Six month Study Plan for all things Cloud technology, including Bash, Networking, Git, Programming, Prompt Engineering, AWS, Azure, GCP, Terraform, Docker and GitHub Actions
This learning path is designed to give you practical, hands-on experience with the Data Build Tool so you can use it confidently for creating data modeling and transforming projects
Webinar covering Artificial Intelligence (AI) and Machine Learning (ML) in networking evaluating the benefits and opportunities, pitfalls, use cases and decision points to use these in context
Tutorial covering how AWS utilises Encryption techniques such as Encryption at Rest, Transit Encryption, Key Management Systems (KMS) and more to achieve security compliance requirements
Workshop showcasing how Lambda works. You will see cold-start, scaling, traffic shift, and some of the common tools to help develop and optimize Lambda functions
This workshop covers the full spectrum of AWS Networking, from the basics of VPC and Subnets to the advanced configurations with Transit Gateway and VPN, including security and monitoring examples
A workshop to leverage relational databases such as Amazon Aurora, non-relational databases such as Amazon DynamoDB and NoSQL databases such as MongoDB
Series of Online Labs following the AWS Well-Architected Framework in AWS-centric areas of Operations, Security, Reliability, Cost Optimisation, Well-Architected Tool and Sustainability
Learn how to optimise Compute resources within Azure, from Azure Virtual Machines to Azure Container Instances (ACI), Azure Kubernetes Service (AKS) and Azure App Service
Apply Azure components such as Regions, AZ, Scale Sets and the Microsoft Cloud Adoption Framework to architect workloads against the Well-Architected Framework
Become an expert in GitOps and DevOps practices such as Branching, Git Structure, Git Workflows, Pull Requests, Git Hooks and tips and tricks to accelerate DevOps culture
Get to grips with the nuances of using DevOps practices for Azure and related tooling such as Azure Repos, GitHub, Azure DevOps, Source Control and Agile
Learn to implement CI/CD using Azure Pipelines, Azure DevOps, GitHub Actions and related concepts around Azure Pipeline Runners, Agents, Pools and concurrency
Explore how identity is the starting point for all security within your company, including Azure Active Directory, Azure AD DS and Azure PAM for privileged access management
Perfect the usage of security tools such as Azure Key Vault, Application Secrets, Privacy Detection, Storage Security and SQL Database Security within the Azure cloud
Learn how to design and implement a secure network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure
Learn how to apply the Microsoft Cloud Adoption Framework to introduce workloads into Azure, touching on Azure Landing Zones, Blockers and becoming Data Driven
GitOps simplifies Application Deployment and Operations using Kubernetes. This workshop covers Application and Infrastructure Deployment, their associated Resources, Amazon EKS Clusters and more
Guide to Active Directory on AWS, setup hybrid solutions including integration with Azure AD and setting up Hybrid DNS, Security and Compliance and best practices for AD on AWS deployments
Learn how to create, manage, secure and scale virtual machine resources including Azure Virtual Machines, Azure Storage, ARM and Bicep techniques for IaC automation
Exploit PowerShell on HTTP Port 5985 to remotely administrate Windows Desktop and Windows Server instances using CIM, WMI and remote access technologies
Bicep (the successor to Azure ARM) is a fundamental declarative syntax to allow for easy and consistent management of Azure Resources for IaC and Automation of your deployments
Utilise Agile Project Management practices such as Kanban, Sprints, Epics, Stories, Dashboarding and Iterations to deliver successful Software and Infrastructure Projects in less time to lower budget
Workshop collection to implement Advanced Design Patterns for DynamoDB using instructions, scripts, data and modelling challenges to understand design decisions and tradeoffs using relational databases
Workshop to educate on the features of Amazon Elastic Kubernetes Service (EKS), including k8s in general, Docker, Containers and related workflows around OCI and orchestration using CNI and CSI
Learn how to create, manage and use Multi-Region Access Points, including failover controls feature, as well as interaction with KMS encryption, bucket policies, and VPC endpoints
