Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O'Reilly Media Company.  (195)
  • Vugt, Sander van  (53)
  • ACI Learning,  (45)
  • Därr-Expeditionsservice
  • Electronic videos ; local  (226)
  • Instructional films  (69)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135338698 , 0135338697
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: Virtual computer systems ; Systèmes virtuels (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781801078047 , 1801078041
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the foundational concepts of working with variables and basic scripting, setting the stage for more advanced scripting techniques. It delves into the intricacies of the Linux operating system, including the X11 and Xorg configuration. As the course progresses, it covers critical administrative tasks such as managing user accounts, groups, system accounts, and scheduling tasks with cron and systemd. The importance of localizing Linux, managing system time, and configuring network time protocol (NTP) servers and clients is highlighted. The course focuses on essential system management topics, including system logging with rsyslog and journald, configuring mail transfer agents, and managing printers. Networking fundamentals are explored, from understanding TCP/IP to configuring network adapters and troubleshooting network issues. Security is a key theme, with topics on auditing permissions, managing root access with sudo, exploring networks, hardening Linux, and configuring SSH and GPG for secure communications. The course wraps up by offering insights into tunneling traffic with SSH, providing students with a comprehensive skill set for securing and managing Linux systems effectively. What you will learn Manage Linux user accounts and groups efficiently Schedule tasks using cron and systemd Configure and troubleshoot Xorg and remote X servers Secure Linux systems and manage root access Configure network settings and troubleshoot networking issues Encrypt data and communications with GPG Audience This course is ideal for aspiring and current IT professionals seeking to deepen their expertise in Linux administration. Ideal for those aiming to pass the LPIC-1 (102-500) certification exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881248 , 1835881246
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Web applications Security measures ; Tests d'intrusion ; Applications Web ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the foundational elements of web application infrastructure, introducing you to the critical aspects of URLs, HTTP Methods, and the underlying technologies that make the internet tick. You will gain a firm grasp on the workings of Web APIs, Content Management Systems, and Databases, setting the stage for more advanced topics. The course focuses on equipping you with the skills to identify, analyze, and exploit vulnerabilities within web applications. From exploring the use of powerful tools like Burp Suite and OWASP ZAP to understanding the intricacies of SQL Injection, XSS attacks, and CSRF (Cross-Site Request Forgery), you will journey through a curriculum designed to challenge and enhance their hacking capabilities. The course wraps up by delving into complex security issues such as JWT Attacks, IDOR, and SSRF, ensuring you emerge with a well-rounded mastery of web app pentesting. Throughout, the emphasis is on hands-on learning, providing you with the opportunity to apply concepts in real-world scenarios, thereby cementing your understanding and preparing you for professional success. What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. Familiarity with basic security concepts and experience with web technologies are recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633074 , 183763307X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the foundational elements of Linux Shell Scripting, guiding you through basic script building and the use of variables to automate repetitive tasks efficiently. As the course progresses, it focuses on more complex concepts such as redirection, arithmetic operations, and conditional statements, enhancing your scripting skills for real-world applications. Through practical examples, you'll learn how to craft scripts that solve problems, automate tasks, and streamline your workflow. The course wraps up by delving into advanced topics such as loops, user input handling, and script control, equipping you with the knowledge to write sophisticated scripts. By the end of this course, you'll have a solid understanding of Linux Shell Scripting, enabling you to leverage its capabilities to optimize and automate your Linux environment. What you will learn Craft basic to advanced shell scripts Automate tasks using shell scripts Implement conditional logic in scripts Create loops for repetitive tasks Control script flow and execution Optimize Linux tasks through scripting Audience This course is ideal for IT professionals, system administrators, and developers looking to automate and optimize their Linux environments. Basic knowledge of Linux commands is required. Perfect for those aiming to enhance their scripting skills for efficiency. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885703 , 1835885705
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters - the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats. What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Brad Stine: Brad Stine is the Chief Information Security Officer at Semper Sec with years of experience in security architecture. Throughout his career, Brad has played a key role in the development and delivery of technology-driven business solutions, including projects centered around cloud transformation, CI pipeline automation, and identity access management. Brad is highly skilled in Analytics, Incident Management, Vulnerability Management, ISO 27001:2013, and Enterprise Architecture. He has an extremely knowledgeable computer science background and holds a CISSP certification.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836207511 , 1836207514
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Computer security Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock the potential to elevate your career with the AWS Certified Security - Specialty course, which intricately details the mechanisms and strategies for enhancing security within the AWS ecosystem. This course begins with an introduction to host and network security, guiding you through key security configurations and troubleshooting practices. As you progress, delve into the critical areas of data encryption and key management, ensuring your expertise in protecting data at rest and in transit. The course also addresses logging, monitoring, and responding to security incidents effectively, giving you the tools to not only react to but also anticipate and mitigate potential security threats. Each section is designed to build upon the previous, ensuring a comprehensive understanding of AWS security from the ground up, making it indispensable for IT professionals aiming to specialize in cloud security.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138293321 , 0138293325
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Become a Linux power user! Overview: Learn the ins and outs of Linux Internals and discover what makes Linux the most powerful operating system Get under the hood and understand how Linux really works Perform in-depth practical investigations of key Linux functionalities Linux Under the Hood offers an extensive exploration of how Linux functions, allowing you to fully harness its capabilities. Familiarizing yourself with Linux internals will allow you to surpass mere commands and gain valuable insights to optimize your use of Linux. The first module dives into a deeper understanding of Linux architecture; you will learn about the inner workings of key Linux components like the kernel, systemd, and the Linux boot procedure. The following module will focus on storage and filesystems, encompassing local devices as well as cloud and datacenter storage solutions. Next, we will cover core components, including memory, processes, and the intricacies of command execution. Finally, we will explore Linux's evolution into a container-based platform. Each lesson concludes with a real-world scenario, where Sander demonstrates the practical implementation of various features explained in the lesson videos. Sign up for live training classes by Sander van Vugt: Linux Under the Hood (Updated) If you believe your knowledge of the Linux operating system is limited, you can start with Sander's Linux Fundamentals, 2 nd edition video course. About the Instructor: Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level: Intermediate to advanced Course requirement: Learners are expected to have basic working knowledge of the Linux operating system. Learners should prepare one virtual or physical machine with any Linux distribution; hardware specs are not important. To make it easy to follow along with the instructor, it is recommended (but not required) to install either the latest version of Ubuntu LTS (either workstation or server edition) or the latest CentOS Stream or equivalent. Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. The secondary audience consists of operating system students and others who want to know how Linux works. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135313022 , 0135313023
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Kubernetes ; Application software Development ; Computer programs ; Logiciels d'application ; Développement ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 6, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886502 , 1835886507
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Risk management ; Sécurité informatique ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836205456 , 1836205457
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 38 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer algorithms ; Problem solving ; Algorithmes ; Résolution de problème ; algorithms ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Algorithmic Problem Solving"" is a cutting-edge video course tailored for those who seek to navigate the complexities of programming with ease and confidence. This comprehensive course begins by addressing the common hurdles newcomers face when diving into the world of programming. Through a series of engaging episodes, instructors Justin and Vonne, alongside Zach, guide learners through the art of algorithmic thinking, starting with foundational concepts and gradually advancing to more complex challenges. The course meticulously covers a range of topics from planning and implementing solutions for finding the maximum number in a list, reversing strings, detecting palindromes, applying title casing to strings, to coding a Caesar cipher. Each topic is designed to not only teach the technicalities of coding but also to sharpen problem-solving skills, thereby enhancing learners' ability to tackle any programming challenge with strategic thinking and precision. By the end of this journey, participants will have gained invaluable insights into algorithmic problem-solving that will serve as a cornerstone for their future projects, making their code more efficient, readable, and above all, effective. What you will learn Approach and solve programming problems algorithmically. Implement solutions for common coding challenges in Python. Enhance code readability and maintainability. Develop strategies for planning and coding algorithms. Apply concepts of string manipulation and data processing. Design algorithms for detecting patterns and encrypting data. Audience Ideal for beginner to intermediate programmers who have a basic understanding of Python or another programming language. No prior algorithmic or advanced mathematical knowledge is required, but familiarity with basic programming concepts is recommended to get the most out of the course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204473 , 1836204477
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: An immersive video course designed to introduce and deepen your understanding of Object-Oriented Programming (OOP) principles within the Python ecosystem. Through a hands-on approach, instructors Vonne and Justin guide you from the foundational setup and OOP basics--encapsulation, abstraction, inheritance, and polymorphism--to the creation of a dynamic text-based game, MonsterSlash. This course is structured to enhance your programming skills by applying OOP techniques to reduce code redundancy, promote reusability, and streamline your coding workflow. You'll embark on a project-driven learning path that not only solidifies theoretical concepts but also puts them into practice by developing a fully functional game. As the course progresses, you'll refine your game, add complexity, and implement advanced OOP strategies, culminating in version 2 of MonsterSlash that features enhanced gameplay elements. Whether you're a beginner eager to explore programming or an intermediate looking to sharpen your OOP skills in Python, this course offers valuable insights and skills for your development arsenal. What you will learn Set up your Python environment for OOP development. Understand and apply the four pillars of OOP in Python. Create, extend, and refine classes and objects. Develop a text-based game from scratch using OOP principles. Employ inheritance and composition to optimize your code. Refactor and enhance your game with advanced OOP techniques. Audience This course is ideal for individuals interested in Python programming, especially those curious about object-oriented programming. Beginners will find the course accessible, while intermediate programmers can deepen their OOP knowledge. Prior exposure to basic Python syntax is helpful but not required. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OfficeProTV and CreativeProTV channels. She has over a decade of experience teaching Office and Adobe applications both online and in the classroom. Certifications: Microsoft Office Master 2016.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836205357 , 183620535X
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "Embark on a programming adventure with ""Applied Fundamentals: Hangman,"" where you'll apply your foundational coding skills to build the time-honored game of Hangman from scratch. This course, guided by Justin and Vonne, starts with an overview of how learning fundamental programming can be empowering and immediately useful. Through a series of meticulously planned videos, you'll journey from conceptualizing the project, setting up the structure, to implementing the game's core mechanics such as taking guesses, determining correct answers, and enhancing user interface. As the course progresses, you'll dive into refining the code by refactoring into functions, adding a scoreboard, and implementing win/lose conditions, all while ensuring your Hangman game is as engaging as it is functional. This hands-on approach not only solidifies your understanding of programming concepts but also hones your problem-solving and project management skills, preparing you for future software development projects. What you will learn Plan and structure a programming project from the ground up Implement core game mechanics i.e. guess input and answer validation Enhance user experience through improved interface design Refactor code into functions for better organization Manage game states and implement win/lose logic Create dynamic feedback for users Audience Ideal for beginners with a basic understanding of programming concepts looking to apply their knowledge in a fun, tangible project. A rudimentary knowledge of Python or similar languages is recommended but not necessary. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OfficeProTV and CreativeProTV channels. She has over a decade of experience teaching Office.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204459 , 1836204450
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/17
