Browse most popular courses
-
Understanding what makes a bad decision in the cloud47s
Understanding what makes a bad decision in the cloud
From: Avoiding Bad Decisions in Your Cloud Strategy
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Windows Event Logs and Finding Evil: Cybersecurity Labs Powered by Hack the Box
Video
-
Understand the Google Cloud landscape48s
Understand the Google Cloud landscape
From: Google Cloud Core Services
Video
-
The importance of cloud computing, observability, and operations1m
The importance of cloud computing, observability, and operations
From: Cloud Observability and Operations: Considerations for Security, Governance, Monitoring, and Cost Control
Video
-
Infrastructure modernization56s
Infrastructure modernization
From: Google Cloud Infrastructure and App Modernization
Video
-
Windows Event Logs and Finding Evil: Cybersecurity Labs Powered by Hack the Box4m
Windows Event Logs and Finding Evil: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Vulnerability Assessment: Cybersecurity Labs Powered by Hack the Box5m
Vulnerability Assessment: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Introduction to Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Introduction to Threat Hunting and Hunting with Elastic: Cybersecurity Labs Powered by Hack the Box
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Security Monitoring and SIEM Fundamentals: Cybersecurity Labs Powered by Hack the Box
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Understanding Log Sources and Investigating with Splunk: Cybersecurity Labs Powered by Hack the Box
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Incident Handling Process: Cybersecurity Labs Powered by Hack the Box
Video
-
Introduction to Threat Hunting and Hunting with Elastic: Cybersecurity Labs Powered by Hack the Box4m
Introduction to Threat Hunting and Hunting with Elastic: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Intermediate Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box
Video
-
Apply your skills with Hack the Box1m
Apply your skills with Hack the Box
From: Vulnerability Assessment: Cybersecurity Labs Powered by Hack the Box
Video
-
Introduction to Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box5m
Introduction to Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
The role of application dependency54s
The role of application dependency
From: Dependency Mapping for Cloud Migration
Video
-
Geographical distance calculations8m
Geographical distance calculations
From: Power BI Weekly
Video
-
Inheritance and polymorphism: AI-assisted OOP design3m
Inheritance and polymorphism: AI-assisted OOP design
From: Intro to Building Java Applications with Cursor
Video
-
Add persistence with File I/O with Cursor1m
Add persistence with File I/O with Cursor
From: Intro to Building Java Applications with Cursor
Video
-
Create data models that scale with Cursor3m
Create data models that scale with Cursor
From: Intro to Building Java Applications with Cursor
Video
-
Five Cursor techniques that will boost your Java productivity times 102m
Five Cursor techniques that will boost your Java productivity times 10
From: Intro to Building Java Applications with Cursor
Video
-
Create a user interface with JavaFX using Cursor4m
Create a user interface with JavaFX using Cursor
From: Intro to Building Java Applications with Cursor
Video
-
Building smarter methods with AI suggestions2m
Building smarter methods with AI suggestions
From: Intro to Building Java Applications with Cursor
Video
-
JSON and XML processing: Let AI do the heavy lifting3m
JSON and XML processing: Let AI do the heavy lifting
From: Intro to Building Java Applications with Cursor
Video
-
Project blueprint: Library management system58s
Project blueprint: Library management system
From: Intro to Building Java Applications with Cursor
Video
-
Generate drafts and modify documents in Word5m
Generate drafts and modify documents in Word
From: Learning Microsoft 365 Copilot for Work
Video
-
Policy decision and enforcement points (PDP/PEP)3m
Policy decision and enforcement points (PDP/PEP)
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video
-
Core security principles of Zero Trust3m
Core security principles of Zero Trust
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video
-
Introduction to Zero Trust3m
Introduction to Zero Trust
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video
-
The role of identity in Zero Trust3m
The role of identity in Zero Trust
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video
-
Intermediate Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box5m
Intermediate Network Traffic Analysis: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Understanding Log Sources and Investigating with Splunk: Cybersecurity Labs Powered by Hack the Box4m
Understanding Log Sources and Investigating with Splunk: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Generative AI with large language models45s
Generative AI with large language models
From: Generative AI: Introduction to Large Language Models
Video
-
Building financial harmony for couples1m
Building financial harmony for couples
From: Financial Wellness for Couples and Families
Video
-
Security Monitoring and SIEM Fundamentals: Cybersecurity Labs Powered by Hack the Box5m
Security Monitoring and SIEM Fundamentals: Cybersecurity Labs Powered by Hack the Box
By: Hack the Box
Course
-
Structure your project for maintainability using AI2m
Structure your project for maintainability using AI
From: Intro to Building Java Applications with Cursor
Video
-
Automatic Swagger documentation with Cursor5m
Automatic Swagger documentation with Cursor
From: Intro to Building Java Applications with Cursor
Video
-
Build model classes using Cursor2m
Build model classes using Cursor
From: Intro to Building Java Applications with Cursor
Video
-
Why Cursor will transform your Java development55s
Why Cursor will transform your Java development
From: Intro to Building Java Applications with Cursor
Video
-
Use Cursor to build the repository and service layers4m
Use Cursor to build the repository and service layers
From: Intro to Building Java Applications with Cursor
Video
-
Use Cursor to manage pesky dependencies with Maven/Gradle2m
Use Cursor to manage pesky dependencies with Maven/Gradle
From: Intro to Building Java Applications with Cursor
Video
-
Install and configure Cursor: Setup for maximum productivity3m
Install and configure Cursor: Setup for maximum productivity
From: Intro to Building Java Applications with Cursor
Video
-
Vibe working: Agent Mode and Office Agent3m
Vibe working: Agent Mode and Office Agent
From: Learning Microsoft 365 Copilot for Work
Video
-
Summarize meetings and leverage Copilot in Teams6m
Summarize meetings and leverage Copilot in Teams
From: Learning Microsoft 365 Copilot for Work
Video
-
Draft and summarize messages in Outlook4m
Draft and summarize messages in Outlook
From: Learning Microsoft 365 Copilot for Work
Video
-
Least privilege access and RBAC4m
Least privilege access and RBAC
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video
-
Zero Trust network access (ZTNA) and SASE integration4m
Zero Trust network access (ZTNA) and SASE integration
From: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Video