Azure Cosmos DB: SQL API Deep Dive | LinkedIn
The SQL API is considered the core API for Azure Cosmos DB. It allows developers to query and manage the data they have stored in Cosmos using a familiar programming language. Explore the SQL API more...
View ArticleAmazon Web Services: Monitoring and Reporting | LinkedIn
As you’re financially responsible for whichever AWS services you use, it’s important to establish sound financial monitoring to ensure that you’re alerted to any changes before those changes become a...
View ArticleAWS Certified Advanced Networking – Specialty 2019 | Udemy
Will be prepared to give the AWS Certified Advanced Networking – Specialty certification. Implement IPSec tunnels as part of Hybrid Infrastructure Understand and Implement various complex AWS...
View ArticleDesign Training | RouteHub
Design Training RouteHub provides additional practical training resources for network engineers and consultant for reference, design, to network documentation. Reference hundreds of quick sample Cisco...
View ArticlePalo Alto Networks Training | RouteHub
Do you want to learn how to block certain applications within Facebook like writing posts or chatting? Do you want to learn how to decrypt a secure web page a user may access to inspect it further? Do...
View ArticleRoutehub – Ultimate Collection 2016
Contains all routehub courses. Cisco Fortinet F5 Big-IP Design Juniper Palo Alto SonicWall Riverbed Ubiquiti VMware...
View ArticleRoutehub – Ultimate Collection 2017
Hash /data/routeHub – Ultimate Collection (August 2017)/VMWare Training/routehub – VMware ESXi/VMW-5.zip Hash /data/routeHub – Ultimate Collection (August 2017)/VMWare Training/routehub – VMware...
View ArticleRed Hat Certified System Administrator (RHCSA), 3/e | Livelessons
Red Hat Certified System Administrator (RHCSA) Complete Video Course 3rd Edition has more than 16 hours of comprehensive video training—which includes whiteboard concept teaching, live CLI work,...
View ArticlePentester Academy Course Bundle Including Projects Sourse Codes And Pdfs
Here you will find all pentester academy courses till time of creation this topic Javascript for Pentesters In this course, we will be learning how to use Javascript for Pentesting. Linux Forensics...
View ArticleIT Complete Pack Soultion 2019 | Lynda
Content List ============ Access tutorials Access 2013 Forms Reports Depth 19585 Access tutorials Access 2013 Power Tips 16861 Access tutorials Access 2013 Queries Depth 16651 Access tutorials Building...
View ArticleLearning Path: CCNA Routing and Switching (ICND1 100-105, ICND2 200-105, and...
This Learning Path consists of CCENT ICND1 100-105 Complete Video Course and CCNA Routing and Switching ICND2 200-105 Complete Video Course. Prerequisites: Familiarity with the basics of networking...
View ArticleTCP/IP and Networking Fundamentals for Sysadmins | Pluralsight
The payroll server is down! Is the outage a downed system, or is it a network issue? In this course, you’ll learn the critical tools needed to quickly diagnose these types of critical issues. This...
View ArticleEthical Hacking from Top University Professor | Udemy
Basic Concepts of Networking TCP IP Protocol IP adressing and Routing Network based attacks Password Cracking DNS and Email Security and Much Much More Who wants to start a new Career or just want to...
View ArticleWindows 10 Troubleshooting Advanced | Intellezy
This course is designed to give users an understanding and the skills to troubleshoot Windows 10. In this course, students will become familiar with the troubleshooting process and available tools,...
View ArticleMicrosoft PowerShell Reference Training – CBT Nuggets
This Windows PowerShell training course serves as a broad reference library of all the Microsoft’s dynamic programming language and interactive command line shell can do. This course is a powerful...
View ArticleEthical Hacking for Beginners | Packt
Stage attacks to your own advantage Work with the Metasploit toolkit to test the effectiveness of defenses Incorporate sniffing with the Man-in-the-Middle attack Bypass modern security defenses to...
View ArticleCybersecurity Attacks (Red Team Activity) | Packt
See different types of cyber attacks, how they are executed, and to provide vulnerability assessment Explore the technology of cyber espionage and quickly discover upcoming cyber attacks Use Kali...
View ArticleSQL Server 2016 – Maintenance and Automation | Packt
Create a backup strategy and perform full and differential restores Configure and use a database mail to send messages under server automation Create full database backups and work with different...
View ArticleDigital Forensics and Cyber Crime with Kali Linux Fundamentals | Livelessons
Overview Why is digital forensics so important? In today’s digital world, every organization is bound to be attacked and likely breached by a cyber adversary. Forensics can be used to determine if and...
View ArticleCCENT ICND1 100-105 | Livelessons
CCENT ICND1 100-105 Complete Video Course is a comprehensive training course that brings Cisco CCENT exam topics to life through the use of real-world demonstrations, animations, live instruction, and...
View Article