PLURALSIGHT BUILDING PIPELINES FOR WORKFLOW ORCHESTRATION USING GOOGLE COMPOSER PROPER

PLURALSIGHT BUILDING PIPELINES FOR WORKFLOW ORCHESTRATION USING GOOGLE COMPOSER PROPER
English | Size: 232.73 MB
Category: Tutorial

Cloud Composer is a pipeline orchestration service on the GCP. Based on the Apache Airflow API, Composer was launched in May 2018 and is fast-emerging as a popular and versatile service for building and executing system pipelines. In this course, Building Pipelines for Workflow Orchestration Using Google Composer, you’ll learn how Composer allows cloud users to quickly create pipelines with complex interconnected tasks. First, you’ll discover where Composer fits in the taxonomy of GCP services and how it compares to Dataflow, which is another service for building and executing pipelines on the GCP. Next, you’ll explore what a Composer environment is and how pipelines are specified, and run on these environments. Then, you’ll develop an understanding of the powerful suite of operators made available for use within Composer pipelines by utilizing Airflow operators for executing shell scripts, executing arbitrary Python code, and implementing complex control flow. Finally, you’ll learn how to use Airflow’s GCP-specific operators for sending email, working with BigQuery, and instantiating Dataproc clusters. When you’re finished with this course, you’ll have the skills and knowledge necessary to build and deploy complex pipelines built on the Apache Airflow API by utilizing Composer. [Read more…]

Pluralsight Streamlining Your Incident Response Process with Splunk

Pluralsight Streamlining Your Incident Response Process with Splunk
English | Size: 579.59 MB
Category: Tutorial

In this course, you’ll learn how Splunk can help streamline your incident response (IR) process.

In this course, Streamlining Your Incident Response Process with Splunk, Ryan Chapman and Aaron Rosenmund discuss how Splunk can help streamline your incident response (IR) process. Learn the benefits and importance of log aggregation, why Splunk is the best tool for the job, and how Splunk works and which logs you’ll need. By the end of this course, you’ll have a solid understanding of the true benefits Splunk brings to the IR realm. [Read more…]

Pluralsight – Design a Data Protection Strategy with Microsoft Azure

Pluralsight – Design a Data Protection Strategy with Microsoft Azure
English | Size: 253.63 MB
Category: Cloud-Comp | E-learning | Microsoft | others

This course explores the key aspects and solutions related to designing a data protection strategy for your organization using Azure services.

Understanding all the aspects of data protection and addressing can be complex. In this course, Design a Data Protection Strategy with Microsoft Azure, you will learn the foundational knowledge necessary to design a data protection strategy using Azure services. First, you will learn key considerations related to data protection. Next, you will discover encryption options for all stages of the data lifecycle. Finally, you will explore how to add performance and availability requirements for data in Microsoft cloud services. When you’re finished with this course, you will have the skills and knowledge of data protection needed to design a strategy for your organization’s data in Microsoft Azure. [Read more…]

Pluralsight – Preventing Switching Loops and Configuring Complex Technologies on ArubaOS-Switch

Pluralsight – Preventing Switching Loops and Configuring Complex Technologies on ArubaOS-Switch
English | Size: 229.92 MB
Category: E-learning | Networking | others

This course covers everything from spanning tree protocol, through link layer discovery protocol, into layer 3 switched virtual interfaces, static routing and RIP routing, and more, all on ArubaOS-switch devices.

ArubaOS-Switch is an alternative to the ubiquitous Cisco IOS devices, and learning how to resolve layer 2 loops, configure layer 2 discovery protocols, and understander simple layer 3 routing concepts are great skills to have for all network technicians and engineers. In this course, Preventing Switching Loops and Configuring Complex Technologies on ArubaOS-Switch, you will learn foundational knowledge/gain the ability to configure and verify layer 2 loop prevention protocols and simple layer 3 routing. First, you will learn how and what spanning-tree protocol to configure. Next, you will discover how to enable layer 3 routing on the ArubaOS-switch devices. Finally, you will explore how to configure and verify both static routing and simple RIP routing. When you’re finished with this course, you will have the skills and knowledge of spanning-tree, layer 2 discovery protocols, and simple layer 3 routing needed to configure and verify ArubaOS-Switch devices and interwork them with Cisco IOS devices. [Read more…]

Pluralsight – Cisco ASA NAT for CCNP Security (300-206) SENSS (REUP)

