Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (70)
  • HU Berlin
  • München BSB
  • München UB
  • MARKK
  • English  (70)
  • 2020-2024  (70)
  • 1995-1999
  • 1990-1994
  • 1935-1939
  • 2024  (66)
  • 2023  (4)
  • 1996
  • ACI Learning 〈Firm〉,  (70)
  • Films de formation  (70)
  • Computational intelligence.
  • Monografische Reihe
Datasource
  • MPI Ethno. Forsch.  (70)
  • HU Berlin
  • München BSB
  • München UB
  • MARKK
Material
Language
  • English  (70)
Years
  • 2020-2024  (70)
  • 1995-1999
  • 1990-1994
  • 1935-1939
Year
  • 2024  (66)
  • 2023  (4)
  • 1996
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835883600 , 1835883605
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Computer science ; Systèmes d'exploitation (Ordinateurs) ; Informatique ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Linux, offering insights into its importance and widespread use in today's tech-driven world. You'll learn why Linux is the backbone of many servers, devices, and systems, and how its open-source nature fosters innovation and customization. The course focuses on choosing a Linux distribution, guiding you through the myriad of options available and helping you select the one that best fits your needs. This segment is crucial for understanding the diversity within the Linux ecosystem and how it caters to different user preferences and requirements. Next, we delve into choosing a desktop environment, emphasizing the significance of the user interface in your day-to-day interaction with Linux. You'll explore popular desktop environments, their features, and how to select one that aligns with your usability and aesthetic preferences. The course wraps up with a detailed walkthrough on installing software on Linux, covering various package managers and installation methods. This section is designed to equip you with the skills to extend the functionality of your Linux system and customize it to your liking.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835883525 , 1835883524
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by introducing you to the basics of terminals and shells, laying a solid foundation for command line proficiency. It methodically progresses through executing commands, offering three parts to ensure a thorough grasp of command functionalities and nuances. The course focuses on enhancing your Linux skills further with detailed explanations on filesystem management, permissions, and file editing with Vi, ensuring you can navigate and manipulate the Linux environment with ease. It covers essential topics such as finding files, managing processes, and executing scripts, providing you with the tools needed to optimize and automate your Linux tasks. The course wraps up by delving into advanced programming constructs, presented in two comprehensive parts to solidify your scripting and automation capabilities. Each section is designed to build on the previous, ensuring a seamless learning curve from beginner to advanced techniques. By the end of this course, you will have learned the art of leveraging Linux for powerful, efficient computing, making you an invaluable asset in tech-driven environments.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836203919 , 1836203918
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Windows PowerShell (Computer program language) ; Computer software Development ; Windows PowerShell (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A meticulously crafted video course aimed at professionals seeking to leverage the power of automation through PowerShell. This course, divided into three main sections, begins by laying the foundation with PowerShell basics, including setup, execution policies, command usage, and leveraging the Visual Studio Code environment. Progressing through the course, you'll delve into scripting basics, learning about arrays, hash tables, operators, and control structures like "if," "switch," and looping statements to manipulate and process data dynamically. The final section is dedicated to practical scripting, where real-world scenarios are addressed, such as prompting for user input, archiving files by date, and comparing hash values for security checks. Through engaging video content, this course not only strengthens your understanding of PowerShell's core concepts but also enhances your skills in scripting to automate and optimize a wide array of tasks.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204572 , 1836204574
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Services Web ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our "AWS Certified Solutions Architect – Associate" course, meticulously crafted to prepare you for the AWS Solutions Architect - Associate exam. This course dives deep into the essentials of designing scalable, resilient, and cost-efficient solutions on AWS, employing the Well-Architected Framework as a guide. Through a structured curriculum, you'll explore crucial concepts such as EC2, S3, VPC, and Route 53, among others, gaining an understanding of how to architect and implement AWS services effectively. The course begins with an overview of cloud-native design principles, setting the stage for more complex discussions on identity management, networking, and compute services. Each section builds on the last, with a focus on practical application, preparing you for scenarios you will face both in the exam and in real-world applications. By the end of this course, you will be well-equipped not only to pass the AWS certification exam but also to design AWS solutions that are robust, secure, and aligned with business needs.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200611 , 1836200617
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Application software Study guides Development ; Electronic data processing personnel Certification ; Streaming video ; Services Web ; Examens ; Guides de l'étudiant ; Logiciels d'application ; Développement ; Guides de l'étudiant ; Vidéo en continu ; streaming video ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is designed for developers looking to deepen their understanding of AWS services to build scalable and fault-tolerant applications. Starting with an overview of AWS's Identity and Access Management (IAM), it covers essential AWS services such as EC2, S3, RDS, and DynamoDB. Through practical demonstrations, learners will grasp how to effectively manage virtual machines, implement security, and develop serverless applications. The course also explores AWS's developer tools like AWS CLI, CloudFormation, and Elastic Beanstalk, equipping developers with the skills needed to deploy and manage applications efficiently. As you progress, you will learn how to optimize applications with caching services and ensure high availability with multi-AZ deployments. Prepare to not only pass the AWS Certified Developer exam but also to apply these skills in real-world scenarios, enhancing your professional capabilities in the AWS ecosystem.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204398 , 1836204396
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/476
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows server ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the full potential of Windows Terminal with our in-depth video course, designed for both beginners and seasoned IT professionals. Starting with an introduction to Windows Terminal and its significance as the new default terminal application for Windows, this course dives deep into all aspects of Windows Terminal. You will learn about installation methods, startup and interaction settings, appearance customization including color schemes, and the creation of custom keyboard shortcuts through actions. The course also explores advanced features such as configuring and managing multiple profiles and using panes to run several shells in a single tab. Whether you're looking to streamline your workflow, enhance productivity, or simply bring a touch of personality to your terminal with a retro command prompt, this course covers it all. As you progress, you'll see how these settings and features can be applied to real-world scenarios, giving you the practical skills and knowledge to tailor your terminal environment precisely. This journey will transform your command line experience, making it more powerful and enjoyable.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200277 , 1836200277
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Amazon Web Services (Firm) ; Penetration testing (Computer security) ; Computer networks Security measures ; Cloud computing ; Tests d'intrusion ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The "Introduction to AWS Pentesting" course offers a detailed exploration into the specialized field of penetration testing within Amazon Web Services (AWS), providing a strategic blend of policy understanding, technical insights, and hands-on techniques. Beginning with a crucial overview of AWS Pentesting Policy, the course outlines the legal landscape, guiding participants on what is permissible in the realm of AWS security testing. This foundational knowledge is vital for conducting responsible and effective penetration testing activities. As participants progress through the series, they delve deeper into the mechanics of AWS, with specific episodes dedicated to understanding and exploiting vulnerabilities in key services such as IAM, S3, EC2, and Lambda. In addition to technical skills, the course fosters a comprehensive understanding of AWS resource naming with ARNs, enhancing the ability to navigate and manipulate AWS architecture for security testing purposes. By the end of the series, participants will not only be prepared to spot and mitigate security risks but also to leverage AWS features and tools to strengthen infrastructure against future threats.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836203896 , 1836203896
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks ; Computer networks Management ; Réseaux d'ordinateurs ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the essentials of network infrastructure with our meticulously structured video course, "Network Fundamentals." This course starts by grounding you in the foundational concepts of network infrastructure, exploring various network types and topologies. As you progress, you'll uncover the intricacies of both wired and wireless networks, learn about the role of demarcation points, and delve into the complexities of wide and virtual private networks. The course seamlessly transitions into network hardware, introducing you to critical components like switches and routers, and explains their functions and interconnections. You'll gain practical skills in building and managing robust networks, supported by an understanding of network protocols, services, and addressing, including both IPv4 and IPv6. The journey concludes with hands-on tutorials on essential network commands and tools, enhancing your troubleshooting skills. This course not only educates but also prepares you to effectively design, secure, and manage network systems in any business environment.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836206934 , 1836206933
    Language: English
    Pages: 1 online resource (1 video file (27 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing Management ; Risk assessment Data processing ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Évaluation du risque ; Informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides an extensive preparation path for the Systems Security Certified Practitioner (SSCP) exam, catering specifically to IT administrators, managers, and security professionals. Starting with a robust understanding of the SSCP's significance and framework, participants will dive into detailed explorations of security operations, administration, risk management, and more. Each module focuses on practical applications and theoretical knowledge necessary to maintain a secure IT infrastructure. From security controls and compliance to advanced access management and risk assessment strategies, the course builds a foundational and advanced understanding, ensuring readiness for the SSCP exam and real-world applications. The structured content is designed to sequentially build competence and confidence in handling security-related tasks effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836202356 , 1836202350
