Inhalt: Do you need to learn Python for your current job, for the job you want, or just for fun? In this course, instructor Ronnie Sheer shows you how you can leverage your existing knowledge of JavaScript to get started programming in Python. Ronnie compares Python and JavaScript, then covers how to set up and run a Python environment. He discusses how to write code that adheres to Python conventions, which can prevent bugs. Ronnie explains some of the basic logic in Python, including the use of indentation, how to write and debug control flow, how to use Python try/except appropriately, and more. He goes over objects and class definitions, then explores Python's data model feature and mixins class. Ronnie goes into iteration in Python and shows how you can write more concise and elegant code in Python by using zip, enumerate, and list comprehensions. He concludes with a challenge that shows you how to apply your knowledge of JavaScript and Python to improve a small program. Umfang: 01:57:40
Inhalt: Learn how to develop more secure Python applications. In this course, instructor Ronnie Sheer reviews the most common vulnerabilities in Python apps and explains how to set up a coding environment that helps you develop code with security in mind. Learn how to avoid common pitfalls associated with loose typing and assertions and find out how to deserialize Pickle data. Then explore the security features-such as code generation and secrets management-in Django, a popular Python framework. Ronnie also explains how to secure a RESTful API in Django using permissions, data serialization, and automated testing, and closes the course with some tips for securing applications written with Flask, a powerful micro web framework. Umfang: 01:31:05
Inhalt: Demonstrate your knowledge of OneNote 2010 by becoming a Microsoft Office Specialist. In this course, Microsoft Office Specialist Julie Sheets helps you prepare for the OneNote 2010 MOS certification exam (77-853) by covering the three main areas of the test: managing the OneNote environment, organizing and finding notes, and sharing and collaborating. Julie begins with an overview of the certification program and the exam preparation process, and then walks you through all of the certification objectives. Get hands-on experience with downloadable practice files and take the challenges exercises to practice for the exam. It also provides a review of each challenge to give you a chance to see where you may need more focus in preparation for the exam. Umfang: 02:55:47.00
Inhalt: Become a Microsoft Office Specialist. Study to pass the Microsoft OneNote 2013 certification exam. This course, created by Microsoft Project MVP Julie Sheets, helps test-takers prepare for exam 77-421, which covers the four main skill areas in OneNote 2013. The course first explores the MOS certification program and its costs, format, and objectives. Julie then walks through all of the exam objectives in detail. Learn how to create notebooks and add notes, sections, and pages. Find out how to customize and personalize OneNote, including creating templates and configuring OneNote Backstage. Then discover how to organize and find notes, edit text and images, link content between notebooks and from other programs, and share and collaborate with other OneNote users. There are over a half dozen challenges to test your skills, and a full-length, 50-minute practice test to ensure you're ready for the real exam. Disclaimer: Microsoft does not produce, provide, or endorse this video training course. Umfang: 05:38:05.00
Inhalt: Distinguish yourself from other SharePoint users with a Microsoft Office Specialist (MOS) certification. Train for the SharePoint 2013 Microsoft Office Specialist exam. This course provides an overview of the MOS program and the SharePoint certification, so users know what to expect in terms of cost, time, and exam format. Microsoft consultant and trainer Julie Sheets walks through each objective of the exam, including creating and formatting content with lists and libraries, managing SharePoint sites and workspaces, participating in user communities, and working with search results. Disclaimer: Microsoft does not produce, provide, or endorse this video training course. Umfang: 03:36:18.00
Inhalt: Scrum is an agile framework that helps organizations deliver high-quality products to their customers. Learn how to use scrum and project management tools like Jira and Confluence to manage software development. This course takes a practical approach with real-life examples that show how scrum is executed. Instructor Shashi Shekhar covers scrum roles, rules, artifacts, and events and uses Jira and Confluence to show how popular software development tools can assist in scrum implementation. Umfang: 02:40:03.00
Inhalt: Cucumber is a tool for behavior-driven development (BDD), which allows you to write assertions in plain language that are then testable by code. By making written requirements actually testable, it provides a common language between business and engineering professionals. In this course, learn how to use Cucumber to implement agile practices like BDD, test-driven development (TDD), and acceptance test-driven development (ATDD). Instructor Shashi Shekhar goes over the basics of BDD, TDD, and ATDD, and then dives into the Cucumber workflow. He also shows how to map user stories to features, add hooks, generate reports, and apply techniques to make BDD maintainable. Umfang: 02:43:57.00
Inhalt: From scrum to Six Sigma, there's an abundance of options for architecting an organization's workflow. And since there's no one-size-fits-all approach to software development, it's important for software project managers, architects, and team leads to grasp the different options at their disposal before making a decision that affects the budgeting, staffing, and management of software delivery. This course zooms out on the software development landscape to provide a high-level look at a variety of software development life cycle (SDLC) approaches-from traditional methods to more modern processes. Instructor Shashi Shekhar provides a brief overview of each method, highlighting how each one is unique and can be applicable today. Learn about lean, kanban, DevOps, and more. Umfang: 01:34:47.00
