OReilly Building Microservice Systems with Docker and Kubernetes

OReilly Building Microservice Systems with Docker and Kubernetes
English | Size: 371.83 MB
Category: Programming | E-learning


This course teaches you how to build microservice systems hosted with Kubernetes. It’s intended for intermediate to advanced developers or DevOps engineers who have problems they think Kubernetes will solve, but are not sure about the best way to move forward. Participants should have some experience working on web applications as this is not a course on the basics of web hosting.
[Read more…]

PluralSight Linux Systems Programming Tutorial

PluralSight Linux Systems Programming Tutorial
English | Size: 540.09 MB
Category: Tutorial


This course delivers a comprehensive introduction to the Linux system call interface and also to key components of the standard C library.The course primarily presents the API via its traditional “C” language bindings; however, many examples are additionally presented using Python.
[Read more…]

Pluralsight – Information Systems Auditor Path

Pluralsight – Information Systems Auditor Path
English | Size: 1.81 GB
Category: Programming | Cloud-Comp


This series provides foundational knowledge of information systems audit techniques and technology, knowledge which is necessary for developing an audit plan and conducting subsequent audits. This series can be used to prepare for the ISACA® CISA® (Certified Information Systems Auditor®) examination, with coverage of the 2016 CISA Job Practice Areas. [Read more…]

Oreilly Encryption – Toward Secure Systems

Oreilly : Encryption – Toward Secure Systems
English | Size: 1.93 GB
Category: E-learning | Security


Title: Encryption By: Brian Sletten Publisher: O’Reilly Media Formats:
– Safari Videos Online
– Video
Video: June 2016 Run time: 7 hours 14 minutes [Read more…]

Oreilly Encryption – Toward Secure Systems

Oreilly : Encryption – Toward Secure Systems
English | Size: 1.93 GB
Category: E-learning | Security


Title: Encryption By: Brian Sletten Publisher: O’Reilly Media Formats:
– Safari Videos Online
– Video
Video: June 2016 Run time: 7 hours 14 minutes [Read more…]

Risk Management and Information Systems Control: Risk Response and Mitigation | Pluralsight

Risk Management and Information Systems Control: Risk Response and Mitigation |Pluralsight
English | Size: 142.78 MB
Category: Tutorial


This course examines the various options available to respond to an identified risk. You will learn how to make the correct risk response decision to reduce risk to levels acceptable to management. [Read more…]

Risk Management and Information Systems Control: IT Risk Assessment | Pluralsight

Risk Management and Information Systems Control: IT Risk Assessment | Pluralsight
English | Size:134.85 MB
Category: Tutorial


This course outlines the process of risk assessment, the follow up to the risk framing and risk identification processes done previously. This will help you understand the entire risk management process and prepare for ISACA’s CRISC examination. [Read more…]

O’Reilly – Building Microservice Systems with Docker and Kubernetes

O’Reilly – Building Microservice Systems with Docker and Kubernetes
English | Size:456.52 MB
Category:Tutorial


This course teaches you how to build microservice systems hosted with Kubernetes. It’s intended for intermediate to advanced developers or DevOps engineers who have problems they think Kubernetes will solve, but are not sure about the best way to move forward. Participants should have some experience working on web applications as this is not a course on the basics of web hosting. [Read more…]

Understanding Intrusion Detection Systems Training Video – Infinite Skills

Understanding Intrusion Detection Systems Training Video – Infinite Skills

English | Size: 0.99 GB (1,059,256,402 Bytes)
Category: CBTs


Understanding Intrusion Detection Systems Training Video

An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You’re a systems or network admin and it’s your job to prevent these types of malicious events.
[Read more…]

Information Systems Auditor: Governance and Management | Pluralsight

Information Systems Auditor: Governance and Management | Pluralsight

English | Size: 438.48 MB (459,782,420 Bytes)
Category: CBTs


This course prepares you for the CISA examination by examining the second chapter of the CISA – the process of auditing the operations and management of the IT department.

The CISA examination is very difficult and requires extensive knowledge in many areas. This course, Information Systems Auditor: Governance and Management, addresses the second of the five chapters of topics covered in ISACA’s CISA examination. First, you’ll look at how best to align your IT strategy with your organizational strategy, as well as how to audit the governance and management of your IT Department. Next, you’ll get to understand the risk management process before seeing auditing of IT systems management. You’ll finish the course with seeing some of the techniques used by an IT Auditor and the role of the information systems auditor in regard to business continuity planning. After completing this course, you will be familiar with the concepts, tools, and techniques used in auditing the operations and management of the IT department in an organization. [Read more…]