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/12
    Keywords: Big data Data processing ; Data mining ; Automatic data collection systems ; Electronic data processing ; Exploration de données (Informatique) ; Collecte automatique des données ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your Splunk journey with our comprehensive video course designed to guide you through every facet of this powerful tool. Start with a condensed history to understand why Splunk has become an essential tool for data-driven decisions. You'll dive into the components that constitute Splunk, ensuring you grasp each element's role in a successful implementation. From installing Splunk and understanding its licensing to configuring and managing data inputs, this course covers the operational spectrum. Gain deep insights into managing user roles and authentications, setting up robust data retention policies, and leveraging Splunk's advanced data transformation capabilities. By the end, you'll not only be prepared to effectively use Splunk in your organization but also to optimize its functionalities to suit your specific needs.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9781836207634 , 1836207638
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon.com (Firm) ; Web services ; Electronic data processing personnel Certification ; Cloud computing ; Application software Development ; Services Web ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The "AWS Certified DevOps Engineer - Professional" course is designed to deepen your technical expertise in managing distributed application systems on the AWS platform. This advanced training covers the entire spectrum of DevOps methodologies, including continuous integration, continuous delivery, and infrastructure as code, providing a robust foundation for implementing and managing dynamic, automated environments. Starting with an overview of the AWS DevOps environment, the course progresses through detailed discussions and hands-on practice with AWS tools like CodeCommit, CodeBuild, CodeDeploy, and CodePipeline, teaching you to manage complex workflows and optimize deployment processes. You'll learn how to use Elastic Beanstalk for easy application deployment, manage Docker containers, and orchestrate applications with ECS and CloudFormation. Instructors guide you through setting up real-world scenarios, demonstrating how to integrate various AWS services to create highly efficient DevOps pipelines. This course not only prepares you for the AWS Certified DevOps Engineer - Professional exam but also equips you with the practical skills necessary to implement the lessons learned directly into your workplace.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836209119 , 1836209118
    Language: English
    Pages: 1 online resource (1 video file (26 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a detailed journey through the realms of Information Systems (IS) auditing with our "CISA: Certified Information Systems Auditor" course. This course thoroughly covers the five domains outlined by ISACA, ensuring a complete understanding of the essential components required for the CISA exam. It begins with an overview of the IS auditing process, including standards, guidelines, and ethical practices, before diving into the governance and management of IT. The course also explores the nuances of information systems acquisition, development, implementation, operations, and the pivotal business resiliency necessary for modern enterprises. Throughout your learning experience, you'll engage with practical scenarios that demonstrate auditing practices, risk management, and control assessments. The course also includes in-depth discussions on emerging technologies such as cloud computing and virtualization, and their impact on IS auditing. By providing tools and strategies to effectively study and understand the material, this course serves as both an educational resource and a practical guide to prepare for the CISA certification.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836203711 , 1836203713
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The "AWS Certified Cloud Practitioner CLF-C02" course is meticulously crafted to provide both technical and non-technical professionals with a solid foundation in AWS cloud services. This comprehensive course starts with an overview of cloud concepts, essential AWS services, and common billing and pricing strategies, ensuring a broad understanding of what the cloud can offer. As you progress, the course delves into detailed explorations of EC2, Lambda, S3, EBS, VPC, and RDS, coupled with practical applications of security best practices and cost management. The journey through this course is designed to build your confidence in using AWS tools effectively, with a focus on achieving the AWS Cloud Practitioner certification. Moreover, the course discusses the implications of cloud on IT infrastructure and explores innovative cloud technologies and security frameworks, helping you to understand how to make informed decisions in a cloud environment. The final sections of the course ensure that you are well-versed in advanced topics such as cloud deployment models, connecting to the cloud, and the expansive AWS infrastructure. This strategic progression equips you with the knowledge needed to navigate the complexities of cloud technology and prepares you for practical challenges in your career.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836203032 , 1836203039
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/78
    Keywords: Business Data processing ; Security measures ; Electronic data processing departments Security measures ; Crisis management ; Computer networks Security measures ; Management information systems Security measures ; Gestion ; Informatique ; Sécurité ; Mesures ; Centres de traitement de l'information ; Sécurité ; Mesures ; Gestion de crise ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Systèmes d'information de gestion ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "Business Continuity and Recovery Planning" is a meticulously crafted course aimed at equipping professionals with the knowledge and skills to design and implement robust business continuity plans (BCPs) and disaster recovery strategies. The course begins with a foundational overview of business continuity, discussing the crucial elements and objectives involved in a continuity plan. Following the introductory discussions, the course dives into practical methodologies for conducting Business Impact Analyses, assessing risks, and developing recovery strategies that align with organizational needs. Participants will learn through a series of detailed episodes that guide them through each step of creating and fine-tuning a Business Continuity Plan—from initial risk assessment and business impact analysis to the strategic inclusion of cloud technologies. The course provides learners with template-based planning, detailed walkthroughs of risk assessment, and the crafting of emergency communication strategies. Learners will also explore the integration of modern IT disaster recovery planning, understanding the nuances of IT-specific recovery testing, and the documentation required to ensure continuity and resilience. By the end of the series, participants will be equipped to handle and respond to emergencies effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9781836203834 , 1836203837
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Cloud computing Study guides Examinations ; Web services Study guides Examinations ; Big data Study guides Examinations ; Electronic data processing personnel Certification ; Computer technicians Certification ; Services Web ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The "AWS Certified Big Data - Specialty" course offers a comprehensive journey through the landscape of big data on AWS, designed to empower you with the skills needed to master the platform's data handling capabilities. Beginning with an understanding of the basics of data collection via innovative AWS services like Kinesis & IoT, this course meticulously guides you through the various stages of data management, including secure storage options like S3 and DynamoDB, and robust data processing technologies such as EMR, Lambda, and Glue. As you delve deeper, you'll explore advanced analytical tools like Athena and Redshift, learning how to query and manipulate large data sets efficiently. This detailed exploration is complemented by practical insights into data visualization techniques using QuickSight, helping you turn complex data into actionable insights. Moreover, the course covers essential security practices necessary for protecting data, with in-depth sessions on using IAM and KMS to manage access and encryption. Real-world applications and case studies demonstrate the theoretical concepts and help the participants understand how they are applied in practical scenarios. This approach prepares you for the certification while also equipping you with the knowledge to implement what you have learned in real-world job settings.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836201892 , 1836201893
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 43 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7
    Keywords: Big data ; Data mining ; Exploration de données (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Our "Survey of Data Science" course provides a deep dive into the world of data analysis and modeling, equipping learners with the skills to transform raw data into insightful decisions. Starting with an introduction to data scientists' roles and activities, the course progresses through data exploration and analysis. You will learn about the importance of data hygiene, statistical foundations, and the power of visualization to communicate data-driven insights effectively. As the course unfolds, it covers complex topics such as handling unstructured data, building associative rules, decision trees, and regression models, and delves into sophisticated areas like neural networks and natural language processing. The Lambda architecture section will illuminate real-time and batch data processing, essential for handling big data scenarios in professional settings. The course not only provides technical skills but also emphasizes practical application, preparing participants to apply their knowledge in real-world situations. This journey will equip you with the expertise to navigate the challenges of modern data science, making you an asset in various industry roles.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836207931 , 183620793X
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 38 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/6
