OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
Caroline WongThe Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and…
vSphere 6.7 Professional Part 01: Managing Networking
Rick CrisciVMware vSphere is an integral part of any modern networking environment. vSphere offers a virtualized data center that helps administrators…
Using Power BI with Excel (2019)
MadecraftTake your analysis skills to the next level. Power BI is a powerful data analytics tool that is streamlining the…
Python for Data Science Essential Training Part 1
Lillian Pierson, P.E.Python for Data Science Essential Training is one of the most popular data science courses at LinkedIn Learning. It has…
Nail Your DevOps Interview
Michael JenkinsDevOps engineers are in high demand, but the barriers to entering the field can be intimidating. DevOps roles require an…
GitHub Actions First Look
Ray VillalobosActions, a developer productivity and CI/CD suite of tools from GitHub, offers developers a new way to automate workflows for…
Build Your First Chatbot with SAP Conversational AI
Michael ManagementWith the rise of digital assistants like Alexa and Siri, voice-based interactions are becoming commonplace. SAP provides its own bot-building…
Building Angular and ASP.NET Core Applications
Ervis TrupjaWant to build your own web application? In this course, Ervis Trupja shows you how, explaining what it takes to…
Flask Essential Training
Nick WalterFlask is a Python framework for building lightweight and dynamic web applications. It helps speed up tedious behind-the-scenes development work,…
Building Chatbots Using Google Dialogflow
Lee AssamGoogle Dialogflow can help you build engaging text-based conversational interfaces, using an AI-powered toolset that assists with designing, scaling, and…
Data Rights Foundations
Martin KemkaThe main driver of the technological revolution isn’t artificial intelligence or machine learning. It’s data: data about people like us.…
Security for the SMB: Implementing the NIST Cybersecurity Framework
Ronald WoernerCybersecurity incidents impact organizations of all sizes, in all sectors. Small and medium businesses (SMBs) may not have the same…
SAS® 9.4 Cert Prep: Part 13 Processing Repetitive Code
SAS InstituteWant to get ahead in a crowded job market? Get certified with SAS. This course is part of a series…
Microsoft Power Automate: Advanced Business Automation (2020)
Phil GoldIn this advanced course, instructor Phil Gold explores how to create time-saving automations using Microsoft Power Automate (formerly known as…
Excel: Macros in Depth (365/2019)
Dennis TaylorLearn about how to use macros to automate tasks in Excel and see how to create simple macros of your…
MERN Essential Training
Emmanuel HenriCurious about how MongoDB, Express, React, and Node.js, or MERN, work together, and how to build a full-stack application with…
Software Testing Tips Weekly
Michael SmithAs a software tester, it’s your job to ensure that your organization ships high-quality, working software to customers. But how…
Apache Flink: Exploratory Data Analytics with SQL
Kumaran PonnambalamExploratory data analytics is a key phase in data science that deals with investigating data to extract insights. In a…
Figma: Working with Clients
Emmanuel HenriExplore an effective client workflow with Figma, the team-oriented design tool. Learn about the best ways to structure a Figma…
Python Code Challenges
Barron StoneWant to test your Python skills? These concise challenges let you stretch your brain and test your talents. Instructor Barron…