Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

Protocol Deep Dive: TCP and UDP | Pluralsight

TCP and UDP are the world’s foremost transportation protocols. As a network engineer it’s imperative that you have a deep understanding of these protocols. You’ll gain that exact knowledge needed to...

View Article


Basics of Using Containers in Production | Cloud Academy

This course is for anyone with a basic understanding of what containers are, and even why you’d want to use them, but who doesn’t understand the nitty-gritty of how they work yet. You should have a...

View Article


Building a Chatbot on Azure | Cloud Academy

The ‘Building a Chatbot on Azure’ course will allow team members to learn how to automate basic support tasks by using chatbots to answer typical questions about their products and/or services. In this...

View Article

The Complete Ethical Hacking Masterclass: Beginner To Expert | Udemy

The Complete Ethical Hacking Masterclass Is The Most Comprehensive And Extensive Course On Ethical Hacking With The Aim Of taking you from beginner to advanced.This course covers every aspect of...

View Article

PluralSight – CentOS 7 Courses

PluralSight – CentOS 7 CoursesEnglish | Size: 4.48 GBCategory: Tutorial CentOS Enterprise Linux 7 Network Management CentOS Enterprise Linux 7 Operation Essentials CentOS Enterprise Linux 7 Service...

View Article


Linkedin Learning – Microsoft 365: Implement Modern Device Services

Linkedin Learning – Microsoft 365: Implement Modern Device Services-ZHEnglish | Size: 321.14 MBCategory: Tutorial Mobile devices are a critical productivity tool for most organizations. But balancing...

View Article

Certified Wireless Analysis Professional (CWAP) – INE

This course is designed to prepare viewers for the CWAP certification. 802.11 Access will provide a foundation for 802.11 communication that illustrates the transmission of frames such as...

View Article

Certified Wireless Network Administrator (CWNA) Technology Course – INE

In this course you learn about the basics of radio frequency (RF) as it applies to Wi-Fi. You will also learn about the 802.11 MAC architecture along with the layers of the OSI model that Wi-Fi...

View Article


Practical Digital Forensics

Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing...

View Article


INE – Designing Azure Deployment, Migration & Integration

INE – Designing Azure Deployment, Migration & IntegrationEnglish | Size: 766.17 MBCategory: E-learning | Microsoft | Networking This course is intended for Azure architects, developers, and...

View Article

Splunk Enterprise Administration: Working with Configuration Files and...

You will gain a thorough understanding of Splunk’s layered configuration files architecture. You will also master creating and managing Splunk indexes, which are the building blocks of Splunk. Splunk...

View Article

Building Convolutional Neural Networks on Google Cloud | Cloud Academy

Once you know how to build and train neural networks using TensorFlow and Google Cloud Machine Learning Engine, what’s next? Before long, you’ll discover that prebuilt estimators and default...

View Article

Building a Solution Using Artificial Intelligence and IOT | Cloud Academy

Learn and understand the holistic approach to solving a problem and go beyond feature matching with this curated course from Cloud Academy in partnership with Calculated Systems LLC. Engineer centric,...

View Article


Career Opportunities in Cloud Computing | Cloud Academy

This course describes 6 different positions in the cloud computing industry, all of which are in high demand as established companies move to cloud technologies, companies expand IT departments, and...

View Article

Google Cloud Platform (GCP) Certification: Associate Cloud Engineer 2020 |...

Welcome to the NEW Skylines Academy GCP Associate Cloud Engineer 2020 course! The cloud computing market is one of the fastest growing with some of the most in-demand skillsets today. With the...

View Article


Certified Ethical Hacker (CEH) Certification Primer and Ethical Hacking...

Master ethical hacking and get prepared for the Certified Ethical Hacker (CEH) certification in this in-depth course from hacker expert Zanis Khan. You can also use the techniques and tools from this...

View Article

Architecting Cisco Secure Communications | Pluralsight

Data has become a high value commodity and protecting it is essential, especially when your data is traversing the internet and this is where VPNs come in. Using any VPN is not enough however, as...

View Article


Ethical Hacking: Social Engineering | LinkedIn

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals...

View Article

Ethical Hacking: Sniffers | LinkedIn

Ethical hackers: Get an inside look into the tools the black hat hackers use to “sniff” network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a...

View Article

Exam MD-100 Windows 10 | Microsoft Press Store

More than 8 hours of video instruction to help you support your organization’s Windows 10 deployment and prepare for Exam MD-100 Windows 10, one of the exams required to achieve Microsoft 365...

View Article
Browsing all 6856 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>