    Keywords: Information technology Management ; Database management ; Computer files ; Technologie de l'information ; Gestion ; Bases de données ; Gestion ; Fichiers (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this foundational series, we demystify the command-line interface, starting with the basics and progressively building your skills to enhance productivity. The journey begins with an overview, easing any initial fears of the cursor on a seemingly blank screen. You'll learn the significance of the terminal, its capabilities, and how mastering it can transform your efficiency. Next, we delve into the terminal environment with Justin and Vonne, where you'll gain a comprehensive understanding of the terminal, terminal emulator, and shell. This knowledge sets the stage for more advanced operations. The series continues with practical guidance on accessing and customizing the terminal, ensuring you can tailor it to your needs for an optimized workflow. The exploration doesn't stop there. You'll master navigation within the terminal, learning efficient techniques to move around your system. Justin provides valuable tips to enhance your terminal usage, making complex tasks more manageable. The series culminates with a focus on file management—creating, moving, and deleting folders and files—equipping you with essential skills to manage your projects effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836208273 , 1836208278
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer networks Security measures ; Python (Langage de programmation) ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course explores Python for security testing through hands-on projects. Starting with foundational concepts like creating socket connections, participants progress to advanced topics such as port scanning and banner grabbing. Each episode builds on the previous one, ensuring a cohesive learning experience that enhances understanding of both Python and cybersecurity principles. Learners will tackle complex security testing techniques, including constructing a brute force SSH attack program to identify weak passwords. The packet sniffing modules offer in-depth knowledge on capturing and analyzing network data, crucial for monitoring and securing network communications. These projects simulate real-world scenarios, providing practical skills applicable to professional environments. By the end of the course, participants will have developed a suite of Python-based security tools. The final project, a comprehensive packet sniffer, integrates all learned skills into a robust tool for network security analysis. Ideal for those with a basic understanding of Python, this course aims to expand capabilities in cybersecurity. With detailed explanations and hands-on practice, participants will gain valuable skills to enhance their security testing toolkit.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836206194 , 1836206194
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Computer software Development ; Client/server computing ; Open source software ; Logiciels d'application ; Développement ; Architecture client-serveur (Informatique) ; Logiciels libres ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a thorough exploration of Docker, the leading platform for containerization, with this comprehensive introductory course. Starting with an overview of Docker, the course guides you through the essentials of installing Docker on your system. You will learn the fundamental concepts of Docker, including what containers are and how they revolutionize application deployment. As you delve deeper, you'll gain hands-on experience running your first Docker container and managing multiple containers efficiently. The course covers essential topics such as inspecting Docker images and containers, understanding Docker's approach to handling data, and exploring practical use cases. You'll then move on to building your own Docker images, a crucial skill for customizing and optimizing your containerized applications. In the advanced sections, you'll learn to store custom Docker images and build complete applications using Docker. Additionally, you will explore Docker Machine and Docker Swarm, essential tools for orchestrating and managing your containers in various environments, including cloud platforms like Digital Ocean. By the end of this course, you will be adept at using Docker to streamline your development and deployment processes, making you an asset in the modern DevOps landscape.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836206798 , 1836206798
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Git (Computer file) ; Computer software Development ; HTML (Document markup language) ; HTML (Langage de balisage) ; HTML ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the power of GitHub-Flavored Markdown with this comprehensive course, designed to simplify and enhance your documentation process. This series begins with an overview of Markdown, highlighting its advantages over other markup languages like HTML. You'll learn what GitHub-Flavored Markdown is and how it simplifies formatting tasks for better structure and styling. The initial episodes guide you through setting up your environment to write Markdown files with immediate rendering feedback, ensuring a smooth start. You'll master basic text formatting, including italicizing, bolding, and striking through text, as well as creating external and internal links. As you progress, you'll explore advanced formatting techniques, such as creating different heading sizes, blockquotes, and underlined headings. Practical demonstrations will teach you how to create lists, add images, and create images with links. In the advanced sections, you'll learn to leverage GitHub-Flavored Markdown's unique features. You'll arrange information in tables, inline code, create code blocks, and build task lists to keep track of your to-dos. By the end of this course, you'll be proficient in using GitHub-Flavored Markdown to enhance your documentation, making it more readable and professional.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836202394 , 1836202393
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: PHP (Computer program language) ; Web sites Design ; PHP (Langage de programmation) ; Sites Web ; Conception ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of server-side scripting with our detailed introductory course on PHP. This course begins with an overview of PHP and guides you through the setup process, ensuring you have a strong foundation to build upon. You'll learn about PHP's basic syntax, including numbers, strings, and operators, and how these elements form the building blocks of PHP programming. As you progress, you'll explore conditionals, arrays, and loops, essential tools for controlling the flow of your programs and handling data efficiently. The course also delves into functions, providing you with the knowledge to write reusable code, and classes and objects, which introduce you to object-oriented programming in PHP. These concepts are critical for creating organized and scalable web applications. In the latter part of the course, you'll learn about dependency management with Composer, a crucial skill for managing libraries and packages in your PHP projects. The course wraps up with a section on basic error handling, equipping you with techniques to debug and manage errors effectively. By the end of this course, you'll have a comprehensive understanding of PHP, ready to apply your skills to develop dynamic and interactive web applications.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836207696 , 1836207697
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Node.js ; Express.js (Electronic resource) ; Application program interfaces (Computer software) ; Web sites Design ; Interfaces de programmation d'applications ; Sites Web ; Conception ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a detailed journey into creating RESTful APIs with the Express framework. This course starts with setting up a Node-based project and installing Express. You'll learn essential concepts like routing, middleware, and data modeling, crucial for robust API development. The course covers CRUD operations within RESTful APIs, ensuring a solid grasp of backend fundamentals. Progressing further, you'll build a simple Express application, with detailed explanations of request and response objects, middleware creation, and integrating third-party middleware. Hands-on learning with real-world examples guides you through building routes and managing data. Tools like Postman are introduced for testing and refining your API. In advanced topics, you'll focus on data persistence and adding complex features like location tracking. Discussions on universally unique identifiers (UUIDs) will enhance your technical skills. By course end, you'll have a comprehensive understanding of building scalable and efficient RESTful APIs with Express, ready to apply your skills in real-world projects.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204435 , 1836204434
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Git (Computer file) ; Revision control (Computer science) ; Open source software ; Computer software Development ; Logiciels libres ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the essentials of version control with Git in this detailed introductory course designed for developers of all levels. Begin with an overview of Git, explaining its importance in modern software development. You'll learn how to install Git, setting a solid foundation to start using this powerful tool. In the initial section, explore setting up a Git repository and making changes to track your project's progress. Through practical demonstrations, learn to add, commit, and manage changes, and efficiently fix mistakes with Git's robust features. This hands-on course equips you with the skills to confidently manage your codebase. The latter part focuses on advanced Git functionalities, such as connecting to remote repositories and understanding branches. You'll learn to create and manage branches for parallel development and workflow efficiency. The course also covers merging techniques, conflict resolution, and seamless work with remote repositories and branches. Finally, dive into collaborative development using GitHub, learning to push changes, pull updates, and collaborate effectively. By the end, you'll be proficient in using Git for version control, ready to implement it in your projects and collaborate with ease.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836202578 , 1836202571
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.6/6
    Keywords: HTML (Document markup language) ; Video games Programming ; Computer animation ; HTML (Langage de balisage) ; Jeux vidéo ; Programmation ; Animation par ordinateur ; HTML ; computer animation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Immerse yourself in the world of HTML5 Canvas with this all-encompassing course, designed to turn you into a proficient creator of graphics and animations. The course kicks off with an overview and a deep dive into the Canvas element, setting the stage for a thorough understanding of its capabilities. You'll start by learning how to draw basic lines and rectangles, progressing step-by-step to more complex shapes like curves, arcs, and custom figures. Throughout the course, you'll explore various drawing styles and colors, gaining the ability to customize your graphics to match any desired aesthetic. Text rendering on Canvas, gradient creation, and image manipulation, including applying filters, will also be covered in detail. These skills will enable you to produce rich, vibrant graphics that capture attention and convey information effectively. As you advance, the course introduces transformations and clipping, essential techniques for creating dynamic and interactive content. You'll learn to apply these transformations to both shapes and images, expanding your creative toolkit. The final modules involve building practical projects like particle systems and handling user events, ensuring you can apply your knowledge in real-world scenarios.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836203377 , 1836203373
    Language: English
