Pluralsight – Microsoft Azure For Node Js Developers Building Secure Services And Applications

Pluralsight – Microsoft Azure For Node Js Developers Building Secure Services And Applications-QUASAR
English | Size: 464.18 MB
Category: Tutorial


Node.js is a very popular platform and is a first-class citizen in Azure This course shows you how to build various kinds of secure applications that integrate with Azure AD, and make use of Azure facilities such as managed identity and Key Vault. Node.js in Azure can be used in many ways: web apps, functions, containers, and more While writing these applications, you’ll want to offer authentication and authorization using Azure AD. You’ll want to give your applications identities using managed identity so they can access secure resources in a secure, monitored, and controlled manner. You’ll want your application to save secrets, secrets that are well guarded come with great monitoring, and more. In this course, Microsoft Azure for Node.js Developers – Building Secure Services and Applications you’ll learn how to write Node.js applications that can work in any form, and integrate and make use of all the facilities that Azure AD offers. You’ll also find out how Node.js applications can be given managed identities, and how such applications can safely use secrets guarded by Azure Key Vault. By the end of this course, you’ll have a good understanding of how to make use of the facilities Azure offers helping you write secure applications in Node.js [Read more…]

Pluralsight – Windows 10 Foundations 2019

Pluralsight – Windows 10 Foundations 2019-QUASAR
English | Size: 286.35 MB
Category: Tutorial


With Windows 10 Foundations (2019), busy business professionals will learn all about the basic operations, functions, and features of Windows 10. Quickly get up and running with Windows 10! Busy business professionals will learn all about the basic operations, functions and features of Windows 10. You’ll learn the ins and outs of the Start Menu, Task bar, and basic Windows 10 apps. You’ll explore basic operations and learn to search and surf in Windows [Read more…]

Pluralsight – Data Loading Best Practices-QUASAR

Pluralsight – Data Loading Best Practices-QUASAR
English | Size: 111.40 MB
Category: Tutorial


Microsoft Ignite 2019. Data Loading Best Practices. Chris Testa-O’Neill
Connect to a Windows Azure Blob Storage (WASB) container to load dimension tables using best practices on distribution and indexes [Read more…]

Pluralsight – Microsoft Azure Service Bus In Depth

Pluralsight – Microsoft Azure Service Bus In Depth-QUASAR
English | Size: 630.23 MB
Category: Tutorial


This course provides deep and detailed coverage of the capabilities of the Azure Service Bus. Real-world scenarios and stories from the field will be used to highlight the engaging demos. Microsoft Azure Service Bus is a fully managed enterprise integration message broker. In this course, Microsoft Azure Service Bus In-depth, you will gain a deep and thorough understanding of the capabilities of the Azure Service Bus First, you will be introduced to messaging scenarios, along with the Service Bus functionality. Next, you will discover the sending and receiving of messages. Finally, you will get into details on the more advanced features such as message sessions, duplicate detection, and dead-lettering. When you are finished with this course, you will have the skills and knowledge of how to provide granular security on the Service Bus [Read more…]

Pluralsight – Spring Framework Spring Expression Language SpEL

Pluralsight – Spring Framework Spring Expression Language SpEL-QUASAR
English | Size: 117.20 MB
Category: Tutorial


This course guides experienced Spring developers to leverage the power of SpEL to query and manipulate an object / object graph at run time making it possible to dynamically inject values or objects in to other beans. Spring Expression Language (SpEL), introduced with Spring 3.0 back in 2009, is a powerful yet seemingly underutilized feature of Spring. In this course, you’ll learn to harness it’s power in dynamic bean wiring/ dependency injection which is made possible through writing String expressions that gets evaluated at run time. First you’ll discover how to leverage the power of SpEL to query and manipulate an object. Next, you’ll see how to use an object graph at run time, making it possible to dynamically inject values or objects in to other beans. Finally, you’ll explore the conditionalization ability of SpEL to pick the right bean or value to dependency inject based on the conditions in an application. When you’re finished with this course, you’ll be able to apply SpEL to any application [Read more…]

Pluralsight – Penetrating Networks For Comptia PenTest Plus

Pluralsight – Penetrating Networks For Comptia PenTest Plus-QUASAR
English | Size: 1.19 GB
Category: Tutorial


Weaknesses in your network infrastructure will enable a security professional to gain entry to hosts in the resources, eavesdrop on data in transit, and disturb communications. See how these actions can have serious consequences for the organization. Connecting computing devices together to share files and other resources is certainly an essential part of today’s computing landscape; however, the very act of connecting to networks introduces risk to the devices and the data stored on them. In this course, Penetrating Networks for CompTIA PenTest+, you will gain the ability to review all aspects of given
network infrastructure to discover any weaknesses during a penetration test. First, you will learn about the similarities that all networks have in common that create different attack surfaces. Next, you will discover how different networking services can create possible entry points into a network or, at the least, the ability to enumerate systems for more data. Finally, you will explore how to look within the realm of wireless technologies whether it’s basic WiFi or Bluetooth, or even some of the flaws of WPS. When you are finished with this course, you will have the skills and knowledge to thoroughly test networks and their devices during a penetration testing engagement.n [Read more…]