    Keywords: Python (Computer program language) ; Application software Development ; Python (Langage de programmation) ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Abstracting with Functions"" is a meticulously curated video course designed for technical professionals eager to master the art of function creation in Python. Through a comprehensive series of videos, learners are taken on a journey that begins with the basics of what functions are and why they are pivotal in programming. The course underscores the significance of functions in collecting logic into reusable chunks, thereby fostering more readable and maintainable codebases. Starting with an introductory overview, the course swiftly moves to dissect the anatomy of functions, from the simplest forms without arguments to more complex functions featuring multiple positional and keyword arguments. Each episode, hosted by dynamic duos such as Aubri and Ronnie or Justin and Zach, not only discusses the syntax and theoretical aspects but also delves into practical demonstrations and the subtleties of function creation, such as edge cases and argument types. The importance of understanding functions is also linked to professional development, highlighting their relevance in networking and certification exams. By the end of the course, learners will have a solid grasp of how to efficiently abstract logic through functions, enabling the construction of more sophisticated and scalable programs. What you will learn Understand the fundamental concept of functions. Explore the syntax and creation of functions in Python. Distinguish between various types of functions. Learn advanced topics such as keyword arguments. Use mixed arguments to enhance function versatility. Grasp the significance of functions in different contexts. Audience Individuals at the beginning of their coding journey who want to learn best practices early on, and those with some experience in Python or other programming languages looking to deepen their understanding of functions and how to use them more effectively in their projects will find this course quite useful. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836209591 , 1836209592
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft Power BI (Computer file) ; Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Our video course is a comprehensive journey through the world of data visualization and analysis using Power BI. Hosted by Adam, this series is tailored for individuals aiming to leverage Power BI's robust capabilities to turn disparate data sources into coherent, visually immersive, and interactive insights. Beginning with an introduction to Power BI's ecosystem, Adam walks you through installing the software, understanding its interface, and the prerequisites needed to get started. The course progresses into more advanced topics such as connecting to data sources, refining data with queries, and creating interactive reports and dashboards. You'll learn not just the technical skills but also the thought processes behind effective data visualization and analysis strategies. Whether you're dealing with Excel spreadsheets or hybrid data warehouses, this course equips you with the knowledge to make data-driven decisions confidently. With a focus on real-world application, Adam ensures that by the end, you'll be proficient in using Power BI to its full potential, making you an invaluable asset to your organization. What you will learn Identify and connect to various data sources with Power BI Refine and transform data using Power BI desktop and service Create dynamic reports and dashboards Use DAX for basic measures Design mobile-responsive reports and dashboards Analyze data trends with Power BI's analysis features Audience This course is ideal for business and data analysts, BI professionals, and anyone interested in data visualization. A basic understanding of data principles is recommended but not required. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836202530 , 1836202539
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; JavaScript (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is a comprehensive training program designed for IT beginners and network students eager to delve into the fundamentals of network security. In today's digital age, safeguarding information and data is of paramount importance, and this course equips participants with the essential knowledge and skills to excel in the field of cybersecurity. This course is ideal for individuals with a basic understanding of Linux programming, and it provides a solid foundation in network defense and information security. Our primary goal is to enable trainees to reach competency and expertise in network defense and information security skills, ensuring they are well-prepared to navigate the complexities of the digital landscape. The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836208938 , 1836208936
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Applied Fundamentals: Guess the Number"" offers a hands-on approach to learning programming by guiding participants through the creation of a simple yet captivating game. Led by Justin and Vonne, along with Zach, this course begins with an overview, setting the stage for what's to come. As learners progress, they're taken through the crucial stages of game development--from initial planning and project setup to coding game logic and user interactions. The course emphasizes the iterative process of building software, including planning, coding, testing, and refining, making it ideal for those looking to strengthen their programming foundations. Through the development of the ""Guess the Number"" game, participants will learn about user input handling, program flow control, function utilization for cleaner code, and implementing game mechanics like guess limits and win/lose determination. This course not only teaches the technical aspects of programming but also instills a problem-solving mindset, critical for any aspiring developer. By the end, learners will have a fully functional game and a deeper understanding of how to apply programming concepts in real-world projects. What you will learn Plan and set up a programming project from scratch. Handle user inputs and process them within your application. Refactor code into functions for improved readability and maintenance. Implement control flow to manage game states, including win and lose conditions. Audience This course is ideal for beginners in programming or those with basic Python knowledge looking to solidify their understanding through a practical project. A fundamental understanding of Python syntax is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204077 , 1836204078
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course systematically walks you through the foundational aspects of Python, starting with the basics of setting up your programming environment and progressing through more complex programming concepts. Justin and Vonne guide you through understanding variables, values, data types, control structures, data structures, and iteration with clarity and practical examples. You'll delve into the nuances of Python's syntax, exploring how to write clean and efficient code. By tackling real-world problems, you'll apply what you've learned in a hands-on manner, solidifying your understanding and skills in programming. This course not only teaches you how to code in Python but also how to think like a programmer, preparing you for further learning and application in the tech industry. What you will learn Understand and use variables, expressions, and statements. Differentiate and use basic data types. Implement control structures. Work with Python data structures. Master iteration through loops, and comprehensions. Utilize iteration helpers like zip, range, and enumerate. Audience This course is perfect for beginners with no prior programming experience looking to dive into the world of Python programming. A curiosity about coding and a desire to learn are all you need to get started. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OffceProTV and CreativeProTV channels. She has over a decade of experience teaching Office and Adobe applications both online and in the classroom. Certifications: Microsoft Office Master 2016.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780138230678 , 0138230676
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Complete video course
    Series Statement: Live lessons
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 20+ Hours of Video Instruction Your full resource to successfully study for the Linux Foundation Certified System Administrator (LFCS) exam Linux Foundation Certified System Administrator (LFCS) Complete Video Course, 3rd Edition is a comprehensive video training that will teach you core Linux concepts and usage along with clear explanations on the objectives of the LFCS exam. To offer this course in a way that is most efficient for you, the contents have been developed to build on your existing Linux knowledge. You will start with Linux Fundamentals, 2nd edition, a full video course on Linux basics, concepts, practices, and theories so you can get the foundational knowledge you need. You will then dive into the core part of the LFCS exam--including Advanced System Administration--and managing storage, security, SSH services, and virtualization. Each lesson ends with a lab for you to practice the skills learned in each lesson. These labs also act as training for the hands-on LFCS exam. The LFCS section explores more advanced LFCS topics. It covers Advanced Systems Management; security; storage; containers and virtualization; and open-source solutions. The course then ends with a practice exam so you can test your skills, compare your answers to mine, and get a feel for the exam before you take the test. Topics included in course: Linux Fundamentals, 2nd Edition Module 1: Essential Commands Module 2: User and Group Management and Permissions Module 3: Operating Running Systems Linux Foundation Certified System Administrator (LFCS) Module 1: Advanced Systems Management Module 2: Managing Security Module 3: Managing Storage Module 4: Containers and Virtualization Module 5: Using Essential Open Source Solutions Module 6: Practice Exam About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level : Beginner to Intermediate Learn How To : Key concepts for all the objectives on the Linux Foundation Certified System Administrator (LFCS) exam Real-life Linux administration tasks Course requirement: The ideal target student wants to learn Linux from the ground up and carry through to the LFCS exam. They will start with the Linux Fundamentals portion of the course, and then get into the details for LFCS exam prep. Who Should Take This Course : Linux Foundation Certified System Administrator (LFCS) certification candidates Anyone interested in learning about Linux from the ground up Junior system administrators who want to deepen their skills Administrators currently administering UNIX systems and developers who write software for Linux DevOps Engineers who want to build their Linux skills About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138230258 , 0138230250
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 41 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Live lessons
    DDC: 005.8
    Keywords: Git (Computer file) ; Application software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 9+ Hours of Video Instruction Over 9 Hours of Video Instruction Demonstrating How To Use GitOps To Manage Cloud Native Applications Overview: Automating Kubernetes with GitOps is designed to teach you the key concepts on how to automate infrastructure using Gitops. It introduces core topics of DevOps, pipelines and Git and shows how to build images from code in an automated way. You will build on your knowledge of automating infrastructure using Terraform and Ansible and proceed with how to use GitOps operators in a Kubernetes environment and build a custom operator. Finally, you will also learn how to use operators provided by ecosystems, such as Tekton and Argo CD. Best-selling author and trainer Sander van Vugt uses real-world scenarios and demos throughout so you can see in real time how to use GitOps efficiently and effectively to manage Cloud Native applications. Topics Include: Understanding the Fundamentals teaches the fundamentals by covering DevOps, GitOps and how to work with pipelines. From Code to Image teaches how to code from image and goes deeper on creating container images based on the code that you have in Git. Automating Infrastructure is about infrastructure automation. It covers how to use infrastructure as code, using Terraform, and about configuration as code, using Ansible. From Image to Application is about GitOps and how to advance from running container images to running applications in Kubernetes, accompanied by a short introduction to running applications in Kubernetes. Using Kubernetes Ecosystem Solutions covers GitOps solutions that come from the Kubernetes ecosystem including observability, tekton pipelines, and automated code updates. About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level : Intermediate Learn How To : Use DevOps, GitOps, and pipelines Build Container Images using Dockerfile Run Applications in Kubernetes Setup Kubernetes for Gitops Build a custom GitOps operator and run it in Kubernetes Use advanced Kubernetes solutions to integrate the GitOps operator in Kubernetes Use GitOps solutions provided by the ecosystem, such as Argo CD, Jenkins, and Tekton Course requirement: Basic knowledge of Kubernetes is recommended. Students without Kubernetes knowledge are recommended to watch Getting Started with Kubernetes, 3rd Edition by Sander van Vugt: https://learning.oreilly.com/videos/getting-started-with/9780138057626/ Who Should Take This Course: IT professionals who want to learn how to use GitOps and Kubernetes to implement an optimized way to manage infrastructure as code, as well as applications. DevOps Engineers Software Developers IT Administrators IT Architects Hybrid Cloud Administrators About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 24, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138282691 , 0138282692
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: "Sneak peek.". - "Video course.". - Online resource; title from title details screen (O'Reilly, viewed September 05, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138268510 , 0138268517
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Kubernetes ; Application software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 15+ Hours of Video Instruction Go from basic to guru in the Kubernetes world! Overview: Kubernetes: From Basics to Guru is your one-stop course to mastering the Kubernetes world. The course is a comprehensive guide to learn fundamentals through advanced concepts in a carefully curated course. You will master container orchestration, Kubernetes deployments, and unlock the full potential of cloud-native applications. Learn to run applications in Kubernetes and create a minikube and cloud native environment. You will learn how to manage security settings, understand API access, setup RBAC, deploy applications using YAML manifests and demonstrate continuous delivery using GitOps principles. The course is divided into 26 lessons categorized under 6 modules. The modules are Fundamentals, DevOps and GitOps, Kubernetes, Advanced Kubernetes Services, Microservices and Gitops. This master course includes lessons from: Building and Managing Microservices with Kubernetes and Istio Automating Kubernetes with GitOps Getting Started with Containers Kubernetes and Cloud Native Associate (KCNA) Complete Video Course Certified Kubernetes Administrator (CKA) Complete Video Course, 3rd Edition Getting Started with Kubernetes About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level: Beginner to Intermediate Learn How To: Run Applications in Kubernetes Setup Kubernetes for GitOps Use DevOps, GitOps, and pipelines Run Kubernetes, Minikube environment, and run applications in Kubernetes Run applications in a cloud native environment Create a Kubernetes cluster Manage Kubernetes Networking Manage Cluster Nodes Troubleshoot Kubernetes Clusters and Applications Course requirement: A computer with a recent operating system and at least 4GB RAM and 20GB available disk space Basic knowledge of Kubernetes is recommended. Students without Kubernetes knowledge are recommended to watch Getting Started with Kubernetes, 3rd Edition by Sander van Vugt: https://learning.oreilly.com/videos/getting-started-with/9780138057626/ Who Should Take This Course: Developers that need to learn how to write efficient and well-structured Rust applications People with prior OOO language experience About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: "Video course.". - Online resource; title from title details screen (O'Reilly, viewed September 05, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138271657 , 0138271658
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 52 min.)) , sound, color.
