Assessing and Enhancing Applications Using Cisco DevNet Techniques

Assessing and Enhancing Applications Using Cisco DevNet Techniques

English | 2h 26m | Video 720p | Subtitles | Project File

So, you've written a few small apps and Python scripts. What comes next? You'll need to evaluate your app's behavior first, which this course covers. Then, we explore adding database support, security features, and continuous integration/deployment.


user Solid     

Ethical Hacking & Penetration Testing


Ethical Hacking & Penetration Testing
https://www.udemy.com/course/ethical-hacking-penetration-testing-i/

Build Ethical Hacking and Penetration Testing skills so you can secure your networks and stop malicious attacks


user Gamystyle     

Splunk Hands-on - The Complete Data Analytics using Splunk

Splunk Hands-on - The Complete Data Analytics using Splunk

English | 54:57:14 | Video 720p | Subtitles

This Splunk training helps to use Splunk in Application Management, Business Analytics and to analyze huge data


user Solid     

Big Data: Parallel Processing by SimpleIT (Updated 5/2019)

Big data: Parallel Processing by SimpleIT

English | 39:13 | Video 720p | Subtitles

'Must-see' to understand BigData & Hadoop! ~~ Easy real world non-technical examples.


user Solid     

Basics of SQL Server from scratch and Database Concepts (Updated 4/2019)

Basics of SQL Server from scratch and Database Concepts

English | 03:42:07 | Video 720p | Subtitles

A Foundation course for learning SQL Server from very beginning with practical examples of SQL and GUI Interfaces.


user Solid     

The Complete AWS SQL Server RDS Bootcamp: Beginner To Expert

The Complete AWS SQL Server RDS Bootcamp: Beginner To Expert

English | 53:11 | Video 720p | Subtitles

Everything you need to know about SQL Server RDS


user Solid     

Udemy - The Complete Cyber Security Bundle Beginner to Advanced
Udemy - The Complete Cyber Security Bundle Beginner to Advanced

Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!


user Gamystyle     

Lynda - Querying Microsoft SQL Server 2019

Querying Microsoft SQL Server 2019

English | 2h 41m | Video 720p | Subtitles

Discover how to query data from SQL Server tables. In this course, Adam Wilbert covers how to retrieve information stored in a Microsoft SQL Server database using the Transact-SQL (T-SQL) language. Learn the fundamental structure of a query and see how to manipulate data through the use of built-in functions, operators, filters, and other language features to return a dataset that's formatted to meet a wide variety of needs and perspectives. Upon wrapping up this course, you'll be equipped with the commands and keywords you need to know to effectively analyze your data.


user Solid     

Linux Troubleshooting Course with Practical Examples (Updated 9/2019)

Linux Troubleshooting Course with Practical Examples (Updated 9/2019)

English | 17:38:02 | Video 720p | Subtitles

Linux Troubleshooting and Administration


user Solid     

Cloud Security with AWS and Microsoft Azure

Cloud Security with AWS and Microsoft Azure

English | 03:07:52 | Video 720p | Subtitles

learn cyber security in modern era of cloud computing

 


user Solid     

Udemy - Web Hacking for Beginners
Udemy - Web Hacking for Beginners

The course will introduce the various methods, tools and techniques used by attackers. You will study web application flaws and their exploitation.


user Gamystyle     

Complete Ethical Hacking & Cyber Security Masterclass Course

Complete Ethical Hacking & Cyber Security Masterclass Course

English | 13:16:27 | Video 720p | Subtitles

In this complete ethical hacking & cyber security master class course you will learn ethical hacking from scratch


user Solid     

Ethical Hacking with Hardware Gadgets

Ethical Hacking with Hardware Gadgets

English | 45:41 | Video 720p | Subtitles

Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming.


user Solid     

Lynda - Exploring Performance and Scale with Data Options in Azure

Exploring Performance and Scale with Data Options in Azure

English | 2h 11m | Video 720p | Subtitles

Relational engines can be a solid choice for working with data, but Microsoft Azure offers many additional options, each with its own unique performance characteristics, features, and capabilities. In this course, Mike Benkovich explores what those options are and how to get the most from your investment. Mike explores storage options, including relational, NoSQL, and document databases, showing the pros and cons of each one. He steps through how to convert a real application that  uses SQL Server to use Cosmos DB and Azure Storage. Plus, he looks at how to leverage storage patterns to make the most out of your investment in the cloud.


