All Architect courses

Course image
Lynda.com - Drupal 8 Essential Training 2: Building Out Your Website
Your Drupal site is built. Now what? Web design doesn't stop once the website is launched. Learn how to build out your Drupal site to better fit your visitors' needs.In these tutorials, Tom Geller helps new Drupal designers change the layout and design elements of their sites, control visitor interactions (including comments), arrange content in user-friendly "views," and expand the site's capabilities beyond what's available in core Drupal with Drupal modules. In all the steps you'll learn best practices to ensure your sites remain streamlined, secure, and up to date.If you want to start from the beginning and create your Drupal site from scratch, check out Drupal 8 Essentials 1: Getting Started. Topics include: Grouping content into categories Managing comments Adding discussion groups Customizing fields and image styles Adjusting menus and navigation to help users Adding new features with Drupal modules Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Lynda.com - Drupal 8 Essential Training 1: The Basics
Drupal 8 Essentials is designed to help anyone create a simple website using Drupal, the free web design software that powers personal blogs as well as the sites of some of the world's largest corporations.This course is the first of the series. No prerequisites are required beyond basic computer skills! These easy-to-follow tutorials show how to install Drupal and other necessary components on a Windows or Mac computer, navigate Drupal's web-based interface, configure the settings of a new Drupal site, create content, and move the site to a server. Every step includes best practices to ensure your website remains streamlined, secure, and up-to-date.Watch Drupal 8 Essentials 2: Building Out Your Website to find out how to finesse your site with categories, comments, custom styles, and other special features. Topics include: Comparing Drupal to other software Getting help with Drupal Installing Acquia Dev Desktop on Mac and Windows Installing the Drupal database, modules, and themes Creating basic content Establishing your site's look and feel Adjusting security settings Adding images and metadata Adding a sidebar Moving your Drupal website to a server Backing up a Drupal site Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning) copy 1
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Apply for this course
 
Course image
Advanced Cisco Routing: RIP and EIGRP (LinkedIn Learning)
The decisions you make about routing determine how your information moves from place to place. And if you’re an IT administrator working with Cisco, you need to understand the various routing protocols that are available as well as how to effectively configure and manage them within your organization. In this course, instructor Jarrel Rivera gives you an in-depth overview of advanced routing in Cisco. Explore the basics of the Routing Information Protocol (RIP), before turning to the Enhanced Interior Gateway Routing Protocol (EIGRP), a more advanced distance-vector protocol for network route configuration. Along the way, Jarrel provides step-by-step demos using IPv4 and IPv6 addresses. By the end of this course, you’ll have the skills you need to leverage RIP and EIGRP so you can get the most out of your network topology. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Angular: Testing and Debugging (LinkedIn Learning)
Errors caused by missing dependencies, undefined variables, or poorly formatted data can cause your web application to stop working. In this course, learn how to track down and eliminate these types of errors in your Angular applications through the process of testing and debugging. Instructor Derek Peruo breaks down common error messages and goes over a variety of testing and debugging options. He also covers code linting, shares some tips and tricks for avoiding pitfalls during development, and goes into writing custom error handlers to make it easier to work with errors as your application grows. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in English only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Webinar ReUse, All that data (OpenCourses)
How do reusable services contribute to the management of large volumes of data? How do can they reduce the data volume? Or garantee its quality? And control storage and handling cost?
 
Course image
Lynda.com - Learning Cisco CLI Switch Configuration
Learn how to configure a Cisco switch to connect and control resources on your network. Join Denise Allen-Hoyt in this course, as she explores the Cisco command-line interface using an out-of-band connection with a cable and terminal program. She'll show how to access the switch's three modes—user EXEC, privileged EXEC, and global configuration—and use commands to configure essential settings. After addressing the switch and configuring a default gateway, Denise shows how to modify individual port modes, secure those ports, and create and manage virtual LANs (VLANs). In the final chapter, she'll show how to verify your settings and reset the switch if necessary. Topics include: Accessing a switch Configuring the terminal program Configuring a switch hostname Saving and viewing configurations Securing access Encrypting passwords Assign an IP address to a switch Exploring port modes and security Creating VLANs Resetting a switch Apply for this course
 
