Microsoft Server 2012 R2 - Intermediate Hands-on Training

Microsoft Server 2012 R2 - Intermediate Hands-on Training (Updated 10/2021)

https://www.udemy.com/course/windows-server-2012r2-hands-on-training-part-ii

 

Intermediate Hands-on Training for the Installation and Configuration of Microsoft Windows Server 2012 R2


user Solid     

Microsoft SQL Server Development for Everyone

Microsoft SQL Server Development for Everyone (Updated 8/2021)

https://www.udemy.com/course/microsoft-sql-server-2017-for-everyone

 

Learn the fundamentals of database design, development and querying using the latest Microsoft SQL Server


user Solid     

Digital Forensics for Pentesters - Hands-on

Digital Forensics for Pentesters - Hands-on (Updated 1/2022)

https://www.udemy.com/course/digital-forensics-for-pentesters-hands-on-learning

 

Learn Digital forensic as it applies to pentesting and conducting a digital forensic investigative response.


user Solid     

Windows Server 2022: Installation and Configuration


Windows Server 2022: Installation and Configuration

https://www.linkedin.com/learning/windows-server-2022-installation-and-configuration
Do you need to learn how to plan and execute a server installation? Planning how you need your server to work can be even more important than the installation process itself. In this course, instructor Ed Liberman demonstrates the importance of planning the big-picture use of a new server and using that plan to install and configure a new Windows 2022 server that will accomplish specific goals. Ed goes over planning and preparing to install Windows Server 2022, then steps you through installing with either the full Desktop Experience or with just the Server Core. Once installation is complete, he shows you how to configure Windows Server and how to create and configure a variety of storage partitions. Ed covers extending and shrinking a volume, as well as converting from basic to dynamic disks. Ed demonstrates installing roles and features, configuring a role, and installing roles on a Server Core. Then he finishes up with a discussion on how to manage features on demand.


user Gamystyle     

Ethical Hacking for Beginners

Ethical Hacking for Beginners (Updated 10/2021)

https://www.udemy.com/course/practical-ethical-hacking-for-beginners

 

Learn practical skills for ethical hacking & penetration testing with this comprehensive course, no experience necessary


user Solid     

Learn Ethical Hacking and Pentesting - Hands-on

Learn Ethical Hacking and Pentesting - Hands-on (Updated 1/2022)

https://www.udemy.com/course/hacking-made-easy-with-hands-on-training

 

An Introduction to the Hacking Techniques of Hackers, Ethical Hackers, Pentesters and Cyber Security Professionals


user Solid     

Intermediate Ethical Hacking - Hands-on Training

Intermediate Ethical Hacking - Hands-on Training (Updated 1/2022)

https://www.udemy.com/course/ethical-hacking-hands-on-training-part-ii

 

Intermediate Ethical Hacking Hands-on Training, for learing intermediate and advance hacking techniques


user Solid     

Ethical Hacking: Malware Threats


Ethical Hacking: Malware Threats

https://www.pluralsight.com/courses/malware-threats-ethical-hacking-ceh-cert
Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 concerning malware.


user Gamystyle     

How to Migrate MySQL Database to Microsoft SQL Server

How to Migrate MySQL Database to Microsoft SQL Server

https://www.udemy.com/course/how-to-migrate-mysql-database-to-microsoft-sql-server

 

MySQL to SQL Server Migration  step by step


user Solid     

Learn Fundamentals of Networking & Network Troubleshooting

Learn Fundamentals of Networking & Network Troubleshooting

https://www.udemy.com/course/learn-the-fundamentals-of-networking-joshua_israel

 

Learn to Practically connect a LAN, Troubleshoot a network, Networking Commands & the Fundamentals of networking.


user Solid     

Microsoft SQL Database Server Functions

Microsoft SQL Database Server Functions

https://www.udemy.com/course/microsoft-sql-database-server-functions/

 

Learn how to execute built-in functions on SQL databases.


user Solid     

Wireshark Essential Training

Wireshark Essential Training

https://www.linkedin.com/learning/wireshark-essential-training

 

Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark. 


user Solid     

CRISC Cert Prep: 1 Governance

CRISC Cert Prep: 1 Governance

https://www.linkedin.com/learning/crisc-cert-prep-1-it-risk-identification

 

