AW Software Products ExcitingAds :: Exciting Ads

kahm-logo

Sitemap

 
"Cloud Native Development on Azure with Java"
"This course will help you architect a cloud-native application which will be resilient, can auto-scale automatically, and requires less maintenance; it focuses entirely on practicality, building a cloud-native application in Java and deploying it on Azure. Developers get hands-on experience in a range of computing, storage, data, and network services, which offers the developer a complete toolbox to build and deploy cloud-native applications. You'll learn about the driving factors for cloud adoption and see how cloud deployment with Azure is different from regular deployment on a standard data center.This course is a one-stop guide for Java developers who want to use Java Spring to build secure, resilient, robust, and scalable applications that are hosted on Microsoft Azure. You'll easily build and monitor a scalable, resilient, and robust cloud-native application that is always available and fault-tolerant.About the AuthorTetraNoodle Technologies provides your business with an augmented executive service that prioritizes growth. We provide technology and CTO services that are cheaper, faster, and better informed than traditional CTOs.Our team has worked within the technology industry for over 45 years. We use the connections, experience, and knowledge we gained during this time to provide flexible solutions to your technology needs. We excel at scaling companies quickly by facilitating rapid technology implementation to propel you to the top of your industry."
Price: 124.99

"Clean Data: Tips, Tricks, and Techniques"
"""Give me six hours to chop down a tree and I will spend the first four sharpening the axe""? Do you apply the same principle when doing Data Science?Effective data cleaning is one of the most important aspects of good Data Science and involves acquiring raw data and preparing it for analysis, which, if not done effectively, will not give you the accuracy or results that you're looking to achieve, no matter how good your algorithm is.Data Cleaning is the hardest part of big data and ML. To address this matter, this course will equip you with all the skills you need to clean your data in Python, using tried and tested techniques. You'll find a plethora of tips and tricks that will help you get the job done, in a smart, easy, and efficient way.About the AuthorTomasz Lelek is a software engineer who programs mostly in Java and Scala. He is a fan of microservice architectures and functional programming. He dedicates considerable time and effort to being better every day. Recently, he's been delving into big data technologies such as Apache Spark and Hadoop. He is passionate about nearly everything associated with software development.Tomasz thinks that we should always try to consider different solutions and approaches before solving a problem. Recently, he was a speaker at several conferences in PolandConfitura and JDD (Java Developer's Day)and also at Krakow Scala User Group. You can find his JDD video ML Spark talk. He also conducted a live coding session at Geecon Conference. He is currently working with TypeScript. The following links showcase his work:"
Price: 124.99

"ASP.NET Core Full-Stack Development Projects"
"ASP .NET Core is a powerful tool for the full-stack development of real-world applications.You will build three complete full-stack projects: a shopping app, an accounts app, and an online music store. Through these projects, you will learn to build powerful full-stack ASP .NET Core applications for the real world. You will also learn how to use Angular, React, and Vue with your ASP .NET Core applications.By the end of this course, you will have the skills to develop powerful and reliable full-stack web applications with ASP .NET Core and popular JavaScript frameworks.About the AuthorJonathan Forrider is a passionate programmer. He graduated from the University of Phoenix in 2012 with an IT degree emphasizing Software Engineering and has been coding for the last six years. He works as a Programmer Analyst at the University of Montana while he also pursues further education in Computer Science. He says programming for him is both a livelihood and a hobby. When he's not programming or learning new programming skills, he likes to spend some quality spending time with his family hanging out in the outdoors, watching a good movie, or reading a good book. He loves developing products in multiple languages and is dedicated to sharing knowledge and helping aspiring developers be more successful in their software career. You will like frank and charming personality."
Price: 124.99

"Real World Node.js Projects"
"Node.js is a performance-efficient server-side platform which makes writing backend code simple and fun. Since it is written in JavaScript, it is the perfect tool for full-stack development because it allows you to have your entire codebase in one language.In this course, you will learn a broad range of skills to build high-performance real-world applications with MERN Stack. You will start by developing a voting application, focusing on server-side tasks with Node.js and Express and then communicating from the server-side to the client with EJS. Then you will learn about WebSockets and real-time communication, which will lead on to developing a full-stack messaging application. Next, you will discover microservices and cloud storage with AWS and upload assets, such as images, video files, documents, and more.Moving on, you will create a Node.js API and interact with it using the very popular library, React. Ultimately, this will lead to your creating a full-stack shopping application and connecting it to the backend API using the MERN stack. By the end of the course, you will have adapted to using a broad range of Node.js skills and JavaScript technologies to create highly performant, full-stack applications.About the AuthorMohammad Hunan Chughtai is a software engineer from NYC who has developed several courses with Packt Publishing. His primary interest lies in programming in the MERN stack (MongoDB, Express.js, React, and Node.js), and also use some other technologies such as Amazon Web Services, React Native, PHP, Java, and Ruby on Rails.Dimitris Loukas is a software engineer currently part of a growing start-up building a revolutionary referral marketing platform with Node.js, Angular, MySQL, Redis, and Docker. He also develops trading software applications using C#, Aurelia, and TypeScript. He is an author at Packt and has developed many video tutorials in C#, .NET Core, and TypeScript. He has worked for two startups in the past, is active in the open-source community, and loves taking up small side-projects. He has developed microservices using C# and Node.js and has also mastered Angular, Aurelia, and Vue.JS. He is an early adopter of .NET Core and is fascinated by modern JavaScript and where the web is going."
Price: 124.99

"Learning Microsoft Power BI"
"Tell your data story with Power BI and reach millions of users with a single click on any kind of a device. Using Power BI, you can combine your data sources, create stunning visualizations, and embed your story on your website within seconds. The goal of this course is to teach you how to use raw data, monitor it, and visualize it in a form that will provide rich insights with the help of dashboards.You will start with a set of business requirements for an example project from a client. Initially, you will connect to a data file. You'll run through the process of connecting to your data, transform it, and then build the data model. This will help you understand and determine which DAX calculations are needed to meet the business requirements. Finally, you will build out an interactive and functional report and a detailed dashboard, and publish them on PowerBI. com.When it comes to learning Power BI, this course will ensure that you have the necessary tricks of the trade for effective insights and simplified visual analytics.About The Author:Reid Havens is the Founder of Havens Consulting Inc. and a Microsoft MVP. He has a formal background in technology and organizational management, having obtained separate Master's Degrees in Organizational Development & Business Analytics. Reid has experience working with many of the Fortune 50, 100, & 500 companies. Additionally he guest lectures at the University of Washington and other universities, teaching Business Intelligence, Reporting, & Data Visualization.Reid is also an avid content developer, having authored numerous articles and videos on various blog sites and video platforms. He's also written multiple training curriculum's for PowerPivotPro, and taught them as a Principal Consultant at dozens of companies around the world. He also developed college level classes for Bellevue College and The University of Washington. Reid is also currently developing multiple online video series on Learning & Mastering Power BI for Packt Publishing."
Price: 154.99