Course image
Lynda.com - CCNA Security (210-260) Cert Prep: 5 Cisco Firewall Technologies
The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Topics include: Firewall services and security contexts Basic firewall configuration Stateless versus stateful firewalls Implementing NAT on Cisco ASA Zone-based firewalls Access Management Implementing high availability Cisco Modular Policy Framework Apply for this course
 
Course image
Ethical Hacking: System Hacking (LinkedIn Learning)
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Acquiring passwords Generating rainbow tables Understanding where passwords are stored Defending against privilege escalation Understanding spyware Protecting against keylogging Detecting steganography How hackers cover their tracks Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Ethical Hacking: Hacking IoT Devices (LinkedIn Learning)
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures.Learning Objectives: How IoT devices work IoT technologies and protocols IoT communication models Common OWASP vulnerabilities Overcoming inherent IoT challenges Attacks occurring on IoT devices Methodologies used for hacking Securing IoT devices Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Ethical Hacking: Wireless Networks (LinkedIn Learning)
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Selecting an antenna Configuring security Extracting WEP and network passwords Testing passwords Harvesting connections from rogue access points Attacking networks via Bluetooth Capturing wireless packets with Acrylic Wi-Fi Heat mapping with Ekahau Wi-Fi sniffing with Wireshark Testing the Internet of Things Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Ethical Hacking: Mobile Devices and Platforms (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Learning Objectives: Today's threat landscape Managing incidents Creating security policies Protecting data The COBIT framework Conducting penetration testing Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Ethical Hacking: Social Engineering (LinkedIn Learning)
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Visualizing the victim Recognizing an attack Using charm, power, and influence Manipulating with social media Preventing insider attacks Stealing identities Pen testing with social engineering Taking countermeasures Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Ethical Hacking: Introduction to Ethical Hacking (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Learning Objectives: Today's threat landscape Managing incidents Creating security policies Protecting data The COBIT framework Conducting penetration testing Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
SEO: Keyword Strategy (LinkedIn Learning)
Formulating a keyword strategy is one of the most important activities in marketing. Properly optimizing a website and strategically using keywords can yield visitors for years. Digital marketing expert Matt Bailey begins with the basics, covering what keywords are and what they do. Next, learn about how to find and analyze the right keywords for your business and implement them into different channels. Matt covers all the important components of choosing keywords including how to determine customer intent, identify trends, develop analytics, utilize negative keywords, and focus on what works. Finally, learn about how to measure the results, understand rankings, and establish priorities. Topics include: What are keywords? Why are keywords important? Starting keyword research Creating a starter set Analyzing keyword patterns Reading search engine results pages (SERP) Mapping keywords across the customer lifecycle Appling keywords to optimize your website Choosing keywords for voice search Build your quality score with themes Apply keywords to optimize your marketing Apply for this course
 
Course image
AngularJS 1 Form Validation (LinkedIn Learning)
Validation is key to successful online forms. Implementing dynamic form validation that reacts to input can be difficult to implement with languages like JavaScript and jQuery. However, AngularJS allows you to take advantage of two-way data-binding functionality without having to write any JavaScript code. This makes reacting to input from the user—as it happens—a breeze. In this short course, Ray Villalobos shows how to implement form validation on any HTML form using the built-in validation properties and methods in AngularJS. Together, you'll look at how AngularJS can help style forms dynamically as the user updates the content. Plus, explore how to implement validation with JavaScript, just in case you need more fine-tuned control of form interactions. Apply for this course
 
Course image
AngularJS 1 Building a Data-Driven App (LinkedIn Learning)
Want to create data-driven web applications? AngularJS is a great choice. It allows you to build apps where multiple users can push and pull data at the same time, in real time. However, while the framework is easy to learn, it can be tough to master. This course is the second in a two-part series designed to show you how Angular works in the real world. It takes up where AngularJS 1: Adding Registration to Your Application left off: a simple application that checks users in and out of meetings. Here, instructor and Angular advocate Ray Villalobos shows how to enhance the existing app with new views and controllers to reward random checked-in users with prizes. Learn how to create forms, edit database records, create methods, randomize record selections, and style and secure your app. With these project-based lessons, you'll learn how to see how data-driven programming with AngularJS can help your apps react to real-time data streams. Apply for this course
 
