Stacks Image 39

Over the years, we have developed some great courses on a variety of important high level IT topics. These courses are are designed to be easily understood by anyone in the IT industry.

Feel free to download and enjoy these courses. However, commercial use is prohibited.


Free TrainingMagic Courses

  • Basic Hacking
  • Basic Hacking is an overview of some methods that hackers can use to compromise networks and computers.  Topics covered include: social engineering, cross site scripting, networking scanning tools, buffer overflows, keystroke logging, Trojan programs, and password cracking.

  • Critical Cryptography
  • This course covers some the cryptographic methods used in modern digital communications.  Topics covered include: stream encryption, block ciphers, public key encryption, digital signatures, hashing, digital certificates, and steganography.

  • Essential Authentication Methods
  • This is an overview of some the authentication methods used in modern networks.  Topics covered include: Remote Access Servers (RAS), RADIUS, TACACS+, Kerberous, password policy, password attacks, tokens and biometrics. 

  • Fundamental Firewall Theory
  • An overview of firewall concepts covers a variety of topics including: firewalls, DMZs, firewall rules, proxies, intrusion detection systems, and network address translation.

  • Multi Protocol Label Switching (MPLS) Concepts
  • The MPLS course describes the purpose and philosophy of MPLS, label switching concepts,  MPLS components, Label-Switched Path (LSP), Forward Equivalence Class (FEC), Pushing Labels, Popping Lables, Swapping labels, Shim MPLS header, Ethernet MPLS header, Frame Relay MPLS header, ATM MPLS header, Generalized MPLS, Label Information Base (LIB), Label Forwarding Information Base (LFIB), and various other label distribution protocols and principles.

  • Multicasting Theory
  • This course covers of the basic concepts multicasting.  Topics covered include: Multicasting address space, Reverse Path Forwarding (RPR), Internet Group Management Protocol (IGMP), Path Distribution Trees (source and shared), Distance Vector Multicasting Routing Protocol (DVMRP) protocol, Multicast extension to OSPF (MOSPF), Protocol Independent Multicast (PIM), PIM dense mode, PIM sparse mode, and Multicast Source Discovery Protocol (MSDP).

  • Basic Quality Of Service Concept
  • Basic QOS describes fundamental Quality Of Service concepts including: serialization delay, queuing delay, Frame Relay, ATM, IP Integrated Services (IntServ), RSVP, Differentiated Services (DiffServ) and Queuing Algorithms. 

  • Virtual Private Networks
  • Virtual Private Networks is an overview of the basic concepts and technologies used in VPNs.  Protocols discussed includes: VPN definition, tunneling, Generic Routing Encapsulation (GRE),  Point to Point Tunneling Protocol (PPTP), Layer 2 Forwarding (L2F), Layer 2 Tunneling Protocol (L2TP), IPsec, Authentication Header (AH), Encapsulating Security Protocol (ESP), and Internet Key Exchange (IKE). 

"Education is the key to unlock the golden door of freedom."
- George Washington Carver