The Certified in Risk and Information Control (CRISC) certification is an established, well-recognized credential from ISACA, the organization that has issued over 200,000 certifications to cybersecurity professionals in 188 countries. A CRISC certification shows employers that you understand how to identify and manage IT risk in an enterprise and that you’re capable of implementing and maintaining the controls necessary to address risks.


user Solid     

OpenVPN in Linux

OpenVPN in Linux Online Class

https://www.linkedin.com/learning/openvpn-in-linux

 

In this course from ITProTV, instructors Daniel Lowrie and Justin Dennison take you through the process of setting up an Ubuntu-based OpenVPN server in AWS and an Ubuntu client, from start to finish. 


user Solid     

Mastering Azure Virtual Desktop (WVD - Advanced Training)

Mastering Azure Virtual Desktop (WVD - Advanced Training) (Updated 1/2022)

https://www.udemy.com/course/mastering-azure-virtual-desktop-avd-advanced-training

 

Deliver a full AVD remote working solution including designing, scoping, planning, optimizing, sizing, and costing, more


user Solid     

LEARN Docker Swarm- A Docker container Orchestration ASAP

LEARN Docker Swarm- A Docker container Orchestration ASAP (Updated 11/2021)

https://www.udemy.com/course/learn-docker-swarm

 

A practical oriented guide for Devops people with DCA sample que. Learn how to create and use Docker Swarm in right way


user Solid     

Building RESTful APIs

Building RESTful APIs (Updated 1/2022)

https://www.udemy.com/course/building-restful-apis

 

Learn How to Build Useful APIs


user Solid     

A complete guide to Domain and Web Hosting development

A complete guide to Domain and Web Hosting development (Updated 12/2021)

https://www.udemy.com/course/a-complete-guide-to-domain-and-web-hosting-development

 

Complete Domain and Hosting Masterclass for anybody who wants to completely understand what domain web hosting is.


user Solid     

SSCP Cert Prep: 5 Cryptography

SSCP Cert Prep: 5 Cryptography

https://www.linkedin.com/learning/sscp-cert-prep-5-cryptography-14489357

 

The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain.


user Solid     

 

Choosing a Cloud Platform for Developers: AWS, Azure, and GCP

Choosing a Cloud Platform for Developers: AWS, Azure, and GCP (Updated: January 12, 2022)

https://www.linkedin.com/learning/choosing-a-cloud-platform-for-developers-aws-azure-and-gcp

 

Migrating your applications to the cloud? Review the benefits and challenges of developing in the cloud with the top three cloud service providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).


user Solid     

Ethical Hacking: Mobile Devices and Platforms

Ethical Hacking: Mobile Devices and Platforms (Updated: January 12, 2022)

https://www.linkedin.com/learning/ethical-hacking-mobile-devices-and-platforms

 

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. 


user Solid     

Hands-on with Windows Virtual Desktop (WVD)

Hands-on with Windows Virtual Desktop (WVD)

https://www.linkedin.com/learning/hands-on-with-windows-virtual-desktop-wvd

 

Windows Virtual Desktop is a desktop and app virtualization service in Azure that lets you do everything from deliver a few remote apps to deploying a full-blown Windows 10 desktop to any platform, including macOS or Android devices. 


user Solid     

Microsoft 365 Fundamentals (MS-900): 4 Describe MS365 Pricing and Support

Microsoft 365 Fundamentals (MS-900): 4 Describe MS365 Pricing and Support

https://www.linkedin.com/learning/microsoft-365-fundamentals-ms-900-4-describe-ms365-pricing-and-support

 

This course continues a series on preparing for the Microsoft 365 Fundamentals (MS-900) exam, a useful certification to have if you are in a technology, IT help desk, or software support role. 


user Solid     

Ethical Hacking: Understanding Ethical Hacking [Updated Nov 29, 2021]


Ethical Hacking: Understanding Ethical Hacking [Updated Nov 29, 2021]

https://www.pluralsight.com/courses/understanding-ethical-hacking-ceh-cert

A Certified Ethical Hacker is a security professional who understands how to look for weaknesses in target systems and uses the same knowledge and tools as a malicious hacker. This course will teach you the foundations of this knowledge needed for the CEH 312-50 exam.


user Gamystyle     


Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss