IT & Software
Hands-On : Azure Tenant and SQL Database deployment, Creating Azure Tenant, Subscription, Azure SQL Server and SQL Database. Manipulating data on Azure SQL Database.
Description
Azure SQL ...
Demystifying Docker and Kubernetes for beginner's, Learn how to create containers, Azure containers instances, AKS, Play with docker tool.
Description
In this comprehensive course, ...
15 signs to tell that your computer has got virus, Signs of computer virus, Types of computer viruses, Computer virus and other types of malware, what a computer virus can.
Description
1. ...
IT/Desktop Computer Support- Troubleshooting for Technicians, Learn how to troubleshoot desktop computer issues as an IT Support Technician on real-world organizational networks.
Course Description
...
Aws Certified Cloud Practitioner Mock Exams, We prepared a series of Practice Tests for AWS Certified Cloud Practitioner which will help to prepare for the real exam.
Description
The AWS ...
DP-900 Microsoft Azure Data Fundamentals (In-Depth), Azure DP900 Clearly explained with Practical in most simplest explanation and In-Depth.
Description
Learn Azure DP-900 Microsoft Azure ...
Linux bash shell scripting Incl. AWK, SED and 10+ projects, Master Linux Bash scripting: AWK, SED, 10+ projects. Perfect for beginners & experts. Step-by-step guide with practical.
This ...
React Redux Project for Beginners 2023, learn react redux.
Description
Welcome to the React Redux tutorial for beginners! This comprehensive video course is designed to cater to both ...
Reverse Engineering: IDA For Beginners, Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows.
If you are a beginner to Reverse Engineering and want to learn how to use IDA Pro ...
Computer Networks Foundations - Best Starter Course , Learn foundations of computer network systems in a simplified manner.
Description
This course aims to provide you with a simplified ...
Zero Trust All in one, Your one stop for Zero Trust strategy.
Description
What's Zero Trust?
Zero trust is a cybersecurity strategy that assumes that no user or device can be trusted, ...
