This course helps you understand the basics of machine data. You will learn about Splunk components, its basic functions, and be introduced to apps, which becomes your workspace. It teaches you how to navigate Splunk, get you familiar with search anatomy to run searches using fields and basic commands. … [Read more...] about Splunk Search Expert 101
Information Technology
Design Thinking and Global Startup
This course offers a systematic engineering design methodology: Stanford Design Thinking for preparing global startup. The course empathizes the whole Stanford design thinking process, "Empathy-Define-Ideation-Prototype-Test," for building a startup with a business model that has a “customer truly need†component. This course focuses on lean “Prototype and Test†stages … [Read more...] about Design Thinking and Global Startup
Introduction to Hardware and Operating Systems
If you're ready to enter the world of Information Technology (IT), you need job-ready skills. This course enables you to develop the skills to work with computer hardware and operating systems, and is your first step to prepare for all types of tech related careers that require IT Fundamental skills. First, learn about the essential software brain of a computer—its operating … [Read more...] about Introduction to Hardware and Operating Systems
Application Development using Microservices and Serverless
Are you a developer ready to explore serverless application development? This intermediate-level course is for you! Begin with an understanding of how serverless benefits developers, learn when to use serverless programming, serverless deployment models, and discover its top use cases and design patterns. You’ll also discover how serverless supports continuous integration and … [Read more...] about Application Development using Microservices and Serverless
Introduction to the Threat Intelligence Lifecycle
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't? The Threat … [Read more...] about Introduction to the Threat Intelligence Lifecycle