Applied Machine Learning: Algorithms
Derek JedamskiIn the first installment of the Applied Machine Learning series, instructor Derek Jedamski covered foundational concepts, providing you with a…
Business Analytics: Multiple Comparisons in R and Excel
Conrad CarlbergStatistical analysis often goes beyond simple analysis of variance (ANOVA), which tells you only if a reliable difference exists somewhere—but…
Introduction to Machine Learning with KNIME
Keith McCormickKNIME is an open-source workbench-style tool for predictive analytics and machine learning. It is highly compatible with numerous data science…
Excel Statistics Essential Training: 1
Joseph SchmullerData isn’t valuable until you put it to good use. Statistics transforms data into meaningful information, enabling organizations to make…
Windows Quick Tips
Nick BrazziIf you spend a sizable portion of your day working in Windows 10, it pays to discover new, more efficient…
The Cybersecurity Threat Landscape (2019)
Marc MenningerAs IT systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly…
Learning TypeScript
Jess ChadwickTypeScript adds discipline to JavaScript development. You can find errors in your code before you execute it, and leverage productivity…
Ethical Hacking: Hacking IoT Devices
Luciano FerrariThe number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge…
Interaction Design: Structure
Diane CronenwettBefore UX designers can move on to anything else, they must think holistically about the structure of their project, determining…
Learning SAP SD (Sales and Distribution)
Justin ValleySAP Sales and Distribution (SD)—a key module in SAP ERP— stores customer and product data for selling, shipping, and billing.…
Web Security: User Authentication and Access Control
Kevin SkoglundUser authentication plays a central role in almost everything we do online. From apps to hardware and websites, user accounts…
CCSP Cert Prep: 3 Cloud Platform and Infrastructure Security (2019)
Mike ChappleModern businesses are charged with keeping troves of sensitive data safe in the cloud. These companies need IT professionals who…
Advanced Selenium: Support Classes
Alan RichardsonMake your automated execution code more robust using support classes within Selenium WebDriver. In this course, instructor Alan Richardson takes…
Application Security in DevSecOps
Tim ChaseWith DevOps continuing to grow in prominence, modern businesses expect applications to be built with greater speed and efficiency than…
Learning System Center Configuration Manager
Robert McMillenSystem Center Configuration Manager (SCCM) allows system admins to manage large groups of operating systems. In addition, it provides remote…
Creating Presets, LUTs, and Profiles for Photography
Richard HarringtonAre you looking to save time and unlock new creative options in your photo editing workflow? Learn how to build…
OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
Caroline WongThe Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and…
vSphere 6.7 Professional Part 01: Managing Networking
Rick CrisciVMware vSphere is an integral part of any modern networking environment. vSphere offers a virtualized data center that helps administrators…
Power BI Top Skills (2019)
MadecraftYou don’t need a dedicated team to unlock insights into your data. All you need is Power BI. Power BI…
Azure for Architects: Design a Networking Strategy
Scott DuffyLearn about designing a network strategy with Microsoft Azure and prepare for the networking portion of Exam AZ-301: Microsoft Azure…