This course covers essential topics required for working with data structures and algorithms using JavaScript. From basics of data structures and algorithms to key concepts, such as arrays, lists, Big O time-space asymptomatic analysis, trees, and maps, this course will teach you everything with the help of engaging examples and activities.
In this course, you'll learn all the tools you need to become an ethical hacker, with a keen sense of knowledge in the cybersecurity domain. You'll start with the fundamentals of hacking and work your way up to use all the modern hacking tools at your disposal. In this course, you'll learn how to think and operate like an ethical hacker.
This course is your guide to deep learning in Python with Keras. You will discover the Keras Python library for deep learning and learn how to use it to develop and evaluate deep learning models.
In this course, you will learn everything you need to know about working with Git and GitHub. By the end of this course, you will have the knowledge and confidence you need in order to apply for a job, work in a team, or work on open-source projects.
Build real-world MVC applications using Repository Pattern, N-Tier Architecture, APIs, Entity Framework Core and ASP.NET MVC Core 3.1
This course will guide you on how to design a responsive website from scratch without any previous experience in Adobe XD. You will also learn the principles of UI and UX and get your design ready for coding.
Cybercriminals are increasingly relying on user error to perpetrate attacks. Employees are, therefore, the first line of defense when it comes to protecting your organization. One crucial step in making sure that everyone in your organization is prepared to keep your networks secure is for them to know what attacks look like. The five most common workplace computer attacks are explored in this video, along with how to spot and prevent them. Learning Objectives Identify the various forms of cyber crime and learn how to spot potential risks, enabling you to protect your computer and personal information effectively.;Recognize and respond to the five most common types of attempted cyber security attacks.;Explore the concept of denial of service (DoS) attacks and the dangers of typosquatting, equipping you with the ability to detect potential threats and contribute to overall cybersecurity resilience.
Supercharge your career as an Oracle DBA! This in-depth performance tuning course empowers you to pinpoint bottlenecks, master essential tools like AWR and ASH, elevate your database's performance, and unlock your potential as a top-tier Oracle DBA.
Safety, Security & Situational Awareness For Everyone The S3AFE™ Skills Program covers the fundamentals of situational awareness, demonstrates how to translate human behaviour, recognise observable indicators, both verbal and non-verbal and communicate or act in a way that will pre-empt violence. Course curriculum 1 Welcome & Administration How to navigate the learning platform Enrollment Process Trouble Shooting Student booklet - Note: Please download it and use it to take notes and follow the course. 2 Physiological Effects Lesson 1 - Introduction to S3AFE ACT Video Lesson 2 - Maslow & the Left of bang model Lesson 3 - Principles of Real-time Behaviour Lesson 4 - The Predator Mindset Lesson 5 - Dynamics of the brain in times of Stress or Under Threat Test 1 - Physiological Effects 3 Non-Verbal Communication Lesson 6 - Kinesics.pdf Behavioural analysis Lesson 7 - Pacifying behaviour Lesson 8 - Behavioural Indicators Handout 1 - Kinesic Cues Test 2 - Non-verbal Communication 4 Proxemics & Atmospherics Lesson 9 - Introduction to Proxemics Lesson 10 - Proxemics, distance and threat Lesson 11 - Being MADE Lesson 12 - Introduction to Atmospherics Lesson 13 - What atmospherics tell us Test 3 - Proxemics & Atmospherics 5situatiionalSafety & Security Lesson 14 - Colour Codes of Awareness.pdf Handout 2 - Colour Codes of Awareness Lesson 15 - Colour Coded Risk Evaluation.pdf Handout 3 - Risk Evaluation Guide Handout 4 - Recommended Reading List Final Assessment Training and Evaluation Feedback Form
In this self-paced course, you will learn how to use TensorFlow 2 to build convolutional neural networks (CNNs). You will learn how to apply CNNs to several practical image recognition datasets and learn about techniques that help improve performance, such as batch normalization, data augmentation, and transfer learning.