Classes

Each course I have created has objectives for both the course as a whole and broken down into objectives per topic/week, videos I have created, PowerPoints I've put together, and resources I've curated. Please feel free to use these materials for your own needs, but don't forget to give me credit.

Image of a Penguin Drawn with GIMP by Larry Ewing By https://en.wikipedia.org/wiki/Larry_Ewing - <https://en.wikipedia.org/wiki/Tux_(mascot)>, <https://en.wikipedia.org/wiki/File:Tux.png>, <https://upload.wikimedia.org/wikipedia/commons/a/af/Tux.png>, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=97150979

Introduction to Linux

This class is designed for someone that has never used Linux before and would like to start. We go over how to ssh into a server or setup a virtual machine for practice. Starting at the very beginning of what is Linux, who uses it, and then going into some more depth for some basic scripting practice.

View details »

Matrix code representing how the world is made of data

Introduction to Data

This is an introductory course in data literacy and databases. The course includes aspects of database design including entity relationship modeling, tables, and queries. Students will utilize database applications and Structured Query Language (SQL). Data science including data collection, modeling, and visualization will be discussed. Best practices for data security and privacy in regards to current regulations around the world will be emphasized in this course.

View details »

Computer Monitor

Introduction to Security

This class is designed for everyone to learn about security. I talk about why security is important for everyone in every field, not just tech people. We'll talk about some of the key concepts in security that everyone should know, such as MFA (Multifactor authentication), encryption, and some ethical concerns that are currently going on in the world today.

View details »

picture of circuits

Advanced Security

This course is designed for people that are interested in taking their security knowledge to the next level. We're going to go over certified ethical hacker topics such as penetration testing and the tools needed for that, OSINT both how to do it and how to work around it, and some of the important vocabulary you'll need. We are going to talk about things like backups, CSIRT terms, disaster recovery planning, and threat analysis. We also talk about resources to help guide you to the steps beyond this class and where you can go to next.

View details »

image of a head in blue light with a background that looks like a circuit made of blue lights

Advanced Database Management

This course will focus on advanced techniques and concepts in database management. Emphasis will be on Structured Query Language (SQL) and current industry best practices for utilizing data and databases. This course will be using hands-on exercises and real-world case studies for topics such as database optimization, database scalability, performance tuning, and concurrency control.

View details »

NO one fscks with Tux.  Linux.  For the Truly hardcore

Linux Administration

This is an advanced course in system administration with a heavy focus on Linux. The course utilizes hands-on labs for topics such as software configuration and installation. Students will build and maintain a small network of virtualized Linux servers from the ground up employing best practices for all aspects of backups, disaster recovery, planning, testing and troubleshooting. Students will read, utilize, and produce technical documentation.

View details »