    Pages: 1 online resource (1 video file (6 hr.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Application software Development ; Python (Langage de programmation) ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the full potential of Python by mastering its Standard Library with this comprehensive course. Designed for developers aiming to streamline their coding process, the course begins with an introduction to the Python Standard Library, detailing its purpose and access methods. You'll explore a vast array of built-in modules that simplify various programming tasks. Starting with fundamental modules like os and os.path, you'll learn to interact with the operating system and manipulate file paths through practical examples. You'll perform file system operations, navigate directories, and handle paths efficiently. Progressing further, you'll master the datetime module, covering operations involving date and time, such as arithmetic, comparisons, parsing, and timezones—crucial skills for applications relying on time-based data. The course also delves into the math module for advanced mathematical operations and the sys module for insights into the Python interpreter's settings, runtime environment, and module management. Additionally, you'll learn to use the random module to generate random numbers, essential for simulations, testing, and security applications. By the end of this course, you'll be proficient in using Python's Standard Library to enhance your development efficiency and effectiveness.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204534 , 1836204531
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Ruby on rails (Electronic resource) ; Web site development ; Ruby (Computer program language) ; Sites Web ; Développement ; Ruby (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of web development with Ruby on Rails in this comprehensive course, perfect for beginners and those seeking to deepen their understanding of this powerful framework. The journey begins with an introduction to Ruby on Rails, exploring its purpose, the Ruby programming language, and the conventions that make Rails ideal for dynamic websites. You'll start by setting up your development environment on MacOS and Linux-based machines, equipping yourself with essential tools like Ruby, Rails, Ruby Gems, and SQLite. Next, you'll delve in the foundational concepts of web applications, focusing on the HTTP protocol and the Model View Controller (MVC) design pattern. Through practical examples, you'll learn to create a Rails application from scratch, understanding the View layer and how Rails components work together. The course then transitions to data models, using ActiveRecord ORM to persist data and understanding migrations to synchronize your data model and database. In the advanced sections, you'll cover RESTful routing, data validations, and model relationships. The course also introduces testing with MiniTest, highlighting the importance of automated tests for robust applications. Finally, you'll gain hands-on experience deploying your Rails application to Heroku, bringing your web projects live and accessible.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836207054 , 1836207050
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the fundamentals of Python programming with this comprehensive course designed for beginners and aspiring developers. Starting with an overview of Python's versatility and ease of use, you'll learn how to set up Python on your system, establishing a solid foundation for your programming journey. Initial modules guide you through using Python for simple tasks and decision-making processes, essential for many applications. You'll explore the power of functions, learning to write reusable code to simplify complex problems, and delve into iterations, covering loops and their role in automating repetitive tasks. As you progress, you'll master Python's handling of strings and various data structures, including lists, dictionaries, and tuples. Practical exercises will reinforce your learning, ensuring you can apply these concepts in real-world scenarios. In the latter part of the course, you'll learn to manipulate files using Python, a crucial skill for any developer. The course also covers essential standard library functions, providing tools to extend Python's functionality effortlessly. The final module ties everything together with a capstone project that integrates all the learned concepts. By the end, you'll be proficient in Python programming, ready to tackle diverse coding challenges.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 24, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9781836209911 , 1836209916
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Ansible (Computer software) ; Software configuration management ; Programming languages (Electronic computers) ; Logiciels ; Gestion de configurations ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the power of automation with our comprehensive Ansible course. Start with the fundamentals, learning core concepts and setup procedures to create the perfect environment and execute foundational commands. Progress step-by-step to gain proficiency in installing packages, managing users, and configuring services, streamlining essential IT tasks. As you advance, delve deeper into Ansible's capabilities, exploring hosts, tasks, variables, and handlers. Build a robust understanding of leveraging these elements in real-world scenarios. Enhance your scripting skills with sections on templating and control flow, creating dynamic and efficient automation scripts. Master roles to modularize your configurations, making them reusable and scalable. In the final part, apply your knowledge with hands-on projects. Set up NGINX for static site deployment, manage NFS architecture, and restructure setups using roles. These practical applications ensure you're not just learning theory but applying it tangibly. By the end, you'll be confident in automating and managing IT infrastructure with Ansible. This course is ideal for system administrators, DevOps engineers, and IT professionals looking to streamline their workflows through automation. A basic understanding of system administration and networking is recommended.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 9781836202677 , 1836202679
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Node.js ; JavaScript (Computer program language) ; Web site development ; JavaScript (Langage de programmation) ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join us to master Node.js, the powerful runtime environment for executing JavaScript server-side. This meticulously designed course, led by expert instructors Daniel and Justin, covers every aspect of Node.js. You'll start with a general overview and installation on various operating systems, gaining a solid understanding of Node.js, its performance capabilities, and comparisons to other development languages. As you progress, you'll tackle complex topics like using modules, handling events, and managing event execution with timers. Our hands-on approach ensures you apply theoretical knowledge through practical examples. From reading and writing files to managing external processes and streams, each lesson builds on the previous one, increasing in complexity and depth. The latter part of the series focuses on real-world applications. You'll explore TCP and HTTP modules, build servers and clients, and make HTTP requests. The course culminates in exciting projects such as creating a Twitter CLI and a Click Capture app, demonstrating how Node.js develops functional and interactive applications. This course is your gateway to becoming proficient in Node.js and creating robust server-side applications. This course is designed for aspiring developers with a basic understanding of JavaScript who want to expand their knowledge to server-side programming using Node.js. No prior experience with Node.js is required, but familiarity with JavaScript fundamentals will be beneficial.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200031 , 183620003X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: AngularJS (Software framework) ; Application software Development ; Web applications ; Logiciels d'application ; Développement ; Applications Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the full potential of AngularJS with this detailed course for web developers eager to enhance their skills. Justin and his co-hosts dive deep into AngularJS, starting with the basics and moving to advanced topics. You'll begin with an introduction to AngularJS, its history, core principles, and differences from the current Angular. Learn how to set up your first AngularJS application, avoid common pitfalls, and understand the role of controllers and scope in managing data. As the course progresses, you'll explore data binding, a fundamental concept for dynamic applications, and the built-in directives that give AngularJS its power. Justin and his co-hosts demonstrate how to handle events, render lists, and apply dynamic styles. The course also covers the creation of custom directives and components, enabling you to build reusable and modular code. You'll delve into the intricacies of services and factories, making AJAX requests, and the importance of client-side routing. By the end of this course, you'll have a comprehensive understanding of AngularJS and be equipped to build sophisticated web applications. Whether you're a novice learning a new framework or an experienced developer deepening your knowledge, this course offers valuable insights and practical skills to advance your career. This course is designed for web developers and programmers who are interested in learning AngularJS to build dynamic and efficient web applications. Prerequisites include a basic understanding of HTML, CSS, and JavaScript. Prior experience with other JavaScript frameworks is beneficial but not necessary.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836202776 , 1836202776
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.2/4
    Keywords: Computer networks Monitoring ; Computer programs ; Computer networks Security measures ; Computer programs ; Penetration testing (Computer security) ; Réseaux d'ordinateurs ; Surveillance ; Logiciels ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Logiciels ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with a straightforward guide to installing Nmap, ensuring that you have the software ready to use. Next, we cover the fundamentals of Nmap, providing a solid foundation for beginners. As you progress, you will delve deeper into host discovery, learning various techniques to identify active hosts on your network. Each step is carefully explained to build your confidence and understanding. The journey continues with an in-depth exploration of port states and port scanning. You’ll gain insights into different port states and their implications for network security. Detailed videos on port scanning techniques will teach you how to identify open ports, understand service versions, and recognize vulnerabilities. Advanced port scanning methods, such as IP ID Idle Scan and FTP Bounce, are thoroughly covered, offering you sophisticated tools to enhance your scanning capabilities. Throughout the course, practical examples and hands-on exercises ensure that you can apply what you’ve learned immediately. By the end, you will possess a comprehensive skill set that enables you to use Nmap effectively for network security and troubleshooting. This course is designed to transform you into a proficient Nmap user, capable of tackling complex network challenges with confidence.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836206453 , 1836206453
