369625 637221418014693480 16x9 2

Cybersecurity with Cloud Computing

Description How do you keep your organization’s files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and Read more…

5539867212001 5667961168001 5660941583001 vs

After Effects Kickstart

DESCRIPTION After Effects Kickstart is the ultimate After Effects intro course for motion designers. In this course, you’ll learn the most commonly used tools and best practices for using them while mastering the After Effects interface. Adobe After Effects is a Swiss Army Knife used all across the entire Motion Read more…

512726 637199541940241900 16x9 1

Ethical Hacking: Wireless Networks

Description Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of Read more…

753915 637199657056208905 16x9 1

Marketing Tools: Digital Marketing

Description As a modern marketer, you have a wealth of digital marketing solutions at your disposal. How do you determine which ones are right for you and your organization? In this course, marketing expert Anson Alexander digs into the tools available to you across the different areas of digital marketing, Read more…