Pluralsight – Play by Play Get Paid with .NET Core and Modern Payment Gateways

Pluralsight – Play by Play: Get Paid with .NET Core and Modern Payment Gateways
English | Size: 390.1 MB
Category: Tutorial

In this course, you’ll learn about major payment gateways and understand how they keep your company secure when dealing with sensitive data through .NET Core.

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: Get Paid with .NET Core and Modern Payment Gateways, Ben Cull and Lars Klint demonstrate how modern payment gateways have made it easy to take payments online, creating security dangers and adding the need for more responsibilities. Learn how to subscribe to a payment plan using .NET Core, capture a customer’s credit card, and explore the .NET Core SDK architecture. By the end of this course, you’ll have a deep understanding about major payment gateways and how they keep your company secure when dealing with sensitive data.
[Read more…]

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO

PLURALSIGHT PLAY BY PLAY A PENETRATION TESTERS GUIDE TO SOCIAL ENGINEERING TUTORIAL-kEISO
English | Size: 495.22 MB
Category: CBTs

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: A Penetration Tester?s Guide to Social Engineering, Stephen Haunts and Lars Klint are going to delve into the shadowy world of social engineering. Learn about information gathering pre-texting, and manipulation. By the end of this course you?ll know a wide range of techniques that you can use to protect yourself and your company from a social engineering attack [Read more…]

Pluralsight – Play by Play – What You Need to Know About HTTPS Today

Pluralsight – Play by Play – What You Need to Know About HTTPS Today
English | Size: 522.33 MB
Category: CBTs

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed and unscripted. In this course, Play by Play: What You Need to Know About HTTPS Today, Troy Hunt and Lars Klint cover how securing web traffic over HTTPS is rapidly becoming a critical component for today. Learn how websites are increasingly being compelled to go secure as browsers warn users of insecure sites, allow performance features only over secure connections, and increase content security policies. By the end of this course, you’ll have a clear understanding of the importance of securing web traffic over HTTPS. [Read more…]

Play by Play: Emerging Threats in IoT

Play by Play: Emerging Threats in IoT
English | Size: 441.19 MB
Category: CBTs

Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you’ll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities. [Read more…]

Pluralsight – Play by Play Emerging Threats in IoT

Pluralsight – Play by Play: Emerging Threats in IoT
English | Size: 441.19 MB
Category: Tutorial

Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you’ll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities. [Read more…]

Pluralsight – Play By Play – Becoming a More Effective Scrum Master

Pluralsight – Play By Play – Becoming a More Effective Scrum Master
English | Size: 1.71 GB
Category: Tutorial

In this course, you’ll learn tools to improve your Scrum Master skills in order to be more effective and help your team reach their highest potential.
Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. [Read more…]

Pluralsight – Play by Play – Enterprise Data Encryption with Azure Revealed

Pluralsight – Play by Play – Enterprise Data Encryption with Azure Revealed
English | Size: 734.95 MB
Category: Tutorial

In this Play by Play, you’ll learn about what enterprise data is critical to encrypt, and robust patterns and practices you can apply in your organization.

Play by play is a series in which top technologists work through a problem in real time, unrehearsed and unscripted. In this course, Play by Play: Enterprise Data Encryption with Azure Revealed, Stephen Haunts and Lars Klint look at the different ways in which enterprises can protect their data, especially in a cloud-first, multi-tenant world. [Read more…]

Pluralsight Play by Play Building a Node Web API with Sam Artioli and John Papa

Pluralsight Play by Play Building a Node Web API with Sam Artioli and John Papa
English | Size: 797.61 MB
Category: Programming | E-learning

Play by Play is a series where we sit down with an expert to work on a solution in real time. It’s unscripted and unrehearsed. In this course, NodeJS expert Sam Artioli builds a web app from scratch. You’ll learn how to set up a Node app, build a web API with Express, integrate with MongoDB, and cache HTTP results with Redis. You’ll also learn some expert techniques, such as offloading and proxying requests to multiple Node servers, organizing API routes, and avoiding blocking process and taking advantage of Node’s event loop. [Read more…]