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing Study guides Examination ; Electronic data processing personnel Study guides Certification ; Microsoft Azure (Computing platform) ; Microsoft Azure (Plateforme informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course takes you on a journey through Azure development, starting with an overview and environment setup, ensuring you have the right tools for success. You'll learn to provision virtual machines, deploy ARM templates, and manage container images with Azure Container Registry. As you advance, you'll create and deploy Azure App Service Web Apps, implement diagnostics logging, and configure web app settings. The course also covers autoscaling rules, ensuring your applications can handle varying loads efficiently. You'll delve into Azure Functions, exploring bindings, triggers, and durable functions, followed by an in-depth look at developing solutions using Cosmos DB and Blob Storage. Security is paramount in cloud solutions, and this course ensures you're well-versed in user authentication, authorization, and secure cloud practices. You'll learn to use the Microsoft Identity Platform, Azure Active Directory, and manage keys, secrets, and certificates. Additionally, the course covers implementing caching with Azure Cache for Redis, troubleshooting solutions using metrics and log data, and managing APIs with Azure API Management. By the end of this course, you'll have the skills and knowledge to develop, deploy, and manage robust, secure, and scalable applications on Azure. What you will learn Set up and configure development environments Provision and manage Azure virtual machines Create and deploy web apps on Azure Implement and manage Azure Functions Develop solutions using Cosmos DB and Blob Storage Secure applications with authentication and authorization Audience This course is designed for software developers, cloud engineers, and IT professionals looking to deepen their Azure development skills. Prerequisites include basic knowledge of cloud computing and familiarity with programming concepts. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836200659 , 183620065X
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Microsoft Azure (Computing platform) Study guides Examinations ; Cloud computing Study guides Examinations ; Microsoft Azure (Plateforme informatique) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the essentials of designing robust cloud infrastructure with Microsoft Azure. This comprehensive course guides you through the complexities of solution design, from log routing and monitoring tools to securing resources and identity management. Enhance your understanding of hierarchical resource management, compliance enforcement, and Azure's organizational structure, preparing you for advanced architectural challenges. Transition to advanced modules that cover the integration of applications with Azure AD, database scalability, and data protection strategies. Each lesson is crafted to build on your knowledge, focusing on practical applications and real-world scenarios that Azure architects face daily. This structured approach ensures a thorough understanding of each concept, from security to compliance and data storage solutions. Conclude your learning journey by mastering recovery solutions for diverse environments, high availability strategies, and advanced compute solutions including virtual machines, containers, and serverless options. The course’s capstone sections on network architecture provide key insights into optimizing performance and security, equipping you with the skills to design and implement comprehensive Azure solutions effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836202059 , 1836202059
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet domain names ; Cloud computing ; Client/server computing ; Software configuration management ; Architecture client-serveur (Informatique) ; Logiciels ; Gestion de configurations ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive deep into the world of DNS with this comprehensive course, meticulously designed to guide you through every aspect of DNS configuration and management. The journey begins with an exploration of DNS utilities, where you'll gain hands-on experience with tools like nslookup, dig, dnswalk, and dnsrecon, essential for troubleshooting and analyzing DNS records. Moving forward, the course covers the vital aspect of configuring email services through the setup of MX and SPF records, ensuring your email infrastructure is robust and secure. You’ll then navigate the complexities of managing public domains, from purchasing and transferring domains to changing name servers, providing you with a comprehensive understanding of domain lifecycle management. The course also emphasizes the importance of DNSSEC for securing DNS information and its configuration using NSD. In the latter sections, you’ll master zone replication across different DNS servers including NSD, Microsoft DNS, BIND, and Unbound. Each server-specific module covers installation, zone configuration, and replication strategies, ensuring you can manage DNS infrastructure across various platforms. The final section explores advanced topics like ad-blocking with Unbound and integrating it with BIND and NSD, equipping you with versatile skills to tackle any DNS challenge.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836208457 , 1836208456
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Firewalls (Computer security) ; Software configuration management ; Open source software ; Cloud computing Security measures ; Coupe-feu (Sécurité informatique) ; Logiciels ; Gestion de configurations ; Logiciels libres ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a thorough journey into pfSense 2.4.4 with this expertly designed course. Begin with an overview of pfSense, exploring its history, use cases, and suitable hardware choices. Move on to preparing and installing pfSense, where you will learn the installation process, menu options, initial configuration, and essential system security practices. Next, delve into pfSense's robust features and services. Configure firewall rules, schedules, virtual IPs, and understand traffic shaping. Gain proficiency in NAT configuration and various services setup, including detailed modules on VPN services. The course then advances to pfSense's sophisticated features like multi-WAN support, VLAN configuration, high availability setups, bridging, and captive portal management. Learn to monitor your network and leverage additional packages for enhanced functionality. The final section focuses on managing and maintaining your pfSense setup. Master backup and restore procedures and stay on top of reporting and upgrading your system. By the end of this course, you will have comprehensive skills to deploy, manage, and secure a pfSense-based network.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204350 , 1836204353
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Git (Computer file) ; Revision control (Computer science) ; Open source software ; Computer software Development ; Logiciels libres ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Version control is essential in software development, ensuring efficient tracking and management of code changes. This series starts with an introduction to various version control systems, then delves deeply into Git and GitHub. You'll begin by setting up Git, creating and cloning repositories, and committing changes. These foundational lessons will equip you with the skills needed to manage projects and collaborate effectively. As you advance, the course covers topics like branching, merging, and conflict resolution. You'll learn to synchronize local and remote repositories, create pull requests, and manage collaborators. Practical demonstrations reinforce each concept, building your confidence and competence in Git and GitHub. By the end, you'll understand how to maintain a clean, organized repository and navigate the complexities of collaborative version control. Whether you're new to version control or seeking to enhance your skills, this course offers valuable insights and hands-on experience. You'll gain a robust toolkit for managing code changes, collaborating with team members, and maintaining project integrity. Join us to master essential skills for modern software development.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 17, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200956 , 1836200951
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Web site development ; Web sites Design ; Application software Development ; Internet programming ; Java (Langage de programmation) ; Sites Web ; Développement ; Sites Web ; Conception ; Logiciels d'application ; Développement ; Programmation Internet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this course, you will embark on a journey to master Redux, the powerful state management library for JavaScript applications. Starting with an overview, you will get acquainted with the core concepts and structure of Redux, setting a solid foundation for your learning. The subsequent video will delve into the reasons why Redux is essential, providing a clear understanding of its significance in modern web development. As you progress, you will explore the fundamental principles that underpin Redux. These principles are crucial for effectively implementing and utilizing Redux in your projects. Additionally, the course addresses the unique challenges of managing lists within Redux, offering strategies and best practices to handle these scenarios effectively. The course concludes with a comprehensive wrap-up, reinforcing the knowledge gained and ensuring you are ready to apply Redux with confidence. Designed for developers with a basic understanding of JavaScript, this course is perfect for those looking to enhance their state management skills. By the end of the course, you will have a thorough understanding of Redux, its core principles, and how to manage state efficiently in your applications.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 17, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836209959 , 1836209959
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/3
    Keywords: Data structures (Computer science) ; Programming languages (Electronic computers) ; Structures de données (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to master essential data formats crucial for any data-driven professional. The course begins with a deep dive into CSV files, teaching you how to explore and manipulate them using Python's csv module and the powerful pandas and tablib packages. You'll learn the ins and outs of CSV files, ensuring you can handle them with ease and efficiency. Moving forward, the focus shifts to JSON files, where you’ll understand their structure and how to work with them using the json module. The course further explores advanced JSON handling with pandas and introduces you to additional packages like simplejson, ujson, and tablib. This segment ensures you are well-equipped to manage JSON data in various contexts. The course also covers YAML, XML, and HTML files, providing a comprehensive understanding of each format. You’ll explore YAML files and use the PyYAML and tablib packages for effective manipulation. The XML and HTML sections delve into their respective file structures, and you’ll learn to use the xml, lxml, xmltodict, and BeautifulSoup packages. By the end of this course, you’ll be proficient in handling these diverse data formats, significantly boosting your data processing capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836208174 , 1836208170
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.36