"Kali Linux: Tips, Tricks and Techniques"
"Discover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.About the AuthorPaul Olushile is a Unix/Linux System Administrator expert with 4 years' experience as a Kali Linux Penetration Tester. He's responsible for setting up and maintaining Linux servers, training and maintaining servers installed and set up with custom builds and applications on a network; for creating, deleting, and modifying local user and group accounts; and troubleshooting and fixing NFS, TCP/IP, and other protocol problems. He's a freelancer in Kali Linux Penetration Testing and Research, breaking into computers and networks in order to find potential security breaches, running tests, creating written reports, detailing assessment findings and recommendations, designing new tests, designing and creating new penetration tools and tests, working on improvements to security services (including the continuous enhancement of existing methodology materials), supporting assets, and running security audits.Aubrey Love II has been designing and developing websites for over 10+ years. He started off with a Commodore Vic20, on which he designed his first Hello World app at the age of 7. After attending several colleges and universities, he moved on and started his own website firm, in which he caters to all types of company, from startup ventures to Fortune 500 organizations."
Price: 124.99

"Learning Vue.js 2.0"
"Vue.js is one of the latest JavaScript frameworks and has attracted the interest of web developers as it can be used to build complex single-page applications.This video course shows developers how to build high-performing, reactive web interfaces with Vue.js. It starts from scratch, teaching you how to build a Hello World! application in Vue.js and moves towards building advanced applications step by step. You'll earn the concepts that you need to know about Vue.js. You'll build an application as you go, putting the concepts we've explained into practice. Several modern tools such as Webpack, vue-cli, hot reloading, and vue devtools will be used to develop modern web applications, focusing on the view layer to provide the most performant experience for users. Also you will use the vue-cli-based Webpack template and look at how we can build on top of that starter kit.By the end of this course, you will be able to build complex and large web applications with Vue.js and will also understand how to make single-file-based reusable components which can be used across projects.About the AuthorJonathan M Hethey has been writing code since the age of 14 and has actively participated in shaping and experimenting with the IT systems around him. After a short apprenticeship as an IT supporter, he completed his studies with a Bachelor degree in Web Development in Denmark.Since then he has been working as a teacher for young adults with autism and went on to work for agencies as a developer and is now a Full Stack Developer in Copenhagen.Programming and working in teams efficiently are key to success in a rapidly changing industry, whether we are speaking of app development or creating beautiful web experiences. He quickly became a fan of Git and one of the blog posts on Gitlab lead to his first book contract with PACKT in 2013."
Price: 124.99

"The Road to Ethical Hacking - Beginner to Expert!: 3-in-1"
"Cyber threats are on the increase with the rising growth of technology, thus giving rise to the need for ethical hacking and advanced security. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. Security is the foremost concern for all organizations both big and small, and thus companies and people are ready to invest in enhanced security, pentesting, and Ethical Hacking.This comprehensive 3-in-1 course is a comprehensive course full of the latest and most important tools for you to be a master in the Ethical Hacking world! Youll begin to work with the Metasploit toolkit to test the effectiveness of defenses. Youll then use Kali Linux for information gathering, vulnerability assessment, exploitation, password cracking, and network sniffing and spoofing. Finally, youll learn Network pentesting, Website pentesting, Android pentesting as well as prepare for Ethical Hacking exam!By the end of the course, youll hack your way to a secure and threat-free environment using best-in-class tools and techniques with Kali Linux!Contents and OverviewThis training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Ethical Hacking for Beginners, covers hacking your way to a secure and threat-free environment using best-in-class tools and techniques. We'll begin by introducing you to the best tools around; these are essential to get you started with penetration testing. Next, we'll introduce you to a basic hacking technique: reconnaissance. You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses. Next, you'll learn about sniffing and how effective the Man-in-the-Middle attack can be. We'll take you through a coffee shop scenario to further your understanding. You'll get the hang of bypassing different defenses, then learn how hackers use networks to gain access to different systems.The second course, Mastering Ethical Hacking, covers Take your organizations system security to the next level using Kali Linux. This course takes your Ethical Hacking skills to the next level to help you address various security threats, whether in information, networks, and other security concerns. This course will start by showing you how to install Kali Linux on your system and how to work with it. The course will then show you how to gather information using different methods such as fingerprinting and open ports. The course will then help you check your system's vulnerability using Nessus and OpenVAS. You will then learn to exploit your vulnerability with different parameters to reveal all the gaps in your system. You'll then escalate privileges in your system to improve your design and program and prevent password attacks using different methods. Finally, you will learn to prevent wireless attacks on your system. By the end of the course, you will be a Master of Ethical Hacking and will have learned to prevent unwanted hackers from hacking into your system.The third course, Ethical Hacking Masterclass, is your certification guide to ethical hacking. Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course, you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker.By the end of the course, youll hack your way to a secure and threat-free environment using best-in-class tools and techniques with Kali Linux!About the AuthorsGary Dewey is an IT consultant specializing in security. A graduate of SUNY Broome's Computer Security and Forensics degree program in New York, he has attended numerous B-Sides conferences and spoken at B-Sides in Rochester, New York. Gary participated in the 2015 US Cyber Challenge held at Virginia Tech. He is an active member of the Triple Cities Makerspace, a non-profit organization dedicated to community collaboration and learning. He enjoys hiking and cats. He is also the author of the video course: Ethical Hacking for Beginners.Sunil Gupta. He is a Certified Ethical Hacker. Currently, he teaches 50,000+ students online in 150+ countries. He is a specialist in the Ethical Hacking and Cyber Security areas. Author strengths Vulnerability assessment Penetration testing Intrusion detection Risk identification Data analysis Reporting and briefing.Alexis Ahmed is an experienced Ethical Hacker and Cyber Security Expert with over 5 years' experience, He also develops Android apps and games in his free time. In addition, he is also a Web Developer with over 4 years' experience and he loves creating beautiful and functional websites for clients all over the world. He has a YouTube channel with over 19,000 subscribers and more than 1 million views where he makes videos on Ethical Hacking, Linux, and programming."
Price: 199.99

