Showing 496–504 of 1061 results

  • Networking , Shop

    Cisco ASA with FirePOWER using ASDM Training

    Do you want to learn how to block certain applications like BitTorrent, Remote Desktop, to FTP? Do you want to learn how to decrypt a secure web page a user may access to inspect it further? Do you want to learn how to block certain files uploaded towards the Internet? Do you want to setup your firewall to dynamic block …

  • Animation & Graphics , Programming

    Compositing in Photoshop From Start to Finish

    Start compositing in Photoshop and watch your wildest image ideas come to life alongside digital artist Bret Malley. Begin by learning how to use the Quick Selection, Magic Wand and Refine Edge tools for accurate, clear composites. Then, gain complete creative control over your images by working with masks and adjustment layers as you clip your curves, color and saturation …

  • Linux & IT , Shop

    TechWorld with Nana – The Ultimate Course for IT Beginners

    We get a lot of requests from viewers with zero or little IT pre-knowledge, who want to start a career in DevOps.
    But since DevOps Engineering is not an entry-level IT profession, we decided to create a course that will prepare non-IT people for transitioning into DevOps.

    However, the course turned out to be a great resource for IT beginners in general. …

  • Shop , Trading & Marketing

    Email Marketing Money Mastery

    The Exact System I Use To Make Thousands Of Dollars A Month By Typing Some Words And Clicking A Big, Red Send Button.

    Let me show you the exact system that makes me thousands of dollars a month like clockwork.

    I’m Jose Rosado. Husband and father, living and working in the Dominican Republic.

    Despite the barriers my country imposed on online businesses, I …

  • Programming , Shop

    Certified Kubernetes Application Developer (CKAD) Complete Video Course (Video Training), 3rd Edition

    Certified Kubernetes Application Developer (CKAD) Complete Video Course, Third Edition is your complete guide to learning how to run Kubernetes applications and pass the CKAD exam. It includes in-depth discussions, lightboard explanations, and lab demonstrations to get you started with Kubernetes. It also covers all objectives in the industry-recognized CKAD exam. Each lesson ends with a hands-on lab and the video …

  • Linux & IT , Shop

    BYOL: Build Your Own Linux From Scratch

    By the end of this course, you will have built an understanding of how the Linux kernel interoperates with glibc and the rest of the binary toolchain. This, in turn, will enlighten your understanding of how various software packages rely on the kernel and glibc to provide interfaces and services, …

  • Programming , Shop

    JavaScript: From First Steps to Professional

    Take your first steps into the wide world of JavaScript and walk away with the core skills needed to become a professional JavaScript programmer! Through a series of hands-on projects, you’ll learn the building blocks to write dynamic websites. Modify web pages on the fly, write reusable code with functions, react to user events, make decisions with conditionals, and fetch …

  • Security , Shop

    GIAC Enterprise Security Essentials (GSEC)

    This intermediate GIAC Security Essentials training prepares security professionals to take the GSEC exam, which is the one required exam to earn the Security Essentials certification.

    The Global Information Assurance Certification is an industry credential IT professionals earn to prove that they’re technically proficient in a specialized field. The GIAC Security Essentials is a broad certification that proves a …

  • Security , Shop

    Web Hacking Expert: Full-Stack Exploitation Mastery

    In this course, it will be shown to you how hackers can bypass Content Security Policy (CSP) which is the most powerful defensive technology in modern web applications. Then during this course, it will also be demonstrated how web applications can be hacked via PDFs, images, and links. You will also learn how hackers can steal secrets from AngularJS applications, which are …