CompTIA Security+ (SY0-601) Cert Prep: 10 Governance, Risk, and Compliance
Prepare for the Governance, Risk, and Compliance domain of the CompTIA Security+ (SYO-601) Cert Prep test. Instructor Mike Chapple explains how to lay the groundwork for a strong cybersecurity program, manage risk, and comply with legal and regulatory obli ...
Reinforcement Learning Foundations
Innovations in finance, health, robotics, and a variety of other sectors have been made possible with reinforcement learning (RL), which involves the training of machines to learn from their environment. Many top tech companies are investing heavily in thi ...
Supervised Learning Essential Training
Data scientists and ML/AI students may need some practical experience with supervised learning algorithms. In this course, instructor Ayodele Odubela teaches you to apply models you’ve created to new data and to assess model performance. First, Ayodele out ...
AWS: Controlling Cost
Learn how to use Amazon Web Services (AWS) tools and best practices to understand, forecast, and control service costs. This course covers core AWS tools, such as CloudWatch billing alarms, consolidated billing with AWS Organizations, and the AWS billing d ...
IT Service Management Foundations: Tools
You understand ITSM and ITIL, but how do you make it standard operating procedure at your company? Instructor Jim Kerrigan teaches you about the top ITSM tools available and what to keep in mind when choosing and implementing them. First, Jim goes over whi ...
Help Yourself: Tech Tips
For basic IT issues, most users prefer to help themselves. If you are interested in troubleshooting your own computer issues, this series is the answer. The tips are equally useful to end users, small businesses that perform their own IT, and enterprise IT ...
CSSLP Cert Prep: 7 Software Deployment, Operations, and Maintenance
The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification from (ISC)2. In this course, part seven in an eight-part series, instructor Jerod Brennen provides insights and context around the seventh domain of the CSS ...
Data for Good: Using Data Science in Nonprofits and NGOs
The revolution in data science has transformed, for better or worse, the way companies do business in the last few decades. But data science isn't just for capitalists. AI is one of the most important forces for change developed in the last century, and we ...
Red Hat Certified System Administrator (EX200) Cert Prep: 2 File Access, Storage, and Security
Red Hat Enterprise Linux is one of the top enterprise Linux distributions, and the Red Hat Certified System Administrator (RHCSA) cert is highly sought after. This course helps you prepare for the second half of the RHCSA exam. First, instructor Grant McWi ...
SharePoint Online Essential Training: Beyond the Basics
Interested in taking your SharePoint Online skills to the next level? If so, then this course is for you. Here, instructor Gini von Courter breezes past basic concepts, focusing instead on techniques that can help power users and site owners leverage the i ...
Excel Tips Weekly
This tips-based course will show Excel users productivity-boosting tricks, cool hidden features, need-to-know functions, and advanced content on subjects such as using PivotTables for data analysis. Tune in every Tuesday for a new tip from expert Dennis Ta ...
Linux Tips Weekly
Linux is the operating system of choice for enterprises that need a stable, agile, and open-source platform, and it's only getting more popular. Qualified system administrators are in demand. If you've been anticipating a transition to Linux for your compa ...
Database Foundations: Database Management
In the realm of relational databases, the table is the main event, the showstopper, the lead singer, the king. However, there are several other components of databases that are just as vital to a fully functioning system. In this course—the third part of h ...
Data Science Foundations: Data Mining in R
Data science continues to grow in sophistication and demand at an exponential rate. Data mining is the area of data science that focuses on finding actionable patterns in large and diverse datasets: clusters of similar customers, trends over time that can ...
Azure for Architects: Design for Identity and Security
Learn how to secure your cloud environment by successfully incorporating identity management into your Azure strategy. In this course, instructor Gary Grudzinskas covers key considerations for Azure architects related to identity management, authentication ...
CCSK Cert Prep: 2 Infrastructure Security for Cloud
Cloud-based services should be secured with common practices such as hardening, disaster recovery planning, periodic security testing, and the use of encryption. Instructor Daniel Lachance goes over software-defined networking (SDN), cloud network infrastr ...
AWS Machine Learning: Building an Expense Tracker Using Amazon Textract
If you’ve ever used an optical character recognition (OCR) program, you know that scanning documents for text can often be hit or miss. If you’re a developer working on an app that's dependent on accurate text scanning, say for an expense report, hit or mi ...