A workshop to review how Amazon VPC Network Access Analyzer helps identify network configurations that can lead to unintended network access, including security posture review for flexible operation
Get to grips with the Agile Scrum method - from Roles, Activities, Artefacts, Requirements, User Stories, Sprints, Backlogs, Estimation, Velocity and Scrum Methodology essentials
Explore Azure Database, NoSQL, Azure Cosmos DB, Azure SQL Managed Instance and Big Data Analytics tools to exploit the value of the data within such as Azure Synapse
Learn to architect compute infrastructure solutions to best effect for resource optimisation within Azure cloud using Azure Virtual Machines, Azure Scale Sets and more
Lear about security-oriented resources available in the Azure cloud to harden your infrastructure, such as Azure Application Gateway, Azure Key Vault and Azure Security Dashboard
Perfect the architecture and design of storage solutions within Azure, utilising Azure Storage, Azure Read-Write Replicas, Azure Storage Explorer and data classification tools
Tutorial using the AutoGPT Python application, which uses OpenAI API and Python Virtual Environments (venv) to guide you through the creation of an AI Chatbot for question prompting and knowledge retrieval
Implement optimisations within your CI/CD Pipelines using a combination of Azure DevOps, GitHub Actions and the GitHub API to achieve strong integration for IaC Automation
This course will give you an idea of how many different DevOps practices and technologies work together to create a production NetDevOps solution, including culture, tooling, principles and outcomes achieved such as increased uptime and reliability using the concept of CI/CD Pipelines
Learn the fundamentals of the Azure Platform ready for AZ-900 Exam, including core Azure Services, Identity, Storage, Compute and related Cloud concepts
Perfect your knowledge on Kubernetes (K8s) solutions within Azure for Container orchestration based on Azure Kubernetes Service (AKS), allowing Service Mesh and Sidecar Proxies
Perfect your use of the Azure Kubernetes Service (AKS) for Container orchestration within the Azure cloud, utilising Service Mesh, Microservices, Sidecar Proxies, CNI and CSI
Minimise the need to manage full Azure Virtual Machines by using Azure Static Web Apps to host Static HTML and basic ASP and Python Web Frontend frameworks on Azure cloud
Perfect network administration within Azure VNET and complex Hub and Spoke Network Architectures, including Azure CDN, ExpressRoute, Azure Load Balancer and Azure Virtual WAN
Discover how to advertise IPv4 prefixes to BGP neighbors, with practical configuration tasks and warnings for fully RFC 8212-compliant devices, along with the importance of tight control over advertised prefixes
Many BGP Communities have special meanings attached to them in relation to Transit behaviour, and the concept can be used for a "tag+block" strategy to prevent learning your own prefixes back via differing ASN peerings in this lab
Route Aggregation is criticial when advertising to BGP Neighbours, and care needs to be taken with techniques such as allowas-in and advertising towards the Internet DFZ, which can be explored in this lab
Learn how to configure a single EBGP session, including neighbor description and BGP session logging for troubleshooting, and verification using CLI commands
Learn how to multi-home your connectivity into two upstream providers in different Autonomous Systems, and how to deal with routing relationships and peering transit relationships between them
Learn how to filter advertised Prefixes into your upstream, to prevent routing loops and undesired path behaviour, using Regular Expression and BGP Community logic
Utilise BGP LOCAL_PREF to insure a consistent internal behaviour for learned exit paths from your ASN into upstreams, downstreams and other Transit Networks
Explore techniques to allow your to minimise the size of your BGP Table, especially relevant when connecting to the Internet Default Free Zone (DFZ) or when dealing with older and less capable Routers with low RAM memory size
Utilise Route Filters to prvent Transits from leaking smaller more-specififc Prefixes which might break your overall Route Summarisation routing strategy
Explore the use of MPLS VPNs to redistribute information from a CE runing eBGP to the MPLS IP VPN Provider and OSPF back to the Enterprise Network edge
