Text Data with Bash and Z ShellCore TechIntermediate4h 45mSep 19, 2024(41)LabsSecurityLab - Performing Non-Technical Tests for CompTIA PenTest+SecurityIntermediate4h 45mSep 18, 2024(11)LabsCore TechLab - Mastering TCP Analysis with WiresharkCore TechAdvanced4h 15mSep 16, 2024LabsCore TechLab - Foundational TCP Analysis with WiresharkCore TechIntermediate4h 15mSep 11, 2024(15)LabsSecurityDiscover and Enumerate Targets with NmapSecurityIntermediate2h 35mSep 11, 2024(283)LabsSecurityLab - Ethical Hacking: SniffingSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Malware ThreatsSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Session HijackingSecurityIntermediate4h 45mSep 10, 2024LabsSecurityLab - Ethical Hacking: Hacking Web ServersSecurityIntermediate4h 15mSep 10, 2024(11)LabsSecurityLab - Ethical Hacking: CryptographySecurityIntermediate1h 45mSep 09, 2024(12)LabsSecurityLab - Conducting Passive Reconnaissance for CompTIA PenTest+SecurityIntermediate4h 45mSep 09, 2024(30)LabsCore TechLab 1 - CentOS Enterprise Linux 7 Operation EssentialsCore TechIntermediate1h 10mSep 04, 2024(41)LabsCore TechLab - Analyzing Network Protocols with WiresharkCore TechIntermediate3h 15mSep 04, 2024(22)LabsCore TechLab 2 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner2h 50mSep 03, 2024(74)LabsSecurityLinux Endpoint Security: ProcessesSecurityBeginner1h 55mAug 28, 2024(159)LabsSecurityLinux Endpoint Security: NetworkingSecurityBeginner2h 5mAug 28, 2024(115)LabsSecurityWindows Endpoint Security: ProcessesSecurityBeginner1h 50mAug 27, 2024(96)LabsSecurityAssess Password Policy ComplianceSecurityAdvanced2h 10mAug 12, 2024(70)LabsSecurityApache Commons Text: Emulation and DetectionSecurityAdvanced1h 30mAug 09, 2024(59)LabsCore TechLab 1 - Learning the Essentials of CentOS Enterprise Linux 7 AdministrationCore TechBeginner3h 5mAug 01, 2024(196)LabsSecurityActive Directory Security Hands-on SandboxSecurityIntermediate4h 30mJul 25, 2024(75)LabsSecurityVelociraptor Hands-on SandboxSecurityIntermediate3h 10mJul 03, 2024(17)LabsCore TechLab - Docker and Kubernetes: The Big PictureCore TechBeginner1h 5mJun 26, 2024(897)LabsCore TechLab 2 - CentOS Enterprise Linux 7 Storage ManagementCore TechIntermediate4h 5mOct 05, 2023(24)LabsSecurityLab - Denial of Service TestingSecurityIntermediate2h 45mSep 05, 2023(18)LabsCore TechLab 3 - CentOS Enterprise Linux 7 Operation EssentialsCore TechBeginner4h 45mJun 08, 2023(43)LabsCore TechLab 3 - CentOS Enterprise Linux 7 User and Group ManagementCore TechBeginner3h 45mApr 25, 2023(17)
-
CourseSecurityEnterprise Security: Executive BriefingRETIREDSecurityBeginner39m 35sOct 12, 2024(110)CourseSecurityElastic Stack: Getting StartedRETIREDSecurityBeginner1h 41m 44sOct 11, 2024(106)CourseSecurityStreamlining Your Incident Response Process with SplunkRETIREDSecurityBeginner1h 13m 24sMar 19, 2024(44)CourseSecuritySelecting the Right Tool(s) for Your Red Team OperationRETIREDSecurityIntermediate1h 30m 59sMar 19, 2024(26)CourseSecurityAssessing Red Team Post Exploitation ActivityRETIREDSecurityIntermediate1h 3m 13sMar 19, 2024(18)CourseCore TechGetting Started with VMware PowerCLI and AutomationRETIREDCore TechBeginner1h 48m 37sJun 29, 2021(27)CourseCore TechVMware vSphere Automated Reporting with PowerCLIRETIREDCore TechIntermediate2h 47m 10sJun 29, 2021