Course catalog

Categories

Showing 7,441-7,460 of 9,126 items.

Seán Duggan's Fire and Ice Photo Composite: Start to Finish

Follow along with fine art photographer Seán Duggan as he shoots in the Icelandic wilderness and then composites his photographs into new imaginary landscapes with Photoshop.

Search Techniques for Web Developers (219399)

Effective search skills are often a key part of programming talent. In this course, instructor Morten Rand-Hendriksen highlights several search techniques that you, as a web developer, need to know. Morten begins by explaining where to find reliable information. He goes over several possibilities, including the original source, platform resources, status reference sites, and community resources. Next, Morten shows you how to master searches with search techniques for Google, other search engines, internal site searches, and GitHub. He concludes with a discussion of the developers behind every line of code and how you can enrich your searches for information through participating in and contributing to online communities.

Sebastien Deguy: Allegorithmic Changing the Art of Games

An in-depth interview with Sebastien Deguy, founder of Allegorithmic, the company behind creative 3D texturing tools such as Substance Designer and Substance Painter.

Secure Coding in C

Learn how to identify and code around weaknesses in the C programming language to write more secure programs.

Secure Coding in Java (221439)

The enduring popularity of Java makes it a target for bad actors. And its prevalence in internal enterprise applications—which are vulnerable to attacks from employees with insider knowledge—renders secure coding practices even more critical. In this course, instructor Frank Moley helps advanced Java developers kick-start their secure coding journey, providing a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats. Frank discusses how to prevent SQL injection attacks, identify places where sensitive data is stored and avoid exposing it to the outside world, write code that protects the integrity of the system, and more. Along the way, he provides challenges that allow you to put your new skills to the test.

Secure Coding in Python

Develop more secure Python apps. Discover how to set up a secure coding environment and explore the security features of popular Python frameworks like Django and Flask.

Securing Containers and Kubernetes Ecosystem

Learn best practices and security controls for containers and the Kubernetes ecosystem using a simple five-factor security model.

Securing Cryptocurrencies

Explore some of the basic security requirements for cryptocurrencies, as well as some tools that can help you reduce your own exposure to risk.

Securing Django Applications

Protect your Django web app using essential security and authentication measures. Learn how to implement two-factor authentication, encrypt user data, and more.

Securing the IoT: Introduction

Secure the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.

Securing the IoT: Privacy

Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.

Securing Windows Server 2016: Implementing Threat Detection Solutions

Get practical and up-to-date information on implementing threat detection in Windows Server 2016.

Securing Windows Server 2016: Implementing Workload Specific Security

Learn how to implement workload specific security in Windows Server 2016 to help maintain a secure server environment.

Securing Windows Server 2016: Managing Privileged Identities

Learn how to manage privileged identities in Windows Server 2016. Explore key topics, including user rights, Privileged Access Management, and how to protect credentials.

Securing Windows Server 2016: Securing Network Infrastructure

Learn how to secure network infrastructure, including virtual machines, in Windows Server 2016.

Securing Windows Server 2016: Server Hardening Solutions

Learn about server hardening solutions for Windows Server 2016. Discover how to configure file and disk encryption, configure patches and updates, and implement antimalware.

Securing Windows Server 2019

Learn how to keep Windows Server 2019 secure. Get practical strategies on topics such as server hardening, mitigating common network threats, and managing privileged identities.

Security Awareness: Social Engineering

Defend your organization from social engineering by learning to recognize and thwart the most common types of attacks.

Security for the SMB: Implementing the NIST Cybersecurity Framework

Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.

Security Matters (To Everyone) (206938)

Security affects everyone who uses the internet and shares personal data. Consequently, it's not a concern that should be confined to your organization's information security department. Here, join Mandy Huth—the director of information security at Smarsh—as she shares tips that can empower you to keep your own data safe, as well as convey the significance of information security to others in your company. Learn how to talk about security with non-security people, build a security-minded culture, sell security to customers, collaborate with IT, protect yourself and your family from security threats, and more.