Search results for: ca
Phishing and Email Security Best Practices
Attackers want to trick you into helping them by sending you malicious emails, text ...
Ivanti Avalanche Vulnerability: What You Should Know
Q&A session discussing the Ivanti Avalanche Vulnerabilities, covering a wide range of ...
The IT Ops Sessions: Using Ansible Sign and Verify
In this IT Ops session, you’ll learn how to use the 'ansible-sign' command line utility ...
Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions
In this course you will learn the security solutions Microsoft offers for Microsoft 365 ...
Implement LangChain Solutions in Your Data Workflow
This course covers LangChain integration and automation in data pipelines. The topics ...
OpenAI Assistant API
The Assistants API is OpenAI's functionality that allows building powerful AI assistants, ...
Agile Conversations: Using Information Radiators Effectively
Effective collaboration begins by sharing the right information in the right way at the ...
Reconnaissance with Gobuster
Performing reconnaissance is one of the most important phases in a red team exercise. In ...
Recurrent Neural Networks (RNNs): Deep Learning for Sequences and Time Series
Recurrent Neural Networks (RNNs) excel at processing sequences, making them ideal for ...
OpenAI: Prompt Engineering for Business Professionals
ChatGPT can make you a more effective and efficient business professional. This course ...
Internationalization in Angular
This course will teach you internationalization and localization techniques so you can ...