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client ...
Google Cloud Platform for Enterprise Essential Training
Is Google Cloud Platform (GCP) the right choice for your enterprise application? GCP now has the enterprise-level features large organizations demand: IAM security, custom encryption, NoSQL database support, and cloud-native continuous integration and depl ...
Power BI Mistakes to Avoid
As a data expert using Microsoft Power BI, your goal is to always be growing your skills. In this course, instructor John David Ariansen helps grow your skills by learning mistakes to avoid. First, John introduces you to a few challenges of Power BI. He sh ...
Data Engineering Foundations
Data science can be generally defined as the process of making data useful, and data engineering is a key part of how and why. If you think of data science like a race car, the data engineers are the pit crew. They’re not driving the car, but they make the ...
Microsoft 365 Security Administration (MS-500) Cert Prep: 4 Manage Governance and Compliance Features in Microsoft 365
Cybersecurity skills are in high demand, and the Microsoft 365 Security Administration (MS-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. In this course, instructor and Microsoft MVP P ...
Data Visualization: A Lesson and Listen Series
Follow along with expert Bill Shander in this series exploring key themes in data visualization, data storytelling, and information design. Each episode is broken into two segments: a short lesson and a listening session where Bill interviews data storytel ...
Oracle Database 19c: Advanced SQL
Mastering SQL is an essential skill for any Oracle Database professional. If you feel like you’ve got a firm handle on the basics and want to take your skills up a notch, this course is for you. Join Oracle Database administrator Bob Bryla as he covers the ...
Using Tableau to Discover Powerful Business Insights
Tableau is a powerful data visualization tool, with many uses in business. In this course, data analytics expert John David Ariansen shows you how to use Tableau effectively for uncovering powerful data insights. John David defines what data visualization ...
Learning Azure DevOps
Azure DevOps is a bundle of services to help developers ship high-quality products faster. In this course, instructor Walt Ritscher teaches you everything you need to get up and running using this DevOps solution. Walt gives you an overview of the Azure De ...
Threat Modeling: Denial of Service and Elevation of Privilege
In this installment of Adam Shostack’s Threat Modeling series covering the STRIDE threat modeling framework, Adam goes over the D and E parts of the framework: denial of service and elevation of privilege. For both threats, Adam digs deep into two main que ...
Introduction to Linux
With so many technical terms, cultural quirks, and options to pursue, getting started with Linux can seem overwhelming. In this course, instructor Scott Simpson covers the fundamentals of what you need to know in order to make smart choices about learning ...
Azure Administration: Implement and Manage Storage
Learn how to manage Azure storage, including Blob storage and file shares. This demo-heavy course is for any administrator who wants to be able to configure and secure cloud-based storage options with Azure, and those who want to prepare for the coveted Mi ...
Networking Foundations: Servers
Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimate ...
Ethical Hacking: Footprinting and Reconnaissance
If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinti ...
CISSP Cert Prep (2021): 4 Communication and Network Security
The Certified Information System Security Professional (CISSP) certification is an important component of any security professional's resume, and is a requirement for many top jobs. In this course, prepare for the fourth domain of the exam: Communication a ...
CSSLP Cert Prep: 1 Secure Software Concepts
The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification from (ISC)², the organization that has certified well over 100,000 information security professionals. As a CSSLP holder, you can demonstrate to current or ...
CSSLP Cert Prep: 2 Secure Software Requirements
Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series, instructor Jerod Brennen dives into the subject of security requirements to prepar ...
Microsoft 365 Security Administration (MS-500) Cert Prep: 2 Implement and Manage Information Protection
Cloud computing is playing an increasingly important role in how both organizations and individuals work. Consequently, it's essential to know how to keep data safe when working with this essential technology. In this course, Microsoft Certified Trainer Ug ...
CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Certified Information Systems Security Professional (CISSP) is the gold standard in IT security certification. Prepare for domain three of the examâSecurity Architecture and Engineeringâin this installment of CISSP Cert Prep. Security engineering ensur ...
CSSLP Cert Prep: 8 Supply Chain and Software Acquisition
The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification from (ISC)2, the organization that has certified well over 100,000 information security professionals. As a CSSLP holder, you can demonstrate to current and ...
