Quantcast
Channel: Get Tutorials & Training | Tut4DL
Browsing all 6856 articles
Browse latest View live

Red Hat Enterprise Specialist in Diagnostics and Troubleshooting...

Red Hat Enterprise Specialist in Diagnostics and Troubleshooting Virtualization Classroom Setup & Videos...

View Article


Fundamentals of Cloud Computing and Quantum Computing | Udemy

Learn the core concepts of Cloud Computing and Quantum Computing Learn the types of clouds. Learn about IaaS, SaaS, PaaS Learn Cloud Computing Planning, Cloud Security and Cloud Operations Amazon Web...

View Article


PostgreSQL 9.4 Administration | Linux Academy

Understanding open source RDBMS systems is an important skill for a successful system administrator or engineer. This course will help you gain a deep understanding of how to install and coonfigure...

View Article

Practical Threat Hunting – Applied Network Defense

Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out...

View Article

MySQL Fundamentals Part 2 | Pluralsight

Part 2 of the Fundamentals of MySQL series, covering stored procedures, user-defined functions, triggers and more. MySQL is a popular choice of database for use in web applications, and is a central...

View Article


Using ATT&CK to Advance Cyber Threat Intelligence Training

The goal of this training is for students to understand the following: What ATT&CK is and why it’s useful for cyber threat intelligence (CTI) How to map to ATT&CK from both finished reporting...

View Article

Cybersecurity : A beginner’s guide to IT and system development, cybersecurity

Because this is a complete guide that will give you every bit of information you were looking for. This book will teach you about zodiac signs and astrology, how astrology and tarot are corelated? How...

View Article

TOR DARKNET: Master the Art of Invisibility

The ULTIMATE Guide on the Art of InvisibilityWant to surf the web anonymously? Cloak yourself in shadow? I will show you how to become a ghost in the machine – leaving no tracks back to your ISP....

View Article


MySQL Fundamentals Part 1 | Pluralsight

Fundamentals of MySQL, an essential part of the LAMP stack. MySQL is a popular choice of database for use in web applications, and is a central component of the widely used LAMP open source web...

View Article


Hands-On Network Scanning with Nmap for Network Security | Packt

Learn how to perform internal network scans to audit and secure your network Understand how to use Nmap to perform network scanning with basic and advanced options Get familiar with host discovery and...

View Article

30-day Windows Security Crash Course

WHY ARE WE DOING THIS? The cybersecurity industry grows and demands talent like no other. But talent should come with an up-to-date skill set. We’re here to save you from learning stuff that neither...

View Article

Cisco SD-WAN Softwares 19.x

Cisco Viptela + CSR1000v SD-WAN Collection 19.x qcow2 and ova. https://nitroflare.com/view/7625CE7F4F142E9/Cisco-SD-WAN-Softwares-19.x.1.4.part01.rar...

View Article

Learning Hadoop | LinkedIn

Hadoop is indispensable when it comes to processing big data—as necessary to understanding your information as servers are to storing it. This course is your introduction to Hadoop; key file systems...

View Article


Linux Interview Questions and Answers with Explanations | Udemy

Learn basic command line Linux usage and commands This course will focus on Linux Interview Questions and their answers along with their explanation. If you go through all the lectures along with the...

View Article

SQL Master Class | Cloud Academy

In this course, we go beyond the basics to empower you with the skills, how-to knowledge, and hands-on expertise to work through and solve complex business issues with SQL. We go deep and hands-on with...

View Article


The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

Few national-security threats are as potent-or as nebulous-as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know...

View Article

Cyber Security in India

This book of ‘directions’ focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur’s Computer Science...

View Article


Data Security in Cloud Computing, Volume I

This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications...

View Article

Applied Incident Response

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident...

View Article

Cyber Security Intelligence and Analytics

This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research...

View Article
Browsing all 6856 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>