    Edition: Second edition.
    DDC: 005.4/32
    Keywords: Red Hat, Inc ; Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Systems engineering Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 9+ Hours of Video Instruction 9+ hours of video instruction and test-taking strategies for the 2023 RHCE exam. Red Hat Certified Engineer (RHCE) EX294, Second Edition provides more than 9 hours of video training to give you a solid understanding of the RHCE objectives. Experienced author and trainer Sander van Vugt covers all topics in the exam and ends each lesson with a lab walkthrough, so you can see how to complete goals and solve scenarios in real time. The course emphasizes how to perform common automation tasks using Ansible, as well as how to use common Ansible components to automate the management of a Linux environment. This video training was designed to provide an in-depth understanding of all topics on the Red Hat Certified Engineer (RHCE) exam, as well as a deeper understanding of Red Hat Enterprise Linux and Ansible. You will learn concepts, and then practice through video labs that you can also perform on your own so you can test your skills. Each lab ends with the instructor providing a detailed a solution where he explains how to solve for the exam objectives. Related Learning: Sign up for live training classes on RHCE and Ansible with Sander van Vugt: Red Hat Certified Engineer (RHCE) EX294 Crash Course: https://learning.oreilly.com/live-events/red-hat-certified-engineer-rhce-ex294-crash-course/0636920092161/ Ansible in 4 Hours: https://learning.oreilly.com/live-events/ansible-in-4-hours/0636920123842/ Topics included in this course: Introduction to Ansible is about the Ansible product offering, followed by lessons on how to set up an Ansible managed environment. After you've done that, you'll learn how to work with Ad Hoc commands, playbooks, as well as variables and facts. Using Advanced Ansible Solutions teaches the more advanced Ansible elements. The end of lesson labs will verify your Ansible knowledge by practicing how to apply task control, using loops, items, when, handlers, blocks, and more. Managing RHEL 9 with Ansible is about how to use Ansible for some common scenarios. It will cover scenarios about software management, user management, managing processes and tasks, managing storage, as well as networking. Sample Exam allows you to practice topics covered in the RHCE 9 objectives in a way that is very similar to what you'll see on the exam About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides, as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level : Intermediate/Advanced Learn How To : Work with Ansible Best prepare for the RHCE EX294 Manage RHEL 9 with Ansible Set up a Managed IT Environment Use Ad Hoc Commands and Playbooks to manage RHEL 9 Servers Work with Ansible Content Collections Course requirement: Plan to, or have already, taken the RHCSA Exam A working knowledge of Linux Who Should Take This Course : Linux engineers that want to become certified to work with Ansible to manage Red Hat Enterprise Linux Junior system administrators that want to deepen their skills in configuration management Administrators with a profound knowledge and experience working with any Linux distributions, and want to learn how to use Ansible to manage their environment Administrators currently administering UNIX systems Developers that write software for Linux Administrators who have already completed the RHCSA Exam About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed August 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889886 , 1835889883
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.076
    Keywords: Client/server computing Study guides Examinations ; Web servers Study guides Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with an exploration of server architecture, delving into components, racks, power management, and connectivity, establishing a solid foundation. You'll gain insight into the types of storage drives, shared storage solutions, and the importance of fault tolerance. The course focuses on hands-on server administration, from OS requirements and installations to robust server network configuration. It emphasizes the significance of server roles, storage management, and data security, linking them to high-availability and cloud technologies. The course wraps up by equipping you with critical skills in scripting, asset management, disaster recovery, and troubleshooting, ensuring you're prepared to tackle server challenges head-on. What you will learn Identify server hardware components Configure network roles and features Implement effective data security measures Perform disaster recovery operations Apply server monitoring techniques Troubleshoot common server issues Audience This course is ideal for IT professionals seeking to advance in server administration. Basic knowledge of computer systems and networks is beneficial. This course is designed for those aiming to align their skills with industry-standard server management and security practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780138191368 , 0138191360
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 22 min.)) , sound, color.
    Series Statement: Complete video course
    Series Statement: Live lessons
    DDC: 005.3
    Keywords: Application software Study guides Development ; Examinations ; Virtual computer systems Study guides Examinations ; Computer programmers Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Overview A full deep-dive training to learn how to run applications on Kubernetes and pass the CKAD and CKA exams! 21 hours of video instruction Description This master class includes the following courses: Certified Kubernetes Application Developer (CKAD) Complete Video Course, 3rd Ed Certified Kubernetes Administrator (CKA) Complete Video Course, 3rd Edition Certified Kubernetes Application Developer (CKAD) Complete Video Course, Third Edition is your complete guide to learning how to run Kubernetes applications and pass the CKAD exam. It includes in-depth discussions, lightboard explanations, and lab demonstrations to get you started with Kubernetes. It also covers all objectives in the industry-recognized CKAD exam. Each lesson ends with a hands-on lab and the video course concludes with a full practice exam, so you can get the practice you need to feel prepared on exam day. The course provides in-depth knowledge for how to develop, create, manage, store, and troubleshoot Kubernetes applications, as well as how to work with containers in a Kubernetes environment. Best-selling author and trainer Sander van Vugt clearly and succinctly explains Kubernetes basics and building and exposing scalable applications. Advanced CKAD tasks, including working with the API, applying DevOps technologies, and troubleshooting Kubernetes are also covered. Certified Kubernetes Administrator (CKA), 3rd Edition acts as a complete study resource to help you build skills as you work your way through the course. Explore each exam objective on the CKA exam and learn how to build, run, and manage Kubernetes clusters. Expert trainer and author Sander van Vugt gives you hands-on labs to work with Kubernetes, so you have the opportunity to test your skills. The course then ends with a sample exam, allowing you to practice before taking the real thing. It introduces containers and Kubernetes, and moves through the process of creation, managing, and storing applications before providing labs on setting up and managing clusters, and how to troubleshoot Kubernetes applications and cluster nodes. Sander shows how to manage deployments, services, ingress, setting up storage, and walks through key troubleshooting scenarios. Course requirement: A working knowledge of Linux. To build a strong understanding of working with Linux, watch Linux Fundamentals, 2nd edition by Sander van Vugt. https://learning.oreilly.com/videos/linux-fundamentals-2nd/9780137929313/ A basic understanding of containers. To study for the KCNA exam, watch Kubernetes and Cloud Native Associate (KCNA) https://learning.oreilly.com/videos/kubernetes-and-cloud/9780137993413/ by Sander van Vugt. To work on the lab assignments in this course, participants need three virtual machines using a recent version of Ubuntu server LTS. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Certification ; Operating systems (Computers) Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Overview All topics covered to pass the EX180 and EX280 exams. 16+ Hours of Video Instruction Description This master class includes the following courses: Red Hat Certified Specialist in Containers and Kubernetes Complete Video Course: Red Hat EX180 Red Hat OpenShift Administration: Red Hat EX280 Red Hat Certified Specialist in Containers and Kubernetes Complete Video Course: Red Hat EX180 provides an in-depth analysis of the core objectives and topics in the Red Hat EX180 exam so you can get started with containers on Red Hat Enterprise Linux and OpenShift, the Red Hat Kubernetes distribution, while also preparing for the Red Hat exam EX180. Topics include managing containers and container images with Podman, running applications in OpenShift, and using OpenShift to automate complex automation builds. This video course is also a great resource for anyone interested in working with standalone containers using Podman on Red Hat, as well orchestrated containers and devops workflows using Red Hat OpenShift. In almost 9 hours of engaging video training, instructor Sander van Vugt uses deep-dive explanations, whiteboard instruction, and real-world hands-on demos. Each lesson concludes with a hands-on lab, which provides a deeper understanding of all the topics of Red Hat Certified Specialist in Containers and Kubernetes and helps you excel on your EX180 exam. Red Hat OpenShift Administration Complete Video Course: Red Hat EX280 provides an introduction in administrating OpenShift and prepares viewers to take the Red Hat exam EX280. This course provides in-depth training and hands-on labs exploring the ins and out of administering in OpenShift. Topics include management of cluster nodes, users, and role-based access control, as well as management of applications in an OpenShift environment. The Red Hat Certified Specialist in OpenShift Administration exam (EX280) tests the knowledge, skills, and ability to create, configure, and manage a cloud application platform using Red Hat OpenShift Container Platform. This engaging self-paced video training solution provides learners with more than 8 hours of video instruction from an expert trainer with years of providing practical Linux teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of all topics on the Red Hat OpenShift Administration EX280 exam, as well as a deeper understanding of Ansible. The combination of video and labs provides a unique offering that gives you a full toolkit to learn and excel on your exam. Course Requirements One (virtual) machine running Red Hat Enterprise Linux, CentOS, or Rocky Linux 8.x to perform the labs about Podman containers A computer running any operating system with at least 16GB RAM to run the CodeReady Containers Virtual Machine Students should be able to run a virtual machine that requires 12GB of RAM About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 9, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780138086558 , 0138086559
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Complete video course
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Application software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 13 Hours of Video Instruction More than 13 hours of deep-dive video training to learn how to run applications on Kubernetes and pass the CKAD exam. Overview : Certified Kubernetes Application Developer (CKAD) Complete Video Course, Third Edition is your complete guide to learning how to run Kubernetes applications and pass the CKAD exam. It includes in-depth discussions, lightboard explanations, and lab demonstrations to get you started with Kubernetes. It also covers all objectives in the industry-recognized CKAD exam. Each lesson ends with a hands-on lab and the video course concludes with a full practice exam, so you can get the practice you need to feel prepared on exam day. The course provides in-depth knowledge for how to develop, create, manage, store, and troubleshoot Kubernetes applications, as well as how to work with containers in a Kubernetes environment. Best-selling author and trainer Sander van Vugt clearly and succinctly explains Kubernetes basics and building, and exposing scalable applications. Advanced CKAD tasks, including working with the API, applying DevOps technologies, and troubleshooting Kubernetes are also covered. Topics include: Module 1: Container Fundamentals Module 2: Kubernetes Essentials Module 3: Building and Exposing Scalable Applications Module 4: Advanced CKAD Tasks Module 5: Sample Exam Skill Level : Beginner to Intermediate Learn How To : Best prepare to pass the Certified Kubernetes Application Developer (CKAD) exam Run applications in containers Develop, create, manage, store, and troubleshoot Kubernetes applications Manage API options Manage pods Manage deployment and networking Manage ingress Manage Kubernetes resource storage Manage ConfigMaps and Secrets Troubleshoot Kubernetes Use the Helm Package Manager Work with custom resources Implement blue/green deployments Implement canary deployments Use operators Course requirements: A working knowledge of Linux A basic understanding of containers Who Should Take This Course : IT Administrators DevOps Engineers Software Developers IT Architects Hybrid Cloud Administrators About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed December 12, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Addison-Wesley Professional
    ISBN: 9780137935611 , 0137935617
    Language: English
    Pages: 1 online resource (1 video file (32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Linux ; Operating systems (Computers) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 30 minutes of Video Instruction Description Learn the basics for using Windows Subsystem for Linux (WSL). Overview Linux Essentials for Windows Users LiveLessons is a concise video training course covering core topics, so you can start using Windows Subsystem for Linux. Expert author and trainer Sander van Vugt will walk you through the basics for using Windows Subsystem for Linux (WSL). The course is for anyone new to Linux who uses WSL and is meant to supplement the author's larger Linux Fundamentals course, in addition to any other Linux basics training. Linux Essentials for Windows Users LiveLessons is a short and precise course going over details for Windows users to use Linux commands by covering necessary and important foundational knowledge of working with WSL, using tools like MobaXterm and WinSCP that will allow connection to Linux and link Windows and Linux. The course will also cover Linux command line with a focus on WSL version 2. The course is a preparation for anyone using Windows to access Linux and designed to enable Windows users to access the power of Linux. Topics include: Getting started with Windows Subsystem for Linux 2 (WSL) Exploring the WSL Command Line Using root Permissions Running a Linux Service on WSL MobaXterm WinSCP About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open Source topics. He is the author of the best-selling Red Hat RHCSA Cert Guide and the Red Hat RHCSA Complete Video Course along with many other titles on topics that include RHCE, Bash, Kubernetes, Ansible and more. Sander also works as a Linux instructor, teaching on-site and on-line classes for customers around the world. Skill Level : Beginner Learn How To Get started with Windows Subsystem for Linux 2 (WSL) Explore the WSL Command Line Use root Permissions Run a Linux Service on WSL Use tools like MobaXterm and WinSCP Who Should Take This Course Any Windows user who wants to work with Linux. Course Requirements Students should have access to Windows 10 or later. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Compact discs. - Online resource; title from title details screen (O'Reilly, viewed June 21, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780137903726 , 0137903723
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 45 min.)) , sound, color.