Learn how to use AS-Path Prepend stuffing to influence outbound routing behaviour and advertised desired return-paths into your ASN to upstream ISPs and peering networks
BGP Weights allow for links to be locally preferred in such a way that doesn't advertise this behaviour downstream to other BGP Network Peers. Learn to exploit this concept in this interactive lab
Learn how to protect BGP sessions using mechanisms such as GTSM and cryptographic protection, along with practical instructions for implementation and verification
Multi Exit Discriminator (MED) is a popular technique to ensure an upstream link becomes Primary over another becoming Backup. Explore how this is used in this short BGP MED lab
Cilium offers native support for BGP, allowing a Kubernetes Cluster to interact with the world outside of Cloud Native, opening up possibilities of interconnection with Physical Routers using techniques such as DNS Anycast
This free, on-demand training course will help you and your team unleash the power of reporting in Jira. You’ll learn about Jira Software Cloud's different types of reports, discover which one is right for you, and explore how teams use them
Mentored course covering all aspects of how to break into Solutions Architecture, including systems, tools, approaches, frameworks, tecnologies and ways of thinking to progress you into the world of Solutions
Learn what agile, kanban, and scrum is, why they are awesome, and how agile works in Jira Software. The Beginner's Guide to Agile in Jira delivers expert tips for building an "agile mindset" so you can manage your tasks efficiently
Introduction to using Dockerfile and YAML to build the definition files for Containers which can then be exported into OCI image format into a Container Registry
Tutorial to build simple Web Frontend Applications using Amazon Elastic Kubernetes Services (EKS) and general k8s practices and considerations for hosting a HTML/CSS Web Application
Webinar covering the business angle of network technology decision-making focussing on impact of IT infrastructure decisions, balance between building and buying and lessons learned from real-life
Workshop to provide in-depth introduction to building CI/CD Pipelines for Amazon ECS, to create a single-stage rolling update pipeline using Modules, GitOps, Templates an Terraform to deploy
Learn about using Cisco ISE, DNAC, SGTs, VNs, AMP and IPS to create microsegmentation within traditional Enterprise Networks, where east-west flows may be able to pervade without any segmentation
Detailed Study Notes for the Certified Ethical Hacker (CEH) v11 Certification, including topics such as Reconnaissance, Scanning, Malware, Hacking, Pentesting, Cryptography, DoS, XSS and Sniffing
BIG TCP is a revolutionary networking technology that is now available with Cilium to provide enhanced network performances for your nodes. In this lab, you will learn how BIG TCP can improve throughput by 40-50% in your network
Learn what Cilium Cluster Mesh is able to do when run as a CNI for a Kubernetes cluster, and the benefits of this architecture when overcoming multi-zone layers and latency issues from other k8s Networking approaches
Cilium Egress Gateway allows you to specify an exit pod to reach the outside world, and acts effectively as SNAT for Kubernetes. Learn how to utilise this feature in conjunction with a Kubernetes Cluster to override the default k8s Network Pod behaviour
Learn about the Gateway API, a new k8s standard on routing traffic within a Kubernetes cluster. This is the next generation of the Ingress API, and addresses some of the limitations of Ingress by allowing for advanced L7 traffic routing capability
Cilium Host Firewall allows for the definition of Network Policies to restrict traffic based on IP Address, Protocol, FQDN or other, by utilising eBPF within Cilium to create cluster-wide Network Policies on Application Containers
Learn how to use Dual Stack to implement IPv6 in co-existence with IPv4 on a Cilium Service Mesh within Kubernetes, and how to use Cilium and Hubble to benefit from their network and observability capabilities
Learn how you can use Cilium to deploy Ingress resources by dynamically configuring the Envoy proxy via the Cilium agent to allow the use of eBPF in these Applications without any Envoy sidecar injection in your pods!
Cilium is able to integrate into Load Balancer IPAM and use BGP Service Address advertisements to simplify IP Address Management on dynamic Containers within k8s clusters. Learn how to simplify your k8s network operations in this lab!
