Search result for Network tools and technologies Online Courses & Certifications
Get Course Alerts by Email
The Basics of Blockchain: Ethereum, Bitcoin, & More
by Tom Serres- 4.3
3.5 hours on-demand video
TED Speaker Bettina Warburg connects the dots between the business, economics, and technology of Blockchain. Expert video interviews with Dominic Williams, one of the first investors in Ethereum and Founder of the Dfinity Network, Vlad Zamfir, Blockchain Researcher and Creator of Casper, and Gavin Wood, one of the founders of the Ethereum Network and founder of Parity Technologies, and others....
$16.99
Learning Path: VMware vSphere Unlocked
by Packt Publishing- 4.1
23.5 hours on-demand video
Master the art of delivering high availability and zero data loss across the virtual IT environment Atindra Chaturvedi is a certified VMware Advanced Professional in Data Center Design (VCAP-DCD) and Data Center Administration (VCAP-DCA) which speak to his advanced knowledge of the vSphere virtual data center design and hands-on ability to operate the advanced tools available in the environment....
$11.99
Free Ways to Create Passive Income Online
by david herpin- 0.5
43 mins on-demand video
You'll learn dropshipping, affiliate marketing, Email Marketing, Network Marketing, url shortening, free domain extensions, Free automated passive income software, annuities, and websites. Learn how to get free traffic and lots of it. It's simple and laid out for you, You have to be the one to take action! Do the work and you'll be so happy you did....
$12.99
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
It explains how the rise of technologies and proliferation of (medical) data has become an attractive target to cybercriminals, which is essential in understanding why adequate cybersecurity measures are critical within the healthcare environment. You will learn about different ways to improve and maintain cybersecurity, highlighting the interaction between technology and human behaviour...
Salesforce Lightning for Beginners (with Examples)
by Deva Venkata Momidi- 3.8
3.5 hours on-demand video
It provides modern fonts and colors, and the flexible size and arrangement of “components” makes much better use of available screen space. Customizing Salesforce with Lightning Components, you'll learn how easily customize Salesforce with the new Lightning Component framework, which includes all the tools and technologies needed to build responsive and efficient components for any device....
$9.99
Ethical Hacking and Network Security from Scratch 2021
by Andrei Dumitrescu- 4.7
15 hours on-demand video
This course is for you if you want to learn Ethical Hacking and Network Security applied to the real-world. It’s specially designed for you whether you have no experience in Network Security, you’ve taken other related courses and you want to level up your skills, or you are coming from other fields like Network and System administration or Programming....
$18.99
Cyber Security: Learn How to Protect Your System & Web App
by Thinkahead Academy, LLC.- 0.0
4.5 hours on-demand video
This course gives you hands-on experience to mitigate risks and prevent attackers from infiltrating your system. Learn both web application vulnerabilities and web intrusion testing Use Metasploit and more tools for network infrastructure tests At the end of this course, you will have hands-on knowledge of using different tools for cyber security....
$12.99
Related searches
Learn BERT - most powerful NLP algorithm by Google
by Martin Jocqueviel- 4.2
5.5 hours on-demand video
Understand and apply Google's game-changing NLP algorithm to real-world tasks. Use BERT as a pre-trained model and then fine tune it to get the most out of it Explore the Github project from the Google research team to get the tools we need Use Google Colab and Tensorflow 2. Create customs layers and models in TF 2....
$15.99
Developing FPGA-accelerated cloud applications with SDAccel: Theory
by Marco Domenico Santambrogio- 4.7
Approx. 19 hours to complete
In this case, certain attributes, directives, or pragmas, can be used to direct the compilation and synthesis of the hardware kernel, or to optimise the function of the data mover operating between the processor and the hardware logic. Familizarize youself with FPGA technologies Reconfigurable Computing and FPGA technologies FPGA-based systems and reconfiguration...
Communicate Effectively about Ethical Challenges in Data-Driven Technologies
by Renée Cummings , Jennifer Fischer , Megan Smith Branch- 0.0
Approx. 14 hours to complete
Communication to stakeholders will guide an organization's strategy and potentially impact the future of work for that organization or entity. Design Diverse, Equitable, and Inclusive External Communication Strategies The Importance of Diversity, Equity, and Inclusiveness Diverse, Equitable, and Inclusive Communication Strategies Mission and Vision Statement Manage a Crisis, Communicate Critical Messages, and Ensure Business Continuity Media Communication Plans and Tools...