Are you responsible for designing, implementing or managing a
Wi-Fi network? Or simply want to understand how Wi-Fi works? In
this course, Using Wireshark to Analyze and Troubleshoot Wi-Fi
Networks, you'll learn how to capture, analyze, and
troubleshoot Wi-Fi networks in Wireshark.
A major consideration most people face when implementing SQL
Server is the cost. Are you buying the right edition for the
features that you need? Are you using the features in standard
edition to their full potential?
Error handling doesn't always get the attention it
deserves. In this course, Java Fundamentals: Exception
Handling, you'll learn exactly how exception handling works in
Java.
Flat, painterly textures have been used as a way around
technical limitations in video games for years, but with some care
and the right techniques they can really take on a unique and
valid look of their own.
Get acquainted with today's cybersecurity reality. In this course familiarize yourself with the current state of cybersecurity. Identify, categorize, and discuss cyber threats, covering the types that would concern a CIO, as well as ones that could endanger any user.
Social engineers—by playing into their target's desire to be helpful and do their job—can trick their victims into casually revealing sensitive internal information. As a result, social engineering is a key concern for all employees of an organization.
People and companies leverage the capabilities of social networking sites to stay connected and share information—but there are risks to this technology. Scams on Facebook are a highly common form of malware distribution, and millions of fake Facebook accounts exist.
Discover how to manipulate the inner workings of WooCommerce to deliver customized WooCommerce stores. In this course, learn how to tailor the functionality of your online store to match your existing business practices by creating a plugin that interacts with WooCommerce.
After you install Windows 10, there's a lot of work to do: configuring device drivers, setting up the user interface, and getting ready to administer the OS in the enterprise. This course prepares you to perform these essential implementation steps.
Protect your Windows OS and prevent hackers from stealing or destroying your data. This course will teach you the weaknesses of the Windows OS, the different ways it can be hacked, and how to secure yourself against these attacks.
Starting to build a spreadsheet from a blank worksheet is less intimidating if you are familiar with functions and how to create formulas in Excel. This course covers creating formulas, managing named ranges and tables, importing, exporting, validating data, and more.
If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
In this final course consisting of new topics in the CCNA training series, you'll examine some services that run on top of a network that is already functioning, and discover ways to improve and manage a network.