Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems. [Read more…]

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE
English | Size: 3.19 GB
Category: Tutorial

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. [Read more…]

OREILLY Essentials of Microsoft Azure-RiDWARE

OREILLY Essentials of Microsoft Azure-RiDWARE
English | Size: 621.86 MB
Category: Tutorial

Learn how to plan your migration to the cloud in this introductory-level course that teaches you the concepts of cloud computing and how to implement a cloud model using Microsoft Azure. You’ll study the different cloud deployment types available; observe how experts choose the correct implementation model for their businesses; learn about Azure’s costs, functions, tools, services, advantages, and disadvantages; and explore the key factors to consider when moving to a cloud-based system. You’ll come away with the knowledge required to resolve real world implementation issues (e.g., back-up and recovery, uptime, scaling, and software delivery-on-demand concerns) and gain a deep awareness of the efficiencies cloud computing offers (e.g., reduced operational costs, improved agility, and reliability). [Read more…]

O’Reilly – Introduction to Web Application Security Testing with Kali Linux

O’Reilly – Introduction to Web Application Security Testing with Kali Linux
English | Size: 2.74 GB
Category: Tutorial

Video Description
Most businesses today use web applications to interact with their customers. These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. This video, designed for entry to intermediate-level security engineers, describes the vulnerabilities often found in web apps, shows you the techniques hackers typically use to exploit those vulnerabilities, and explains the processes and toolsets you can use to test for and remediate against those vulnerabilities. Participants should have access to Kali Linux before starting the course. [Read more…]

Oreilly Livelessons Python From Scratch Tutorial

Oreilly Livelessons Python From Scratch Tutorial
English | Size: 8.93 GB
Category: CBTs

Python from Scratch LiveLessons is a gentler, more entertaining, and more practical starting point to learning the Python programming language. Unlike the typical approach to teaching a programming language that covers each feature section by section, this course is structured more like a cooking class. You can follow along and execute all the code being demonstrated in an interactive notebook as you watch the video much the same way you would watch a cooking video in your kitchen [Read more…]

Oreilly Learning Path Networking For Sysadmins Tutorial-Oxbridge

Oreilly Learning Path Networking For Sysadmins Tutorial-Oxbridge
English | Size: 3.01 GB
Category: CBTs

Networking is a complex but essential area of study for system administrators. This Learning Path covers the ways users can connect to a network; the concepts of switching, routing, and internetworking, end-to-end protocols; end-to-end data; network security; and everything else you need to know to keep a network functioning smoothly. [Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.17 GB
Category: Tutorial

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

O’Reilly – Security Testing and Ethical Hacking with Kali Linux

O’Reilly – Security Testing and Ethical Hacking with Kali Linux
English | Size: 3.03 GB
Category: Linux | Security

Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you’ll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you’ll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you’ll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you’ll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course. [Read more…]

Oreilly – Managing Your Manager

Oreilly – Managing Your Manager
English | Size: 6.85 GB
Category: E-learning | others

In a hierarchical organization, every employee is affected by managers on a regular basis. Your relationship with your manager determines everything from compensation and basic responsibilities to opportunities for advancement, success, and career satisfaction. Many times, management decisions feel capricious, arbitrary, and frustrating, but it doesn’t have to be that way. The goal of this video is to show you how to build a relationship with your manager that can be relied upon when crises happen, in a way that preserves your own sense of self respect, and helps you get what you need when you need it. [Read more…]

O’Reilly – Learning Path Python for Data

O’Reilly – Learning Path: Python for Data
English | Size: 8.03 GB
Category: Misc E-Learning

This is a collection of courses or a "Learning Path" from O’Reilly’s "Safari Books Online". Please note this is NOT the same as the Python for Data Analytics path.

This takes you from a introductory level to having a fairly in-depth knowledge of Python. A lot of the stuff in the second two videos goes over Algorithms, Time Complexities ( i.e. O(N) stuff ) and does it more clearly than anything else I’ve found. It’s a real gem if you are looking to get on at Google / Amazon etc.. or just want to improve your understanding of the more complex end of Python. [Read more…]