Course image
Advanced Java Programming (LinkedIn Learning)
Want to get more out of the Java language and platform? In this platform- and framework-neutral course, instructor Bethan Palmer digs into some of the language’s more advanced features, helping you expand your programming skills as she equips you with techniques you can use when building applications anywhere Java is used: in web, mobile, and desktop applications. Bethan covers a variety of topics, including generics, working with the Collections Framework, and functional programming. Plus, learn about I/O in Java, working with files and directories, and structuring applications using the modular system available in Java. Learning objectives : Installing the NetBeans IDE Using generic methods in Java Using wildcards in generic programming Implementing a queue with a LinkedList Functional programming in Java Multi-threading Working with I/O in Java Managing files and directories Apply for this course
 
Course image
IT Security Foundations: Network Security (LinkedIn Learning)
Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Apply for this course
 
Course image
Learning Cryptography and Network Security (LinkedIn Learning)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Apply for this course
 
Course image
La sécurité informatique et cybersécurité : Niveau avancé (LinkedIn Learning)
En tant que responsable de la sécurité ou DSI, vous devez mettre en place une politique de cybersécurité pour répondre aux menaces qui pèsent sur votre informatique. Pour cela, Pierre Cabantous vous propose de faire un tour de la cybersécurité en entreprise. Dans ce cours, vous étudierez la démarche d'un pirate, avant et après l'intrusion dans un système, à la suite de l'exploitation d'une vulnérabilité. Vous verrez comment gérer ces vulnérabilités par rapport à un niveau de risque que vous apprendrez à calculer. Vous aborderez aussi une des principales menaces encourues aujourd'hui par tout service accessible en ligne : les attaques par déni de service. Puis vous découvrirez comment protéger votre organisation aux niveaux technique et organisationnel, en suivant des bonnes pratiques, des process ainsi que des normes européennes comme le RGPD. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course //
 
Course image
DevOps Foundations: Infrastructure as Code (LinkedIn Learning)
By automating configuration management, you can make your organization's systems more reliable, processes more repeatable, and server provisioning more efficient. In this course, learn the basics of infrastructure as code, including how to keep your configuration in a source repository and have it built and deployed like an application. Discover how to approach converting your systems over to becoming fully automated—from server configuration to application installation to runtime orchestration. Well-known DevOps practitioners Ernest Mueller and James Wickett dive into key concepts, and use a wide variety of tools to illustrate those concepts, including Chef, CloudFormation, Docker, Kubernetes, Lambda, and Rundeck. After you wrap up this course, you'll have the knowledge you need to start implementing an infrastructure as code strategy. Topics include: Testing your infrastructure Going from infrastructure code to artifacts Unit testing your infrastructure code Creating systems from your artifacts Instantiating your infrastructure from a defined model Provisioning with CloudFormation Immutable deployment with Docker Container orchestration with Kubernetes Apply for this course
 
Course image
Lynda.com - SEO Foundations
Modern consumers navigate the world through search. From laptops, smartphones, virtual assistants, tablets, and more, they search the wild and wondrous internet for the products and services they need. By leveraging the fundamentals of search engine optimization (SEO), you can ensure that your business pops up in these all-important search results. This course is about mastering those fundamentals. Join instructor David Booth as he covers how to make improvements that boost your website's visibility on search engines, attracting the right kind of traffic to the right pages on your site. Explore the basics of SEO, including how to read a results page and see how rankings affect businesses large and small. Discover how to implement foundational optimization strategies and techniques, including how to conduct keyword research, build internal and external links, optimize your pages and content, measure your successes and progress, and plan for a long-term SEO strategy. Additionally, learn specific SEO tips for ecommerce, local search, and mobile audiences to expand your reach. Topics include: What is SEO? Reading search engine result pages Researching keywords Optimizing pages for keywords Optimizing code and site structure Optimizing nontext components of a webpage Analyzing content quality Defining your audience, topics, angle, and style Building links to your content Promoting your content via social media Measuring SEO effectiveness Optimizing ecommerce sites for search Leveraging local SEO Configuring sites for mobile Apply for this course
 
