Course description: ACA System Operator Certification Preparation Course is intended for individuals who have technical expertise in deployment, management and operations on Alibaba Cloud. It’s recommended for System administrators with at least one year of experience in deployment, management, and operations on Alibaba Cloud. ACA System Operator Certification is intended for … [Read more...] about Operate Alibaba Cloud Systems and Services
Computer Security and Networks
Teaching Impacts of Technology: Relationships
In this course you’ll focus on how “smart” devices have changed how we interact with others in personal ways, impacting how we stay connected in our increasingly mobile society. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all … [Read more...] about Teaching Impacts of Technology: Relationships
Message Encoding/Decoding in Python with GUI
In this 1-hour long project-based course, you will learn how to secure your information by encoding and decoding the messages. In this project, You’ll be able to create functions in Python that perform encoding and decoding techniques using a common key. Furthermore, You’ll be able to create a Graphical User Interface (GUI) in Python using Tkinter library. Note: This course … [Read more...] about Message Encoding/Decoding in Python with GUI
Reliable Cloud Infrastructure: Design and Process dalam bahasa Indonesia
Kursus ini membekali peserta dengan keterampilan untuk membuat solusi yang sangat andal dan efisien di Google Cloud menggunakan pola desain yang telah terbukti. Kursus ini merupakan kelanjutan dari kursus Architecting with Google Compute Engine atau Architecting with Google Kubernetes Engine dan memberikan pengalaman interaktif dengan teknologi yang dibahas dalam kursus … [Read more...] about Reliable Cloud Infrastructure: Design and Process dalam bahasa Indonesia
Threat Investigation
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand how threat-centric SOC must prepare for analyzing new and emerging threats by implementing robust security investigation procedures • By the end of the course, you will be able to: • Understand cyber-threat hunting concepts • Describe the five … [Read more...] about Threat Investigation