Showing 1417–1428 of 4482 results

DevSecOps: Enabling Security Governance and Compliance in DevSecOps
This course will teach you the importance of strong security governance and compliance. Learn to leverage DevSecOps pipelines for automatic compliance using “Compliance as Code”, a critical part of a modern cloud strategy to demonstrate Governance.

DevSecOps: Integrating Incident Response into DevSecOps
This course will teach you to design and build automated incident response (IR) into your DevSecOps pipelines for faster and better incident response.

Dial Plan for Cisco Collaboration (300-070) CIPTV1
The dial plan is one of the key elements of a Cisco Unified Collaborations deployment. This course will teach you the main dial plan elements, functions, and demonstrate how to configure the dial plan components.

Digital Transformation for Business Leaders
Understand how business leaders can drive digital transformation initiatives within their organizations.

Dimensional Modeling on the Microsoft SQL Server Platform
This course teaches you how to use Microsoft SQL Server and SQL Server Integration Services to design and efficiently load data to your data warehouse. You'll also learn techniques for troubleshooting performance bottlenecks in your ETL.

Dimensionality Reduction in Python
Understand the concept of reducing dimensionality in your data, and master the techniques to do so in Python.

Directives and Pipes in Angular
Learn how to use built-in, and write custom Directives and Pipes in Angular. No more duplicated code, or bad performance!

Directives and Pipes in Angular
Learn how to use built-in, and write custom Directives and Pipes in Angular. No more duplicated code, or bad performance!

Discover Network Weaknesses with Nessus
This course will teach you how to go beyond the basics and configure the advanced capabilities of Nessus for an infrastructure assessment.

Discover sentiments in customer service tweets
Learn sentiment analysis techniques to assess customer service feedback on Twitter. Master text mining, natural language processing (NLP), and machine learning to understand customer emotions and improve service responses effectively.

Discovery with ADRecon
In this course, we cover the ADRecon tool, which allows you to extract valuable information from the Active Directory, including users, security groups, computers, security policies, and even Kerberos tickets.

Discovery with BloodHound
Attacking Active Directory is a great way to achieve control of an environment, letting you access the data, and act on your objectives. BloodHound lets you visualize the shortest path to get to where you need to be.