Cert Prep: Red Hat Certified System Engineer (EX300)
Red Hat Enterprise Linux is one of the top enterprise Linux distributions—and Red Hat Certified System Engineer is one of the top Linux certifications. The RHCE certification is required for many high-level jobs and a prerequisite for all Red Hat higher-le ...
Cisco CCNP SCOR Security (350-701): 1 Security Concepts and Network Security
The newest Cisco certification tracks each have one exam that serves as the core exam for that track’s CCNP certification, and that same exam also serves as the written exam for that track’s CCIE certification. For the Security track, that exam is Implemen ...
Cisco CCNP SCOR Security (350-701): 2 Cloud and Content Security
In this second part of the three-part series covering the Cisco CCNP SCOR Security (350-701) exam, instructor Charles Judd covers the third and fourth domains of the exam: Cloud Security and Content Security. Whether you’re an IT professional pursuing the ...
Cisco CCNP SCOR Security (350-701): 3 Endpoint Protection and Secure Access
In the final installment of the three-part series covering the Cisco CCNP SCOR Security (350-701) exam, instructor Charles Judd details the fifth and sixth domains of the exam: Endpoint Protection and Secure Access. Charles delves into topics like multifac ...
Database Foundations: Administration
Ongoing, regular administration is critical to the security and performance of databases such as SQL Server. In this course—the fourth installment in the Database Foundations series—explore vital techniques and best practices for administering a database. ...
Networking Foundations: IP Addressing
The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the ...
CISSP Cert Prep (2021): 5 Identity and Access Management
Are you getting ready for the Certified Information Systems Security Professional (CISSP) exam, or perhaps an experienced information security professional who wants to learn more about identity and access management? In this course, instructor Mike Chappl ...
Computer Literacy for Windows 10
Get up to speed quickly with your Windows computer. Instructor Garrick Chow provides a thorough, jargon-free introduction to computers, files and folders, networks, and peripherals like external storage drives and Bluetooth devices. Garrick also covers bas ...
Microsoft Power Automate: Business Process Flows
Business process flows are a great way to boost efficiency and save time for your organization. Learning how to create automated and directed flows results in more uniform and efficient workflows throughout the organization for both in-office and remote wo ...
Learning Network Troubleshooting
Troubleshooting network issues is a key skill for a wide range of IT professionals and network professionals. In this course, instructor Robert McMillen teaches you the skills and tools that you need to start network troubleshooting. Robert begins with an ...
Ethical Hacking: Scanning Networks
After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infras ...
Apache Kafka Essential Training: Getting Started
One of the key components of a big data processing pipeline is a scalable and distributed message queue. Message queues enable real-time streaming capabilities with multiple producers and consumers of data. This enables real-time applications that can anal ...
AutoCAD Map 3D 2022 Essential Training
AutoCAD Map 3D enriches your map data, making it more visual and intelligent. With AutoCAD 2022, the Map 3D toolset ships free, bringing an intelligent geographic information system (GIS) to every AutoCAD drawing. Join GIS consultant and trainer Gordon Luc ...
Learning Go
What is Go? Go is a next-generation, open-source programming language created by Google for building systems, web, and other applications. This course is designed to help developers get started with Go, covering its core language elements and syntax. David ...
Power BI Data Visualization and Dashboard Tips, Tricks, & Techniques
Power BI is a software that lets users visualize and report data flexibly and share it in a number of ways. It is rapidly gaining market share, as it is affordable and well-integrated with other Microsoft tools. In this course, instructor Emma Saunders sho ...
SAP Financials Essential Training
In this course, instructor Justin Valley dives into the financial accounting module of SAP FI ERP. Justin covers the general ledger, accounts receivable, accounts payable and asset accounting submodules. After going over the general ledger and SAP FI inte ...
Statistics Foundations: Probability
Not sure if you need statistics? Think again! Statistics help with making decisions, new discoveries, investments, and predictions. For subjects ranging from political races to healthcare advancements, statistics can improve your understanding of your favo ...
Data Science Methodologies: Making Business Sense
There is an increasing recognition that data science needs to go beyond small-scale experimentation to a large-scale implementation. In this course, Neelam Dwivedi brings software engineering and data mining methodologies to data scientists, then applies t ...
CISA Cert Prep: 1 Auditing Information Systems for IS Auditors
Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares you to tackle this exam by going into each of the topics it covers, helping you acquire the skills you need to confid ...