Cilium 1.13 introduced support for LoadBalancer IP Address Management (LB-IPAM) and the ability to allocate IP addresses to Kubernetes Services of the type LoadBalancer. Learn about how to utilise this in a k8s cluster as part of Cilium BGP Service Mesh
Learn how to supplement Cilium with encrypted transit options such as IPsec and WireGuard to secure data transfer between kubernetes Pods, and between Containers running within a Cilium Service Mesh
Introduction to Cisco ACI software-defined Network Fabric for Data Centre product, features, concepts such as APIC and APIs and tips on scaling and deploying in real life
Overview of using the Cisco Continuing Education (CE) scheme to gain Career Professional Development (CPD) points towards recertifying your CCNA, CCNP and CCIE
Overview Course that follows the Cisco DevNet Certification, covering Network Automation technologies and common Software Development techniques and frameworks
Introduction to Cisco Identity Services Engine (ISE) 802.1x NAC engine for Network Access Control, and related integrations with other IdP, MFA, PIM and PAM solutions possible in real life deployments
Overview to using the Cisco Partner Portal (CCO) to access Training Material, Sales Material, Learning Material, Cisco Labs and other benefits of the CACI-Cisco Partnership
Tutorial using Extended Nodes for non-Fabric Aware Cisco Catalyst and IE Switches, and how these can semi-integrate with Cisco DNAC using the technology
Webinar covering the ex-Viptela Cisco SD-WAN solution in detail of fundamentals, advantages and limitations including practical applications, architecture and orchestration
Learn more about Classical Enterprise Network Design, including deep dives into oversubscription, Packet Capturing, STP Topology, HSRP Topology, Failure Domains and more
Learn about Classical Enterprise Network Design, including L2 and L3 Topology, STP, HSRP, VTP, OSPF, Topology Failover, Path Optimisation, HSRP Active Node and more
The Cloud Financial Framework is built to create a structured plan for Cost Optimisation activities, including AWS Budget, Cost Monitoring, AWS Cost Anomaly Detection and AWS Trusted Advisor suggestions
Cloud Native online learning labs in areas such as Containers, Linux, Kubernetes, Sandboxes, DevOps and Cloud Engineering in a Udemy-style Online Learning format
Hands-on workshop to deep dive into operating Cloud and On-pRemises Environments, going through a pick your own challenge with focus on Managing and Automating Infrastructure, Governance and Compliance
Deploy common Linux server functions on Azure virtual machines including a SQL Server, Web Application Server using the MEAN stack and Database Migration with Azure Automanage
Computer Networking introduction course covering common topics of Data Centre, Service Provider, Cloud, Industrial Networks (IoT/IIoT) and associated fields
In this free Skillbuilder course, learn a step-by-step approach to meeting business requirements, and designing, configuring and testing your permissions in Confluence. Learn a general framework for troubleshooting in Confluence
Built for new Confluence users, this collection of self-paced courses will help you get up and running in Confluence in just 90 minutes. Complete all three courses and pass a 30-question assessment to earn your Confluence Fundamentals badge
Overview of Container Images in reference to Container Image Registries, and how the Open Container Initiative (OCI) format specifies the equivalent of an OVA/VMDK for Docker containers
Walkthrough of the state of a Container as it moves from instantiation by the Containerfile, through download from the Container Image Registry, to Run, Pause, Stop and finally Deletion
Introduction that summarises the use of Network Interfaces for Network interconnect for Containers and Docker instances that are orchestrated by Kubernetes
Tutorial summarising how Storage Networking for Block and Object Storage works for Containers and Docker instances that are orchestrated by Kubernetes, including Persistent Volumes
Overview of a Container instance (such as Docker or rkt), including their creation and touching on OCI, Container Image Registries, Process Namespace in contrast to Virtual Machines
Learn best practices for cost and sustainability optimisation and how to shift costs and sustainability into the Cloud Centre of Excellence (CCoE) to provide automation in these tasks
This course poses the use of the Palo Alto Networks Cortex XSOAR solution to automate Incident Response workflows across SecOps, NetSecOps, CloudSecOps and related SOC areas
This free Skillbuilder course covers configuration techniques, best practices, and common pitfalls for every type of workflow transition, along with advanced examples, troubleshooting, and testing advice. It also covers Jira Service Management approvals and automation
Learning Path taking seasoned Network Engineers through focussed aspects of NetDevOps - including NETCONF, RESTONF, gNMI, YANG - as well as Scripting Security topics using Ansible and Python to build Network Automation mastery