Course image
Lynda.com - Building Native Mobile Apps with NativeScript and Angular 2
NativeScript is an open-source framework for building native iOS and Android apps. Web developers who are familiar with Angular 2 can get introduced to NativeScript in this course and learn how to develop an application for iOS and Android by leveraging the NativeScript framework with Angular 2. Join Alex Ziskind as he guides you from the initial installation of NativeScript through architecting an application. He explains how to declare the most common user interface widgets while styling them with CSS. Plus, he demonstrates how to set up the Faker library, and how to programmatically tap into the native navigation engine for iOS and Android. Topics include: Setting up the development environment Using the NativeScript CLI Using Angular with NativeScript Angular bootstrap Application architecture Components User interface NativeScript widgets Application lifecycle Data and event binding Navigation Apply for this course
 
Course image
Lynda.com - Managing Data in Angular 2 Applications
All web applications use data, which can come from a server or be stored locally in the browser. In Managing Data in Angular 2 Applications, Derek Peruo guides you through the process of retrieving and saving data for your Angular applications, both in the browser and on a server. He also introduces tips and tricks for customizing data management as your application grows in size and complexity. Learn about the various storage options and when and where to use each type, and find out how to write custom services to manage the data for a fast-growing Angular app. Topics include: Overview of data storage options Saving and retrieving data from the browser Setting routes in the URL Using query strings and fragments instead of routes Saving and retrieving data from a server Working with user input Using JSONP instead of HTTP Why writing custom services is important Writing custom services for working with browsers and servers Apply for this course
 
Course image
Lynda.com - Building a Full-Stack App with Angular 2+ and Spring Boot
Angular 2 can serve as the primary MVC framework for your application, or it can supplement a server-side solution like Laravel or ASP.NET. In this course, Derek Peruo guides you through the process of transforming your Angular 2 single-page application (SPA) into a widget-based application for use with server-side frameworks. Plus, he goes into single-page and widget-based architectures, as well as common patterns for communicating between your server-side and client-side frameworks. Topics include: Single-page applications and widget-based applications Creating a new Laravel project Moving Angular files into Laravel Migrating Angular routing and Angular modules Using global variables Adding stateless API routes Using basic REST requests Using route parameters in controllers Apply for this course
 
Course image
Course image
Lynda.com - Spring 5.0 and Spring Boot 2.0 New Features
The Spring developers are always listening to feedback and feature requests. They have responded with Spring 5, a version that's packed with exciting new enhancements. This course gets you up to speed with the latest and greatest in Spring Framework 5.0 and Spring Boot 2.0, including reactive Spring and Spring Actuator. Instructor Frank Moley covers the new support structure for Java 8 and Java EE 7, and explains which packages, classes, and methods have been removed. Next, learn about the changes to Servlet 3 and 4, data binding for immutable objects, and the spring-web-reactive module for reactive programming. Then explore the integration for Junit Jupiter, parallel test execution, and mock environments. Finally, review the changes in Spring Boot, including third-party library upgrades and Spring Boot Actuator for monitoring the health of production applications. Topics include: Spring core changes Spring web changes Spring test changes Spring Boot changes Apply for this course
 
Course image
Lynda.com - Spring 5.0 and Spring Boot 2.0 New Features
The Spring developers are always listening to feedback and feature requests. They have responded with Spring 5, a version that's packed with exciting new enhancements. This course gets you up to speed with the latest and greatest in Spring Framework 5.0 and Spring Boot 2.0, including reactive Spring and Spring Actuator. Instructor Frank Moley covers the new support structure for Java 8 and Java EE 7, and explains which packages, classes, and methods have been removed. Next, learn about the changes to Servlet 3 and 4, data binding for immutable objects, and the spring-web-reactive module for reactive programming. Then explore the integration for Junit Jupiter, parallel test execution, and mock environments. Finally, review the changes in Spring Boot, including third-party library upgrades and Spring Boot Actuator for monitoring the health of production applications. Topics include: Spring core changes Spring web changes Spring test changes Spring Boot changes
 