Inhalt: Der agile Ansatz, der auf kontinuierliche Bereitstellung und Verbesserung, Zusammenarbeit und Offenheit für Veränderungen setzt, kann Teams dabei helfen, sowohl ihre Produktivität als auch die Qualität ihrer Endprodukte zu steigern. In diesem Kurs lernen Sie die Grundlagen agiler Arbeitsweisen kennen und Sie werfen einen Blick auf die wichtigsten Techniken. Der Software- und Technologieexperte Carsten Humm diskutiert dabei zunächst die wichtigsten Prinzipien des agilen Ansatzes aus der Perspektive der Softwareentwickler. Anschließend bespricht er Scrum - ein äußerst beliebtes agiles Framework - und erläutert Scrum-Prinzipien, Rollen und Ereignisse. Er untersucht auch, wie Sie Ihre Scrum-Implementierung mit Kanban ergänzen können und geht weiterhin auch auf Extreme Programming (XP) ein. Der Kurs wurde im englischsprachigen Original entwickelt von Shashi Shekhar, seines Zeichens Senior Technical Account Manager bei Amazon Web Services (AWS). Umfang: 01:44:30.00
Inhalt: A abordagem Ágil - que enfatiza a entrega e a melhoria contínuas, a colaboração e a receptividade a mudanças - pode ajudar os profissionais a melhorar tanto a produtividade quanto a qualidade de seus produtos finais. Neste curso, conheça os fundamentos do Ágil para desenvolvedores e saiba por que essa abordagem é especialmente adequada para a engenharia de software. O instrutor Shashi Shekhar explora os princípios-chave da abordagem Ágil do ponto de vista dos desenvolvedores. Em seguida, analisa o Scrum - um framework Ágil bastante conhecido - e discute seus princípios, papéis e eventos. Também explica como complementar a implantação do Scrum com o Kanban, explora em profundidade a Programação Extrema (XP) e compartilha como uma equipe de desenvolvimento deve aplicá-la para ser mais eficaz e eficiente. Ao longo do curso, Shashi oferece exemplos práticos que ajudam a reforçar os conceitos abordados. Umfang: 01:32:58
Inhalt: The agile approach-which emphasizes continuous delivery and improvement, collaboration, and openness to change-can help professionals enhance both their productivity and the quality of their final products. In this course, learn the fundamentals of agile for software developers, as well as why this approach is uniquely suited for software engineering. Instructor Shashi Shekhar discusses key principles of the agile approach from the perspective of developers. He then reviews scrum-a hugely popular agile framework-and discusses scrum principles, roles, and events. He also looks at how you can complement your scrum implementation with Kanban; takes a deep dive into extreme programming (XP); and shares how you can apply XP to be more effective and efficient in a development team. Throughout this course, Shashi shares practical examples that can help reinforce the concepts covered in this course. Umfang: 01:53:56.00
Inhalt: El enfoque ágil y su interés por la entrega y la mejora continua, la colaboración y la apertura al cambio puede ayudar a que las empresas y los equipos optimicen tanto su productividad como la calidad de sus productos. En este curso, vamos a aprender los fundamentos de ágil para desarrolladores de software, así como las razones que hacen único a este planteamiento de la gestión de proyectos dentro del mundo del software. Vamos a explorar los principios de la filosofía Agile, así como sus implementaciones, tales como Scrum y la programación extrema, y vamos a ver ejemplos prácticos que reforzarán los conceptos que te explicamos en el curso. Umfang: 02:01:18.00
Inhalt: At its essence, agility in enterprise is an approach focused on the ability to adapt and follow an empirical process to learn and improve over time in order to provide better business value to customers. Today, many organizations are using cloud computing to enhance agility, and in this course, Shashi Shekhar covers how to use the cloud to architect your applications and infrastructure to enhance agile software development practices. Shashi illustrates these key points through a case study of a fictional financial advisory company, highlighting the planning and implementation of cloud architecture to improve agility. He shows how to build a microservices-based architecture and deploy it in the cloud to achieve automatic scaling and minimize downtime. Whether you're a developer, solutions architect, or project manager responsible for enterprise modernization, this course gives you tools toward replacing legacy systems with highly resilient and extensible systems. Umfang: 01:14:34
Inhalt: In Video for Photographers: Shooting with a DSLR, photographer and videographer Rob Sheppard provides the essential foundation that photographers need to make the leap from still pictures to moving ones. From technical considerations, such as audio and frame rates, to aesthetic issues, such as composition and story development, this course presents concepts and techniques photographers need to get the best results from their gear and learn the art of video-based storytelling. Exercise files are included with the course. Umfang: 02:32:16.00
Inhalt: Raspberry Pi development comes in many flavors, but Python is common and powerful. In this project-based course, learn how to work with this highly readable language-along with a Raspberry Pi board-to build a secure ecosystem of interconnected IoT devices. Instructor Anum Sheraz begins by reviewing the basics of IoT smart devices, as well as several important IoT communication models. Next, Anum steps through how to create the first course project: an anti-theft motion detector. He then dives into several other projects that build upon this first one, including how to enable real-time bidirectional communication using PubNub, create and secure your own custom domain name, and build an atmosphere monitoring system that can alert and detect ambient atmospheric conditions. Note: This course was created and produced by Packt Publishing. Umfang: 03:03:39.00