"A Start-to-Finish Guide to Malware Analysis!: 2-in-1"
"Are you worried about the malware that will intrude your system, and youre looking forward to analyzing it? Then this course is the one you're looking for! The threat analysis is an on-going process that helps identify paradigm of malicious software. With hacker's regularly reintroducing network infrastructure, it is obvious to lose sight of the tools being used. Beginning with malicious program analysis, this course is centered on mapping vulnerabilities, exploits, network infrastructure, additional malware, and adversaries!This comprehensive 2-in-1 course an easy-to-follow guide with a step-by-step approach which will get you up and running with the key concepts of malware analysis, malware behavior, and evasions! Youll learn the art of detecting, curing, and preventing future malware threats. Master advanced malware analysis topics and techniques like IDA Pro, OllyDbg, and WINDBG! Finally, youll evade malware using various types of malware analysis tools and techniques!By the end of the course, youll explore the basic concepts of malware and get familiar with various types of malware analysis tools and techniques like IDA Pro, OllyDbg, and WINDBG to tackle malware threats!Contents and OverviewThis training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Fundamentals of Malware Analysis, covers basic concepts of malware and get familiar with various types of malware analysis tools and techniques. In this video course, we start with the basic concepts of malware and youll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, youll see how to set up your own lab to make a secure environment for malware analysis. Moving on, youll get familiar with the basic techniques of static and dynamic malware analysis and gets your hands dirty with debuggers and disassemblers such as OllyDbg and IDA PRO. Youll learn how to analyze malware and understand its anatomy using these tools and techniques. Finally, youll be exposed to the techniques that malware may use to evade detection and remain undetected. By the end of the course, youll have a solid knowledge that will enable you to analyze the majority of malware programs.The second course, Advanced Malware Analysis, covers understanding malware behavior and evading it using IDA Pro, OllyDbg, and WINDBG. In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system. Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks. Finally, we cover the concept of packers and unpackers and explore how to unpack packed malware to analyze it.By the end of the course, youll explore the basic concepts of malware and get familiar with various types of malware analysis tools and techniques like IDA Pro, OllyDbg, and WINDBG!About the AuthorMunir Njenga is a self-driven, multi-talented, technology enthusiast, cybersecurity consultant, and researcher. He mainly focuses on malware analysis, and web- and mobile-based application testing and methodologies. His skills and competencies stem from his active involvement in engagements that deliver advisory services such as network security reviews, security course development, training and capacity building, mobile and internet banking security reviews (BSS, MSC, HLR/AUC, IN, NGN, GGSN/SGSN), web applications, and network attack and penetration testing. Apart from his security hat, he is a poet, graphic designer, blogger, tool/application tester, social media marketer, web 2.0 developer and designer, naturalist, and traveler."
Price: 199.99

"Azure Stream Analytics - End-to-End Analytics Solutions!"
"Microsoft Azure is a very popular cloud computing service used by many organizations around the world. Its latest analytics offering: Stream Analytics - allows you to process and acquire actionable insights from different kinds of data in real-time. If you are an analytics professional looking to get familiar with Microsofts Azure stream analytics, then this Course is perfect for you!This comprehensive 2-in-1 course is concise and appropriate for evaluating deep aspects of building real-world data-centric and data processing with the Azure Data Platform! Youll begin with implementing Azure's simple, declarative model to build real-time data transformations for processing IoT streams, real-time data analysis, and more! Understand the development aspects of Azure Stream analytics to build real-time event processing solutions. Finally, youll build end-to-end analytics solutions with Azure Stream Analysis!By the end of the course, youll understand the development aspects of Azure Stream analytics to build end-to-end, real-time event processing solutions!Contents and OverviewThis training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Real-time Data Processing with Azure Stream Analytics, covers real-time data processing with Azure Stream Analytics. This video is your guide to understanding the basics of how Azure Stream Analytics works, and then building your own analytics solution using its capabilities. You will start by learning what stream analytics is, and why it is a popular choice for acquiring real-time insights from data. Then you will be introduced to Azure Stream Analytics, and learn how you can use the tools and functions in Azure to develop your own Streaming Analytics. During the course of the video, you will build streaming solutions for the IoT, fraud detection, real-time event processing, and more. The video also shows you how you can manage, monitor, and scale your solution for optimal performance. By the end of this tutorial, you will have mastered using Azure Stream Analytics to develop an efficient analytics solution that can work with any type of data.The second course, Managing and Monitoring Streaming Solutions in Azure, covers the development aspects of Azure Stream analytics to build real-time event processing solutions. This course will give you a good understanding of the development aspects of Azure Stream analytics to build real-time event processing solutions. The course mainly focuses on monitoring scaling aspects to increase throughput in your streaming jobs and supplies a varied troubleshooting guide for big data developers/architects. The course provides end-to-end demonstrations for solutions to real-world business problems related to Internet of Things and fraud detection scenarios with the help of Microsoft Cortana Intelligence Gallery.By the end of the course, youll understand the development aspects of Azure Stream analytics to build end-to-end, real-time event processing solutions!About the Authors Anindita Basak is working as Big Data & Cloud Architect for one of Computer Software giant & working with Microsoft Azure for last 8+ years. She has worked with various teams of Microsoft as FTE in the role of Azure Development Support Engineer, Pro-Direct Delivery Manager, and Partner Technical Consultant. She has been technical reviewer for five books from Packt Publisher on Azure HDInsight, SQL Server Business Intelligence, and Hadoop Development & Smart Learning with Internet of Things & Decision Science. Recently, she authored two video courses on Azure Stream Analytics from Packt Publishing."
Price: 199.99