Course image
Lynda.com - Java: XML Integration
Learn how to choose the right Java API for your application and get started coding with XML and Java. In this course, author David Gassner shows you how to read and create XML strings and files, decide whether to use a streaming or tree-based API, and find out which APIs are compatible with Android. Plus, discover how to use both standard APIs that are included with the Java SE and EE distributions, such as DOM, SAX, and JAXB, and learn about popular open-source libraries such as JDOM and the Simple XML Serialization framework. Topics include: Choosing a Java-based XML API Reading XML as a string Comparing streaming and tree-based APIs Parsing XML with SAX Creating and reading XML with DOM Adding data to an XML document with JDOM Reading and writing XML with StAX Working with JAXB and annotated classes Comparing Simple XML Serialization to JAXB Apply for this course
 
Course image
Lynda.com - Java 8 Essential Training
If you want to build applications for mobile devices, desktop computers, or the web, you need to know Java. This course provides the foundation for learning Java SE (Standard Edition), so you can build your first apps or start exploring the language on your own. Author David Gassner shows how to install Java and the IntelliJ IDEA IDE, and start working with variables, data types, keywords, and other critical language components. He also helps you control program flow with conditional logic and loops, store data with the Java Collections Framework, and understand how Java implements object-oriented coding principles such as inheritance and polymorphism. Topics include: Understanding the history and principles of Java Installing Java, IntelliJ IDEA, and BlueJ Creating a Java project Working with variables, values, and expressions Working with object data types Building, comparing, and parsing strings Debugging and exception handling Creating loops and reusable code Passing arguments by reference or value Using simple and complex arrays Creating custom classes Understanding inheritance and polymorphism Managing files with Java libraries Documenting code with Javadoc Packaging classes in JAR files Apply for this course
 
Course image
Lynda.com - Java Persistence API (JPA): 1 The Basics
The Java Persistence API (JPA) is the standard for mapping Java objects to relational databases. JPA provides several advantages over traditional data access methods like Java Database Connectivity (JDBC). In this practical course, Kesha Williams discusses these advantages and acquaints you with the basics of JPA, entity management, transaction management, and relationship mapping. Upon completing this course, you'll be equipped with a firm understanding of JPA and persisting data in Java enterprise applications. Topics include: What is persistence? JPA configuration and entities Benefits of JPA over pure JDBC Managing entities with the EntityManager API Creating, persisting, reading, updating, and deleting objects Managing transactions Advanced mapping techniques using annotations How to map relationships Apply for this course
 
Course image
Lynda.com - Programming Foundations: Web Security
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and smart strategies for encryption and user authentication. Kevin also covers special considerations when it comes to credit cards, regular expressions, source code managers, and databases. This course is great for developers who want to secure their client's websites, and for anyone else who wants to learn more about web security. Topics include: Why security matters What is a hacker? How to write a security policy Cross-site scripting (XSS) Cross-site request forgery (CSRF) SQL injection Session hijacking and fixation Passwords and encryption Secure credit card payments Apply for this course
 
Course image
Lynda.com - IT Security: Key Policies and Resources
Cybersecurity can be daunting because of its technical complexity and the ever-changing threats that professionals must grapple with. And more than ever, cybersecurity is not just an IT issue, but a core business issue for organizations of all kinds. Just like other business issues—such as finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Apply for this course
 
Course image
Lynda.com - Performing a Technical Security Audit and Assessment
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. Topics include: Developing technical security assessments Conducting technical security reviews Identifying and analyzing targets Validating target vulnerabilities Planning a technical assessment Conducting a technical assessment Implementing remediation and mitigation Apply for this course
 
Course image
Lynda.com - DevOps Foundations: DevSecOps
Security is a major concern in the DevOps world. There is a constant push for companies to move more quickly, and security teams struggle to keep up with testing. This has led to the rise of a new field: DevSecOps. This course introduces the concept of DevSecOps and explains how an organization can build out a DevSecOps program that helps teams integrate security into the application development pipeline. Learn about the role of APIs, containers, and automation, and how a continuous integration and delivery framework can help your organization run security tests as often as developers want. Instructor Tim Chase also introduces some free tools and resources for starting your DevSecOps journey. Apply for this course