CSS: Refactoring Style Sheets
Morten Rand-HendriksenView Morten’s LinkedIn Newsletter As sites and apps grow ever more intricate, stylesheets frequently grow by gradual accumulation—things get added…
Implementing the NIST Privacy Framework
Ronald WoernerThese days, a large-scale security breach seems to be an almost-daily occurrence. Standing in the balance is the personal information…
Vue.js: Testing and Debugging
Fikayo AdepojuYou’ve learned Vue and can create amazing front-end interfaces, but how do you make sure they really work? With Jest,…
IT Security Foundations: Core Concepts (2019)
Lisa BockComputing and internet security are everyone’s business, but it’s especially critical for information technology specialists. Learning the core concepts of…
macOS Monterey Essential Training
Nick BrazziIf you are buying a new Mac, upgrading your current Mac, or migrating from Windows, you’ll need to know the…
Certified Information Security Manager (CISM) Cert Prep (2022): 4 Incident Management
Mike ChappleEven the best security controls aren’t foolproof. That’s why security professionals need a solid incident management plan. The fourth domain…
Advanced SQL for Data Science: Time Series
Dan SullivanTime series data is data gathered over time: performance metrics, user interactions, and information collected by sensors. Since different time…
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 2 Evaluate Governance Risk Compliance (GRC) and Security Operations Strategies
Pete ZergerPassing the Microsoft Cybersecurity Architect Expert SC-100 exam certifies your ability to design cybersecurity solutions using the full range of…
Creating a Culture That Inspires Your Employees
MadecraftA common trait of great organizations a healthy culture. Your organizational culture is simply the way you do work together,…
Cybersecurity Awareness: Web3, Crypto, and NFTs
Miles NolanIf you’re interested in learning more about crypto, you need to understand the importance of end-user security. Too many people…
Learning Java 17
Kathryn HodgeJava is one of the top five programming languages, and is used for websites, embedded controllers, and Android app development.…
AWS Certified Advanced Networking – Specialty (ANS-C01) Cert Prep: 4 Network Security, Compliance, and Governance
Noah GiftAre you ready for the final domain of the AWS Certified Advanced Networking – Specialty (ANS-C01) certification exam? It’s time…
Learning SAP Sales and Distribution (SD Module)
Justin ValleyTo effectively sell, distribute, and bill for their goods and services, organizations need a robust system to manage customer and…
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 5 Recommend Security Best Practices and Priorities
Pete ZergerThe SC-100 exam is the Expert-level Microsoft security certification, intended for those with deep knowledge and experience designing and architecting…
How to Make Work More Meaningful
Dave CrenshawThere’s an emptiness that many feel about their work. They are disengaged because they feel that they’re not doing what…
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)
AJ YawnIf you’re interested in landing a role in the booming cybersecurity industry, you should check out governance, risk, and compliance…
Learning TinyML
Archana VaidheeswaranWhile you may not realize it, TinyML probably affects your life in some way on a daily basis. If you…
Building Web APIs with ASP.NET Core in .NET
Christian WenzWeb APIs drive the most popular web and mobile apps, as well as internet-enabled devices ranging from fridges to phones.…
Digital Transformation: A Toolkit for Non-Programmers
Attul SehgalDigital transformation is never straightforward, and if you’re not a programmer, it can be quite a slog. But with new…
Learning to Say No with Confidence and Grace
Melody WildingView Melody’s LinkedIn Newsletter Turning down requests at work can be tough. If you’re a high performer who serves as…