    Edition: Third edition.
    Series Statement: Complete video course
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 23+ Hours of Video Instruction Description More than 23 hours of video instruction that helps you learn everything you need about Linux and excel the CompTIA Linux+ exam. Overview Full coverage of all objectives on the CompTIA Linux+ XK0-005 exam Hands-on labs provided in each lesson so you can gain real-world proficiency Explores everything from essential concepts to advanced administration tasks CompTIA Linux+ XK0-005 Complete Video Course is your go-to training to gain proficiency of Linux operating systems and to study for the CompTIA Linux+ exam. Expert author and trainer Sander van Vugt will walk you first through Linux basics, concepts, practices, and theories in his Linux Fundamentals, 2nd Edition video course. This 10-hour course is included with your CompTIA Linux+ XK0-005 training and provides the foundational knowledge needed to start your Linux career. You will then get a thorough review of the intermediate and advanced Linux concepts needed to pass the exam and build your skills. Sander van Vugt will teach core concepts and hands-on skills through lightboard and slide training as well as hands-on Linux CLI demos and labs, so you can learn the material and see firsthand how to use Linux efficiently and effectively. This accessible self-paced video training provides learners with more than 20 hours of personal visual instruction from an expert trainer with more than 20 years of practical Linux teaching experience. Topics include: Linux Fundamentals LiveLessons, 2nd Edition Module 1: Essential Commands Module 2: User and Group Management and Permissions Module 3: Operating Running Systems CompTIA Linux+ XK0-005 Complete Video Course, 3rd Edition Module 1: Essential Linux Management Module 2: Storage Management Module 3: Common Administration Tasks Module 4: Security Module 5: Advanced Administration Tasks About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level Beginner to Intermediate What you will learn The basics of Linux up through exam-level proficiency Key concepts for all the objectives on the CompTIA Linux + exam Real-life Linux administration tasks Who Should Take This Course Administrators and developers who want to become familiar with the Linux operating system Anyone who needs basic Linux skills for working with Linux in cloud, container, or Kubernetes environment Anyone looking to pass the CompTIA Linux+ exam Course Requirements Students need access to a virtual or physical machine, running the latest version of CentOS Stream or Ubuntu LTS. Using a cloud instance is not recommended, as this course discusses topics that are fundamentally different when working with cloud instances. About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed July 25, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780137931521 , 0137931522
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Red Hat, Inc ; Linux ; Electronic data processing personnel Study guides Certification ; Examinations ; Operating systems (Computers) Study guides Examinations ; Red Hat, Inc ; Linux ; Operating systems (Computers) ; Examinations ; Instructional films ; Internet videos ; Nonfiction films ; Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Red Hat Certified System Administrator (RHCSA) RHEL 9.
    Note: Online resource; title from title details screen (O'Reilly, viewed August 23, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 video file (24 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Live lessons
    DDC: 005.3
    Keywords: Application software Study guides Development ; Examinations ; Virtual computer systems Study guides Examinations ; Computer programmers Certification ; Logiciels d'application ; Développement ; Examens ; Guides de l'étudiant ; Systèmes virtuels (Informatique) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Overview All topics covered to pass the EX180 and EX280 exams. 16+ Hours of Video Instruction Description This master class includes the following courses: Red Hat Certified Specialist in Containers and Kubernetes Complete Video Course: Red Hat EX180 Red Hat OpenShift Administration: Red Hat EX280 Red Hat Certified Specialist in Containers and Kubernetes Complete Video Course: Red Hat EX180 provides an in-depth analysis of the core objectives and topics in the Red Hat EX180 exam so you can get started with containers on Red Hat Enterprise Linux and OpenShift, the Red Hat Kubernetes distribution, while also preparing for the Red Hat exam EX180. Topics include managing containers and container images with Podman, running applications in OpenShift, and using OpenShift to automate complex automation builds. This video course is also a great resource for anyone interested in working with standalone containers using Podman on Red Hat, as well orchestrated containers and devops workflows using Red Hat OpenShift. In almost 9 hours of engaging video training, instructor Sander van Vugt uses deep-dive explanations, whiteboard instruction, and real-world hands-on demos. Each lesson concludes with a hands-on lab, which provides a deeper understanding of all the topics of Red Hat Certified Specialist in Containers and Kubernetes and helps you excel on your EX180 exam. Red Hat OpenShift Administration Complete Video Course: Red Hat EX280 provides an introduction in administrating OpenShift and prepares viewers to take the Red Hat exam EX280. This course provides in-depth training and hands-on labs exploring the ins and out of administering in OpenShift. Topics include management of cluster nodes, users, and role-based access control, as well as management of applications in an OpenShift environment. The Red Hat Certified Specialist in OpenShift Administration exam (EX280) tests the knowledge, skills, and ability to create, configure, and manage a cloud application platform using Red Hat OpenShift Container Platform. This engaging self-paced video training solution provides learners with more than 8 hours of video instruction from an expert trainer with years of providing practical Linux teaching experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of all topics on the Red Hat OpenShift Administration EX280 exam, as well as a deeper understanding of Ansible. The combination of video and labs provides a unique offering that gives you a full toolkit to learn and excel on your exam. Course Requirements One (virtual) machine running Red Hat Enterprise Linux, CentOS, or Rocky Linux 8.x to perform the labs about Podman containers A computer running any operating system with at least 16GB RAM to run the CodeReady Containers Virtual Machine Students should be able to run a virtual machine that requires 12GB of RAM About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : Addison-Wesley Professional
    ISBN: 9780137894949 , 0137894945
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Complete video course
    Series Statement: Live lessons
    DDC: 005.1
    Keywords: Computer software Development ; Application software Development ; Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 13+ Hours of Video Instruction 13+ hours of video instruction teaching you how to get started with Ansible for managing Linux, Windows, Containers, Network Devices, and Cloud. Ansible is the leading solution for configuration management. It lets you automate assets in an environment--including Linux, Windows, Cloud, Network Devices and more--and works as an application-deployment tool enabling infrastructure as code. Ansible Complete Video Course: From Basics to Guru will teach Ansible from the ground up, so whether you're a novice or an experienced developer, administrator or user, this title will help you get the most out of your Ansible solutions and playbooks and manage your heterogeneous environment. This course consists of all the major and popular topics and concepts that are relevant to Ansible. It begins with the basics of Ansible and how to get started. It will then explore how to develop flexible playbooks before jumping managed infrastructure, ad-hocs commands, Ansible Tower, conditionals, plugins, and managing containers among various other important topics. Every lesson contains multiple practical examples that show how Ansible is used in the real world. At the end of each lesson, you will find an exercise that was built so you can practice your skills; each exercise also comes with a video explanation. Ansible Complete Video Course: From Basics to Guru is also a deep-dive into the topics covered in the Red Hat Ansible best practices exam (EX447). Topics include Getting Started with Ansible Developing Flexible Playbooks Advanced Ansible Management Managing Heterogenous Environment with Ansible About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level Beginner to Intermediate Learn How To Manage IT infrastructure with Ansible by following examples Get started with Ansible in just a few hours Get a feel for Ansible before focusing on Ansible Certification exams Perform advanced tasks with Ansible Who Should Take This Course Developers and administrators who want to use Ansible to manage different assets in their IT environment. IT users and professionals that want to get experience with simple programming languages. Course Requirements A minimum of 3 virtual machines, running Red Hat Enterprise Linux or Rocky Linux One virtual machine running the latest Ubuntu LTS Optionally, the following can be added One virtual machine running Windows Administrator Access to AWS Administrator Access to Azure A Cisco network device A virtual machine running VMware ESXi About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: "Sneak peek.". - Online resource; title from title details screen (O'Reilly, viewed May 10, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780137929313 , 0137929315
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 35 min.)) , sound, color.
    Edition: Second edition.
