Search result for System and performance testing Online Courses & Certifications
Get Course Alerts by Email
Recruiting & Talent Acquisition - Value Stream Mapping (VSM)
by Culturelligence LLC- 4
43 mins on-demand video
To maximize sustainability, HR agility and organizational performance, it is imperative to understand an organization system and its entities, how the entities interact with each other and the impact of interactions on the whole organizational system. You will learn how VSM steps can be applied to performance management and talent acquisition processes....
$9.99
SAP HANA Administration
by SAP Buddy- 4
23.5 hours on-demand video
Instillation and Administration SAP HANA system administrators are responsible for installing and ensuring continuous operation of all SAP HANA databases deployed in the corporate environment. We’ll examine the operations offered for both individual and multiple database administration, resource monitoring, configuration management and backup and recovery. Course also covers installation of SAP HANA, HANA replication server installation and configuration....
$12.99
Learn Manual Software Testing with Live Project + Jira Tool
by Pavan Kumar- 0.0
12.5 hours on-demand video
Manual Testing course with Live project + Agile with Jira Tool Learn and Start your career as Software Testing field from the experienced professional. Module-1: Software Testing Concepts Different Levels of Software Testing White Box & Black Box Testing Static Testing & Dynamic Testing System Testing Types GUI Testing Functional & Non-Functional Testing...
$16.99
Kali Linux Wireless Penetration Testing - Novice to Pro!
by Packt Publishing- 0.0
11 hours on-demand video
With the Linux operating system and its core structure based on Debian, it comes jam-packed with all the tools you need to penetration-test your websites. Contents and Overview Throughout this course, we will be discussing new products to add to your ethical pen testing tool belt, including antennas, Android devices, and laptops....
$12.99
Penetration Testing - Discovering Vulnerabilities
by Aspen Olmsted- 0.0
5 Weeks
Learn fundamentals of penetration testing, including an Introduction to Penetration Testing Methodologies, Recognisance and Enumeration for Penetration Testers, Scanning and Vulnerability Enumeration. Among the topics covered are an introduction to Penetration Testing Methodologies, Recognisance, and Enumeration for Penetration Testers, Scanning, and Vulnerability Enumeration. The class starts with an overview of penetration testing and the phases of a penetration test....
$166
Introduction to Healthcare
by Nigam Shah , Mildred Cho , Laurence Baker- 4.8
Approx. 12 hours to complete
Solving the problems and challenges within the U. Beyond Patients, Providers, and Intermediaries: Other Players in the Health Care System Intermediaries, Pharmacy Benefit Managers, Drug Prices, and Rebates Products and Prescription Drugs Wrap Up - Data and Opportunities for Innovation Issues you may encounter in efforts to improve healthcare delivery and the healthcare system...
Node JS: Advanced Concepts
by Stephen Grider- 4.7
16 hours on-demand video
Js! Learn caching with Redis, speed up through clustering, and add image upload with S3 and Node! You will be one of the engineers who can clearly articulate the performance profile of Node and its Event Loop. Caching with Redis: We'll also supercharge the performance of database queries by implementing caching backed by Redis....
$18.99
Related searches
Internet of Things V2: DragonBoard™ bring up and community ecosystem
by Ganz Chockalingam , Harinath Garudadri- 3.4
Approx. 21 hours to complete
In this course you will build a hardware and software development environment to guide your journey through the Internet of Things specialization courses. 1) Know where you can find resources and help in the 96Boards ecosystem. File system and tools Setting up hardware and your development environment Editor choices, IDEs and languages...
Network Security - Introduction to Network Security
by Aspen Olmsted- 0.0
5 Weeks
Penetration Testing - Exploitation Penetration Testing - Post Exploitation Next, we cover standard attack techniques, attacks such as Denial of Service, DNS attacks, and client-side attacks, and the tools used to carry out these exploitations. Identify and plan to manage risks in common situations Summarize how attackers can remove evidence of system compromise in Windows and Unix systems...
$166
Single Page Web Applications with AngularJS
by Yaakov Chaikin- 4.9
Approx. 47 hours to complete
Do you want to write powerful, maintainable, and testable front end applications faster and with less code? Lecture 28, Part 1: Directive’s Isolate Scope: “=” and “@” Lecture 28, Part 2: Directive’s Isolate Scope: “=” and “@” Lecture 45, Part 1: Testing AngularJS Services and $http Lecture 45, Part 2: Testing AngularJS Services and $http...