Webinar covering as a comprehensive guide to Dynamic Multipoint VPN (DMVPN) technology, covering detailed router configurations and scalable network designs when implementing and optimising DMVPN deployments
Learning around DNS (Domain Name System) and related activities such as RIPE, WHOIS, TTL, DNS Propagation, DNSSEC, DoH, Domain Names and Registrars/NICs
Webinar covering networking requirements of approaches to Data Centre fabric networks, including in-depth analysis of fabric architectures, scalability and ease-of-use
Webinar covering DCI technologies such as VPLS, OTV and MPLS/VPN, used to build Active-Active and Active-Passive Data Centre architectures with Layer 2 and Layer 3
Data Encoding formats are a foundational programming topic, essential for Network Automation and NetDevOps applications. This course will delve into formats such as XML (eXtensible Markup Language), JSON (JavaScript Object Notation) and YAML which are commonly used in APIs
Get to grips with the fundamentals of security within Cloud environments including an overview of Malware, Indicators of Compromise (IoC), Cryptography, AAA and RBAC
Webinar delving into the complexities of building resilient Data Centre infrastructure, covering DR, Active-Active and related points like RTO, RPO, MTTR and challenges in App Migration
Webinar describing the infrastructure requirements of small- and medium-sized private clouds and presents an architectural blueprint for private cloud design
This tutorial contains a full, real-world solution for setting up an environment that is using DevOps technologies and practices for deploying apps and cloud infrastructure onto AWS
Fundamentals course covering Docker, the world of Containers, OCI and related concepts of Containerisation, Dockerfile, Container Orchestration, Side Cards and a nod towards how multiple Docker Container instances can be orchestrated via Docker Swarm or Kubernetes
In this workshop you learn about the fundamentals of EC2 Spot Instances and recommended tools to launch Spot Instances, test for resiliency, and view pricing history
This workshop builds a shared platform as a Kubernetes multi-tenant, to allow for GitOps practices such as ArgoCD, Rollouts, GitOps and related practices using Terraform IaC to create a k8s deployment
Webinar covering Ethernet VPN (EVPN) technology including basic bridging, MAC mobility, proxy ARP, integrated routing and bridging and interoperability with VXLAN
Learn how to configure Jira email to optimize your teams' experiences. This Skillbuilder course explains the key components of Jira's outgoing and incoming mail system, describes how to configure and use the features to better administer Jira using best practices
This workshop is the accumulate experience gained working with different kinds of customers, we try to convey the best practices of cloud native journey on AWS
Webinar covering foundations of IPv6 in typical deployment scenarios, security implications of adopting IPv6, as well as initial steps required to deploy it and transitioning from IPv4 to IPv6
Webinar on MPLSVPN technology such as Layer 3 virtualisation, Virtual Routing and Forwarding (VRF) and principles of MPLS to provide network efficiency and scalability
Understand the fundamentals of Enterprise Resource Planning (ERP) and Customer Relation Management (CRM) systems in managing business process and product lifecycle within an Enterprise
In this free webinar, we'll learn about how estimation and scope change impacts reporting in Jira Scrum boards. This webinar is intended for scrum teams, power users and project administrators, and those preparing for a Jira certification exam
Webinar diving into the mechanisms and benefits of encryption Ethernet traffic, including implementation issues, standards and protocols involved and principles of cryptography
In this free Atlassian Skillbuilder course, you’ll learn how to delegate key Jira admin tasks at the project level, how to customise a project’s workflows, fields, and screens, and how to apply best practices and troubleshoot configurations
Zone-based Firewalling (ZBFW) in conjunction with EAP is a strong way to govern Remote Access, but has complexity in configuration with Cisco ISE and RADIUS policies explored here
Learn to use the FortiADC for Layer 4 and Layer 7server load balancing, link load balancing, global load balancing, high availability (HA), firewall policies, advanced routing, global load balancing and related DNS load sharing
In this course, you will learn how to deploy, configure, and secure FortiAnalyzer - including logging fundamentals, RAID and HA, Device Management, FortiAnalyzer Fabric, ADOMs and Fortinet Security Fabric
Learn to use FortiAuthenticator for access and identity management, including deployment, certificate and PKI management, FSSO and CA principles, SAML and 802.1x integration, 2FA/MFA and FIDO2 authentication
