This is a hands-on course that comes packed with source code ready for you to use through the lessons. The objective of this course is to guide you through the essentials of HTML5 Canvas drawing and how it works. You must have prior coding experience in JavaScript and HTML and familiarity with web development before getting started with this course.
Learn to build a custom object-oriented PHP MVC framework and application
Secure any Linux server from hackers and protect it against hacking. The practical Linux Administration security guide.
Scala is doubtless one of the most in-demand skills for data scientists and data engineers. This competitive course will teach you the essential concepts and methodologies of Scala with a lot of practical implementations.
Unlock the power of coding with our all-inclusive Ruby course. Whether you're starting from scratch or elevating your programming skills, this course is tailored for a seamless learning curve in Ruby 3.2.
This course is a perfect introduction for individuals and students interested in becoming cyber security/information security professionals. With this course, you will acquire well-rounded knowledge about the fundamental concepts of cyber/information security.
With this course, you will learn about the threats and vulnerabilities to organizations and how they combine to produce risks in an organization. Learn cyber risk prevention methods for risk mitigation, avoidance, transference, and acceptance and how to classify information and successfully implement security controls to limit cyber risks.
Welcome to this course on OWASP Top 10 where we will take a closer look at the top ten vulnerabilities that applications face today. This is a mix of both theory as well as practical and explains to you the real-world cyber-attacks on various companies and web applications.
In this compact intermediate-level course, you will learn how to use Facebook Prophet to do time series analysis and forecasting. You will learn how Prophet works under the hood and the Prophet API. We will apply Prophet to a variety of datasets, including store sales and stock prices.
Learn theoretical and practical skills in cybersecurity, ethical hacking, cyber management, and develop safe networking principles. We will cover crafting phishing mails, performing brute force attacks, conducting audits with Burp Suite, gather data with Maltego software, and safeguard systems and networks from phishing, malware, ransomware, and social engineering.