user Solid     

SQL Server Tutorial (Updated 10/2019)

SQL Server Tutorial

English | 05:51:10 | Video 720p | Subtitles

Learn SQL and Database Core Concepts !


user Solid     

Lynda - Creating a Security Awareness Program

Creating a Security Awareness Program

English | 1h 1m | Video 720p | Subtitles

By implementing a security awareness program, you can turn people into assets—not fragile targets. A truly robust and mature security program makes educating employees a top priority in a company's overall multilayered approach. In this course, Lauren Zink shows how to develop and implement a successful, ongoing security awareness program that's so much more than just one phishing simulation or an annual required training. True security awareness necessitates year-round, relevant, and tailored training and communications that create an overall cultural shift you can measure. Through this course, discover how to sketch out your program plan, create a budget, leverage creative approaches for keeping your employees engaged, and assess the effectiveness of your program.


user Solid     

SQL for Developers and Analysts with MS SQL Server (Updated 9/2019)

SQL for Developers and Analysts with MS SQL Server

English | 03:41:52 | Video 720p | Subtitles

Guide for beginners to intermediate using real life examples


user Solid     


Postman Crash Course for Beginners - Learn API Testing

Postman Crash Course for Beginners - Learn API Testing

English | 01:14:36 | Video 720p | Subtitles


user Solid     

Ethical Hacker Certification course (Updated 10/2019)

Ethical Hacker Certification course

English | 07:24:25 | Video 720p | Subtitles


user Solid     

Lynda - Data Curation Foundations

Data Curation Foundations

English | 4h 56m | Video 720p | Subtitles

Data curation is quickly evolving as a required skill and job function in data teams and organizations. Creating and sharing data curation files can help you more efficiently and effectively manage the work of teams, and leverage their data for analytics and decision-making. In this course, Monika Wahi demonstrates how to develop curation files to document information about datasets and related business processes. Monika provides an overview of five categories of data curation files: files for back-end curation, different files for front-end curation, survey curation files, flow diagrams, and text-based curation files. She goes over a variety of curation files from each category, providing guidance as to how to develop them using Microsoft Word, Excel, or PowerPoint.


user Solid     

Lynda - Azure for Architects: Design an Authentication and Data Security Strategy

Azure for Architects: Design an Authentication and Data Security Strategy

English | 43m 37s | Video 720p | Subtitles

In order to create secure and reliable solutions in Azure, organizations must have strong identity and security designs. In this course, instructor Sharon Bennett covers the concepts you need to know to effectively design a strategy around user authentication and data security across a system. Sharon covers several key topics, including OAuth 2.0 authentication, managed identities for Azure resources, SQL database encryption, and the Key Vault API. In addition to being vital to anyone charged with architecting a secure Azure environment, the concepts covered in this course can help you prepare for the Microsoft Azure Architect Technologies exam (AZ-300), a required exam for the Azure Solutions Architect Expert certification.


user Solid     

Lynda - Microsoft Cloud Fundamentals: Explore Cloud Services

Microsoft Cloud Fundamentals: Explore Cloud Services

English | 2h 11m | Video 720p | Subtitles

Gain a new or enhanced understanding of cloud principles, service offerings, delivery mechanisms, and security requirements in the context of Microsoft cloud services. This course focuses on fundamental cloud concepts, as well as how to enable, configure, and manage Microsoft cloud services. Instructor Andrew Bettany covers selecting a cloud service plan; signing up for and configuring cloud services; leveraging Microsoft Intune for cloud-based device management; and more. The concepts covered in this course can serve as an introduction to Microsoft 365 and Azure fundamentals and can help IT professionals responsible for administering their company's cloud services approach their work with greater confidence.


user Solid     

Learn Ethical Hacking From Scratch


Learn Ethical Hacking From Scratch
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 12h 40m | 1.91 GB
https://www.packtpub.com/application-development/learn-ethical-hacking-scratch-video

Become an ethical hacker that can hack and secure computer systems


user Gamystyle     


Udemy - Turkce Gorsel Ogrenme Setleri
Videohive Wow Pack Series


rss