Inhalt: Retouching faces used to be challenging without using Adobe Photoshop, but recent improvements in Lightroom-involving the Spot Removal tool, Clone Stamp tool, Adjustment Brush tool, syncing capabilities, and more-have made it much simpler to use Lightroom as a stand-alone solution. This course shows you how to save time by staying in Lightroom instead of Photoshop. Discover how to remove unwanted blemishes, make local or targeted adjustments, enhance eyes, smooth skin, and more. Umfang: 01:28:40.00
Inhalt: Our minds default to a certain style of thinking-a style that may actually inhibit us from making the right decisions. In this course, renowned scientist and best-selling author Dr. Michael Shermer shares how to improve the way we think by following a scientific set of steps. Listeners can hear why people think like lawyers, not scientists, and what we can do about it. Dr. Shermer explains common fallacies, techniques for approaching decisions with a skeptical mind, and why the unexplained is not inexplicable. Follow along and learn to unlock a new way of thinking for success. This audio-only course was created by Madecraft. We are pleased to host this content in our library. Umfang: 00:31:03.00
Inhalt: The best decisions are made when you fully understand your bias. In this course, listeners can learn about cognitive bias and how it hurts our ability to think rationally and make effective decisions. Dr. Michael Shermer, a prominent professor and bestselling author, shares ten common bias people often fall victim to. Explore confirmation bias, attribution bias, and authority bias, among many others. Once your bias is understood, better decisions can be made. This audio-only course was created by Madecraft. We are pleased to host this content in our library. Umfang: 00:26:09.00
Inhalt: Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting. Learn how to use the basic toolset and extend Kali, integrating native exploits into the Metasploitable environment. Find out how to generate and maintain a variety of shells, including Python and C++, and discover how to collect and use credentials. Get an introduction to the online Hack The Box lab where you can practice your pen-testing skills. Instructor Malcolm Shore focuses on the advanced customization of exploits and achieving root access through a sustainable shell. He has designed the course to help the learner advance as a professional pen tester, and learn key objectives needed to pass the Offensive Security Certified Professional (OSCP) exam. The training will appeal to all ethical hackers and pen testers, as well as general IT professionals. Umfang: 02:22:01.00
Inhalt: You've secured your systems, trained your users, and fortified your network. Think you're ready to handle a cybersecurity threat? Penetration testing is one of the best ways to see if your security will hold. It puts testers in the role of attackers, looking for vulnerabilities in your networks, computers, applications, email, and users. This course provides an introduction to the key knowledge and skills to start a program of professional penetration testing at your organization. Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on the Kali Linux penetration testing toolbox, approaches to web testing, and several important facets of exploit code. At the end of this course, you'll be prepared to take more advanced training and to pursue the popular Offensive Security Certified Professional (OSCP) certification. Umfang: 02:38:32
Inhalt: The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms-malware which can propagate itself onto other computers through removable media or networks-as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called "botnets." Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional. Umfang: 01:32:24.00
Inhalt: Securing or "hardening" Android apps is an important final step to ensure code, keys, and credentials, as well as the developer's intellectual property, are well protected. This course provides an introduction to the key features of the Android security model: from the Android operating system to the hardware it runs on. Instructor Malcolm Shore demonstrates the weaknesses in some sample commercial Android apps, and shows the default output from existing development environments, including Android Studio, PhoneGap, and RAD Studio. He then explains a range of tools and techniques to increasingly harden an Android app, secure known vulnerabilities, and test your work. Malcolm also reviews advanced techniques for securing enterprise apps and leveraging the security enhancements in Android O. Using these tutorials, you'll be able to develop more secure and more robust mobile applications. Umfang: 01:44:12.00
Inhalt: Ethical hacking-testing to see if an organization's network is vulnerable to outside attacks-is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, detailing how firewalls work in both Windows and Linux, as well as how to set up a firewall simulation in a GNS3 network. Next, he goes over web application firewalls, API gateway threat mitigation solutions, and how to use honeypots to detect intruders. Finally, he covers the main ways to manage a suspected intrusion, including how to use the Security Onion intrusion detection system (IDS). Note: The topics covered in this course are drawn from the Evading IDS, Firewalls, and Honeypots competency in the Certified Ethical Hacker (CEH) body of knowledge. Umfang: 01:59:41.00
Inhalt: One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions-the valid interactions of unsuspecting users-in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website. Umfang: 01:12:08.00
Inhalt: Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration-identifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer. An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:57:10.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 26.04.2024, 12:10 Uhr. 4.186 Zugriffe im April 2024. Insgesamt 509.701 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral