Cybersecurity Awareness Training
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 623 MB
Genre: eLearning Video | Duration: 7lectures (40 mins) | Language: English
All the basics you need to know about cybersecurity and the world of hackers and malwares
Securing Containers and Kubernetes Ecosystem
English | 1h 54m | Video 720p | Subtitles
Containers have transformed the way applications are built, deployed, and managed.
Building, Maintaining, and Distributing RPM Packages
English | 1h 18m | Video 720p | Subtitles
Distributing software in Red Hat Enterprise Linux, CentOS, Fedora, and other distros relies on the RPM Package Manager.
Managing User Profiles with DynamoDB in Serverless Web Applications
English | 1h 57m | Video 720p | Subtitles
Interested in learning how to create and develop with NoSQL databases?
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access
English | 1h 23m | Video 720p | Subtitles
Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers.
AWS Certified Database – Specialty (DBS-C01): 4 Monitoring and Troubleshooting
English | 1h 35m | Video 720p | Subtitles
To pass the AWS Certified Database – Specialty (DBS-C01) exam—and succeed in a database-focused role—you need a solid understanding of how to monitor database operations and troubleshoot common problems.
AWS Certified Database – Specialty (DBS-C01): 1 Introduction and Services
English | 2h 18m | Video 720p | Subtitles
Earning the AWS Certified Database – Specialty certification validates your understanding of AWS database services and ability to design and maintain database solutions.
AWS Certified Database – Specialty (DBS-C01): 2 Design and Deployment
English | 2h 7m | Video 720p | Subtitles
All quality databases begin with a thoughtful design. In this installment of the AWS Certified Database – Specialty (DBS-C01) series, learn how to design and deploy AWS database solutions as you study for exam DBS-C01.
AWS Certified Database – Specialty (DBS-C01): 3 Migration and Management
English | 1h 54m | Video 720p | Subtitles
Validate your understanding of how to design and maintain AWS database solutions by earning the AWS Certified Database – Specialty certification.
AWS Certified Solutions Architect - Associate - Step by Step
English | 27h 46m | Video 720p | Subtitles
Become AWS Certified Solutions Architect in 2020. Get Certified as AWS Certified Solutions Architect - Associate
AWS Administration: Migrating Virtual Machines
English | 1h 26m | Video 720p | Subtitles
Understanding how to successfully carry out migration of existing workloads is a crucial step for cloud admins.
Cyber Security Awareness
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.49 GB
Genre: eLearning Video | Duration: 18 lectures (1 hour, 9 mins) | Language: English
How to prevent a cyberattack, how to detect a cyberattack and how to react to a cyberattack
Getting Started with SQL Server Maintenance
English | 2h 57m | Video 720p | Subtitles | Project File
This course is for new or accidental DBAs, and is designed to help you learn the basics of essential SQL Server Maintenance items. Items such as backups, index rebuilds, and performance reviews are covered, with some relevant demos.
Google Cloud Platform Big Data and Machine Learning Fundamentals
English | 4h 55m | Video 720p | Subtitles | Project File
Mitigating Security Vulnerabilities on Google Cloud Platform
English | 55m | Video 720p | Subtitles | Project File
Configuring and Managing Kubernetes Security
English | 2h 13m | Video 720p | Subtitles | Project File
This course will teach you the fundamentals needed to configure and manage security in Kubernetes clusters.
English | 1h 31m | Video 720p | Subtitles | Project File
Setting Up a Malware Analysis Lab
English | 1h 25m | Video 720p | Project File
In this course, you’ll learn how to set up a malware analysis sandbox for discovering indicators of compromise specific to the variants of malware threatening your organization.