GCP Cloud Developer Bootcamp Part 2 | Stone River eLearning
A Professional Cloud Developer builds scalable and highly available applications using Google recommended practices and tools that leverage fully managed services. This individual has experience with...
View ArticleCertified Ethical Hacker (CEH) Certification Prep Course | Udemy
Foot printing Network scanning Enumeration Packet sniffing Social Engineering DoS/DDoS Session hijacking Webserver and web application attacks and countermeasures SQL injection attacks Wireless...
View ArticleLearn Ethical Hacking From Scratch | Udemy
135+ ethical hacking & security videos. Start from 0 up to a high-intermediate level. Learn ethical hacking, its fields & the different types of hackers. Install a hacking lab & needed...
View ArticlePluralSight – Microsoft Azure Administration for AWS Administrators
PluralSight – Microsoft Azure Administration for AWS Administrators-BOOKWARE-KNiSOEnglish | Size: 175.26 MB Category: Tutorial Release Notes: If you are an Amazon Web Services (AWS) administrator,...
View ArticleThe Ultimate Cisco CCNA Packet Tracer Project | Udemy
The only complete CCNA project course using packet tracer on Udemy. Refresh CCNA knowledge and practical skills. Understand and apply CCNA technologies in a full project environment. Use techniques...
View ArticlePluralSight – Microsoft Azure DevOps Engineer Optimize Feedback...
PluralSight – Microsoft Azure DevOps Engineer Optimize Feedback Mechanisms-BOOKWARE-KNiSOEnglish | Size: 173.64 MB Category: Tutorial Release Notes: A core part of DevOps knowledge is being able to...
View ArticleSQL: Data Reporting and Analysis | LinkedIn
Do you rely on IT to get the data you need? Are you often stuck waiting in line for data, and wish you could just retrieve it yourself? In this course, learn how to get the data you want by writing a...
View ArticleIT Service Desk: Service Management | LinkedIn
As technology continues to evolve, businesses are presented with both challenges and opportunities. Organizations now have access to all manner of innovative new tools; however, they also need to...
View ArticleEthical Hacking – The Most Advanced Level NMAP Course | Udemy
Students will learn to scan entire computer network in their organization or company Students will learn network scanning of ethical hacking Students will learn about NMAP Objective of network scanning...
View ArticleRed Hat Linux Certified System Admin – SA2 | Udemy
Preparation of RHCSA – Certified Red Hat Enterprise Linux System Administrator Using Regular Expressions with Grep Creating And Editing Test Files with VIM Scheduling Linux Tasks Controlling access to...
View ArticleKubernetes Best Practices | O’Reilly
In this practical guide, four Kubernetes professionals with deep experience in distributed systems, enterprise application development, and open source will guide you through the process of building...
View ArticleRed Hat Linux Certified System Admin – SA3 | Udemy
Preparation of RHCSA – Certified Red Hat Enterprise Linux System Administrator Overview of Systemd Features of Systemd Network Manager Overview Network Teaming Teaming Policies and its configurations...
View ArticlePenetration Testing: Advanced Tunneling and Exfiltration
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting, and exfiltration. In this installment of the Penetration Testing series, instructor Malcolm Shore...
View ArticlePenetration Testing: Advanced Enumeration
Enumeration is the key to achieving success with penetration testing, and learning how to do it effectively can be challenging. Whether you’re preparing for the Offensive Security Certified...
View ArticleVeeam Backup and Replication Zero To Hero | Udemy
This complete course contains a high-level overview of Veeam Backup & Replication. You will learn Veeam Backup & Replication Features Backup Veeam provides fast and reliable backup for virtual...
View ArticleCisco Identity Services Engine ISE 2.7.0.356.SPA
Cisco Identity Services Engine ISE 2.7.0.356.SPA https://nitroflare.com/view/B1729D55CCA655E/Cisco-Identity-Services-Engine-ISE-2.7.0.356.SPA.x86-64.part01.rar...
View ArticleWindows PowerShell: Essentials | Pluralsight
IT automation is an ever-expanding need in the IT world and at the forefront is PowerShell. If you want to learn about task automation and configuration management using this versatile tool, look no...
View ArticleMicrosoft Cloud Fundamentals: SharePoint Online, OneDrive, and Teams | LinkedIn
Microsoft SharePoint Online, OneDrive, and Microsoft Teams can help organizations keep their files safe, share information more effectively, and communicate with ease. In this course, learn the basics...
View ArticleLeveraging Cloud-Based Machine Learning on Azure: Real-World Applications |...
In order to successfully incorporate AI on the popular Azure platform, you must gain a fundamental understanding of what AI is and become familiar with the local tools Azure offers. In this course,...
View ArticlePlanning and Configuring a Microsoft Messaging Platform | LinkedIn
Discover what it takes to plan, configure, deploy, and manage messaging platforms for modern organizations. Throughout this course, instructor Robert McMillen provides demonstrations using Exchange...
View Article