Python for Students
MadecraftThere is no better time to learn Python than when you are young. Python is a powerful language for automation,…
CISSP Cert Prep (2021): 6 Security Assessment and Testing
Mike ChappleAre you getting ready for the Certified Information Systems Security Professional (CISSP) exam, or are you perhaps an experienced information…
Building Tools with Python
Scott SimpsonTools aren’t the flashiest, most attention-grabbing type of software. But a great tool—one that successfully automates or enhances a repetitive…
Accounting Ethics
Ajay PangarkarFor both public and private businesses, timely and accurate financial reports are a vital part of communicating your company’s health.…
Learning Shopify
Patrick RaulandWant to start your own online business? Shopify is a trusted and popular hosted ecommerce solution that provides advanced store…
CompTIA Security+ (SY0-601) Cert Prep: 2 Secure Code Design and Implementation
Mike ChappleApplication vulnerabilities can open the floodgates to all manner of malicious attacks. Cybersecurity professionals must be equipped with a robust…
iOS Lean Controllers: 1 Setup, Persistent Data, and Implementation
Mohammad AzamLearn how to implement lean controllers when developing iOS applications. This course covers the setup process and how to work…
Incident Response with PagerDuty
Ibukun ItimiIncidents are an expected part of building software. However, how you manage incidents will determine how reliable your service will…
Organizing Your Remote Office for Maximum Productivity
Paula RizzoView Paula’s LinkedIn Newsletter Working remotely gives you amazing freedom, but how you set up your office makes all the…
International Logistics
Steven BrownAs more and more businesses today go global and more and more materials and merchandise are transferred from one country…
Microsoft Teams Essential Training (2019)
Nick BrazziMore from LinkedIn Learning’s top expertsBusiness Software Newsletter Discover the core features of Microsoft Teams and see how you can…
Ethical Hacking: Denial of Service
Malcolm ShoreEthical hacking involves testing to see if an organization’s network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one…
Critical Roles Consultants Play (and the Skills You Need to Fill Them)
Bob McGannonView Bob’s LinkedIn Newsletter New consultants are often surprised by how agile they need to be to fulfill client expectations.…
CompTIA Pentest+ (PT0-002) Cert Prep: 2 Information Gathering and Vulnerability Scanning
Michael SolomonIf you really want to launch a successful attack, you need to map out the relevant network vulnerabilities beforehand so…
CircuitPython: Connecting a Robot Cat to the Internet
Charlyn GondaWhile many Internet of Things projects send data to the cloud, sometimes you want a physical indication of an event…
Penetration Testing: Advanced Web Testing
Malcolm ShoreWebsites are one of the most vulnerable pieces of information technology, since their contents are exposed to access from the…
Women Transforming Tech: Career Insights
Lori Nishiura MackenzieThe Women Transforming Tech series is focused on helping women interested in working in and staying in the tech industry.…
Ten Security Tips for Developers
Morten Rand-HendriksenSecurity is an essential component of application and web development, yet it is easy to overlook in the rush to…
Android Development Essential Training: Manage Data with Kotlin
David GassnerNearly every app you build will use some kind of data. That data could be a single numeric value, or…
Revit for Systems Design and Smart Buildings
Onyema UdezeIf you’re a systems designer or consultant working in the building and construction industry, you need to be able to…