Course catalog
Showing 7,441-7,460 of 9,127 items.
Scrum: The Basics
Learn what scrum is and how you can start implementing it in your project management workflow.
Sculpt Cloth in ZBrush
Learn how to use cutting-edge tools in ZBrush to create realistic clothing for your digital characters.
Sculpting a Creature with ZBrush and Photoshop
Bring creatures from the depths of your imagination to life with ZBrush and Photoshop, in these tutorials from concept artist and Face Off champion Rayce Bird.
Sculpting a Game Asset in Blender
Learn how to use Blender's Multiresolution modifier and sculpting tools to create high-poly texture maps for 3D game assets.
Sculpting a Game Environment
Learn how game artists work with software like Photoshop and ZBrush to create assets used in real-world games, while you sculpt a unique environment of your very own.
Sculpting a Scarecrow in ZBrush
Learn a variety of powerful digital sculpting techniques by creating a fun and whimsical Halloween scarecrow in ZBrush.
Sculpting and Painting a Head in Cinema 4D
Use CINEMA 4D's sculpting tools to sculpt the head of an old man and paint a great-looking texture map with BodyPaint.
Seán Duggan's Fire and Ice Photo Composite: Start to Finish
Follow along with fine art photographer Seán Duggan as he shoots in the Icelandic wilderness and then composites his photographs into new imaginary landscapes with Photoshop.
Search Techniques for Web Developers (219399)
Effective search skills are often a key part of programming talent. In this course, instructor Morten Rand-Hendriksen highlights several search techniques that you, as a web developer, need to know. Morten begins by explaining where to find reliable information. He goes over several possibilities, including the original source, platform resources, status reference sites, and community resources. Next, Morten shows you how to master searches with search techniques for Google, other search engines, internal site searches, and GitHub. He concludes with a discussion of the developers behind every line of code and how you can enrich your searches for information through participating in and contributing to online communities.
Sebastien Deguy: Allegorithmic Changing the Art of Games
An in-depth interview with Sebastien Deguy, founder of Allegorithmic, the company behind creative 3D texturing tools such as Substance Designer and Substance Painter.
Secure Coding in C
Learn how to identify and code around weaknesses in the C programming language to write more secure programs.
Secure Coding in Java (221439)
The enduring popularity of Java makes it a target for bad actors. And its prevalence in internal enterprise applications—which are vulnerable to attacks from employees with insider knowledge—renders secure coding practices even more critical. In this course, instructor Frank Moley helps advanced Java developers kick-start their secure coding journey, providing a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats. Frank discusses how to prevent SQL injection attacks, identify places where sensitive data is stored and avoid exposing it to the outside world, write code that protects the integrity of the system, and more. Along the way, he provides challenges that allow you to put your new skills to the test.
Secure Coding in Python
Develop more secure Python apps. Discover how to set up a secure coding environment and explore the security features of popular Python frameworks like Django and Flask.
Securing Containers and Kubernetes Ecosystem
Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.
Securing Cryptocurrencies
Explore some of the basic security requirements for cryptocurrencies, as well as some tools that can help you reduce your own exposure to risk.
Securing Django Applications
Protect your Django web app using essential security and authentication measures. Learn how to implement two-factor authentication, encrypt user data, and more.
Securing the IoT: Introduction
Secure the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.
Securing the IoT: Privacy
Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.
Securing Windows Server 2016: Implementing Threat Detection Solutions
Get practical and up-to-date information on implementing threat detection in Windows Server 2016.
Securing Windows Server 2016: Implementing Workload Specific Security
Learn how to implement workload specific security in Windows Server 2016 to help maintain a secure server environment.