"Linux Server Security - Protect system from getting hacked!"
"Do you worry about hackers hacking into your system running locally or remotely? Then this course is the one you're looking for! You'll learn how to secure your system from such attacks. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Linux is the first choice for an attacker and more administrators have started moving to the system to create networks or servers for any task. This comprehensive 3-in-1 course is an easy-to-follow guide with a step-by-step approach to various problems covering various Linux security administration tasks. Youll start with discovering some of the tools hackers use to attack your server, such as NMAP, Reverse IP, and DDoS Attacks. Secure your Linux Server with firewalls and SSL encryptions. Also, learn how to prevent server exploits such as DDoS Protection, hardening login security protocols, and more! Towards the end, youll become a better Linux Admin by sharpening your Linux Security skills!By the end of the course, youll not only secure your Linux server with the help of efficient tools and techniques but also protect networks from attacks by thinking like a hacker!Contents and OverviewThis training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Linux Server Security, covers securing your Linux server with the help of efficient tools and techniques. You will start by discovering techniques that professional hackers use in order to scan a website and a server, in order to carry out their intrusion attacks. Next, you'll learn to create secure accounts where we'll look into deleting and creating user accounts password and monitoring servers. Further, you'll learn to maintain your Linux Server in order to get optimized performance and stability. Moving ahead, you'll focus on tools that can be used to enhance server security, understand the art of hardening passwords, and fix authentication failures. By the end of the course, you'll be confident enough to take control of your Linux servers and use hands-on techniques to protect your server from internet attacks.The second course, Practical Linux Security Solutions, covers creating and administering a secured Linux system in your work environment. This course will help you understand the various vulnerabilities faced by the system and help you to overcome them. Whether you are new to Linux administration or experienced, it provides you with the skills to work with various security tools, thereby making your systems more secure. By the end of the course, you'll have mastered the art of preventing your Linux system from getting compromised.The third course, Mastering Linux Security, covers protecting networks from attacks by thinking like a hacker! In this course, you'll learn to secure workstations and servers against unauthorized persons. Youll start with the three critical fundamentals that must be dealt with first: updates, passwords, and firewalls. Youll then get an overview of what it actually means to secure a system, what an attack surface is, how hackers perform attacks and how to successfully protect against them. Youll learn to secure a Linux machine, by securely configuring and running services, performing logging, secure backups, and more. The course will show you how to secure your system locally or remotely. Finally, youll be shown how to verify your set up. By the end of the course, you'll have mastered security on Linux systems.By the end of the course, youll be one step ahead of hackers by discovering and patching your network vulnerabilities as well as performing professional-level web penetration testing!About the AuthorsAubrey Love II has been designing and developing websites for over 10+ years. He started off with a Commodore Vic20, on which he designed his first Hello World app at the age of 7. After attending several colleges and universities, he moved on and started his own website firm, in which he caters to all types of company, from startup ventures to Fortune 500 organizations.Tajinder Kalsi has more than 9 years of working experience in the field of IT. He has conducted seminars all across India, on topics such as information security and Android application development at more than 120 colleges, teaching more than 10,000 students. Apart from training, he has also worked on VAPT projects for various clients. When talking about certifications, Tajinder is an ISO 2700 LA and also IBM certified analyst. Prior to this course, Tajinder authored Practical Linux Security Cookbook, published by Packt Publishing. He has also authored three video courses with Packt: Getting Started with Pentesting, Finding and Exploiting Hidden Vulnerabilities, and Pentesting Web Applications.Marc van Hauser Heuse started to be interested in IT security in 1993. He founded one of the world's oldest security research communitiesThe Hacker's Choice (www. thc. org)and is the author of several well-known security tools such as hydra, amap, thc-ipv6, THC-SCAN, SuSE firewall, and many others. From 1998 to 2007 he worked for SuSE, hardened the Linux distribution, and built-up the security team. Today he is an independent consultant and security researcher. Just for fun, he records training courses on how to secure Linux servers."
Price: 199.99

"Learn Computer Vision with Python and OpenCV"
"Computer vision solves imaging problems that cannot be solved using ordinary systems and sensors. OpenCV is one of the most popular Computer Vision libraries and helps you write faster code.This course begins with the basics of loading and working with images. You will detect colored objects in your images easily. You will also use tools to build and apply filters in your photos and track objects in a video.By the end of the course, you will have a firm grasp of Computer Vision techniques using OpenCV libraries. This course will be your gateway to the world of data science.About The Author Kathiravan Natarajan completed his Bachelor's degree on Computer Science in SASTRA University. He worked for firms such as Infosys Ltd. and EdgeVerve Systems Ltd. on a banking product called Finacle, which has been used by many banks in India. Kathiravan also completed his Master's degree in Texas A&M University Commerce on Artificial Intelligence. As a programmer and a Machine Learning engineer, he can review heaps of data to find a million-dollar bug . He worked for STMicroelectronics Inc on signal processing and Machine learning He has experience in working with several startup companies on different domains, including signal processing.He has recently completed projects on Supervised and Unsupervised Learning. Some of the projects, including a recommendation system, used collaborative filtering algorithms to benefit more organizations in terms of product recommendations and personalize things for users. Being a night owl, he performs a lot of bug fixing and module development in the late evening. He actively solves Kaggle problems and participating in Data Science Hackathons and Hacker rank competitions."
Price: 124.99

"Hands-On TensorFlow for Smart Application Development"
"TensorFlow is one of the most popular deep learning frameworks available and can be used for solving real-world applications such as analyzing images, generating data, natural language processing, intelligent chatbots, robotics, and more. This course will allow you to add such features without going deeply into machine learning or deep learning.This course will show you how to develop smart applications the easy way using the power of TensorFlow and to add intelligent features to make your applications smarter without delving into deep learning. You will begin by setting up the environment required to get started quickly followed by building and deploying your first machine model. Next, you will use TensorFlow Lite, which is well optimized for on-device machine learning. As we proceed further, youll get hands-on practice in building applications on different platforms such as iOS and Android. Lastly, you will get some crucial tips on how to make your existing applications smarter.By the end of the course, youll not only be comfortable with using TensorFlow for building applications but will also be able to integrate the power of artificial intelligence in your mobile apps.About the AuthorSaikat Basak is currently working as a machine learning engineer at Kepler Lab, the research & development wing of SapientRazorfish, India. His work at Kepler involves problem-solving using machine learning, researching and building deep learning models. Saikat is extremely passionate about Artificial intelligence becoming a reality and hopes to be one of the architects of its future."
Price: 124.99