    Series Statement: Live lessons
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 10+ Hours of Video Instruction More than 10 hours of video instruction to get you up and running with Linux. Overview Linux Fundamentals LiveLessons has more than 10 hours of comprehensive video training for you to find everything you need to build a strong understanding of working with Linux. This comprehensive video course includes coverage of Linux basics, concepts, practices, and theories, so you can get the foundational knowledge of Linux you need to start your Linux career. Sander van Vugt will guide you through gaining an in-depth understanding of Linux. This full-featured video course includes a combination of active Linux demonstrations, lightboard instruction, and hands-on labs, providing a unique offering that gives you a full toolkit to enhance your learning and provide a seamless path forward should you want to get certified for Linux. This is a great first course for anyone wanting to pursue an RHCSA, Linux Foundation, or CompTIA Linux+ certification, or other entry-level Linux exams. Each lesson ends with a hands-on lab, giving you the opportunity to test out the skills and knowledge you have learned. The instructor then walks you through each Lab Solution so you can compare how you did with his work. Topics include Module 1: Essential Commands Module 2: User and Group Management and Permissions Module 3: Operating Running Systems About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level Beginner Learn How To: Install Linux Use essential tools Manage Files Work with text files Log in and run tasks with administrator privileges Work with the Bash Shell Manage Users and Groups Manage Permissions Store Management Essentials Manage networking Work with Systemd Manage software and SSH Manage Time Work with processes Schedule tasks Read log files Who Should Take This Course Administrators and developers who want to become familiar with the Linux operating system Anyone who needs basic Linux skills for working with Linux in cloud, container or Kubernetes environments Anyone taking the LFC and Linux+ exams Course Requirements Students should be able to install a virtual machine that runs Linux. Further instructions about installation are provided in Lesson 1 of this video course. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed June 6, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Addison-Wesley Professional
    ISBN: 9780138057626 , 0138057621
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 50 min.)) , sound, color.
    Edition: Third edition.
    Series Statement: Live lessons
    DDC: 005.3
    Keywords: Kubernetes ; Application software Development ; Computer programs ; Application program interfaces (Computer software) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Getting Started with Kubernetes, 3rd Edition Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780137993413 , 0137993412
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Live lessons
    Series Statement: Complete video course
    DDC: 005.3
    Keywords: Application software Study guides Development ; Virtual computer systems Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 5 Hours of Video Instruction 5 hours of deep-dive training to teach you the concepts and skills needed to pass the Kubernetes and Cloud Native Associate (KCNA) exam. Overview Kubernetes and Cloud Native Associate (KCNA) Complete Video Course is an 8-hour video training course to help you successfully prepare you for the KCNA exam. It will also help you gain a solid understanding of Kubernetes topics and concepts to help you get started with Kubernetes and Cloud Native computing. Expert trainer Sander van Vugt provides a hands-on approach to learning by going deeper into exam topics and concepts using real-world labs and demos. Each lesson in the course ends with a lab exercise along with a practice question review so you can practice your skills and test your knowledge. There is no better place to start your Cloud Native with Kubernetes journey than by studying for the Kubernetes and Cloud Native Associate (KCNA) exam. KCNA is a pre-professional certification created by Cloud Native. It was designed to help candidates advance their Kubernetes skills to the professional level. This Cloud Native certification covers the foundational knowledge and skills needed to start working with Kubernetes in a Cloud Native environment. Sander van Vugt has carefully structured this 11-lesson course to focus on concepts, practices, and solutions used in cloud native environments. The course begins with an exploration of the cloud native certification program before moving onto a look at Cloud Native technologies and solutions. You will then get real-world knowledge on running and orchestrating containers. The next step is a deep dive into Kubernetes--understanding, running, scaling, and finally integrating applications in Cloud Native. The course ends with hands-on lessons showing how to run and deliver applications while using observability solutions. Topics include Module 1: Cloud Native Certifications Module 2: Cloud Native Technologies and Solutions Module 3: Using Containers Module 4: Using Kubernetes Module 5: Running Applications in Cloud Native About the Instructor Sander van Vugt has many years of experience working with, writing about, and teaching Linux and Open-Source topics. He is the author of the best-selling Red Hat RHCSA and RHCE Cert Guides as well as a number of other titles on Kubernetes (including CKAD and CKA), Ansible, Containers, Bash, Microservices, and more. Sander also works as a Linux and DevOps instructor, teaching onsite and online classes for customers around the world. Skill Level Beginner to Intermediate Learn How To Successfully prepare for the KCNA exam Work in cloud native environments, with cloud native technologies and solutions Use containers and container orchestration Run Kubernetes, Minikube environment, and run applications in Kubernetes Run applications in a cloud native environment Who Should Take This Course Anyone looking to pass the KCNA exam Anyone interested in learning Kubernetes and its basic concepts Anyone interested in working with cloud native technologies About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed August 30, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 14 hr., 35 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 16+ Hours of Video Instruction Parallel Functional Programming in Java LiveLessons describes by example how to apply Java functional programming features and frameworks to alleviate the complexity of developing software that can run efficiently and scalably on multi-core and distributed-core processors. In this course, learn how to develop programs using powerful object-oriented and functional programming language features and frameworks supported by Java. This course first provides an introduction to Java's foundational functional programming features, including lambda expressions, method references, and functional interfaces. These core features provide the foundation for the next topic in this course: the Java's Streams framework, which supports functional-style sequential and parallel operations on streams of elements, such as map-reduce transformations on Java collections. This course also shows by example how to develop efficient reactive programs that run scalably on multi-core processors using powerful object-oriented and functional programming language features and parallelism frameworks supported by Java. This portion of the course describes how Java leverages its functional programming features to create the completable futures framework. This framework defines a powerful reactive programming model that allows programmers to run multiple asynchronous operations concurrently in one or more pools of threads and process their results asynchronously with respect to other operations in a program. Skill Level Intermediate Learn How To Develop efficient parallel and reactive programs using powerful modern Java object-oriented and functional programming language features and frameworks Recognize the inherent and accidental complexities involved with developing parallel and reactive software for modern Java clients and servers Understand how common software patterns and modern Java parallel and reactive programming mechanisms can and cannot help to alleviate this complexity Know where to find additional sources of information on how to successfully develop robust parallel and reactive programs in modern Java Who Should Take This C...
    Note: Online resource; Title from title screen (viewed May 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 17 hr., 6 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 27+ Hours of Video Instruction CCNP and CCIE Data Center Core DCCOR 350-601 Complete Video Course focuses on implementing and configuring Cisco Identity Services Engine for preparation for the DCCOR 350-601 certification, and providing the necessary skills for real-world deployment scenarios. Overview CCNP and CCIE Data Center Core DCCOR 350-601 Complete Video Course focuses on a blend of the real-world experience and best practices mixed with the requirements for the CCNP and CCIE Data Center Core DCCOR 350-601 exam. The goal of the course is to not only cover the objectives for the CCNP and CCIE Data Center Core exam, but also provide a solid learning resource for mastering key concepts regarding planning and delivering a Cisco Data Center solution. CCNP and CCIE Data Center Core DCCOR 350-601 Complete Video Course is a unique and a complete video course that provides solid understanding of Core Data Center technologies as well as CCNP Data Center Core exam. This complete video course guides the viewer from an Introduction to the Data Center technologies such as Layer2 and Layer3 features, Overlay technologies such as OTV and VXLAN, Application Data Center Infrastructure, Compute with network and Storage management, Hyperflex, Security and Programmability and Automation. The key topics covered in this course will enable the viewers to understand and implement the key data center technologies covering network, Software Defined Data Center using Cisco ACI, Storage and Compute and finally automating the services in Data Center environment. The topics covered in the CCNP Data Center Core Technologies are the foundational topics for designing and implementing a Next Generation Data Center using Cisco hardware and Software. Cisco Nexus OS (NX-OS) is a next generation modular software, primarily targeting Data Center networking, with the motivation to provide the key features of virtualization, high availability and upgradeability on Nexus line of products. The NX-OS software is used across all Nexus data center products which can run in standalone as well as ACI mode and as SAN-OS. This complete video course is for candidates who can install, configure, and manage Cisco Nexus switches, Cisco MDS switches; implement and deploy automation of Cisco Application Centric Infrastructure (ACI), implement compute using Cisco Unified Computing System (UCS). This complete video course not only helps building the foundation for the CCNP Data Center exam bu...
    Note: Online resource; Title from title screen (viewed May 7, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484260913
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 12 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This step-by-step video will show you how to leverage the power of the Creative Cloud Libraries panel and how it can streamline your work as a freelancer or as a member of a larger team. You will look at Adobe desktop apps that have the panel or access to the panel. During this discussion you'll briefly see what each can or cannot import and export with the CC Libraries panel. This video focuses on importing assets with Bridge and the Creative Cloud Console; collaborating and sharing your CC libraries; and touches on Animate, Dreamweaver, After Effects, Premiere Pro, XD, Dimension, and Fresco. While the Creative Cloud Libraries panel and console have been available in several versions of Adobe, their look and arrangement have changed over time. Adobe beginners or those who have not used the panel will discover how useful it is and save time when working between several Adobe programs to complete complex layout projects. What You Will Learn Use Bridge and Creative Cloud Console to import assets such as animations, 3D items, videos, and templates How to collaborate with a team through the CC libraries Access graphics from Adobe Stock How to integrate your work with other Adobe software for web projects, such as Animate, Dreamweaver, and Premiere Pro Who This Video Is For Students, graphic designers, and corporate administrators who need to create documents for events. This video is a beginner to intermediate level, and will be most helpful to viewers with some basic experience in Photoshop, Illustrator, and InDesign.
    Note: Online resource; Title from title screen (viewed June 16, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484260210
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 3 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn the architecture and implementation of Microsoft's latest SQL Server capability - Big Data Clusters. Combine SQL Server for data, PolyBase for data virtualization, Data Pools for scale-out data processing, and Spark with HDFS for scalable non-relational data processing and analysis. You'll begin this video with a quick overview of the big data space, along with an easy-to-understand introduction to containers, Kubernetes, Spark, and HDFS. You'll put those pieces together by planning and deploying your own cluster. Then it's on to operationalizing the cluster through problem-solving with Transact-SQL, PolyBase, data processing at scale, and working with Spark and HDFS. What You Will Learn Understand big data technologies such as Spark and HDFS Deploy a Big Data Cluster on a Kubernetes environment in Azure Implement PolyBase queries to bring in data from external sources Run Transact-SQL statements and process relational data at scale Execute Spark jobs and machine learning from within SQL Server 2019 Implement basic security protocols to protect your data from theft Who This Video Is For Database professionals who are curious about SQL Server 2019's flagship feature. For those who want to get started in querying and analyzing massive amounts of data using Spark and HDFS clusters while taking advantage of their SQL Server investment.
    Note: Online resource; Title from title screen (viewed May 14, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484257272
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 12 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Dive into performance tuning by learning how data is structured and accessed in SQL Server. Learn from this video how to use execution plans, IO metrics, and query timing to identify problematic queries and trace latency directly to missing or incorrect indexes. Also learn about cardinality and how it affects execution plans and overall query performance. Understanding how indexes and statistics work provides a solid foundation for writing better queries and architecting more effective database objects. The knowledge from this video helps you to dive further into procedural TSQL and identify why a stored procedure or ad-hoc query can perform unexpectedly badly. This video examines such cases through a discussion of the causes of poor performance in TSQL procedures along with solutions such as parameter sniffing. In addition, the video demonstrates how local variables perform differently from parameters and how plan reuse can benefit performance. When plan reuse harms performance, the correct solutions will be presented, allowing you to permanently solve a performance challenge without the use of hacks or temporary fixes. What You Will Learn Create effective table indexes with confidence Identify queries where poor indexing is the cause of latency Display and use statistical metrics to troubleshoot performance challenges Optimize and speed up queries that make poor use of indexes Find and resolve parameter sniffing problems in procedural TSQL Identify when ad-hoc TSQL or local variables can negatively affect performance Understand when plan reuse can inadvertently harm performance Who This Video Is For Database administrators, developers, and architects who need to write fast and efficient database queries. For database administrators who are asked to troubleshoot slow queries to make them faster. For anyone working against SQL Server who relies upon highly performant queries to perform important tasks.
