Showing 2089–2100 of 4482 results

Increase Your Productivity with Component Sandboxes and Stories
Dan will discuss an open source tool called Storybook that can be used with Angular (as well as other frameworks and libraries) to speed up the development of UI components.

Increasing Mental Health Awareness for Improved Inclusiveness
This course provides technical professionals with an overview of the most common mental health disorders. By the end of this course, you will be able to support mental health initiatives by removing the stigma in your workplace.

InDesign CC Creating AEM Mobile Apps
Learn to create AEM Mobile Apps in InDesign CC. Software required: InDesign CC, Adobe Experience Manager.

Index Objects with Pandas
In this course, you’ll learn how to use Pandas index objects for advanced data analysis. You'll learn how to create and use numerical, interval, period, categorical, date-time, time-delta, and multi-indexing in Pandas to retrieve and manipulate data.

Indexing Data in Elasticsearch
This course explains the index distribution architecture of Elasticsearch, cluster configuration, shards and replicas, similarity models, advanced search, and mixed-language documents, all of which improve the performance of search queries.

Information and Cyber Security GRC: Commission and Manage Penetration Tests
Penetration testing is a proven tool in the fight against those who want to attack us. This course will teach you the steps to prepare for and what to expect during the pentest to make the most effective use of time and money.

Information and Cyber Security GRC: Governance
This course will teach you some practical applications of GRC concepts necessary to establish, measure, and maintain a security governance program.

Information and Cyber Security GRC: Risk Management
This course will teach you common procedures to complete practical risk assessments to understand your current information security risk exposure.

Information and Cyber Security GRC: Risk Management Frameworks and Structures
All organizations face varying risks related to their mission, strategies, and goals. This course will teach you the techniques used to manage risks and a selection of frameworks that can be used.

Information and Cyber Security GRC: Supply Chain and Third-party Risk
Managing third-party risks is an essential component of any organization’s security program. This course will teach you to evaluate risks from vendors or other third-parties, develop a useful program, and maintain it for your organization.

Information Gathering and Vulnerability Scanning for CompTIA Pentest+
Reconnaissance is one of the most important phases in a penetration testing engagement. This course will teach you how to perform information gathering and vulnerability scanning needed for the CompTIA Pentest+ certification.

Information Gathering with Kali Linux
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.