Sebastien Deguy started out as a mathematician working on a CGI prototype. Ten years on, his prototy ...
Im Bestand seit: 09.01.2022
Verfügbar
C lacks some of the safety valves offered by newer programming languages. But while this midlevel la ...
Im Bestand seit: 09.01.2022
Verfügbar
The enduring popularity of Java makes it a target for bad actors. And its prevalence in internal ent ...
Im Bestand seit: 09.01.2022
Verfügbar
Learn how to develop more secure Python applications. In this course, instructor Ronnie Sheer review ...
Im Bestand seit: 09.01.2022
Verfügbar
Containers have transformed the way applications are built, deployed, and managed. But it's only a m ...
Im Bestand seit: 09.01.2022
Verfügbar
Cryptocurrencies have exploded in popularity for both individuals and organizations. With billions o ...
Im Bestand seit: 09.01.2022
Verfügbar
The protection of user privacy and data is a clear mandate for business success. In this course, lea ...
Im Bestand seit: 09.01.2022
Verfügbar
Get practical and up-to-date information on implementing threat detection in Windows Server 2016. Th ...
Im Bestand seit: 09.01.2022
Verfügbar
Discover how to implement workload specific security in Windows Server 2016. In this concise trainin ...
Im Bestand seit: 09.01.2022
Verfügbar
Discover how to manage privileged identities in Windows Server 2016. In this concise course, instruc ...
Im Bestand seit: 09.01.2022
Verfügbar
Learn how to secure network infrastructure in Windows Server 2016. In this short training course, in ...
Im Bestand seit: 09.01.2022
Verfügbar
Maintaining a secure server environment is one of the most crucial tasks for professionals charged w ...
Im Bestand seit: 09.01.2022
Verfügbar
Security is a vital part of any enterprise environment. In this course, follow Ed Liberman as he exp ...
Im Bestand seit: 09.01.2022
Verfügbar
Working from a home office might be a temporary situation or a permanent choice, but whatever the si ...
Im Bestand seit: 09.01.2022
Verfügbar
The Internet of Things (IoT) is how devices on the Internet communicate through omnipresent sensors. ...
Im Bestand seit: 09.01.2022
Verfügbar
The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to ma ...
Im Bestand seit: 09.01.2022
Verfügbar
Social engineering is one of the most dangerous forms of hacking because it preys on human nature. L ...
Im Bestand seit: 09.01.2022
Verfügbar
Security affects everyone who uses the internet and shares personal data. Consequently, it's not a c ...
Im Bestand seit: 09.01.2022
Verfügbar
Outsourcing your cybersecurity program can provide major benefits but can also present distinct chal ...
Im Bestand seit: 09.01.2022
Verfügbar
To provide your organization with confidence, you need to perform testing to prove it's secure. Howe ...
Im Bestand seit: 09.01.2022
Verfügbar