Pluralsight – Cisco ASA NAT for CCNP Security (300-206) SENSS (REUP)
English | Size: 491.98 MB
Category: Cisco | E-learning | Networking

This course is part 3 of 6 in the Cisco CCNP Security (300-206) SENSS exam learning path. In this course, you’ll learn all you need to know when it comes the 300-206 SENSS exam and NAT on the ASA. You’ll learn the ins and outs of NAT ranging from Dynamic and Static NAT and PAT to Twice NAT.
[Read more…]

Pluralsight Kubernetes Installation and Configuration Fundamentals

Pluralsight Kubernetes Installation and Configuration Fundamentals
English | Size: 359.41 MB
Category: Tutorial

Let’s take your Kubernetes admin skills to the next level and get you started learning how to install, configure and work with a Kubernetes cluster. In this course, Kubernetes Installation and Configuration Fundamentals, you will learn foundational knowledge needed to install, configure and deploy applications in a Kubernetes cluster. First, you will learn about Kubernetes’ architecture, looking closely at each of the cluster’s components and their roles. Next, you will discover how to install and configure a Kubernetes cluster: you’ll look at how to perform installations on-premises with kubeadm, and in cloud scenarios such as Azure Kubernetes Services and Google Kubernetes Engine. Finally, you will explore how to interact with your cluster, deploying Pods, Services, and Deployments. When you’re finished with this course, you will have the skills and knowledge of Kubernetes needed to administer a Kubernetes cluster and deploy applications in Kubernetes. Software required: Linux. [Read more…]

Pluralsight – Creature Rigging for Games

Pluralsight – Creature Rigging for Games
English | Size: 2.4GB
Category: Tutorial

During this course, we will be rigging a creature that has some unique challenges not often found in your typical biped rig. We’ll be covering some more advanced rigging techniques that are intended to take your rigging knowledge to the next level.

Have you ever been tasked with rigging something other than a human, and didn’t know how to take your existing knowledge and apply it to the task? Do you want to expand your understanding of rigging so that you have the ability to tackle any type of rig? In this course, Creature Rigging for Games, you will learn how to build upon foundational knowledge to be able to tackle more unique rigging challenges. First, you will learn about the unique constraints when building a rig for games. Next, you will discover how to rig each aspect of the character, using some more advanced techniques that you can apply to future rigging challenges. Then, you will learn how to take a cloth simulation in Maya, and export it to something a game engine can use. Finally, you will explore how to finalize your rig for delivery by doing pose tests and testing your work in Unity. When you’re finished with this course, you will have the knowledge needed to create clean, professional rigs, that will work in a game engine. [Read more…]

Pluralsight – Secure Network Design

Pluralsight – Secure Network Design
English | Size: 158.76 MB
Category: E-learning | Networking | Security | others

Networks are complex systems of many components that operate in an insecure world. In this course, you will learn how to design and manage secure networks to protect your organizations and improve your effectiveness in managing a security program.
[Read more…]

PluralSight Configuring Cisco Unity Connection Call Handlers Video Greetings and Unified Messaging

PluralSight Configuring Cisco Unity Connection Call Handlers Video Greetings and Unified Messaging
English | Size: 232.58 MB
Category: Tutorial

Release Notes: In today s fast-paced world, the ability to communicate using real-time IP voice and video technology is a business necessity. In this course Configuring Cisco Unity Connection Call Handlers, Video Greetings, and Unified Messaging, you will learn how to deploy Cisco Unity Connection features such as auto attendants, video greetings, integrated and unified messaging with Outlook and Exchange. First, you’ll explore how to create voice enabled call handlers with Unity Connection. Next you ll configure Unity Connection integrated messaging to send voice mail to an Outlook email client. You ll also be able to deploy Unity and Exchange to support unified messaging to an Outlook email client Finally, you ll see how to configure video greetings using a Cisco MediaSense server. When you re finished with this course, you ll have the skills and knowledge needed to deploy these Cisco Unity Connection features within your collaboration network [Read more…]

PluralSight – Performing OSINT Gathering on Employee Targets

PluralSight – Performing OSINT Gathering on Employee Targets
English | Size: 411.46 MB
Category: Tutorial

As organizations focus their efforts on protecting their technical infrastructure, far too many leave their most vulnerable assets exposed to attack: their people. In this course, Performing OSINT Gathering on Employee Targets, you will gain the ability to gather and analyze OSINT related to an organization’s workforce members.
[Read more…]

Skip to toolbar