By the end of this course, you will have built an understanding of how the Linux kernel interoperates with glibc and the rest of the binary toolchain. This, in turn, will enlighten your understanding of how various software packages rely on the kernel and glibc to provide interfaces and services, …
Programming , Shop
Certified Kubernetes Application Developer (CKAD) Complete Video Course (Video Training), 3rd Edition
Certified Kubernetes Application Developer (CKAD) Complete Video Course, Third Edition is your complete guide to learning how to run Kubernetes applications and pass the CKAD exam. It includes in-depth discussions, lightboard explanations, and lab demonstrations to get you started with Kubernetes. It also covers all objectives in the industry-recognized CKAD exam. Each lesson ends with a hands-on lab and the video …
Linux & IT , Shop
BYOL: Build Your Own Linux From Scratch
Programming , Shop
JavaScript: From First Steps to Professional
Take your first steps into the wide world of JavaScript and walk away with the core skills needed to become a professional JavaScript programmer! Through a series of hands-on projects, you’ll learn the building blocks to write dynamic websites. Modify web pages on the fly, write reusable code with functions, react to user events, make decisions with conditionals, and fetch …
Security , Shop
GIAC Enterprise Security Essentials (GSEC)
This intermediate GIAC Security Essentials training prepares security professionals to take the GSEC exam, which is the one required exam to earn the Security Essentials certification.
The Global Information Assurance Certification is an industry credential IT professionals earn to prove that they’re technically proficient in a specialized field. The GIAC Security Essentials is a broad certification that proves a …
Security , Shop
Web Hacking Expert: Full-Stack Exploitation Mastery
In this course, it will be shown to you how hackers can bypass Content Security Policy (CSP) which is the most powerful defensive technology in modern web applications. Then during this course, it will also be demonstrated how web applications can be hacked via PDFs, images, and links. You will also learn how hackers can steal secrets from AngularJS applications, which are …
Programming , Shop
Testing Javascript with Kent C. Dodds
Learn the smart, efficient way to test any JavaScript application
This course will apply the four-layer testing method to a React application, but this foundational strategy can be applied across any JavaScript framework: Angular, Vue, legacy Backbone apps, even frameworks and libraries we haven’t met yet.
Learn the professional method for JavaScript testing and always ship high quality software like the professional …
Security , Shop
Getting Started in Security with BHIS and MITRE ATT&CK (PDF-VID-LAB)
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
At Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes …
Linux & IT , Programming
Docker Certified Associate (DCA)
Docker is an extremely powerful tool for running and managing containers. Currently, Docker is the industry-leading container runtime platform and offers a colossal number of features revolving around container management, plus orchestration.
This course serves as preparation for learners who seek to pass the Docker Certified Associate certification exam offered by Docker. Ultimately, the certification exam aims to validate one’s skills …
Linux & IT , Networking
Microsoft Certified Azure Solutions Architect Expert – AZ-305
This intermediate AZ-305 training prepares learners to design and manage a network infrastructure that balances all of an organization’s needs with all appropriate Microsoft Azure solutions.
Microsoft Azure is more than just a cloud storage service — Microsoft has been spending staggering amounts of money to ensure that it’s a complete package. The dream for Microsoft is to have …