    Keywords: Microsoft Office Study guides Examinations ; Information technology Study guides Management ; Examinations ; Microsoft software Study guides Examinations ; Electronic data processing personnel Certification ; Technologie de l'information ; Gestion ; Examens ; Guides de l'étudiant ; Logiciels Microsoft ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the comprehensive world of Microsoft 365 administration with this expertly crafted course. Begin with an overview and delve into deploying and managing a Microsoft 365 tenant. Learn to create and manage tenants and domains, monitor service health, and track adoption and usage. Master user, group, license, role, and privileged identity management, equipping you to handle bulk user management and delegation tasks efficiently. Next, explore implementing identity in Azure AD, a crucial skill for any Microsoft 365 Administrator. Utilize tools like IdFix and Azure AD Connect, synchronize directories, and troubleshoot authentication issues. Delve into advanced authentication methods, including multi-factor authentication and self-service password reset. Enhance security management skills with Microsoft 365 Defender. Improve the Microsoft Secure Score, respond to alerts, and handle security and compliance issues. Learn threat analytics, policy implementation, and using Defender for Office 365 and Endpoint. Finally, manage compliance with Microsoft Purview, handling sensitive information types, retention and sensitivity labels, and data loss prevention (DLP) across various workloads and endpoints.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836207214 , 1836207212
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Windows Azure ; Cloud computing Study guides Security measures ; Examinations ; Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to configuring secure networks and private connections, this course offers a structured approach to strengthen your security posture in the cloud. Experience hands-on learning with video tutorials that detail the implementation of security best practices, use of Azure's security tools, and management of security operations. Whether it's securing Azure Kubernetes Services or managing security for containerized applications, you'll gain valuable insights into protecting cloud infrastructure and services effectively. The course culminates with an in-depth look at configuring and managing security operations. Learn to create and manage security policies, use Azure Defender for cloud-based threat mitigation, and leverage Microsoft Sentinel for security information and event management. This comprehensive overview prepares you to handle real-world security challenges and ensures a safer cloud environment for your organization.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836206972 , 1836206976
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Application software Development ; Web site development ; JavaScript (Langage de programmation) ; Logiciels d'application ; Développement ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join Justin and John on a transformative journey into ReactJS. This comprehensive video series starts with an overview of essential JavaScript features and build tools like Webpack, crucial for developing and deploying modern web applications. You'll build a solid foundation to navigate the React ecosystem with confidence. As the series progresses, you'll explore the core concepts of React, understanding the problems it solves and how it enhances front-end development. The instructors provide a detailed overview of the tools and ecosystem used throughout the course, preparing you for hands-on learning. By following a step-by-step approach, you'll learn how to transform a simple JavaScript application using React, showcasing the benefits and efficiencies of this powerful library. In the later episodes, you'll focus on practical implementation. You'll dive into build processes like create-react-app and new JavaScript features from ES2015, including const, let, imports, exports, and destructuring. By the end of the series, you'll master using state and props to manage and streamline your applications, turning them into efficient, scalable React projects. Whether you're a novice or looking to refresh your skills, this series provides a thorough grounding in ReactJS.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200796 , 183620079X
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: WordPress (Electronic resource) ; Web sites Authoring programs ; Sites Web ; Systèmes-auteur ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to master WordPress development, starting with the essential fundamentals. Begin by exploring the history of WordPress, setting up your development environment, and understanding foundational elements such as hooks, filters, and shortcodes. Gain hands-on experience with creating and modifying posts, understanding the Loop, and organizing content using taxonomies. Progress to advanced topics like custom post types, settings pages, and WordPress security. Learn to create widgets, handle remote URLs, and adhere to coding standards. The curriculum covers user and post meta, script and style enqueueing, dashboard widgets, and customizing the login page and admin area. Explore the template hierarchy, child themes, and theme development, ensuring you can build responsive and dynamic WordPress sites. Finally, put your knowledge into practice by creating your first plugin and building a complete WordPress site from scratch. Configure navigation, sidebars, custom post types, theme options, and extend the Customizer for real-time site adjustments. This course equips you with the expertise to develop, customize, and manage professional WordPress sites, setting the stage for your success as a WordPress developer.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836201533 , 1836201532
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Object-oriented programming (Computer science) ; Python (Langage de programmation) ; Programmation orientée objet (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Delve into Python's internal protocols and data models to unlock advanced programming capabilities. This comprehensive course, led by expert instructors Justin and Mike, starts with foundational concepts like creating and initializing instances and progresses to complex topics such as custom object representation and deletion methods. You'll explore Python's __str__ and __repr__ methods to craft custom string outputs and master the __format__ and __bytes__ methods to enhance object presentation. As you advance, you'll learn to implement iterable objects and dictionary-like behaviors through methods like __iter__, __getitem__, __setitem__, and __delitem__. You'll gain expertise in boolean representation, equality and inequality operations, leveraging hash functions, and managing object slots. The course's numeric section covers operator overloading for arithmetic and bitwise operations, extending Python's numeric capabilities to custom objects. Finally, explore advanced topics like attribute management, custom descriptors, making objects callable, context management, and serialization. By the end of this course, you'll be proficient in Python's data model protocols, enabling you to write more efficient, readable, and powerful Python code. Join us to elevate your Python programming skills to a professional level.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836208730 , 1836208731
    Language: English
    Pages: 1 online resource (1 video file (28 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1376
    Keywords: Microsoft Windows server Study guides Examination ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Explore the intricacies of Active Directory (AD) deployment for hybrid environments, beginning with an overview of the logical and physical components of AD Domain Services (AD DS). The course introduces key structural components and operational roles essential for deploying domain controllers both on-premises and in Azure, managing functional levels, and understanding Flexible Single Master Operations (FSMO) roles. As the course advances, it delves into more sophisticated configuration and management strategies. You’ll learn about Read-Only Domain Controllers (RODCs), configuring sites and subnets, and using PowerShell to automate FSMO roles transfers. The course includes practical demonstrations on configuring trust relationships and managing replication across varied AD DS setups, arming you with vital skills for modern IT environments. In its concluding segments, the course focuses on integrating AD DS with Azure AD, creating a strong hybrid identity framework. Topics covered include implementing Azure AD Connect, managing synchronization services, and exploring Azure AD Connect Cloud Sync. Designed to build progressively, the course ensures a thorough understanding of deploying and managing AD in a hybrid setting and mastering the management of authentication and policies within your infrastructure.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836202172 , 1836202172
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/476
    Keywords: Microsoft Windows server Study guides Examinations ; Windows Azure Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive deep into the world of Windows security with this comprehensive course designed for IT professionals. Starting with an overview, you will explore the configuration and management of Microsoft Defender, ensuring your servers are protected against the latest threats. Learn how to implement robust security measures using Group Policies, configure password policies, and secure domain controllers, providing a strong defense against unauthorized access. The journey continues with mastering Windows failover clusters. Understand how to implement and manage these clusters, configure storage and networking, and ensure high availability for your critical applications. You will also learn how to upgrade to Windows Server 2022 and utilize Windows Admin Center for efficient cluster management. This section equips you with the skills to maintain and recover clusters effectively. In the later sections, the course focuses on Windows Server recovery and migration. Discover how to manage backups with Azure, configure recovery options for both on-prem and Azure VMs, and handle Hyper-V replication and failover. The migration modules guide you through transferring data, using Storage Migration Service, and migrating various workloads to Azure, ensuring a smooth transition to modern infrastructure.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836201632 , 183620163X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical lessons, you'll gain hands-on experience with security baselines, extended detection, and response mechanisms, and the action center for efficient threat mitigation. The course then transitions to Microsoft Defender for Cloud, guiding you through planning and configuring cloud security measures. You will learn to assess cloud workload protection, configure workflow automation, and integrate multi-cloud and on-prem resources. Emphasis is placed on understanding the Microsoft Secure Score and implementing robust security and regulatory policies to maintain compliance. Finally, you will delve into Microsoft Sentinel, where you will configure resources, roles, and data connectors. The course covers advanced topics such as incident creation logic, automation rules, threat hunting, and developing custom logs in Azure Log Analytics. By the end of this course, you will be proficient in using Microsoft’s powerful security tools to protect your organization’s digital assets.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836208631 , 1836208634
