Protocol Deep Dive: TCP and UDP | Pluralsight
TCP and UDP are the world’s foremost transportation protocols. As a network engineer it’s imperative that you have a deep understanding of these protocols. You’ll gain that exact knowledge needed to...
View ArticleBasics of Using Containers in Production | Cloud Academy
This course is for anyone with a basic understanding of what containers are, and even why you’d want to use them, but who doesn’t understand the nitty-gritty of how they work yet. You should have a...
View ArticleBuilding a Chatbot on Azure | Cloud Academy
The ‘Building a Chatbot on Azure’ course will allow team members to learn how to automate basic support tasks by using chatbots to answer typical questions about their products and/or services. In this...
View ArticleThe Complete Ethical Hacking Masterclass: Beginner To Expert | Udemy
The Complete Ethical Hacking Masterclass Is The Most Comprehensive And Extensive Course On Ethical Hacking With The Aim Of taking you from beginner to advanced.This course covers every aspect of...
View ArticlePluralSight – CentOS 7 Courses
PluralSight – CentOS 7 CoursesEnglish | Size: 4.48 GBCategory: Tutorial CentOS Enterprise Linux 7 Network Management CentOS Enterprise Linux 7 Operation Essentials CentOS Enterprise Linux 7 Service...
View ArticleLinkedin Learning – Microsoft 365: Implement Modern Device Services
Linkedin Learning – Microsoft 365: Implement Modern Device Services-ZHEnglish | Size: 321.14 MBCategory: Tutorial Mobile devices are a critical productivity tool for most organizations. But balancing...
View ArticleCertified Wireless Analysis Professional (CWAP) – INE
This course is designed to prepare viewers for the CWAP certification. 802.11 Access will provide a foundation for 802.11 communication that illustrates the transmission of frames such as...
View ArticleCertified Wireless Network Administrator (CWNA) Technology Course – INE
In this course you learn about the basics of radio frequency (RF) as it applies to Wi-Fi. You will also learn about the 802.11 MAC architecture along with the layers of the OSI model that Wi-Fi...
View ArticlePractical Digital Forensics
Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing...
View ArticleINE – Designing Azure Deployment, Migration & Integration
INE – Designing Azure Deployment, Migration & IntegrationEnglish | Size: 766.17 MBCategory: E-learning | Microsoft | Networking This course is intended for Azure architects, developers, and...
View ArticleSplunk Enterprise Administration: Working with Configuration Files and...
You will gain a thorough understanding of Splunk’s layered configuration files architecture. You will also master creating and managing Splunk indexes, which are the building blocks of Splunk. Splunk...
View ArticleBuilding Convolutional Neural Networks on Google Cloud | Cloud Academy
Once you know how to build and train neural networks using TensorFlow and Google Cloud Machine Learning Engine, what’s next? Before long, you’ll discover that prebuilt estimators and default...
View ArticleBuilding a Solution Using Artificial Intelligence and IOT | Cloud Academy
Learn and understand the holistic approach to solving a problem and go beyond feature matching with this curated course from Cloud Academy in partnership with Calculated Systems LLC. Engineer centric,...
View ArticleCareer Opportunities in Cloud Computing | Cloud Academy
This course describes 6 different positions in the cloud computing industry, all of which are in high demand as established companies move to cloud technologies, companies expand IT departments, and...
View ArticleGoogle Cloud Platform (GCP) Certification: Associate Cloud Engineer 2020 |...
Welcome to the NEW Skylines Academy GCP Associate Cloud Engineer 2020 course! The cloud computing market is one of the fastest growing with some of the most in-demand skillsets today. With the...
View ArticleCertified Ethical Hacker (CEH) Certification Primer and Ethical Hacking...
Master ethical hacking and get prepared for the Certified Ethical Hacker (CEH) certification in this in-depth course from hacker expert Zanis Khan. You can also use the techniques and tools from this...
View ArticleArchitecting Cisco Secure Communications | Pluralsight
Data has become a high value commodity and protecting it is essential, especially when your data is traversing the internet and this is where VPNs come in. Using any VPN is not enough however, as...
View ArticleEthical Hacking: Social Engineering | LinkedIn
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals...
View ArticleEthical Hacking: Sniffers | LinkedIn
Ethical hackers: Get an inside look into the tools the black hat hackers use to “sniff” network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a...
View ArticleExam MD-100 Windows 10 | Microsoft Press Store
More than 8 hours of video instruction to help you support your organization’s Windows 10 deployment and prepare for Exam MD-100 Windows 10, one of the exams required to achieve Microsoft 365...
View Article