    Note: Online resource; Title from title screen (viewed January 17, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484256480
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 21 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In this video course, you will learn the basic principles of neural networks that are used to build models. You'll start by seeing machine learning, neurons, activations, activation functions, weights, and how everything works under the hood. Next, you'll cover the basics of the learning loop including how backpropagation and gradient descent work. Further, you will learn about convolutions, how they are inspired by the animal visual cortex, and how we use them in neural networks. One of the focuses of the course is image classification and detecting common objects in images. This has many uses in your day-to-day projects. We will be using the PyTorch open-source neural network library here. The course will also cover current state-of-the-art neural network models and show how to use them even on smaller hardware. The video concludes by showing some common tricks with hyperparameter settings and regularization techniques, and how to use neural networks in production environments. What You Will Learn Discover the basics of neural networks and how they function Work with convolutional neural networks Use CNNs in your day-to-day work for image classification and other tasks Who This Video Is For Data scientists and machine learning and deep learning engineers.
    Note: Online resource; Title from title screen (viewed January 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780136823483 , 0136823483
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 30 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: 9 Hours of Video Instruction The Exam AZ-104 Microsoft Azure Administrator (Video) offers full coverage of the MS AZ-104 exam so you can learn everything you need to know to pass the exam. Coverage includes cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust, with the goal of passing the AZ-104 Exam. Description The Exam AZ-104 Microsoft Azure Administrator (Video) offers 9 full hours of video training on all core concepts in the AZ-104 exam so you can fully understand cloud concepts, core Azure Services, Azure pricing and support, and the fundamentals of cloud security, privacy, compliance, and trust. It will prepare Azure Administrators to implement, monitor, and maintain Microsoft Azure solutions, including major services related to compute, storage, network, and security. With 9 hours of hands-on demonstrations, it will provide the knowledge necessary to pass the exam and become Microsoft Certified: Microsoft Azure Administrator. With years of IT experience, numerous publications under his belt, and a wealth of expertise teaching in the field, Michael Shannon is uniquely qualified to prepare students for the Microsoft Azure Administrator AZ-104 exam. Topics include: Module 1: Manage Azure subscriptions and resources Module 2: Implement and manage storage Module 3: Deploy and manage virtual machines (VMs) Module 4: Configure and manage virtual networks Module 5: Manage identities About the Instructor Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, and Pearson, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He is the senior technical instructor for Skillsoft Corporation, specializing in all things cloud and security. Skill Level Intermediate/Advanced Learn How To Manage Azure subscriptions and resources Implement and manage storage Deploy and manage virtual machines (VMs) Configure and manage virtual networks Manage identities Who Should Take...
    Note: Online resource; Title from title screen (viewed June 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484260920
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 4 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: ​This step-by-step video will show you how to leverage the power of the Creative Cloud Libraries panel in Illustrator and InDesign. With this information, you'll be able to streamline your work as a freelance or as a member of a larger team. We'll break down the features and tools of the Creative Cloud Libraries panel. While the Creative Cloud Libraries panel and console have been available in several versions of Adobe, their look and arrangement have changed over time. Adobe beginners or those who have not used the panel will discover how useful it is and save time when working between Adobe Illustrator and InDesign to complete complex layout projects. What You Will Learn Understand what the CC Libraries panel is and how it's used Export and import assets such as 3D items, character styles, patterns, and videos Discover what can and cannot be imported via the CC Libraries panel Who This Video Is For Students, graphic designers, and corporate administrators who need to create documents for events. This video is for intermediate level users with some experience in basic layout in Photoshop, Illustrator, and InDesign.
    Note: Online resource; Title from title screen (viewed June 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 8 hr., 1 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 8+ Hours of Video Instruction It can be difficult for developers familiar with Java and other languages to make the transition to modern JavaScript. If you simply want to be productive with JavaScript as it exists today, then you don't want to relive history with books or courses that teach older JavaScript versions, or that assume familiarity with those older versions and focus on recently introduced features. This course assumes that you are a competent programmer who understands branches and loops, functions, data structures, and the basics of object-oriented programming. You will get up to speed with modern JavaScript in the shortest possible time. Description Modern JavaScript for the Impatient LiveLessons focuses on how to be productive with JavaScript as it exists today. After reviewing the fundamentals of values, variables, and control flow, the video thoroughly covers functions, objects, and classes. The standard library and the most commonly used tools are also covered, as well as key topics related to asynchronous programming, internationalization, and modules. Related Content This training pairs with Cay Horstmann's book Modern JavaScript for the Impatient (9780136502142) About the Instructor Cay S. Horstmann is a professor of computer science at San Jose State University and a Java Champion. He is also the author of Core Java, Volume II,ÄîFundamentals, Eleventh Edition (2019); Core Java, Volume I,ÄîFundamentals, Eleventh Edition (2018); Core Java SE 9 for the Impatient, Second Edition (2018); Java SE 8 for the Really Impatient (2014); and Scala for the Impatie nt (2012). He has written more than a dozen other books for professional programmers and computer science students. What You Will Learn After starting with the basics-JavaScript values, variables, and types, and a quick overview of expressions and the various type of flow control statements-Horstmann shows viewers how to implement functions that consume and produce other functions and how to use closures to implement a form of classes before moving on to more advanced topics including: Object-oriented programming with modern JavaScript (classes and inheritance and how these are implemented with prototypes) The standard library (numbers and dates, strings and regular expressions, as well as arrays and collections.) Metaprogramming, iterators, and generators (a powerful mechanism to bridge between linear and event-driven control flow) How to use proxies to inter...
    Note: Online resource; Title from title screen (viewed January 16, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780137841509 , 0137841507
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 20 min.)
    Edition: 1st edition
    DDC: 005.3
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: 9+ Hours of Video Instruction Certified Kubernetes Application Developer (CKAD) Complete Video Course provides more than 9 hours of video instruction for IT professionals preparing to take the CKAD exam, which requires an in-depth knowledge of how to develop, create, manage, store, and troubleshoot Kubernetes applications. Certified Kubernetes Application Developer (CKAD) Complete Video Course provides more than 9 hours of video instruction for IT professionals,Äìincluding IT Administrators, DevOps Engineers, Software Developers, IT Architects, and Hybrid Cloud Administrators,Äìpreparing to take the CKAD exam, which requires an in-depth knowledge of how to develop, create, manage, store, and troubleshoot Kubernetes applications. The course includes labs, demonstrations, and lightboard explanations by best-selling author and presenter Sander van Vugt. This course first provides a full introduction to containers and Kubernetes; it then moves through the process of creating, managing, and storing applications. The title provides labs for working with the API using curl, as well as using NameSpace and managing pods. You will also learn how to manage deployments, services, ingress, and setting up storage; and you will get a full walkthrough of key troubleshooting scenarios. The course ends with a sample exam so you can practice before taking the real test. Topics include: Module 1: Getting Started Module 2: Kubernetes Essentials Module 3: Building and Exposing Scalable Applications Module 4: Sample Exams About the Instructor Sander van Vugt has been teaching Linux classes since 1995 and has written more than 60 books about different Linux-related topics, including the best-selling RHCSA-RHCE 7 Cert Guide . Sander is also the author of more than 25 video courses, including Kubernetes Fundamentals . He teaches courses for customers around the world, and is also a regular speaker on major conferences related to open source software. Sander is also the founder of the Living Open Source Foundation, a non-profit organization that teaches open source to talent in different African countries. Skill Level Beginner/Intermediate Learn How To Best prepare to pass the Certified Kubernetes Application Developer (CKAD) Exam Run applications in containers Develop, create, manage, store, and troubleshoot Kubernetes applications Manage API options Manage pods Manage deployment and networking Manage ingress and storage Manage ConfigMaps and Secrets Troubleshoot Kuber...
    Note: Online resource; Title from title screen (viewed January 16, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 4.5+ Hours of Video Instruction Description The Cloud Technology and Certifications Jump Start video course covers critical information about cloud technologies, including the "Big Four" public cloud vendors, and their offerings. This course also covers such practical guidance as how to plan a migration to the cloud and the tools available for migration. Overview The goal of Cloud Technology and Certifications Jump Start Livelessons clarifies why cloud technologies are revolutionizing and dominating the IT industry and provides the basics you need to start your cloud career. By providing many real-world examples to illustrate the sea changes taking place, and walking through the various options available, this course explains the benefits of cloud computing. This video series also provides very practical information about each of the Big Four public cloud vendors. This provides the learner with an understanding of the offerings of each of these major players in the industry and also permits a student to see the trends that are occurring in the space as they compare the offerings from the dominant players. The course starts with the evolution of cloud computing, the types of deployments, and the steps to deploy technologies today. The course also covers such important topics as cloud security, cloud migrations, and the architectural design changes that make your solutions much more "cloud-ready". Lastly, the course provides an overview of the various certifications offered by the Big Four cloud vendors. Topics include: The Evolution of Cloud Computing The Big Four Public Cloud Vendors Adopting Cloud Technologies Cloud Migrations Cloud Certifications About the Instructor Anthony Sequeira, CCIE No. 15626, is a seasoned trainer and author regarding various levels and tracks of Cisco, Microsoft, and AWS certifications. Anthony formally began his career in the information technology industry in 1994 with IBM in Tampa, Florida. He quickly formed his own computer consultancy, Computer Solutions, and then discovered his true passion,Äîteaching and writing about information technologies. Anthony joined Mastering Computers in 1996 and lectured to massive audiences around the world about the latest in computer technologies. Mastering Computers became the revolutionary online training company KnowledgeNet, and Anthony trained there for many years. Anthony is currently pursuing his second CCIE in the area of Cisco Data Center! Anthony is currently a freela...
    Note: Online resource; Title from title screen (viewed June 19, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800205024
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Use machine learning today without a machine learning background About This Video Quickly get up and running using state-of-the-art machine learning algorithms in your .Net applications Implement machine learning algorithms using real-world data sets, without first learning math Leverage state-of-the-art (TensorFlow, ONNX) models, pre-trained by the tech giants, in your own .Net code In Detail ML.NET enables developers utilize their .NET skills to easily integrate machine learning into virtually any .NET application. This course will teach you how to implement machine learning and build models using Microsoft's new Machine Learning library, ML.NET. You will learn how to leverage the library effectively to build and integrate machine learning into your .NET applications. By taking this course, you will learn how to implement various machine learning tasks and algorithms using the ML.NET library, and use the Model Builder and CLI to build custom models using AutoML. You will load and prepare data to train and evaluate a model; make predictions with a trained model; and, crucially, retrain it. You will cover image classification, sentiment analysis, recommendation engines, and more! You'll also work through techniques to improve model performance and accuracy, and extend ML.NET by leveraging pre-trained TensorFlow models using transfer learning in your ML.NET application and some advanced techniques. By the end of the course, even if you previously lacked existing machine learning knowledge, you will be confident enough to perform machine learning tasks and build custom ML models using the ML.NET library.