In this course, you will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service attacks while preserving service and network performance
Learn how to use FortiEDR to protect your endpoints against advanced attacks, including Security Policies, Playbooks, Communication Control, Alerting, Threat Hunting and API usage
Learn how to use FortiSEM to enrich syslog analytics data and provide comprehensive SIEM capability, including PAM, Agent usage, CMDB integration, Report Filtering and Dashboards and Rules for MITRE ATT&CK usage
Learn how to use the most common FortiGate networking and infrastructure features, including those applied in Enterprise - such as advanced routing, redundant infrastructure, virtual domains (VDOMs), zero trust network access (ZTNA), SSL VPN, IPsec VPN and single sign-on (SSO)
In this course, you will learn how to use the most common FortiGate features, including security profiles. This course will cover ACLs, NAT, Authentication, Logging, Monitoring, Web Filtering, Access Control, Antivirus, IPS and DoS
In this course, you will learn the fundamentals of using FortiManager for centralised administration of many FortiGate devices - including use of the ADOM, Diagnostics and Monitoring and Policy creation
In this course, you will learn about FortiMonitor architecture, including Onboarding, DEM, Automated Onboarding and the differing agents for Linux and Windows available to gain infrastructure observability
Learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. This also covers Network Visibility, Rogue Identification, State-Based Control, Security Policies and Guest Management
In this course, you will learn how to use FortiProxy features, including policy types, content analysis, and security profiles. You will also explore FortiProxy policies, deployment, user authentication, high availability, monitoring, antivirus, logging and IPS
Learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment - including Device Management, System Configuration, High Availability, War Rooms and System Monitoring
Learn how to use sandbox technologies to contain and detect against Advanced Persistent Threats (APT) and other malware attempts from Email, Web, End User and Third Party binary executable-based threats
Learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This also covers common FortiSwitch stack topologies, including multichassis link aggregation group (MCLAG) for redundancy and higher performance
Fortinet Partner Learning Program to gain cybersecurity knowledge required to undertake Fortinet NSE Certifications for Fortinet Firewall and Security product management
Overview to using the Fortinet Partner Portal to access Training Material, Quizzes, Learning Material, Fortinet Labs and other benefits of the CACI-Fortinet Partnership
This course will familiarise you with all Fortinet products and solutions, covering Security Fabric, Security-Driven Networking, Zero Trust Access, Adaptive Cloud Security and Security Operations
This course focusses on using SageMaker Quickstart to fine-tune Generative AI Models such as Stable Diffusion to create new content and maximise open source models within SageMaker
Get up and running in Jira. No experience necessary. Designed for new users, this self-paced course is all about the basics. You’ll learn key concepts like issues, projects, and boards. Learn how to start organising and managing your work
In just 30 minutes, you'll understand key Jira Work Management terms and start using features to collaborate and manage projects for your team. Learn foundational concepts like issues, projects, and boards
Learn to use an Agile process and manage this with the Boards, Wiki, Backlogs, Sprints, Version Control and other functonality offered by the Azure DevOps suite
Deploy a private 5G Mobile Network using Azure Private 5G Core, including multi-access edge, RAN, MA and MSA architectures for Private and Enterprise 5G Telco
Get up and running in Confluence. No experience necessary. Designed for new users, this self-paced course is all about the basics. You’ll learn key concepts like spaces and pages. Learn how to create content and find the resources
Refine your usage of Windows PowerShell (PS1) to adminstrate common Windows Server elements such as DHCP, DNS, Windows Client, Windows Desktop and batch operations
Builder session to address Threat Detection and Remediation using Amazon GuardDuty as a managed Threat Detection Service, to mitigate Threat Vectors and fix based on Indicators of Compromise (IoC)
Earn an on-chain certificate of your AI knowledge while making you conversant on the origins of AI, what terms like "machine learning" and "natural language processing" actually mean, and the implications of the literally world-changing innovation that is ChatGPT
Tutorial using a fully fledged Cilium installation on a small cluster, together with a few challenges to solve to learn the workings of eBPF, Docker, Linux Kernel, Cilium and Service Mesh first hand
