OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)
Caroline WongThe Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and…
Introducing Jupyter
Josh McQuistonPresent your projects like a pro with a new tool, Jupyter Notebook. Jupyter Notebook is an open-source web application that…
Android App Development: Working with Widgets
Emmanuel HenriLearn to develop widgets—miniature application views—for your Android app. Widgets allow users to access and view the most important functions…
Azure for Architects: Design a Storage Strategy
Scott DuffyAll architects working with the cloud need a strong understanding of storage: a foundational element of any application’s success. Microsoft…
React: Building Progressive Web Apps (PWAs)
Eve PorcelloSingle-page applications may be smooth, quick, and effective—but they disappear when the network connection drops. Progressive web apps (PWAs) work…
Cucumber Essential Training
Shashi ShekharCucumber is a tool for behavior-driven development (BDD), which allows you to write assertions in plain language that are then…
Apache Spark Deep Learning Essential Training
Jonathan FernandesApache Spark is widely considered to be the top platform for professionals needing to glean more comprehensive insights from their…
The Data Game of Fantasy Football
Eddie DavilaAs NFL players ready themselves for a fresh shot at Super Bowl glory, another game starts to invade offices and…
R Programming in Data Science: Dates and Times
Mark Niemann-RossOne of the fundamental difficulties of data science is working with dates and times. This course shows data engineers, DevOps…
Learning VPN
Scott SimpsonVirtual private networks (VPNs) allow remote users to access resources on a protected network via an encrypted connection. While the…
Ethical Hacking: The Complete Malware Analysis Process
Malcolm ShoreThe key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces…
Python Parallel and Concurrent Programming Part 2
Olivia Chiu StoneParallel programming is key to writing faster and more efficient applications. This course, the second in a series from instructors…
Flutter: Part 05 Flutter and Dart Packages
London App BreweryWith Flutter, you can design beautiful apps with minimal effort. This course introduces intermediate app development techniques using packages—specialized plugins…
Power BI Data Modeling with DAX
Gini von CourterPower BI Desktop makes it easy to create basic data models. But if you need to report across time periods—for…
Ethical Hacking: Vulnerability Analysis
Lisa BockIn order to assess—and ultimately, decrease—an organization’s risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you’re…
Developing Plug-Ins and Extensions for Adobe XD
Emmanuel HenriLearn how to create plugins and extensions using the Adobe XD API to extend the features and functionality of Adobe…
CSS Essential Training
Christina TruongCascading Style Sheets (CSS) is a stylesheet language that allows you to control the appearance of your webpages. In this…
macOS Catalina Essential Training
Nick BrazziLearn about how to work with macOS Catalina, including how to manage files and folders, run applications, organize the desktop,…
vSphere 6.7 Professional Part 06: Deploying Virtual Machines and Hosts
Rick CrisciVMware vSphere is an integral part of any modern networking environment. vSphere offers a virtualized data center that helps administrators…
Putting ITIL® Into Practice: Applying ITIL® 4 Foundation Concepts
David PultorakThe Putting ITIL® Into Practice series is designed to help ITIL® Foundation-certified professionals apply the concepts they have learned. It…