Showing 1933–1944 of 4482 results

ICAgile (ICP-TST): Overview
This is an introduction to the IC-Agile Test certification. This course will teach you the broad outlines of what you can expect in ICAgile Testing.

ICAgile (ICP-TST): Testing Techniques
Agile changes the nature of testing. This course will teach you how it changes, and how to integrated Agile testing into your enteprise.

IDA Pro Concepts and Basic Functionality
The ability to reverse engineer binary code is accomplished through the use of complex tools which translate machine code. This course will teach you everything you need to know about IDA Pro to get started using this indispensable tool.

Identify Common Cyber Network Attacks with Wireshark
This course will teach you how to quickly spot cyber attacks and indicators of compromise in network traffic with Wireshark.

Identify Information Architecture Requirements with Microsoft Azure
Solid information architecture is critical to enable organizations to meet data requirements including governance, storage, protection, retention, and more. This course explores identifying and satisfying information architecture requirements.

Identify Patterns and Trends in Power BI
This course will teach you about the Power BI visual analysis features so that you have the knowledge and know how to apply this and answer related questions in the PL-300 exam.

Identify Stop Signs with Transfer Learning
Master the use of transfer learning to build a model that identifies stop signs. Learn how to use pre-trained models to detect traffic signs and apply transfer learning techniques for enhanced image classification accuracy.

Identifying and Understanding Business Problems for Data Scientists
Identifying and defining business challenges is crucial for developing data science solutions and aligning stakeholders. This course teaches you to recognize key problems that data science can address.

Identifying Drivers for IT Governance Implementation
In this course, you will learn how to implement Governance of Enterprise IT. Become the leader, and take this course if you want to be able to conduct any organizational transformation with COBIT5.

Identifying Existing Products, Services, and Technologies in Use for Microsoft Azure
Microsoft Azure can host almost any application, but understanding how to use it with existing workflows is a must. In this course, you will learn how to integrate existing workflows, technologies, and processes with Microsoft Azure.

Identifying Hidden Dependencies
Learn how Honeycomb improved the reliability of our Zookeeper, Kafka, and stateful storage systems through terminating nodes on purpose.

Identity Access Management
Understand identity and access management concepts for securing systems and data access.