CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Mike ChappleNetworks carry sensitive data between systems and users. To protect the confidentiality, integrity, and availability of network traffic, cybersecurity professionals…
Secure Coding in Java
Frank P Moley IIIThe enduring popularity of Java makes it a target for bad actors. And its prevalence in internal enterprise applications—which are…
CSS: Display
Jen KramerEvery CSS layout relies on the display property to tell it basic rules for how to present content. In this…
Artificial Intelligence for Marketing
MadecraftArtificial intelligence (AI) is changing the way that marketers are interacting with their customers. But how can you as a…
UX Research: Mobile Diary Studies
Sarah WeiseStudying your customers’ experience—especially as they interact with your product or brand in the context of their lives—leads to discoveries…
Protecting Your Network with Open Source Software
Jungwoo RyooNetwork protection is vital to organizations big and small, but it doesn’t have to be an expensive proposition. Learn how…
Node.js: Testing and Code Quality
Jon PeckMost software engineers would agree that clean code is easier to maintain than messy code, but what exactly does that…
Learning Google Cloud Security
Dominique WestIf you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and…
Python Data Structures: Sets and Frozen Sets
Mridu BhatnagarIn this course, instructor Mridu Bhatnagar takes you through the basics of using Python sets and frozen sets. If you’re…
ASP.NET Core: Exception Handling
Ervis TrupjaWhen things go bad, good programmers are ready. Exception handling allows you to ensure your applications respond to errors with…
Troubleshooting Common PC Issues for Users
Dan GookinAre you a help desk specialist or a go-to technical troubleshooter? If people rely on you to diagnose and fix…
How to Use Data Visualization to Make Better Decisions—Faster
Steve WexlerMost organizations are drowning in data but are thirsty for understanding. An abundance of information doesn’t do you any good…
PHP: Choosing a PHP Editor
Robin AndrewsWhile you can write PHP with a regular text editor, having the right tool for the job will make your…
No-Code Solutions for Websites and Apps (2021)
Jen KramerGot a brilliant idea for a mobile application or website? Even if you’ve never touched a code editor in your…
CCSK Cert Prep: 5 Application Security and Identity Management for Cloud Computing
Daniel LachanceDeveloping and managing cloud-based applications requires that security be considered in all DevOps activities. In this course, instructor Daniel Lachance…
iOS 15 and iPadOS: iPhone and iPad Essential Training
Garrick ChowGarrick Chow shows Apple fans everything they need to know about iOS 15 and iPadOS, the latest operating systems for…
Agile Service Management
David PultorakService management is the mental model behind ITSM tools like ServiceNow, Nexthink, and HappySignals, as well as the roles, workflows,…
Getting Started as a Full-Stack Web Developer
Tom GellerHave you ever said, “I want to get into web development, but I don’t know where to start”? If you’re…
JSON Essential Training
Sasha VodnikJSON has become the most common format for data interchange on the web, building from a JavaScript base to a…
Quick Start Guide to Scala
Noel WelshCombining object-oriented and functional concepts, Scala is a concise and eminently scalable language. It provides all the advantages of a…