Showing 4021–4028 of 4028 results

You Have Something to Share, and You’re Worthy. Delete Your Imposter Syndrome.
Learn why it's important to delete your Imposter Syndrome, realize your own worth as a human being with experiences worth sharing, and start becoming a day to day "master" to the "apprentices" that surround you in every moment of every day.

You Mad? Productive Disagreement Using Instructional Design
In this session, Rachael Bailey will uncover parallels between the iterative process of Instructional Design and productive disagreements, so you can walk away from hard conversations with empathy and a fresh perspective.

Your Certification Journey Leveraging Google Cloud Content on Pluralsight
In this session, Magda Jary, global GTM lead for certifications and badges, will share an overview of the learning paths, programs, and tools to get Google Cloud Certified, and how to use Pluralsight to do it.

Your Development Strategy Is Killing Your Business
Learn how to equip your technical resources with the skills they need to implement these opportunities within your organization.

Your First AI Model using Python and Scikit-learn
Take your first steps in AI by building a machine learning model using Python and Scikit-learn. Learn the basics of supervised learning, data preprocessing, model training, and evaluation in this hands-on introductory course.

Youtube Sentiment Analysis: Jake Paul vs. Mike Tyson Trailer
Explore sentiment analysis for YouTube videos. Learn how to analyze user comments and reactions to the Jake Paul vs. Mike Tyson trailer, using NLP techniques and machine learning to determine public opinion and sentiments.

Zephyr for Jira Fundamentals
This course will teach you the fundamentals of using Zephyr to capture and assist with the execution of tests.

Zero Trust Networking (ZTN): The Big Picture
Essentially, with Zero Trust Networking, the network is entirely dark to everything and everyone until the administrator turns the lights on. You will go through technologies and introduced to new networking and security architectures.