IT-Learning: 21993 producten
Creating a Book Search Engine from Scratch Using Java and GitHub Copilot
In this intermediate-level course, you will learn how to build a comprehensive book search project using Java, Maven, Spring Boot, PostgreS…
Creating Reports in Word 2016
Create clean, professional, and engaging business reports, from proposals to whitepapers, with Microsoft Word. Gini Courter begins this cou…
Learn T-Shirt Printing and Design
There's more to successfully designing and producing a t-shirt than you might think. This course spells it all out, from design through pro…
Web Site Strategy and Planning
In Web Site Strategy and Planning, Jen Kramer shows that there's more to building a web site than just implementation. She describes how to…
Building Angular and ASP.NET Core Apps with Authentication
Angular 2 and ASP.NET Core offer solid improvements over previous versions. In this course, discover how to work with these technologies to…
Managing Up, Down, and Across the Organization (2017)
If you work in a large organization, chances are you need to manage relationships with all levels, including your boss, peers, and direct r…
Deploying ASP.NET Core Applications: From Fundamentals to Advanced Deployment Strategies
In this comprehensive course, full-stack .NET web developer Ervis Trupja guides you through the intricate world of ASP.NET Core application…
Microsoft Azure: Design Azure Web and Mobile Apps
Being able to create a wide variety of apps is part of the new IT reality. Companies expect IT professionals to be comfortable architecting…
Program Management for Cybersecurity Managers: From Planning to Cross-Functional Coordination
This course offers a thorough exploration of designing and managing effective information security programs that meet customer expectations…
Photo Gear Weekly
Get your gear on! Join photographer, author, and educator Tim Grey for insights on camera gear of all kinds. In Photo Gear Weekly, Tim shar…
Tips to Boost Your Analytical Thinking
Analytical thinking is an essential skill in just about every field or profession. In this course, Christina Stathopoulos guides you throug…
Ethical Hacking: Perimeter Defenses
Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security pr…
Leading Yourself (2017)
Before you can effectively lead others, you need to lead yourself. In this course, learn how to manage your mindset, behaviors, and workpla…
Red Team Operator Series
If you want to assess the viability of your security protocols, building a red team can be a smart move. Red teams let you simulate cyber a…
Screencasting with the Mac
Screencasting with the Mac shows how, with very little investment, Mac users can create coherent and engaging screencasts. Chris Breen show…