Lynda – After Effects CC 2017 Editors and Post Essential Training
Lynda – After Effects CC 2017: Editors and Post Essential TrainingEnglish | Size: 1.4GBCategory: Tutorial In this course, Alan Demafiles covers the core aspects of After Effects commonly used in...
View ArticleLynda – Ethical Hacking – Exploits
Lynda – Ethical Hacking – ExploitsEnglish | Size: 203.96 MB Category: Tutorial In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data...
View ArticleLynda – Learning Audacity
Lynda – Learning AudacityEnglish | Size: 622.16 MBCategory: Tutorial Audacity is a free, open-source, audio-editing application that many nonaudio professionals use to record live audio, convert tapes...
View ArticleLynda – Linux Directory Structure and Basic Tools
Lynda – Linux Directory Structure and Basic ToolsEnglish | Size: 190.62 MBCategory: Tutorial Managing the Linux operating system can be a complex task. In this course, instructor and Linux enthusiast...
View ArticleLynda – Linux File Sharing Services
Lynda – Linux File Sharing ServicesEnglish | Size: 147.59 MB Category: Tutorial Interoperability is at the heart of file sharing. Being able to set up and configure environments to support standard...
View ArticleLynda – Managing Office Politics
Lynda – Managing Office PoliticsEnglish | Size: 232.56 MBCategory: Tutorial Be proactive about managing the office environment by mastering the dynamics of how people work together. When you understand...
View ArticleLynda – Maya Tips, Tricks, & Techniques
Lynda – Maya: Tips, Tricks, & TechniquesEnglish | Size: 668.8MBCategory: Tutorial Even 3D masters sometimes hit a wall with Maya. This weekly series is designed to give you tips, tricks, and...
View ArticleLynda – Microsoft Azure Create and Manage ARM Virtual Machines
Lynda – Microsoft Azure Create and Manage ARM Virtual MachinesEnglish | Size: 285.69 MBCategory: Tutorial Build upon your existing Azure implementation knowledge and broaden your skills by learning how...
View ArticleLynda – Photoshop CC 2017 One-on-One: Fundamentals
Lynda – Photoshop CC 2017 One-on-One: FundamentalsEnglish | Size: 6.7GBCategory: Tutorial Photographers and graphics designers-including professionals, hobbyists, enthusiasts, and students-use...
View ArticleO’Reilly – Designing for Conversion
O’Reilly – Designing for ConversionEnglish | Size: 601.35 MB Category: CBTs The best UX designers always design for conversion, that artfully analytical process by which a first time visitor to a...
View ArticleO’Reilly – Reactive Python for Data Science
O’Reilly – Reactive Python for Data ScienceEnglish | Size: 1.99 GBCategory: CBTs Reactive programming is shaping the future of how we model data. With reactive, not only can you concisely wrangle and...
View ArticleStackskills – Automated Mobile Application Security Assessment with MobSF
Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the complete security analysis of...
View ArticleStackskills – Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will...
View ArticleO’Reilly – Learning Path : Cisco Routing and Switching Exam Prep
This Learning Path prepares you for three necessary steps toward your Cisco Routing and Switching Certification: you’ll prep for the Cisco 100-101 exam (ICND1 – Networking Devices, Part 1), Cisco...
View ArticleStackskills – Build an Advanced Keylogger using C++ for Ethical Hacking!
Here you will see how a keylogger is written in C++ from scratch. It is highly recommended that you have previous programming knowledge prior to taking this course as it dives deep into complex...
View ArticleStackskills – Ethical Hacking from Scratch to Advanced Technique
All our information are not on digital media so everything now is on our Cell Phone, Laptop, Cloud and so on. so what will happen if someone was able to hack our devices, that’s why we need to be aware...
View ArticleIonic 1: From Web to Mobile
Future Proof Yourself. Turn your existing web development knowledge into mobile development super powers with Ionic The course will cover: Implement both Tabbed and Side Menu navigation. Interact with...
View ArticleLearnKey – CISSP: Business Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery Planning is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP...
View ArticleLearnKey – CISSP: Telecommunications, Network & Internet Security
Telecommunications, Network & Internet Security is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP...
View ArticleO’Reilly – Learning Presto DB
Facebook, Netflix, Airbnb, LinkedIn, and Uber. These are just a few of the leading companies who use Presto to query SQL on Hadoop at big data scale. This course provides an introduction to Presto....
View Article