AWS Well-Architected Framework: Performance Efficiency Pillar
The AWS Well-Architected Framework includes strategies to help enterprise architects compare workloads against AWS-identified best practices. It is designed to help architects build secure, high-performing, resilient, and efficient infrastructure for their ...
Protecting Your Network with Open Source Software
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate net ...
Using SABSA to Architect Cloud Security
The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be properly architected. In this course, instructor Malcolm S ...
OSINT Essential Training
If you’ve ever engaged in any sort of internet sleuthing—doing research on a company before an interview, looking up someone on social media before you meet them—then you’ve already engaged in some open-source intelligence, or OSINT. OSINT is, essentially, ...
Everyday Statistics, with Eddie Davila
Statistics help us make sense of the world around us. These numbers help everyone from political pollsters to fantasy football aficionados make informed calls based on the mountains of data at their disposal. In this weekly series, learn how to decode the ...
Cisco CCNP Collaboration 350-801 (CLCOR) Cert Prep: 1 Cisco Collaboration Technologies
Are you getting ready for the Cisco CCNP Collaboration or the Cisco CCIE Collaboration certification? In this course, instructor Kevin Wallace covers everything you need to know to design a unified communications network and to pass your CCNP Collaboration ...
CISA Cert Prep: 2 Information Technology Governance and Management for IS Auditors
Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares you to tackle this exam and acquire the skills you need to confidently manage IT security audits. This course—the sec ...
CISSP Cert Prep (2021): 7 Security Operations
Are you preparing to take the Certified Information Systems Security Professional (CISSP) exam, or maybe an information security professional who wants to learn more about security operations? In this course, instructor Mike Chapple provides you with the d ...
CISSP Cert Prep (2021): 8 Software Development Security
Are you preparing to take the Certified Information Systems Security Professional (CISSP) exam, or are you a cybersecurity professional pursuing a better understanding of secure coding practices? In this course, instructor Mike Chapple provides you with th ...
CISSP Cert Prep (2021): 6 Security Assessment and Testing
Are you getting ready for the Certified Information Systems Security Professional (CISSP) exam, or are you perhaps an experienced information security professional who wants to learn more about security assessment and testing? In this course, instructor Mi ...
Planning a Microsoft Cloud Solution
If you're planning on moving your organization to the cloud, Azureâthe popular cloud services platform from Microsoftâis worth a look. In this course, Sharon Bennett provides a thorough introduction to cloud computing, focusing on the various Azure tec ...
Learning Power BI Desktop
Power BI Desktop—the powerful data analysis and visualization software from Microsoft—can help you get more insights from your data, whether that data is stored on your computer or in the cloud. In this course, discover how to leverage this easy-to-use too ...
Learning Claris Connect
In the digital transformation era, software integration is one of the biggest unsolved challenges. Claris Connect is the solution: a cloud-based integration platform that allows you to automate tasks and create highly efficient, streamlined workflows. Busi ...
Microsoft 365: Design and Implement Services
Microsoft 365 comprises apps like Word, Excel, and PowerPoint, as well as powerful cloud services, device management, and advanced security. The MS-100 Microsoft Identity and Services exam helps enterprise administrators prove their M365 expertise. In this ...
Learning Google Cloud Storage
Google Cloud remains in the top three cloud platforms, and storage remains a high priority for individuals and businesses. In this course, instructor Mark Johnson covers the fundamentals of storage on the Google Cloud platform (GCP). Mark begins with an ov ...
Cisco CCNP Collaboration 350-801 (CLCOR) Cert Prep: 2 Cisco Unified Communications Manager and Gateways
Are you getting ready for the Cisco CCNP Collaboration or the Cisco CCIE Collaboration certification? In this course, instructor Kevin Wallace covers everything you need to know to set up Voice over IP (VoIP) gateways and to pass your CCNP Collaboration ce ...
Cisco CCNP Collaboration 350-801 (CLCOR) Cert Prep: 3 CUCM Call Control, Quality of Service, and Collaboration Applications
Are you getting ready for the Cisco CCNP Collaboration or the Cisco CCIE Collaboration certification? In this course, instructor Kevin Wallace covers everything you need to know about Cisco Unified Communications Manager (CUCM) call control, quality of ser ...
S/4 Finance: Fiori Accounts Receivable Analytics
Are you an Accounts receivable manager or supervisor? If so, then you know how important it is to understand how your accounts receivable process is performing. This course from Michael Management shows you new Fiori Accounts Receivable analytics capabilit ...