    Note: Online resource; Title from title screen (viewed June 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson | Boston, MA : Safari
    ISBN: 9780136875185 , 0136875181
    Language: English
    Pages: 1 online resource (1 video file, approximately 10 hr., 20 min.)
    Edition: 1st edition
    Keywords: Internet videos ; Streaming video ; Electronic videos ; local ; Electronic videos ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. C++20 Fundamentals LiveLessons with Paul Deitel is a code-oriented presentation of C++, one of the world,Äôs most versatile and powerful programming languages. C++ remains hugely popular for the development of systems software, embedded systems, operating systems, real-time systems, communications systems and other high performance computer applications. C++20 Fundamentals LiveLessons is comprehensive and covers all major versions of C++, including: C++11, C++17, and C++20. The code repository for this LiveLesson is kept at https://github.com/pdeitel/CPlusPlus20FundamentalsLiveLessons and will be kept up to date as lessons are added and as changes are made.
    Note: Online resource; Title from title screen (viewed June 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800204126
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 29 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Build powerful, reactive, great-looking UI web experiences with this front-end compiler and its framework. About This Video Build modern, real-life, responsive web applications with Svelte by taking advantage of its small footprint (thanks to its compilation step) Develop complex web applications with Sapper, the framework based on Svelte that provides useful and powerful features thus, making developing Svelte apps even easier Learn a web technology (whose popularity is on the rise thanks to its great developer experience and powerful features) to improve your Svelte skills In Detail This course will take you through three core projects to help you build effective, reactive, and attractive apps with Svelte, demonstrating its intrinsic benefits, including less code and impressive reactivity/state management along the way. Our first project, a vCard generator app, will demonstrate the modularity and reactivity web applications you can develop with Svelte. We will build reusable and dynamic components that we will later enhance with more advanced features. Sections on animation and transitions are included to make applications look as good as they perform! Our second project will be a fully functional Kanban board application, similar to Trello. This application will also have effective state management, by making use of stores and other key Svelte features. Our final application will be based on the previous Kanban board application but making use of Sapper, the official Svelte framework. However, we will build this application with Sapper, the official Svelte framework. We will learn how to create web apps with Sapper and master its most useful features, such as routing and prefetching. We will also provide an introduction to testing Sapper applications with Cypress, and we finish the course by deploying our application in two different ways: as a static page, and as an SEO-optimized server-side rendered (SSR) application.
    Note: Online resource; Title from title screen (viewed May 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800567320
    Language: English
    Pages: 1 online resource (1 video file, approximately 9 hr., 48 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Get to grips with Java design patterns and write robust and extensible software About This Video Understand interfaces, composition, inheritance, and polymorphism Get up and running with the concepts behind design patterns Learn the different design patterns with the help of real-world examples, code, and slides In Detail If you are an intermediate to advanced Java developer or a developer in any other OOP language and are looking to learn Java design patterns, then this course is for you. It is also tailored for anyone who has working knowledge of Java or OOP knowledge and is looking to delve into the core software development principles - design patterns. This course will help you understand Java design patterns effectively so you can apply what you've learned to your projects. Design patterns are the common denominator you need to learn in order to build effective software and systems that work efficiently. In this course, you will explore the different design patterns, right from the Observer Design Pattern and the Singleton Design Pattern through to the Adapter Design Pattern and Façade Design Pattern. As you progress, you'll understand how to apply these patterns to real-world projects. In addition to this, you'll get to grips with solving different software architecture problems using the patterns. By the end of this book, you will be well-versed with Java design patterns and be able to write efficient and extensible software.
    Note: Online resource; Title from title screen (viewed May 29, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Skylines Academy, LLC | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 26 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Welcome to Skylines Academy, where you will get a detailed introduction into Azure DevOps! This course is for you in you want to: • Get the best overview of Azure DevOps from one of the IT industry's leading technologists • Develop a skillset in Azure DevOps, which is becoming more and more sought after as organizations continue to automate processes for faster results • Take the AZ-400 certification and are looking for a place to start Course Description: This course is based on a major section of the AZ-400 Certification from Microsoft: Designing and Implementing Microsoft DevOps Solutions, and includes important fundamental and in-depth lectures and demonstrations on how to start with Azure DevOps. As a foundation to learning all-things Azure DevOps, Author and Instructor Shannon Kuehn will lead you through this course and teach you the following: 1. The importance of source control and how to effectively manage and implement it: o Source Control 101 o Git o Source Control Systems o Authentication to Git Repos o Git Repo Organization 2. An overview of Azure DevOps to get you up-to-speed with the service: o Setting up Azure DevOps with Demo Generator o Azure Repos o In-depth demos on Git Credential Manager, Version Control with Azure Repos, Importing/Cloning/Forking/Branching, and Pull Requests o Azure Pipelines o Jenkins and Azure Pipelines Integration 3. Analyze and Integrate Multi-Stage Files, including: o Deploying Multi-Container Application to Azure Kubernetes Service (AKS) 4. Understanding Parallel Jobs, Build Agents, and Private Agents 5. Implementing Security for Software Configuration: o Secrets and Certificates o Demonstration on Azure Key Vault and Azure Pipelines 6. Mobile DevOps & Visual Studio App Center o Mobile Target Devices and Distribution Groups o Public/Private Distribution Groups o Target UI Test Device Sets o Tester Devices for Deployment Using the Skylines Academy approach, lectures will educate you on the fundamental terms and principles of Azure DevOps, and demos will enable you with a hands-on experience using scenarios to empower you in the real world. The Skylines Academy AZ-400 Course Series This AZ-400 Azure DevOps Development Processes & Source Control is part of a series of courses which will cover the entirety of the AZ-400 Skills Measured document by Microsoft. This course is also an excellent stand-alone knowledge option for those looking to amplify their skills in Source Control without studying for the...
    Note: Online resource; Title from title screen (viewed July 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This three-part series of half-day online events gives attendees an overarching perspective of software development from which to make decisions that strengthen and grow companies and industries, a deep knowledge of key open source technologies to make it happen, and a community in which both they and their companies can thrive. In Part 1, Live Coding-Go, Rust, and Python, we wanted to get deeper into actual coding, and one way to do that was to outlaw slides. That's right, these sessions all incorporate live-coding. These four sessions from Ellen Körbes, John Walicki, Nathan Stocks, and Reuven Lerner will walk you through coding best practices and new ways of getting the most out of languages like Python, Go, and Rust. This event is sponsored by IBM, and features spotlights on Kode With Klossy and the Eclipse Foundation. About the presenters: Rachel Roumeliotis is vice president of content strategy at O'Reilly, where she leads an editorial team that covers a wide variety of programming topics ranging from full stack to open source in the enterprise to emerging programming languages. She's been a programming chair for the O'Reilly OSCON, Fluent, Strata, Software Architecture, and Security Conferences. She's currently the programming chair for the OSCON and Strata Data & AI Superstream Series on O'Reilly online learning. She's been working in technical publishing for 10 years, acquiring content in many areas including mobile programming, UX, computer security, and AI. Kelsey Hightower has worn every hat possible throughout his career in tech and enjoys leadership roles focused on making things happen and shipping software. Kelsey is a strong open source advocate focused on building simple tools that make people smile. When he isn't slinging Go code, you can catch him giving technical workshops covering everything from programming to system administration. Ellen Körbes ran DevRel at both Tilt and Garden-two of the very few companies 100% focused on the development experience side of Kubernetes. They got their start building Kubernetes CLI tooling under SIG-CLI. They've since spoken about Go and Kubernetes at many world-famous events. Tara Tran is the manager of recruitment and instruction, and Mehreen Butt is an instructor at Kode With Klossy. John Walicki is the CTO for edge/IoT advocacy in the Developer Ecosystem Group within the IBM Cognitive Applications Group, where he helps developers create custom IoT and embedded Linux solutions for thei...
    Note: Online resource; Title from title screen (viewed June 24, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800208797
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: UX Process for Beginners from User Interviews to Personas, User stories, Information architecture to Usability testing About This Video Define product scope and feature matrix Understand how to drive user and stakeholder interviews Master UX Process in a simplified way In Detail There are hundreds of elements involved in a UX Design process and each design firm uses its own version of the implementation. It, therefore, leads to confusion among the beginners about where to start the user experience process. This project-based course starts off by introducing to you the project that you will be working on throughout the course and understand the concepts as you progress. Your target will be to create and improve the user experience of an e-commerce startup called Frankland. You will learn to determine the starting point among the pool of different aspects to be covered including user interviews, personas, customer journey maps, and defining the scope of the product. By the end of this course, you'll have understood the complete UX process and its significance in the website and mobile app development.
    Note: Online resource; Title from title screen (viewed January 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In much the same way that the open source paradigm of software development has become a standard model for building applications using code that's generated and evolved by developers from around the globe, InnerSource development is rapidly becoming the preferred methodology for building software products intended for use only within an organization. InnerSource applies the same principles that have made open source so successful, like code reuse and unleashing the combined talent and expertise of many developers to help build higher-quality solutions faster and more flexibly. Within the InnerSource framework, the Contributor role is one of the most central roles-to put it succinctly, without Contributors, there wouldn't be anything to receive or discuss. In this video course, you learn that there's far more to being a Contributor than simply dumping code in a branch or issue. You'll explore what it takes to become a Contributor in an InnerSource community, including adopting the mindset, habits, technical approaches, and other details of this role. You'll learn about the mechanics of being a Contributor-the nuts and bolts of developing solutions in this unique environment. You'll also examine the Contributor ethos, including the guest-in-home analogy, the indispensable set of principles to which a Contributor needs to adhere to successfully interact in an InnerSource development environment and contribute to the host teams work, foster good relationships, and be a happy InnerSource Contributor. What you'll learn-and how you can apply it What an InnerSource Contributor is and why the role is important How to become an InnerSource Contributor and adopt the mindsets and habits that lead to becoming one Understand the Contributor ethos and mindset of an InnerSource Contributor The mechanics and technical aspects of contribution to ensure success The benefits of being a Contributor: what's in it for me (the guest), the receiving team (the host), and our company? This video is for you because... You're a possible future Contributor to an InnerSource project and want to know what to expect You're a host team member looking to open your environment to outside contributors via InnerSourcing and you want to know what the expectations and benefits are of the Contributor role You're a product owner looking to support your TC or a (line) manager and want to know how the InnerSource approach is meant to work Prerequisites: We recommend that you first watch t...
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800201019
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 27 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Develop a blockchain notary office on Ethereum and learn all about Solidity, Remix, Ganache, Geth, Metamask, and Truffle About This Video Understand the types of blockchains and discover potential use cases for blockchain technology Develop a complete understanding of Ethereum networks and clients (Geth, Parity, and Ganache) Learn how to install Truffle and check out a standard Truffle project In Detail The Complete 2020 Ethereum & Solidity Developer Bootcamp is for anyone who wants to get started with building applications and implementing self-enforcing business logic in smart contracts. This course will help you learn everything there is to know about Solidity and understand the big picture of the blockchain industry with a balance of theory and practical experience. You'll not only learn the fundamentals of Solidity but also get to grips with its safe handling and best practices. This course avoids extensive theory by giving you a direct lab entry where you'll learn by doing. With the help of HD video lessons, this bootcamp will take you through creating, testing, and troubleshooting. You'll then learn how to use smart contracts in different scenarios and browsers. The course demonstrates how a blockchain application is created from scratch, and together with your instructor, you'll develop a blockchain notary office, test it, and deploy it to different networks.