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a foundational journey with NumPy, starting with an overview and setting up the scientific Python environment. This course refreshes Python basics using Jupyter notebooks, preparing you to explore NumPy arrays. Learn array creation, manipulation, and the various supported data types, building a strong foundation for complex operations. Progress through essential concepts like indexing, slicing, and the differences between copies and views of arrays. Discover the power of elementwise and broadcasting operations for efficient numerical computations. Engage in hands-on exercises in graphing and visualization to present your data effectively. Topics such as reduction, shape, and sort operations are covered in detail, equipping you to manipulate large datasets with ease. In the final section, delve into specialized topics like structured arrays and data type management, including casting and size considerations. The course culminates in a practical project on time series analysis, applying all the skills learned to real-world data. This project-based approach ensures you understand both the theoretical aspects and gain practical experience using NumPy for scientific computing and data analysis.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 18, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836205494 , 183620549X
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This meticulously crafted course offers an in-depth exploration of Python's file handling capabilities. Beginning with an overview, learners are introduced to the essential concepts of reading and writing files, setting a solid foundation for the subsequent lessons. Each episode, guided by the expert duo Justin and Aubri, builds upon the previous one, ensuring a coherent and progressive learning experience. The course starts by teaching how to open and close files using Python's various modes, moving on to reading file contents with different methods to suit various needs. Writing data to files is covered next, with a focus on practical examples and common pitfalls. The use of context managers is introduced to automate file management, a crucial skill for efficient programming. Advanced topics such as looping through multiple files and leveraging the fileinput module for streamlined file processing are also explored in detail. By the end of the series, participants will have mastered file handling in Python, equipped with the knowledge to implement these techniques in their own projects confidently. This course is an invaluable resource for anyone looking to enhance their programming toolkit with robust file manipulation skills.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 17, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204718 , 183620471X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Object-oriented programming (Computer science) ; Python (Langage de programmation) ; Programmation orientée objet (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Python programming with this beginner-friendly course, perfect for those new to coding or who have previously struggled. Using the Practice Labs environment, each video is supplemented with practical exercises to reinforce learning and ensure a solid grasp of programming principles. Starting with basic data types and variable assignments, the course covers essential topics like list structures, control flow with loops and conditionals, and operators. As you progress, you'll delve into more complex subjects such as file handling, including reading, writing, and copying files, and working with the Python Standard Library's modules. Each lesson builds on the previous one, creating a cohesive learning journey that boosts your confidence and skills. Throughout the course, Justin and Vonne provide clear and engaging instruction, breaking down complex concepts into manageable steps. By the end, you'll understand Python's syntax and capabilities and be able to apply your knowledge to real-world tasks. Whether you're aiming to pass a certification or enhance your coding skills, this course offers the tools and knowledge you need to succeed.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 17, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836208396 , 1836208391
    Language: English
    Pages: 1 online resource (1 video file (23 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Microsoft Windows (Computer file) Study guides Examination ; Microcomputers Study guides Maintenance and repair ; Examinations ; Electronic data processing personnel Certification ; Micro-ordinateurs ; Entretien et réparations ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is designed to equip IT professionals with the knowledge and skills to efficiently deploy, manage, and secure Windows clients and devices using Microsoft Intune and Entra ID. Starting with an overview of the course and the latest updates, learners will delve into selecting and customizing Windows client editions, creating deployment tools, and implementing Autopilot for seamless device registration and deployment. As the course progresses, participants will gain expertise in managing identities and compliance policies using Intune. They will learn to implement and manage compliance policies, monitor device compliance, and handle user authentication and group management in Windows environments. The integration of Microsoft Entra ID for device registration and the use of Active Directory connectors further enhances the management capabilities covered in this course. In the final sections, the focus shifts to advanced device management, maintenance, and security. Learners will explore configuring enrollment, deploying security baselines, and using Microsoft Defender for endpoint security. By the end of this course, participants will have a comprehensive understanding of using Microsoft Intune and Entra ID to manage and secure their organization’s IT infrastructure.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204275 , 1836204272
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Security measures ; Internet of things ; Logiciels d'application ; Sécurité ; Mesures ; Internet des objets ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to master web application security by exploring the OWASP Top 10 vulnerabilities. This course starts with an overview, setting the stage for a detailed look at each vulnerability. You will first learn to exploit common security flaws, gaining insights into the attacker's perspective. Next, you'll discover methods to fix these vulnerabilities, implementing robust security measures to protect your applications. Each section concludes with techniques to verify the fixes, ensuring your applications remain secure. Throughout the course, you’ll tackle various security issues such as broken access control, cryptographic failures, injection attacks, and insecure design. Each topic is broken down into manageable sections, with dedicated videos for exploiting, fixing, and verifying vulnerabilities. This structured approach ensures you build a solid understanding of each concept before moving on. Designed for web developers, security professionals, and IT specialists, this course requires a basic understanding of web technologies and programming. Whether you’re looking to enhance your security skills or secure your organization’s applications, this course provides the knowledge and practical skills needed to stay ahead in the ever-evolving field of web security.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836201755 , 1836201753
    Language: English
    Pages: 1 online resource (1 video file (3 hr.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Application software Development ; Computer networks Management ; Python (Langage de programmation) ; Logiciels d'application ; Développement ; Réseaux d'ordinateurs ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: In this comprehensive course, networking professionals will embark on a journey to master Python for network automation. Starting with an overview, the course delves into creating command-line interfaces, both basic and interactive, equipping you with essential skills to automate repetitive tasks. You'll learn error handling techniques to ensure robust and reliable scripts. As the course progresses, you’ll explore how to use Python with critical network protocols such as HTTP, SSH, Telnet, and FTP. These lessons provide practical insights into integrating Python with different networking environments, enabling seamless automation. Additionally, the course covers environment variables, an essential aspect for managing configurations and scripts effectively. In the advanced section, you will tackle packet sniffing with Python and develop a subnet calculator CLI. These skills are crucial for network analysis and management. The course concludes with configuring devices using Telnet and netmiko, offering hands-on experience in real-world scenarios. By the end of this course, you will have a solid foundation in Python for networking, ready to implement automation in your daily tasks.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836200413 , 1836200412
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/076
    Keywords: Microsoft Office Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Microsoft 365 with this detailed course designed for IT professionals and business users. Start with an overview of cloud computing fundamentals, including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Learn how these services drive productivity in modern business environments. Transition into exploring the specific capabilities of Microsoft 365, such as core productivity tools like Office 365, Windows 365, and collaborative platforms like Teams, SharePoint, and Yammer. Understand hybrid and flexible working solutions, endpoint management, and the benefits of a Zero Trust security model. Each module builds your understanding, enabling you to manage and optimize Microsoft 365 within your organization. Progress into security and compliance features, covering identity and access management, threat protection, and data loss prevention. Gain detailed insights into Microsoft Defender, Secure Score, and compliance solutions to meet regulatory requirements and protect enterprise data. The course concludes with practical knowledge on licensing, service lifecycles, and support offerings, ensuring you have a comprehensive grasp of Microsoft 365’s capabilities and benefits.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836207313 , 183620731X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: Microsoft Azure (Computing platform) Study guides Examinations ; Virtual computer systems ; Microsoft Azure (Plateforme informatique) ; Examens ; Guides de l'étudiant ; Systèmes virtuels (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your journey with an overview of Azure Virtual Desktop, understanding its components, and how it fits within the Azure ecosystem. Each section meticulously breaks down elements such as network connectivity, name resolution, and the use of RDP Shortpath for enhanced connectivity. Discover how to effectively plan resources, manage host pools, session hosts, and automate repetitive tasks to save time and reduce errors. Transition into advanced topics like identity and security management, where you'll tackle identity solutions, role-based access control, and multi-factor authentication to secure your virtual desktop environment. Learn about integration with Microsoft Defender for robust security and the implementation of necessary protocols to protect data and infrastructure. Finally, focus on optimizing user experience and application management through FSLogix, device redirection, and session management strategies. Deep dive into application delivery, including MSIX app attach and RemoteApps, ensuring seamless access and operation. The course culminates in monitoring and maintaining your AVD setup using Azure's monitoring tools, autoscaling features, and disaster recovery plans, preparing you to handle real-world scenarios efficiently.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836207153 , 1836207158