Learning Data Analytics: 1 Foundations
Are you interested in pursuing a career in data analytics? In this course, instructor Robin Hunt brings you into the mind of an analyst. She defines and explains foundational concepts, such as how to think about data, how to work with others in different r ...
S/4 Finance: Fiori Accounts Payable Analytics
Are you an accounts receivable manager or supervisor? If so, then you know how important it is to understand how your accounts receivable process is performing. This course from Michael Management shows you how to use Fiori Accounts Payable analytical apps ...
Linux: Overview and Installation
Linux is a term that we are hearing more often lately, but what is it? In this course, instructor Grant McWilliams explains what Linux is and how it differs from other operating systems, then walks through how to install it to a virtual machine and use it. ...
Ethical Hacking: Vulnerability Analysis
In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid gra ...
Planning Basics in SAP
Planning and logistics are essential functions within every organization. This course from Michael Management gives you a high-level overview of the logistical planning functions in SAP.
The course explains the basics of forecasts and demand planning, then ...
Learning Google Cloud Security
If you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and manage data and assets in the cloud, join Dominique West in this course as she teaches the basics of properly securing your Google Cloud envi ...
Azure Logic Apps
Logic Apps simplify app integration, data integration, system integration, enterprise application integration (EAI), and business-to-business (B2B) communication, whether in the cloud, on premises, or both. In this course, instructor Vishwas Lele introduce ...
SAP SuccessFactors Performance and Goals Management
If you are an HR professional or an IT professional supporting HR, you know how important it is to measure how well employees do their job and meet their own and the company’s goals. This course from Michael Management shows you how the SuccessFactors solu ...
Apache Kafka Essential Training: Building Scalable Applications
Scalable and distributed message queuing plays an important role in building real time big data pipelines. Asynchronous publisher/subscriber models are required to handle unpredictable loads in these pipelines. Apache Kafka is the leading technology today ...
CSSLP Cert Prep: The Basics
The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification from (ISC)2, the organization that has certified well over 100,000 information security professionals. As a CSSLP holder, you can demonstrate to current and ...
Microsoft Dynamics 365 Sales Essential Training
Microsoft Dynamics 365 allows users to easily manage large amounts of data and create streamlined workflows for sales. It can also help automate sales activities and generate insights from the data reps store in Dynamics and Outlook. In this course, Dian T ...
Advanced Power BI Custom Visuals with d3.js
Power BI is rapidly becoming one of the most popular reporting and visualization tools and is a great way for non-technical users to build their own reports and data visualizations. However, Power BI comes with a rather limited set of standard visuals, and ...
Cisco Certified CyberOps Associate Cert Prep: 1 Security Concepts
In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today’s threats and threat ac ...
Salesforce Essential Training
If you work in sales or are looking for a job in sales, chances are you need to know Salesforce, one of the world’s top customer relationship management (CRM) tools. In this course, Jamie Grettum focuses on how to use Salesforce in a sales environment. Jam ...
Cloud Management with Microsoft Endpoint Manager
Microsoft Endpoint Manager offers a unified management system that combines functions of Microsoft Intune and Configuration Manager to allow admins to secure, deploy, and manage users, apps, and devices. In this course, instructor Robert McMillen explains ...
SAP Business One: Production and Logistics
If you’re running any sort of manufacturing, distribution, or retail operation, keeping track of what goes in and out the door is vital to your business. In this course, instructor Steven Lipton dives into the production and logistics module of SAP Busines ...
Measuring Business Performance
All companies are looking for that perfect metric, the one data point that will tell them everything they need to be successful. Measuring errors abound, but developing better metrics can be difficult. In this course, ASU instructor Eddie Davila walks you ...
Data Prediction with Amazon Forecast
Machine learning is growing exponentially, and in Amazon Forecast you have a great machine learning tool for performing predictive analysis. In this course, instructor Carlos Rivas takes you through data preparation and ingestion, selecting prediction trai ...
Microsoft Azure: Networking Concepts
A majority of Fortune 500 companies rely on Microsoft Azure for scalable, dependable cloud services. But it's not enough to create and host resources; you also need to be able to connect to and publish those resources on the web. That's where Azure network ...