"Spring 5 in 7 Days"
"The Spring framework is a popular choice for developers when designing an enterprise-based application. Get set for an incredible journey.This course is your one-stop guide to learning and building applications using the Spring framework in 7 days. The Spring framework enables developers to create high-performing, reusable, easily testable, and loose coupling enterprise Java applications. It can be used to develop any Java application. By the end of the course, you'll have a solid knowledge of the Spring framework and modules and will be able to build enterprise-grade Java applications in 7 days.About The AuthorAnkit Mishra is a Senior Software Engineer with extensive IT experience in mission-critical development projects and architecture designs. He has worked for giants such as Ericsson, Fidelity, and others.He has more than six years' experience in managing and delivering Spring MVC and Spring Security projects, Cloud deployment, and PaaS cloud administration. Currently, he is working on Spring microservices, Spring Security, cloud deployment, and tuning."
Price: 124.99

"A - Z Guide to Linux System Administration!: 3-in-1"
"Have you only come into brief contact with Linux before, but now you need to set up or maintain a Linux server? Then this course is perfect for you! Linux is a major and one of the most popular forces in computing technology, powering everything from mobile phones and personal computers to supercomputers and servers. The job of a systems administrator is to manage the operation of a computer system. Hence, troubleshooting is an important skill used in many Information Technology roles including help desks, system administration, networking, and security.This comprehensive 3-in-1 course follows a strict hands-on approach and demonstrates full troubleshooting steps; performing administrative tasks! Initially, youll perform administrative tasks such as keeping the system up-to-date, installing new software, monitoring the system, and configuring new services. Develop your own methods to troubleshoot services and processes and monitor the system to identify critical machine issues. Configure SSH servers for secured connections via remote computers and set up a Network File System to better manage your Linux files. Finally, set up SELinux and SSH, and operate your web server with Apache!By the end of the course, youll configure, manage, and secure CentOS 7 Linux servers with administrative command-line skills to become an expert Linux Systems Administrator!Contents and OverviewThis training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Hands-On Linux System Administration, covers how to set up services, keep the system up-to-date, and schedule tasks. With this course, you'll learn how to master any Linux machine. Control and master the administration of a Linux machine, whether a workstation or a server. You'll learn how to set up services, monitor the system, perform backups, and schedule common tasks. By the end of the course, you will be ready to start your career as a Linux system administrator.The second course, Troubleshooting Linux Administration, covers quick and simple troubleshooting solutions to deal with all the problems you'll encounter as a Linux administrator! In this troubleshooting course, you will master the full power of the superuser; you'll use sudo to fix user management files and passwords, and schedule tasks with cron before troubleshooting. You will also troubleshoot and resolve wireless issues, identify machine issues with different troubleshooting processes, configure an SSH server for remote connections, and set up a Network File System to connect to your client.The third course, Advanced Linux System Administration, covers how to configure, manage, and secure CentOS 7 Linux servers with administrative command-line skills. Throughout the course, we show you many tasks you'll encounter when administering a Linux server; you'll put the concepts to use in practical, real-world situations. You'll be able to configure, maintain, and run commands across many systemsall at the same time. We provide tips and tricks to make your life easier, speed up your workflow, and make you feel like a certified Linux administrator ninja! We cover topics such as disk and user management, networking, some advanced Linux permissions, shell scripting, and advanced command-line skillsall via practical, hands-on examples and demonstrations. By the end of the course, you will be confident about performing Linux systems administrator tasks; you'll also be able to perform systems engineer tasks smoothly.By the end of the course, youll configure, manage, and secure CentOS 7 Linux servers with administrative command-line skills to become an expert Linux Systems Administrator!About the AuthorsJack-Benny Persson discovered Linux and the internet way back in 1997 and has since been obsessed by it. Linux and networking have been both his hobby, his field of study, and also his career. He runs a small business in Sweden where he does everything from consulting work to writing books, as long as it has to do with Linux, programming, networking, or electronics. He also has a keen interest in communication and is a HAM radio operator. He is truly a jack-of-all-trades when it comes to technology. One of his (many) dream professions is to become a teacher, though he really likes teaching technology.Paul Olushile graduated with a diploma degree in computer science and is currently working as a cybersecurity expert. He loves teaching and hence he has been freelancing for over 4 years to share his expertise as a Unix/Linux administrator with students. He has a diverse set of certifications, interests, and experiences, including server administration."
Price: 199.99

"Building Reusable Code with Rust"
"Rust is the ideal language for writing safe, correct code in a way that won't make you pull your hair out. This course will teach you how to build reusable Rust code so that you can stop copying and pasting code. Write code that can adapt to many different usages.You will reuse code by using advanced features such as traits, generics and macros. You will work with different forms of code reuse, loops, map, filter and fold to save time and resources. Achieve higher-level reuse without sacrificing runtime performance. Organize your code into modules and crates to publish them to crates. io.By the end of the course you will be able to avoid code duplication and write clean reusable code.About the AuthorShing Lyu is a software engineer and open-source promoter. Shing contributed to Mozilla's Servo and Gecko (Firefox) browser engines using Rust, and is active in Rust study groups, training, and conference talks. Shing is passionate about coding, automated testing, and promoting free and open-source software craftsmanship."
Price: 124.99

"Beginning Metasploit"
"Metasploit is a popular penetration testing framework and has one of the largest exploit databases around. It is an essential tool in the penetration tester's arsenal.This course teaches you the practical implementation of Metasploit. Each section will get you started with Metasploit by enumerating available services, identifying potential weaknesses, and testing vulnerabilities through exploitation. The course will show you how to correctly configure Metasploit and how to troubleshoot potential errors. You will scan the different services to identify vulnerabilities. Finally, you will explore sophisticated, real-world scenarios where performing penetration tests is a challenge.By the end of this course, you will be able to use Metasploit to quickly assess the security structure of systems and networks to reduce risk.About the AuthorAlexis Ahmed is an experienced Ethical Hacker and Cyber Security Expert with over 6 years' experience, He also develops Android apps and games in his free time. In addition, he is also a Web Developer with over 4 years' experience and he loves creating beautiful and functional websites for clients all over the world. He also has a YouTube channel with over 60,000 subscribers (and more than 2 million views!) where he makes videos on Ethical Hacking, Linux, and programming."
Price: 124.99

