Kubernetes for Developers: Moving to the Cloud | Pluralsight
Learn how to move your Kubernetes app to the cloud. You will see how to create and update a cluster with your app on AWS, Azure, and Google Cloud. You will also learn how to determine the appropriate...
View ArticleSecurity Event Triage: Leveraging Existing Security Device Alerts | Pluralsight
Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner. Identifying suspicious...
View ArticleWindows 10 Essentials (2019) | Pluralsight
With Windows 10 Essentials (2019), busy business professionals will learn about new ways to personalize and utilize better their Windows 10 experience. Go beyond the basics in this Windows 10...
View ArticleSharePoint Conference ’19: Ask Microsoft Anything | Pluralsight
The SharePoint Conference concludes with a celebration of our community and an opportunity to get your questions answered by the Microsoft product teams....
View ArticleSharePoint Conference ’19: Yammer Trust and Compliance Deep Dive | Pluralsight
While Yammer is a user-driven Enterprise Social Network, some security and compliance tasks are required behind the scenes to ensure a successful implementation. In this deep dive, you’ll learn best...
View ArticleTQ Cloud Wrap Up (7/7) | Pluralsight
Paul Daugherty concludes your learning on the TQ Cloud channel and points you to more valuable resources targeted to help you raise your impact, raise your TQ....
View ArticleTQ Cloud Aftershow (4/7) | Pluralsight
Join host Sarah Dugan at TQHQ in a conversation with Paul Daugherty, new learners and several Accenture experts as they discuss the Cloud, what it is and why we should care. This conversation features...
View ArticleWindows 10 Power Users (2019) | Pluralsight
In this course, Windows 10 for Power Users, you will gain the ability to take your Windows OS to the next level of end-user interaction. First, you will learn more about setting configurations. Next,...
View ArticleAzure Network Connectivity and Name Resolution | Cloud Academy
Learn how to configure Microsoft Azure connectivity and name resolution with this expertly instructed course from Cloud Academy. In this course, you will learn two different ways to connect virtual...
View ArticleAWS: Overview of AWS Identity & Access Management (IAM) | Cloud Academy
This course looks at one of the key Security services within AWS, Identity & Access Management, commonly referred to IAM. This service manages identities and their permissions that are able to...
View ArticleAWS Virtual Private Cloud: Subnets and Routing | Cloud Academy
Creating and configuring a Virtual Private Cloud (VPC) within AWS can be a simple or difficult process. It all very much depends on the complexity of your requirements. For example, how many subnets...
View ArticleAzure Active Directory Security | Cloud Academy
Azure Active Directory, commonly referred to as Azure AD, is Microsoft’s Identity and Access Management service in the Cloud. It manages users, groups, and applications along with their access to other...
View ArticleVMWare Workstation Pro 15.5 (Key)
VMWare Workstation Pro 15.5 (Key)English | Size: 541.16 MB Category: others Features: Run Multiple OSs on a Single PC Develop and Test for Any Platform Secure and Isolate Environments Powerful 3D...
View ArticleAWS Security Best Practices: Abstract and Container Services | Cloud Academy
When implementing different AWS services and architecting them within your environments, whether it be production, test or dev, do you know your security responsibilities for these services? It is very...
View ArticleAWS Machine Learning Services 2019 – Re:invent Reminders | Cloud Academy
This is a short refresher of the 7 AWS machine learning services announced at Re:invent 2018 which will cover: Amazon SageMaker Ground Truth Amazon Forecast Amazon Comprehend Medical Amazon Textract...
View ArticleAWS Identity Federation | Cloud Academy
AWS Identity Federation is the concept of using external authorization sources to permit access to AWS Console and AWS Resources. Identity Federation comes in multiple levels that enable the use of...
View ArticleVirtual Extensible Lan (VXLAN) – INE
Join the world’s most highly respected and experienced team of CCIE instructors for 5+ hours of comprehensive Data Center v2 video training. This online course is taught by Brian McGahan, CCIEx4 #8593...
View ArticleDesigning Networking for Cisco Data Center Infrastructure | Pluralsight
A proper network design is the foundation for a properly functioning data center. This course will cover datacenter redundancy strategies at both layers 2 and 3, as well as disaster recovery planning...
View ArticleServerless and Microservices for AWS | LinkedIn
The benefit of serverless architectures are well-defined. Serverless helps developers focus on what they do best—building solutions—without the difficulty of managing and scaling infrastructure....
View ArticlePlay by Play: Demystifying Salesforce Marketing Cloud | Pluralsight
This course provides an in-depth review of Salesforce Marketing Cloud, including its essential features, tools, and capabilities, and sets you up for your first journey. Play by Play is a series in...
View Article