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks ; Routing (Computer network management) ; Internetworking (Telecommunication) ; Electronic data processing personnel ; Routage (Gestion des réseaux d'ordinateurs) ; Interconnexion de réseaux (Télécommunications) ; Informatique ; Personnel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of network simulation with our in-depth course on GNS3 installation and setup. Begin with an overview of GNS3, understanding its core features and benefits. We guide you through the detailed installation processes for Windows 10, MacOS Catalina, Ubuntu, and ESXi, ensuring you have a seamless setup experience regardless of your operating system. Once GNS3 is installed, learn to build a basic topology to simulate network scenarios effectively. The course progresses to adding various images, including Dynamips and VIRL, to enhance your simulation environment. Upgrading GNS3 is made simple with our step-by-step instructions, ensuring you always have access to the latest features and improvements. Connecting GNS3 to your network and making necessary configurations are crucial skills covered in this course. Whether you are setting up a new simulation or modifying existing choices, our comprehensive guides ensure you can navigate and optimize GNS3 with confidence. This course is designed to equip network professionals with the tools and knowledge to leverage GNS3 for advanced network simulation and troubleshooting.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 3, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9781835881446 , 1835881440
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with core cybersecurity concepts, creating a solid base for in-depth security management study. It dives into security principles, authentication factors, and control types, establishing fundamental cybersecurity knowledge. The course covers topics such as Zero Trust, physical security, and encryption complexities, including Public Key Infrastructure and digital certificates. The course also explores the diverse threat landscape, from social engineering to cloud and virtualization vulnerabilities, providing a comprehensive understanding of cyber threats. The course investigates various attack indicators, like malware and network attacks, boosting your threat identification and response capabilities. Key security infrastructure elements, including firewalls and secure communication, are discussed. The course also emphasizes practical applications in identity and access management, wireless security, and network device security. Vulnerability analysis and digital forensics are examined, readying you for both proactive and reactive cybersecurity roles. Concluding with governance, risk management, and compliance, this course prepares you for real-world cybersecurity challenges, making it a crucial tool for aspiring professionals. What you will learn Understand security control categories Learn Zero Trust and physical security Explore encryption and PKI solutions Identify and mitigate digital threats Secure networks and communication Implement comprehensive cybersecurity measures Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to specialize in cybersecurity. A foundational understanding of IT and basic security concepts is recommended. The course is perfect for those seeking to enhance their cybersecurity skills and apply them in various IT and network security roles. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT. Anthony Sequeira: Anthony Sequeira, our Edutainer, boasts a robust IT career since 1996 and a love for technology from various vendors. His extensive certifications cover CCIE R&S #15626, AWS, Cisco, CompTIA, Juniper, and Microsoft. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887943 , 1835887945
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computing Technology Industry Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a journey to mastering cybersecurity with our CompTIA CySA+ certification course, a pathway designed for those aspiring to become proficient cybersecurity analysts. This course comprehensively covers crucial topics like threat intelligence, vulnerability management, and incident response, ensuring you are well-prepared for the CompTIA CySA+ exam. As a globally recognized certification, CySA+ validates the essential skills and knowledge pivotal in the cybersecurity domain, making it a sought-after credential for professionals in the field. In this course, you will dive deep into practical aspects of cybersecurity, learning to analyze security logs, identify and address security incidents, and manage vulnerabilities effectively. A significant emphasis is also placed on the critical skill of effectively communicating security findings, a key component of a cybersecurity professional's role. By the end of this course, you will not only be prepared for the CySA+ exam but also equipped with the real-world skills needed to excel in the fast-evolving cybersecurity landscape, making the certification a valuable milestone in your career advancement. What you will learn Navigate the complexities of cybersecurity concepts and principles. Identify and mitigate malicious activities in network, host, and application security. Utilize a variety of cybersecurity tools for detection, analysis, and response. Master encryption mechanisms and IAM implementations for enhanced security. Understand the roles of DNS, IP reputation, and email security in cybersecurity. Engage in proactive threat hunting to pre-empt potential security breaches. Audience The CompTIA CySA+ (CS0-003) course is ideal for aspiring and current cybersecurity professionals, IT staff looking to specialize in security, and students in related fields. It's also perfect for compliance and risk management personnel, government or defense employees, and technical support staff seeking comprehensive cybersecurity knowledge. This course is a valuable resource for anyone aiming to pass the CySA+ certification exam or enhance their understanding of cybersecurity practices. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884768 , 1835884768
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the CompTIA Linux+ (XK0-005) course, your gateway to mastering the Linux operating system. Our comprehensive program equips learners with essential skills for navigating, securing, and administering Linux-based systems. Throughout this course, we cover an array of Linux essentials, ensuring a robust understanding of this powerful OS. You'll explore diverse topics, from installation and configuration to file management, storage setup, scripting, containerization, networking intricacies, and proficient troubleshooting techniques. The content presented is distribution-agnostic, ensuring applicability across various Linux distributions and fostering adaptability in any Linux environment. We will dive into the heart of Linux administration, gaining hands-on experience in installing, securing, and efficiently managing Linux systems. Uncover the power of the command-line interface, file, and directory operations, and navigate the Linux Filesystem Hierarchy Standard. Learn to troubleshoot performance issues, configure network settings, and implement robust security measures and alternative authentication methods. By the end of this course, you will not only be prepared for the CompTIA Linux+ certification but also equipped with practical skills for real-world Linux administration. What you will learn Understand fundamentals, installation, and configuration techniques Master navigation, editing, searching, and archiving in Linux Manage users, accounts, groups, and file permissions effectively Configure adapters, troubleshoot networks and secure remote connections Create and execute Bash scripts for task automation in Linux Learn partitioning, file system creation, mounting, and logical volume Audience This course is ideal for aspiring and current IT professionals, system administrators, and tech enthusiasts eager to deepen their Linux knowledge. A basic understanding of operating systems and familiarity with command-line interfaces are helpful but not mandatory. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Don Pezet: With over two decades in the IT domain and a spectrum of IT certifications, Don Pezet has dedicated over 12 years to IT education. Specializing in network and systems administration, Don's expertise extends into Linux, a topic he ardently teaches. His commitment extends to providing engaging, convenient, and impactful training, reflecting his aspiration to offer the guidance he wished for at the onset of his IT journey. Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887424 , 1835887422
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 51 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Penetration testing (Computer security) Study guides Certification ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Informatique ; Personnel ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is meticulously designed to transform learners into skilled professionals in the field of penetration testing and vulnerability management. The course kicks off with an overview of the latest penetration testing skills and vulnerability assessment techniques. It progresses to unravel the complexities of regulations and compliance in the industry, discussing key mandates like PCI-DSS and GDPR. The course further delves into practical aspects of penetration testing such as legal concepts, documentation, standards, and methodologies. It covers critical elements like DNS and target reconnaissance, host discovery, and the use of various tools for defense detection and avoidance. You'll gain hands-on experience in vulnerability scanning, network segmentation testing, and exploring the intricacies of wireless and cloud attacks, among others. Beyond technical skills, the course emphasizes professionalism, integrity, and the significance of effective communication during engagements. It culminates in mastering the art of report writing and recommended remediations, ensuring a comprehensive understanding of the entire penetration testing process. From understanding the basics of penetration testing to analyzing scripts and automating tasks, you'll to be adept at identifying, exploiting, and mitigating security weaknesses. What you will learn Understand the fundamentals and challenges of application security Master risk management strategies and security analysis techniques Conduct penetration testing and exploit vulnerabilities Implement runtime protection in applications Apply security standards, requirements, and maturity models Create a comprehensive roadmap for application security Audience The ideal target audience for the CompTIA PenTest+ course includes cybersecurity professionals, IT security analysts, vulnerability testers, network security professionals, and anyone aspiring to build a career in penetration testing or enhance their skills in identifying and mitigating network vulnerabilities. It's also well-suited for individuals preparing for the CompTIA PenTest+ certification exam. About the Authors ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way. Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT. Ronnie Wong: Ronnie brings over 20 years of experience in the field of computers and technology, coupled with more than a decade dedicated to technical instruction. This extensive background is complemented by an impressive array of certifications: Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Technology Specialist (MCTS), and CompTIA's A+, Security+, Network+. Ronnie is also a certified IT Technician, holding the CCNA Security.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...