"Learning D3.JS 5.0"
"D3 (or D3. js) is a JavaScript library for visualizing data using web standards. It helps you bring data to life using SVG, Canvas, and HTML by combining powerful visualization and interaction techniques.In this course, youll learn about SVG, see how D3.js offers a comprehensive set of visualization tools for your data analysis goals, and how to use these tools. Youll load data internally or externally while creating stunning data visualizations using D3 and SVG. Youll build line graphs, scatter plots, area charts, interactive tree diagrams, and customize your own map. Youll also understand and use methods, functions, layouts, and selections to manipulate the DOM using D3. Finally, youll understand the enter and exist modes, the click and update functions, projections, and the Geojson format in D3 V5.By the end of this course, youll have learned some exciting tips, best practices, and techniques for your data representation and data analysis and will be able to build your own data models with D3.js much faster and with ease.About the AuthorEleftheria Batsou is a passionate frontend developer and UI designer. Her first studies were in the field of Informatics and Telecommunications of Engineering and later in Graphical Arts and Multimedia. She likes to teach and share, is self-motivated, and is working hard to make this world a little bit better every day.When she isn't glued to a computer screen, she spends time working out and strolling in nature. Her friends would describe her as easy-going and passionate about life."
Price: 124.99

"Serverless Computing with Azure"
"Serverless Computing is an architecture that is gaining popularity & with good reason: its lightweight, perfect for microservices & provides reliability with flexible pricing models. With Azure Functions, developers can deploy code that performs simple tasks which can be used by other Azure services, including mobile & web applications, social network sites, storage accounts, databases & more! This course will train you in the fundamentals of serverless computing from creating & deploying an application to the options & configuration that youre able to control in your Serverless App using Azure Functions. To demonstrate the concepts, a sample application that issues Shared Access Signature tokens to provide access to storage containers will be deployed & configured using the Azure infrastructure & services.By the end of the course, you will have the skills to develop, run, deploy & manage your serverless application using Azure functions.About the AuthorMichael Simmons is an IT Professional with over 20 years of experience managing & administering technology & helping the people who use it. His specialization is in Microsoft automation & cloud solutions, where he works with PowerShell & Microsoft Azure to power solutions & empower users. He is an accomplished author & trainer that has created & delivered numerous video courses on PowerShell & Azure, including Mastering PowerShell 6 & PowerShell in the Cloud: Managing Azure Infrastructure as a Service. His technical articles on Microsoft Technologies have been featured on TomsITPro. com & Petri .com."
Price: 124.99

"Bash Scripting Solutions"
"In Linux, one of the most commonly used and most powerful tools is the Bash shell. With its collection of engaging recipes, Bash solutions takes you through a series of exercises designed to teach you how to effectively use the Bash shell in order to create and execute your own scripts. The course starts by introducing you to the basics of using the Bash shell, and teaching you the fundamentals of generating any input from a command. With the help of a number of exercises, you will get to grips with automating daily tasks for sysadmins and power users. Once you have a hands-on understanding of the subject, you will move on to exploring more advanced projects that can solve real-world problems comprehensively on a Linux system. In addition to this, you will discover projects such as creating an application with a menu, beginning scripts on startup, parsing and displaying human-readable information, and executing remote commands with authentication using self-generated Secure Shell (SSH) keys. By the end of this course, you will have gained significant experience in solving real-world problems, from automating routine tasks to managing your systems and creating your own scripts.About the AuthorRon Brash is the CTO and co-founder of a successful technology consultancy company that provides services in a multitude of domains, but primarily in FOSS and Linux. For over 7 years, he has worked on embedded systems, which provide security and network connectivity in industrial control systems and SCADA networks, all running an optimized embedded Linux. He participates regularly at FOSS and community events, providing feedback and mini-seminars where appropriate. He loves to share his knowledge.Ganesh Naik is an author, consultant, and corporate trainer for embedded Android, embedded Linux, IoT, and ML-related product development. He has over 20 years' experience and project accomplishment in IT. He has been a corporate trainer for Indian Space Research Organization, Intel, GE, Samsung, Motorola, Penang Skills Development Center, and various firms in Singapore and India. He started a company called Levana Technologies, which works with organizations for consulting and training activities."
Price: 124.99

"Begin Python Programming in 7 Days"
"We get you started setting up your environment and the tools you need to start programming in Python. You will be learning about variables and operators and how to make use of them in Python programs. You will learn all about control flow statements and loops in Python and you will be using them in your programs to solve your coding problems.Then you will learn to use Python's advanced data structures such as lists and dictionaries. You will be able to organize in functions and save time coding by writing code that can be reused. Then, you will learn about Python modules and how to make use of them. On the last day, you will start interacting with files using Python code.The course will give you a strong entry point into programming in general and programming in Python in particular.About The AuthorColibri Digital is a technology consultancy company founded in 2015 by James Cross and Ingrid Funie. The company works to help its clients navigate the rapidly changing and complex world of emerging technologies, with deep expertise in areas such as big data, data science, machine learning, and cloud computing. Over the past few years, they have worked with some of the world's largest and most prestigious companies, including a tier 1 investment bank, a leading management consultancy group, and one of the World's most popular soft drinks companies, helping each of them to make better sense of its data, and process it in more intelligent ways. The company lives by its motto: Data -> Intelligence -> Action.Rudy Lai is the founder of QuantCopy, a sales acceleration startup using AI to write sales emails to prospects. By taking in leads from your pipelines, QuantCopy researches them online and generates sales emails from that data. It also has a suite of email automation tools to schedule, send, and track email performancekey analytics that all feed back into how our AI generates content.Prior to founding QuantCopy, Rudy ran HighDimension.IO, a machine learning consultancy, where he experienced first-hand the frustrations of outbound sales and prospecting. As a founding partner, he helped startups and enterprises with High Dimension, IO's Machine-Learning-as-a-Service, allowing them to scale up data expertise in the blink of an eye.In the first part of his career, Rudy spent 5+ years in quantitative trading at leading investment banks such as Morgan Stanley. This valuable experience allowed him to witness the power of data, but also the pitfalls of automation using data science and machine learning. Quantitative trading was also a great platform to learn deeply about reinforcement learning and supervised learning topics in a commercial setting. Rudy holds a Computer Science degree from Imperial College London, where he was part of the Dean's List, and received awards such as the Deutsche Bank Artificial Intelligence prize."
Price: 124.99