    Note: Online resource; Title from title screen (viewed January 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 1 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Blockchain is revolutionizing the world by removing middlemen and putting individuals, groups and things in direct contact. Global and trustless, blockchain forms the internet of value, compared to today's internet of data. Key properties of blockchain, like immutability, transparency, and decentralization, can solve the problem of digital identities, which can serve as a base for intellectual property. In this Spotlight on Innovation , find out how blockchain technology can facilitate different types of intellectual property-and transform your business. Artist and blockchain engineer Saga Arvidsdotter explains what blockchain is and discusses the important and varied perspectives you should be familiar with when designing blockchain technology, including philosophy, finance, game theory, and writing code like law. Recorded on October 9, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Innovation , you'll discover what successful companies have in common and how you can follow their lead with small practical steps to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In late 2017, Slack's largest customers were plagued with relentless performance-related outages, due in part to the fact that public channels, private channels, and DMs were stored in completely distinct ways. Instead of shipping scrappy, short-term fixes, the company opted to address the root problem and completely refactor problematic functionality by consolidating any redundant database schemas. In this Spotlight on Data , Maude Lemaire explains how Slack succeeded by mapping out a precise plan that was careful to scope the effort to only its necessary components. Join in to learn real-world, successful techniques for modernizing your infrastructure from the ground up-live and in production. Recorded on November 18, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Data , you'll learn about, discuss, and debate the tools, techniques, questions, and quandaries in the world of data. You'll discover how successful companies leverage data effectively and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 60 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Cyberattacks and breaches are at an all-time high, and the threat of cybersecurity litigation is rising dramatically. But many organizations are still inadequately prepared. The future of technology will depend upon erecting meaningful protections and reducing risk for your users in order to maximize your products' social and economic value. However, for this to happen, a number of key issues must be addressed. In this Spotlight on Cloud , expert Bill Mew discusses four systemic cybersecurity and privacy issues, and addresses how to prepare for a worst-case scenario. Recorded on October 3, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Cloud , you'll learn about the complex, ever-evolving world of the cloud. You'll discover how successful companies have adopted and embraced this massive network of shared information and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 28, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 0 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The more data we collect, the more concerned we are (or should be) about what data is appropriate and how-or if-it should be analyzed. There are many ethical, privacy, and legal issues to consider, and no clear standards exist as to what's fair and what's foul. This means that in order to implement the right policies, organizations must devise their own principles and tolerance for risk. In this Spotlight on Data , learn about the range of ethical, privacy, and legal issues that surround analytics today. Bill Franks will frame the big questions every successful business must consider while outlining some of the trade-offs and ambiguities they need to address to answer them. Recorded on November 13, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Data , you'll learn about, discuss, and debate the tools, techniques, questions, and quandaries in the world of data. You'll discover how successful companies leverage data effectively and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 59 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Security is often thought of as an impediment to progress-slowing things down by adding another layer of complexity. But when done right, a modern approach to security actually empowers an organization to move faster. In this Spotlight on Cloud, Zane Lackey, former chief information security officer at Etsy, shares lessons learned building a security program at the leading edge of the DevOps movement. Recorded on October 16, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Cloud , you'll learn about the complex, ever-evolving world of the cloud. You'll discover how successful companies have adopted and embraced this massive network of shared information and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 2 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Approach your product launches more strategically. David Huska and Stephen Thorne-senior engineers from Google's customer reliability engineering team-share best practices for successfully and reliably deploying new products, services, and features.In this Spotlight on Cloud, find out about choosing technology and feature sets for upcoming launches; integrating reliability practices into product development, failure domains, and graceful degradation for publicly visible features; and recovering quickly when services fail unexpectedly. Recorded on November 26, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Cloud , you'll learn about the complex, ever-evolving world of the cloud. You'll discover how successful companies have adopted and embraced this massive network of shared information and how you can follow their lead to transform your organization and prepare for the Next Economy.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 4 hr., 24 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Programming Foundations of Classification and Regression LiveLessons (Machine Learning with Python for Everyone Series), Part 1 Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed February 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 7 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Reactive Spring Boot, 2nd Edition
    Note: Online resource; Title from title screen (viewed February 13, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839213021
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 22 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Uncover essential design patterns with Kotlin About This Video Implement classical designs via creational, structural, and behavioral patterns and get insights into the advantages and possibilities they bring Use a wide range of design patterns to polish your Android code and write cleaner code effortlessly A practical course comprising small and straightforward examples in a friendly style to help you write high-quality programs and create customized applications In Detail Over the years, programmers have run into pretty much the same problems time and time again; not every problem is entirely unique. Therefore, over time programmers applied varying solutions to these problems, and this is how design patterns were born. This course will walk you through some centrally significant design patterns so that you can easily resolve programming issues encountered in your day-to-day tasks. You'll learn these patterns in one of the most modern languages: Kotlin! We cover the three major areas in design patterns: creational patterns, structural patterns, and behavioral patterns. We also implement one structural pattern-Decorators-that plays an important role in adding functionalities to your programs. We take a look at different kinds of problem and implement the required patterns while avoiding common pitfalls. We also supply useful tips and tricks to use design patterns more effectively. By the end of the course, you will be confident about using varying types of design patterns to solve common design problems. Please note that a basic familiarity with Kotlin is desirable to get the most out of this course, along with some experience working with Android Studio.
    Note: Online resource; Title from title screen (viewed January 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781789618846
    Language: English
    Pages: 1 online resource (1 video file, approximately 5 hr., 54 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Add superior end-to-end security to your network using Metasploit About This Video Gain the skills to carry out penetration testing in complex and highly-secured environments Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios Practical guide to understand and implement new useful methods and techniques to make your network robust and resilient In Detail Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.
    Note: Online resource; Title from title screen (viewed January 21, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: IP Subnetting Video and Practice Questions Kit Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; Title from title screen (viewed February 12, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 12 hr., 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Overview IP Subnetting from Beginning to Mastery
    Note: Online resource; Title from title screen (viewed February 9, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800206847
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 49 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Get to grips with Docker, containers versus images, and more by learning through a hands-on approach About This Video Explore the process of installing Docker on Windows Professional or Server (with Hyper-V) Become well-versed with running a single Docker Container as well as multiple Docker Containers Understand how to use and define network segregation in Docker and the Docker0 network In Detail If you have never worked with containerization before or you need a quick refresher on the most common commands and patterns using Docker, then this course is for you. Although there are other containerization frameworks or tools, Docker has emerged as the standard when it comes to using it for everything from developers' machines to production-ready cloud deployments. In this course, you will learn how to use Docker in your daily development workflow from the very start to increase your productivity. You'll discover Docker Run, before going on to understand how to read, understand, and write docker-compose.yml files. As you progress, the course will take you through developing Docker images, along with helping you understand the technique of creating a custom configuration with Dockerfile. Later, you will explore the benefits of a local development environment versus virtual machines versus Docker. By the end of this course, you will be well-versed with Docker, and have developed the skills you need to use it effectively to manage your environment.
    Note: Online resource; Title from title screen (viewed January 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 19 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: 7+ Hours of Video Instruction An intuitive, application-focused introduction to deep learning and TensorFlow, Keras, and PyTorch Overview Deep Learning with TensorFlow, Keras, and PyTorch LiveLessons is an introduction to deep learning that brings the revolutionary machine-learning approach to life with interactive demos from the most popular deep learning library, TensorFlow, and its high-level API, Keras, as well as the hot new library PyTorch. Essential theory is whiteboarded to provide an intuitive understanding of deep learning's underlying foundations; i.e., artificial neural networks. Paired with tips for overcoming common pitfalls and hands-on code run-throughs provided in Python-based Jupyter notebooks, this foundational knowledge empowers individuals with no previous understanding of neural networks to build powerful state-of-the-art deep learning models. About the Instructor Jon Krohn is the Chief Data Scientist at the machine learning company untapt. He presents a popular series of tutorials published by Addison-Wesley and is the author of the acclaimed book Deep Learning Illustrated . Jon teaches his deep learning curriculum in-classroom at the New York City Data Science Academy. He holds a doctorate in neuroscience from Oxford University, lectures at Columbia University, and carries out machine vision research at Columbia's Irving Medical Center. Skill Level Intermediate Learn How To Build deep learning models in all the major libraries: TensorFlow, Keras, and PyTorch Understand the language and theory of artificial neural networks Excel across a broad range of computational problems including machine vision, natural language processing, and reinforcement learning Create algorithms with state-of-the-art performance by fine-tuning model architectures Self-direct and complete your own Deep Learning projects Who Should Take This Course Software engineers, data scientists, analysts, and statisticians with an interest in deep learning. Code examples are provided in Python, so familiarity with it or another object-oriented programming language would be helpful. Previous experience with statistics or machine learning is not necessary. Course Requirements Some experience with any of the following are an asset, but none are essential: Object-oriented programming, specifically Python Simple shell commands; e.g., in Bash Machine learning or statistics Lesson Descriptions Lesson 1: Introduction to Deep Learning and Artifi...
    Note: Online resource; Title from title screen (viewed February 7, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800200401
    Language: English
    Pages: 1 online resource (1 video file, approximately 7 hr., 54 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Experiment confidently and have fun with coding About This Video Learn to code with absolutely no prior knowledge or experience Build a solid foundation in writing code before you go on to master any coding language Understand the theory and pseudo coding and build your first app with Scratch and Python In Detail Coding for Beginners is the most beginner-friendly eLearning course for anyone looking to start coding! It doesn't matter if you've never even seen a line of computer code before - if you're interested or just wondering if you can learn to code, this is the course for you! This coding guide is designed as a generic, foundation-level course to help you grasp the common coding concepts that you'll apply in any programming language you choose to learn. You'll get a real head start before you advance to mastering a dedicated language and its syntax.
    Note: Online resource; Title from title screen (viewed January 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781800206175
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 23 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: Learn Microsoft Azure and become a certified expert to give your career a new direction About This Video Get to grips with Azure fundamental concepts Derive your own cloud solutions by understanding Microsoft Azure cloud Learn an important and mandatory skill for Windows server administrators and developers In Detail AZ-900 Azure Fundamentals exam is intended for candidates with non-technical backgrounds, such as those involved in selling or purchasing cloud-based solutions and services, as well as those with a technical background who have a need to validate their foundational-level knowledge around cloud services and Azure. This course starts off by setting up a blueprint of what the course covers and how you will travel through the concepts. You will begin by exploring the benefits of cloud services and how as-a-service offerings function. You will further cover cloud models and core Azure architectural components. In the concluding modules, you will understand the internet of things (IoT) on Azure. By the end of this course, you'll become skilled enough to confidently appear in the Microsoft Azure fundamentals examination.
    Note: Online resource; Title from title screen (viewed January 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...