All Linux Courses | Lynda
‘AWK Essential Training’ ‘Bash Patterns and Regular Expressions’ ‘Learning Bash Scripting’ ‘Learning CentOS Linux’ ‘Learning Kali Linux’ ‘Learning Linux Shell Scripting’ ‘Learning Linux Shell Scripting...
View ArticleSoftware Defined Networking | Lynda
‘Practical Software-Defined Networking 1 SDN and OpenFlow Quick Start’ ‘Practical Software-Defined Networking 2 SDN and OpenFlow Foundations’ ‘Practical Software-Defined Networking 3 Learning Mininet’...
View ArticleJuniper Course | Lynda
‘JNCIA (JN0-102) Cert Prep 1 Junos Fundamentals’ ‘JNCIA (JN0-102) Cert Prep 2 Configuration, Monitor, and Maintain’ ‘JNCIA (JN0-102) Cert Prep 3 Routing Fundamentals’...
View ArticleAWS Course | Lynda
‘AWS – Disaster Recovery’ ‘AWS – Enterprise Security’ ‘AWS for Architects Advanced Security’ ‘AWS for Architects High Availability and Continuous Deployment’ ‘AWS for Architects Network and Storage...
View ArticleBash Scripting, Linux and Shell Programming Complete Guide | Packt
Bash scripting provides programming for the most popular operating system in the world. Learn how to work on Linux, one of the most popular OS....
View ArticleSQL Beginner to Guru: MySQL Edition – Master SQL with MySQL | Packt
Become a SQL guru! Be that ‘go-to’ person! Master SQL to create reports from realistic MySQL databases See how to aggregate and analyze data using SQL functions Create your own database through the...
View ArticleWindows 10 Administration | Packt
Carry out administrative tasks by optimizing Windows 10 in your organization Install/upgrade Windows 10 and personalize your UI Develop the core skills needed to administer multitasking in Windows 10...
View ArticleCISM Certification Domain 2: Information Risk Management Video Boot Camp 2019...
Prepare for the 2017 version of the CISM: Certified Information Security Manager exam (the next planned CISM update is in 2022). Understand IT Security and Cyber Security from a management-level...
View ArticleCISM Certification Domain 3: Information Security Program Development and...
Prepare for the 2017 version of the CISM: Certified Information Security Manager exam (the next planned CISM update is in 2022). Understand IT Security and Cyber Security from a management-level...
View ArticleCISM Certification Domain 4: Information Security Incident Management Video...
Prepare for the 2017 version of the CISM: Certified Information Security Manager exam (the next planned CISM update is in 2022). Understand IT Security and Cyber Security from a management-level...
View ArticleCloud Computing for Business People: Azure, AWS, GCP | Packt
You will be able to discuss the benefits of cloud computing with others You will also be aware of things to watch out for, to avoid pitfalls You will no longer be lost by the cloud technical jargon You...
View ArticleMastering Windows Server 2019 | Packt
Take back control of your storage using features such as Storage Spaces Direct, data deduplication, and more Create a failover cluster from scratch using cluster sets while also creating a storage...
View ArticleConfiguring Microsoft Azure Data Infrastructure Security | Pluralsight
This course will teach you how to secure your data infrastructure services running in the Microsoft Azure cloud. Relevant Azure products covered include Azure SQL Database, Azure Cosmos DB, and Azure...
View ArticleDocker & Kubernetes Course | Lynda
‘Deploying Docker to AWS’ ‘Kubernetes Cloud Native Ecosystem’ ‘DevOps Foundations Microservices’ ‘Kubernetes Continuous Delivery with Spinnaker’ ‘Docker Continuous Delivery’ ‘Kubernetes Microservices’...
View ArticleMicrosoft Windows Server 2012 with R2 Updates (70-412) | CBT Nuggets
Note: The exam associated with this course was updated on April 19, 2018. Though this course has not been updated, it still retains value as a training resource. This Microsoft training with James...
View ArticleSEC504 – Hacker Tools, Techniques, Exploits, and Incident Handling
504.1 – Incident Handling Step-by Step & Comp Crime Investigation 504.3 – Computer & Network Hacker Exploits, Part 2 504.4 – Computer & Network Hacker Exploits, Part 3 504.5 – Computer...
View ArticleProvisioning Virtual Machines on Oracle Compute Cloud | Pluralsight
You will learn what choices you have to make to provision a virtual machine in the Oracle Cloud and why the choices matter. You will gain experience in two different ways to launch the virtual machines...
View ArticleTurning Speech into Text on AWS with Amazon Transcribe | Pluralsight
Drive more power and efficiency into your organization’s processes, by converting recorded audio into searchable and consumable text. Listening is easy, but being able to leverage actual text is a more...
View ArticleBuilding Batch Data Processing Solutions in Microsoft Azure | Pluralsight
In this course, you will learn how to perform ETL and ELT batch data processing workflows by using Microsoft Azure products and partner technologies. How can you gain business insights from data lakes...
View ArticleMicrosoft Cybersecurity Stack: Securing Enterprise Information | LinkedIn
Today’s users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for...
View Article