"End-to-End Penetration Testing with Kali Linux"
"Kali Linux contains a large number of penetration testing tools from various different niches of the security and forensics fields. Kali Linux offers a multitude of options to scan a single IP, port, or host (or a range of IPs, ports, and hosts) and discover vulnerabilities and security holes. This output and information can serve as a precursor to penetration testing efforts. In this course, you will perform tests to carry out and exploit hidden vulnerabilities within your network and systems; you will not only expose these but will also provide ways and methods to fix, secure, and harden your system's security, protecting it against any other attacks.You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested; and recognize when stealthy attacks are being used against your network. Exploit networks and data systems using wired and wireless networks as well as web services. Identify and download valuable data from target systems and learn to maintain access on compromised systems. Use social engineering to compromise the weakest part of the networkthe end users. Use port scanning for UDP scanning, stealth scanning, and connect/zombie scanning using pentesting tools. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment.By the end of this course, you will be a pro with the Kali Linux tools you need to perform advanced penetration testing; you will know how to exploit vulnerable systems and how to patch them.About The AuthorSunil Gupta is a certified ethical hacker. Currently, he teaches 45,000+ students online in 150+ countries. He is a specialist in ethical hacking and cybersecurity.His strengths lie in vulnerability assessment, penetration testing, intrusion detection, risk identification, data analysis, reporting, and briefing."
Price: 124.99

"IPython and Jupyter Notebook In Practice: 3-in-1"
"Python is one of the leading open source platforms for data science and numerical computing. IPython and the associated Jupyter Notebook offer efficient interfaces to Python for data analysis and interactive visualization, and constitute an ideal gateway to the platform. This comprehensive 3-in-1 course is a practical, hands-on, example-driven tutorial to considerably improve your productivity during interactive Python sessions, and shows you how to effectively use IPython for interactive computing, data analysis, and data visualization. You will learn all aspects of of IPython, from the highly powerful interactive Python console to the numerical and visualization features that are commonly associated with IPython. You will also learn high-performance scientific computing and data analysis, from the latest IPython/Jupyter features to the most advanced tricks, to write better and faster code. This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.The first course, Learning IPython for Interactive Computing and Data Visualization, begins with an introduction to Python language, IPython, and Jupyter Notebook. You will then learn how to analyze and visualize data on real-world examples, how to create graphical user interfaces for image processing in Notebook, and how to perform fast numerical computations for scientific simulations with NumPy, Numba, Cython, and ipyparallel.The second course, Interactive Computing with Jupyter Notebook, covers programming techniques: code quality and reproducibility, code optimization, high-performance computing through just-in-time compilation, parallel computing, and graphics card programming.The third course, Statistical Methods and Applied Mathematics in Data Science, tackles data science, statistics, machine learning, signal and image processing, dynamical systems, and pure and applied mathematics. You will be well versed with the standard methods in data science and mathematical modeling.By the end of this course, you will be able to apply these state-of-the-art methods to various real-world examples, illustrating topics in applied mathematics, scientific modeling, and machine learning.Meet Your Expert(s):We have the best work of the following esteemed author(s) to ensure that your learning journey is smooth:Cyrille Rossant, PhD, is a neuroscience researcher and software engineer at University College, London. He is a graduate of cole Normale Suprieure, Paris, where he studied mathematics and computer science. He has also worked at Princeton University and Collge de France. While working on data science and software engineering projects, he gained experience in numerical computing, parallel computing, and high-performance data visualization. He is the author of Learning IPython for Interactive Computing and Data Visualization, Second Edition, Packt Publishing."
Price: 199.99

"Apache Spark Deep Learning Advanced Recipes"
"In this video course, youll work through specific recipes to generate outcomes for deep learning algorithmswithout getting bogged down in theory. From using LSTMs in generative networks to creating a movie recommendation engine, this course tackles both common and not so common problems so you can perform deep learning in a distributed environment.In addition, youll get access to deep learning code within Spark that you can reuse to answer similar problems or tweak to answer slightly different problems. Youll learn how to predict real estate value using XGBoost. Youll also explore how to create a movie recommendation engine using popular libraries such as TensorFlow and Keras. By the end of the course, you'll have the expertise to train and deploy efficient deep learning models on Apache Spark.About The Author Ahmed Sherif is a data scientist who has worked with data in various roles since 2005. He started off with BI solutions and transitioned to data science in 2013. In 2016, he obtained a master's in Predictive Analytics from Northwestern University, where he studied the science and application of machine learning and predictive modeling using both Python and R. Lately, he has been developing machine learning and deep learning solutions on the cloud using Azure. In 2016, he published his first book, Practical Business Intelligence. He currently works as a Technology Solution Profession in Data and AI for Microsoft.Amrith Ravindra is a machine learning enthusiast who holds degrees in electrical and industrial engineering. While pursuing his masters, he dove deeper into the world of machine learning and developed a love for data science. Graduate-level courses in engineering gave him the mathematical background to launch himself into a career in machine learning. He met Ahmed Sherif at a local data science meetup in Tampa. They decided to put their brains together to write a book on their favorite machine learning algorithms. He hopes this book will help him achieve his ultimate goal of becoming a data scientist and actively contributing to machine learning."
Price: 124.99

"Modernize Node.js Web Apps with Azure App Service"
"Have you been worrying that your existing web applications aren't good enough to take advantage of the elasticity of the cloud? Or that refactoring them is going to be very difficult? Azure App Service to the rescue! This course on Azure App Service will offer you the ability to quickly refactor, configure, and deploy your Node.js applications on Azure without breaking a sweat.You will benefit from effortless CI/CD configurations and automatic deployments to staging and production environments, and will have more streamlined testing and Quality Assurance processes. Also, you will easily scale your app to meet business needs (while monitoring it for errors and usage statistics with ease) through Azure's services.By the end of this course, you will be confident enough to modernize an existing Node.js web app and deploy it to Azure via App Service.About the AuthorDimitris Loukas is a software engineer currently part of a growing start-up building a revolutionary referral marketing platform with Node.js, Angular, MySQL, Redis, and Docker. He also develops trading software applications using C#, Aurelia, and TypeScript. He is an author at Packt and has developed many video tutorials in C#, .NET Core, and TypeScript. He has worked for two startups in the past, is active in the open-source community, and loves taking up small side-projects. He has developed microservices using C# and Node.js and has also mastered Angular, Aurelia, and Vue.JS. He is an early adopter of .NET Core and is fascinated by modern JavaScript and where the web is going."
Price: 124.99

