This course is about developing core skills that will stay with you for a lifetime. It is designed such that you can watch the material and follow along step-by-step. It focuses on the implementation of YOLOv4 to get you up and running. You'll be an object detecting ninja in no time and be able to graduate to more advanced content.
This course focuses on Kali Linux and Nmap, which every network administrator needs to know. You will also learn the best practices to scan your networks for weaknesses and learn some excellent techniques to defend the security threats.
In this course, you will learn how to create an AAA-looking scene in Unreal Engine 5 from scratch. This class is not for beginners; therefore, no basics of Unreal Engine 5 will be covered. You should be able to know how to navigate and have basic knowledge of the Unreal Engine 5 Interface.
This comprehensive course unlocks the boundless potential of LangChain, Pinecone, OpenAI, and LLAMA 2 LLM, guiding you from AI novice to expert. Dive into 15 different practical projects, from dynamic chatbots to data analysis tools, and cultivate a profound understanding of AI, empowering your journey into the future of language-based applications.
This course will help you become familiar with the implementation of creational design patterns. Featuring real-world examples written in modern C++, each pattern is explained in detail to help you to understand how the pattern can be implemented efficiently using language features.
This is a beginner-friendly video course that teaches you how to build a 2D game from scratch using Unity and C#. You will learn how to implement 2D lighting, use particle systems, program a player controller, and more. No prior experience is necessary!
In this course, you will learn how to author machine learning models in Python without the aid of frameworks or libraries from scratch. Discover the process of loading data, evaluating models, and implementing machine learning algorithms.
Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers' malicious backdoors/malware and trace them back to avoid possible future incidents.
We are in such an era where cyber security plays an important part. With systems getting smarter, we are seeing machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it is important for pentesters and security researchers to understand the working of these systems and how to breach them.
Visualize charts and visuals in Tableau Desktop