Pluralsight – Saving Persistent Player Data in Unity

Pluralsight – Saving Persistent Player Data in Unity
English | Size: 368.1MB
Category: Tutorial

Saving persistent player data has been a standard feature of games for decades. In this course, you will learn how to use the JsonUtility class and PlayerPrefs to automatically store and synchronize character stats between play sessions.

Have you ever needed game data to persist between play sessions? If so, Saving Persistent Player Data in Unity is the perfect course for you, because you will create a data serialization system for a simple Action RPG game. First, you will learn about serialization systems in Unity. Next, you will work with the JsonUtility and PlayerPrefs to save and load data. Finally, you will add a persistent leveling system to a player character. When you are finished with this game development course, you will not only understand how serialization works in Unity but also how to create your own persistent character data systems. Software required: Unity 2018.2 [Read more…]

Pluralsight – Advanced Persistent Threats: The Big Picture

Pluralsight – Advanced Persistent Threats: The Big Picture
English | Size: 184.25 MB
Category: CBTs

Whether you’ve been in the information security field or not, you’ve definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you’ll learn everything that you might want to know about APTs. First, you’ll develop an understanding of their motives and identities. Next, you’ll explore when to classify a threat as an APT, and more importantly, when not to. Then, you’ll learn how to assess your own risk and set up a system to detect these threats before it’s too late. Finally, you’ll finish up with implementing practical defense mechanisms. By the end of this course, you’ll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.
[Read more…]

Skip to toolbar