"Learning JavaFX by Example"
"JavaFX is a modern app development interface. It is designed to provide high-performance applications with GUI features such as smooth animation, web views, and audio and video playback.This course will give you hands-on training in working with JavaFX to create fast, high-performance, and user-friendly applications to meet your clients' requirements. You will learn how JavaFX makes your GUIs more interactive. Work with its rich features such as charts, scene builder, and easy controls while you create real-world applications.By the end of this course, you will have the skills to create fast and feature-rich real-world apps for your clients' business needs. About the AuthorSmail Oubaalla is a talented Software Engineer with an interest in building the most effective, beautiful and correct piece of software possible. He has helped companies build excellent programs. He also manages projects and has experience in designing and managing new products. When not working, he loves hanging out with friends, hiking, and playing sports (football, basketball, rugby, and more). He also loves working his way through every recipe he can find in the family cookbook or elsewhere, and indulging his love for seeing new places."
Price: 124.99

"Learn Raspberry Pi"
"The Raspberry Pi is a small, low-cost, and yet very powerful development platform. It is used to interact with attached electronics by the use of its GPIO pins for multiple use cases, mainly home automation and robotics.This course will get you started with The Raspberry Pi 3 and show you how to utilize its GPIO along with Python. You will start by installing and setting up the necessary hardware to create a seamless development platform. You will then build applications for The Raspberry Pi and run your program on it by building a touchscreen setup. Next, using the Raspberry Pi you will learn by building your own projects such as a Google assistant, a network ad blocker, and a security camera. Further, you will explore the new Raspberry Pi Zero W, which has an added wireless LAN and Bluetooth connectivity by building mini projects such as a Pi-Fi router, USB stick, and time-lapse camera.By the end of the course, you will be well equipped to build your own real-world projects on the Raspberry Pi. About the AuthorParvinder Yadav has worked with wireless penetration testing for more than 4 years and has a deep knowledge of networking. He has created a lot of projects such as Wi-Fi jammer using shell scripting and the Raspberry Pi 2, a portable hacking device which just weighs 100 grams and can hack almost any router, a portable wireless CCTV camera using The Raspberry Pi which is the same size as a mobile phone, a portable media server, a radio station using the Raspberry Pi, and a lot more. He is the author of PHP tutorials, a geeky YouTuber, and a tech-freak and has more than 55K subscribers to his channel on YouTube."
Price: 124.99

"Gaining Access and Covering Your Tracks with Kali Linux"
"Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.This course covers how to gain access to a system using a portfolio of different techniques, each designed to approach the problem from a different angle. Topics covered will be password cracking, NTP, and others. In the second portion of the course you'll be introduced to a group of techniques designed to reduce or eliminate tracks that is left behind as a result of an attack.In this course we will explore the third and fourth phases of a pentest: exploiting access and covering tracks. This course starts with gaining Remote access using netcat, HTTP tunnels, and executing commands. You will further learn how to crack passwords to gain access to a system using brute-force attacks and rainbow tables.By the end of this course, you'll have learned how to extract and remove log file information from a system.About the AuthorSean Oriyano is a long-time security professional and entrepreneur. Over the past 25 years he has divided his time between performing security research and consulting/delivering training, both in general IT and cybersecurity. In addition, he has become a best-selling author with many years' experience in both digital and print media. Sean has published several books over the last decade and has expanded his reach even further by appearing on shows on both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cybersecurity topics and technologies. When in front of the camera Sean has been noted for his casual demeanor and praised for his ability to explain complex topics in an easy-to-understand manner. Outside his own business activities, he is a Chief Warrant Officer and commands a unit specializing in cybersecurity, training, development, and strategy. Additionally, as a CWO he is recognized as a SME in his field and is frequently called upon to provide expertise, training and mentoring wherever and whenever needed. When not working, Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, MMA, Metroid, and The Legend of Zelda."
Price: 124.99

"Cybersecurity: Methods of Protection (Blue Team Activity)"
"Cyber threats and attacks are becoming more common, sophisticated, and damaging. The Alliance is faced with an evolving complex threat environment. State and non-state actors can use cyber attacks in the context of military operations.In the first part of the course, you'll learn about different kinds of cyberattack and how they can be executed. In the second part, you'll prevent or mitigate these attacks and protect your digital assets.First of all you'll find out how to harden your network in all directions. We'll talk about firewalls and how to fine-tune them correctly. You'll manage IDS and IPS and understand what they can tell us. You'll also learn how to track hackers in the cyberspace, harden every host in the network, and find network spies.Next, we cover how to harden your websites and web applications: what steps you should take to avoid SQL injection, XSS scripts, session hijacking, and more.We'll show you how to protect yourself and your employees against hackers and their psychological manipulations, and phishing and spear-phishing.About the AuthorSergii Nesterenko is an Information Security Consultant and Penetration Tester with 20 years' experience in information security and 6 years' in the cybersecurity field. He consults international business companies, military staff, NGOs, politicians, Members of Parliament, law enforcement, and other VIPs on security issues. His wide knowledge of information technologies and human psychology lets him elaborate effective technologies to prevent and overcome the most cunning cyberattacks. He is known for his publications and lectures on cybersecurity, anti-fraud, and counter- cyber-espionage issues."
Price: 124.99

"Real-World Python Deep Learning Projects"
"Deep Learning allows you to solve problems where traditional Machine Learning methods might perform poorly: detecting and extracting objects from images, extracting meaning from text, and predicting outcomes based on complex dependencies, to name a few. In this course you will learn how to use Deep Learning in practice by going through real-world examples.You will start of by creating neural networks to predict the demand for airline travel in the future. Then, you'll run through a scenario where you have to identify negative tweets for a celebrity by using Convolutional Neural Networks (CNN's). Next you will create a neural network which will be able to identify smiles in your camera app. Finally, the last project will help you forecast a company's stock prices for the next day using Deep Learning.By the end of this course, you will have a solid understanding of Deep Learning and the ability to build your own Deep Learning models.About the AuthorJakub Konczyk has enjoyed programming professionally since 1995. He is a Python and Django expert and has been involved in building complex systems since 2006. He loves to simplify and teach programming subjects and share them with others. He first discovered Machine Learning when he was trying to predict real estate prices in one of the early stage startups he was involved in. He failed miserably. Then he discovered a much more practical way to learn Machine Learning, which he would like to share with you in this course. It boils down to the Keep it simple! mantra."
Price: 124.99