CISA Cert Prep: 3 Information Technology Life Cycle for IS Auditors
Prepare to become a Certified Information Systems Auditor (CISA). The CISA Cert Prep series tackles the exam one domain at a time, helping you acquire all the skills you need to confidently manage IT security audits. CISA Cert Prep: 3 teaches the IT life c ...
Ethical Hacking: Enumeration
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting sy ...
CISSP Cert Prep (2021): The Basics
Are you getting ready to take the Certified Information Systems Security Professional (CISSP) exam? In this course, instructor Mike Chapple gives you the detailed information you need to start your preparations for the 2021 CISSP exam. Mike discusses caree ...
Microsoft 365: Manage User Identity and Roles
Identity management is a key element of Microsoft 365 enterprise administration. A successful Microsoft 365 administrator will need to know how to plan, implement, and manage user identities and roles with Azure Active Directory (AD) features such as AD Co ...
Building an Enterprise API for Advanced Azure Developers
Learn how to use Azure API Management and build secure and scalable enterprise-level APIs that can be discovered and consumed internally or by third-party applications. In this course for advanced Azure developers, instructor Nertil Poci reveals what Azure ...
Introduction to NFTs: Non-fungible Tokens
NFTs (non-fungible tokens) enable people to sell digital items like music, art, photos, and more. Creators are interested in NFTs as a way to protect and monetize their original work—and collectors are buying. The NFT model will have a dramatic effect on h ...
Learning Virtualization
Virtualization is a vastly important topic to IT managers, as it allows one computer to run multiple operating systems, leading to a more efficient use of hardware resources.
In this course, Martin Guidry looks at the crucial concepts behind today's virtua ...
Microsoft Azure: Security Concepts
The professionals in charge of Azure administration need to know how to secure services correctly to protect the data flowing between client computers and the cloud. This course investigates security concepts related to Azure deployment and services such a ...
Security Tips: Protecting Sensitive Information
While we often think of our communications channels as secure, it never hurts to add an extra layer of protection when working with sensitive information. Whether it’s personal documents, trade secrets, or any other kind of information that could be misuse ...
Microsoft Power Apps: Using the Dataverse (Formerly the Common Data Service)
The Microsoft Dataverse is a customizable universe of table and column definitions developed by Microsoft as part of an open data initiative with Adobe and SAP, aimed at creating a collection of standard business entities. Formerly called the Common Data S ...
Predictive Analytics Essential Training: Estimating and Ensuring ROI
Nothing is more important to the future of predictive analytics teams than proving their projects have long-term value. Measuring the return on investment (ROI) often can help turn analytics into a visible profit center for your organization. Estimating RO ...
Learning Cloud Computing: Core Concepts
Migrating to the cloud? Get an overview of cloud computing and the key concepts that you should consider. You can choose from public, private, community, and hybrid clouds and leverage emerging deployment models, such as multicloud. When you use cloud comp ...
Ethical Hacking: Sniffers
Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network ...
AWS: High Availability
Building out a resilient application takes knowledge, effort, and the right toolset. Businesses increasingly turn to cloud-based platforms like Amazon Web Services for access to modern, scalable solutions, including compute, database, and storage options. ...
Learning MapGuide Open Source
MapGuide Open Source is a free, web-based platform for creating and publishing web-mapping applications and geospatial web services. In this course, Gordon Luckett shows how to get up and running with MapGuide and create your own maps. Gordon explains how ...
Cloud Native Projects: AWS Serverless
Developers need to understand how to use serverless functions in cloud environments. In this course, instructor Frank P Moley III explains how to use AWS Lambda as a serverless framework and why developers should understand how to use this tool. Frank intr ...
VMware vSphere 7 Professional: 01 Networking
VMware vSphere is everywhere. In order to stay relevant, you must understand vSphere. Perhaps you’re also preparing to take the VMware Certified Professional Datacenter Virtualization (VCP-DCV) exam. In this series of courses, Rick Crisci, a VMware Certifi ...
Learning Minitab
Dr. Richard Chua shows how to import and organize data; open, save, and share Minitab worksheets and projects; create graphs and charts; and use descriptive statistics and statistical tests in Minitab to make inferences and data-driven decisions. Then lear ...
Advanced SQL for Data Scientists
Many data scientists know how to work with SQL—the industry-standard language for data analysis. But as data sizes grow, you need to know how to do more than simply read and write from a database. This course provides a more sophisticated approach to desig ...