Tutorial to create a simple serverless Web Application that implements a ToDo App with an API to store and retrieve tasks in a Cloud Database, including integration with Machine Learning (ML)
Tetragon is an open source Security Observability and Runtime Enforcement tool and integrates into a Cilium Service Mesh to give real-world insight into this attack scenario, teaching you how to detect Container escape step-by-step
Get used to Amazon OpenSearch (ElasticSearch) Serverless, including setting up a new Amazon OpenSearch Serverless domain in the AWS Console and how to secure this domain and documents
eBPF is the new standard to program Linux kernel capabilities in a safe and efficient manner without requiring to change kernel source code or loading kernel modules. Cilium uses eBPF as the low-level filter to detect protocols, processes, packets and frames so learn how it works in this tutorial
Learn how to use Hubble Layer 7 Visibility functionality to export metrics into Grafana and Prometheus to use these dashboards for key insights into your Container Application workloads
Prepare for a career in Security by learning Cybersecurity Foundations, Managing Security Risks, Network Security, Linux and SQL, Alarm Detection and Response, SIEM, SOAR, XDR and Basic Cybersecurity Automation using Python
Learn about H-VPLS in Service Provider (SP) Networks and how loop-avoidance is enacted using split-horizon between the forming U-PEs and N-PEs of the VPLS ring
Overview of Helm Charts as a package manage for Kubernetes to install, update and maintain Kubernetes Packages and Operators to maintain Deployment, Pods, Services and Persistent Volumes
Webinar diving into the fundamental principles and technologies that underpin modern networking, including concepts such as network layers, addressing, routing, and switching
A workshop to learn how and when to use IAM policy types in a hands-on Lab, going through a typical customer journey to configure permissions for a sample application, including Identity, CI/CD and IdP
Live stream encoding breaks a live video into smaller chunks, compresses them, and distributes the video data via a CDN. Updates to this process are making live streaming faster
The Internet is a network of networks. It works by using a technique called packet switching, and by relying on standardized networking protocols that all computers can interpret
How a website performs on mobile is crucial both for user experience and for search engine rankings. Several strategies can be combined to ensure quick page load speeds on mobile devices
Learn about various approaches of designing an IP addressing plan for an Enterprise network. We talk segmentation in general, because IP addressing and segmentation are dependent on each other, IPAM, NSoT, VNs, SD-LAN, SD-WAN, Link Local and more
Detailed tutorial on IPv4 NAT (sometimes called NAT44) covering all aspects of SNAT, DNAT, inside, outside, PAT, CGNAT, port exhaustion, 1:1, 1:many, NAT Cone, Twice NAT and Double NAT
Webinar with in-depth look at mechanisms and design guidelines for ensuring high availability in IPv6 networks, including first-hop technologies, client and server multihoming like LISP and MIPv6 and dual-stack approaches
Webinar exploring IPv6 microsegmentation in large-scale production environments, covering a range of scenarios, including PPPoE and Carrier Ethernet networks, WiFi and campus networks, data centers and virtualised environments
Webinar covering security challenges associated with IPv6 deployments including a range of threats like Layer 2 attacks, Denial of Service (DoS), eavesdropping, session hijacking and Cisco IOS countermeasures
Introduction to ISC2 Cybersecurity certification and ecosystem, including CISSP, CISSM and other exams relating to Network and Cybersecurity practices, tools and techniques
Learn about the application of ISO/IEC 20000 for Information Technology Service Management fundamentals, including ISO 20000:2018, ISO 20000-1, the Service Management System and implementing ISO standards
Get to grips with ISO 27001 for Information Security Management Systems (ISMS), including the application of ISO 27001:2013, use of Information Security Controls and business case for ISMS
Learn about the ITIL Framework version 4 for IT Service Management (ITSM), including the Service Value System, four dimensions and six factors of the ITIL Framework and the ITIL Service Value Chain
Utilise Azure Virtual Desktop for clientless compute within Azure, including Guest and Pool Management, Remote Desktop and RDSH Services and Application Gateways
In this course, you will be introduced to the various methods and protocols that are used in model-driven telemetry and how protocols like NETCONF and gNMI are used to interact with real-time data. A lab is included for hands-on with model-driven telemetry on Cisco IOS XE
An overview of Content Delivery Network (CDN) in general, and how they provide regionalisation and reliability to globally-distributed, Internet-facing Web Applications to improve performance
Everyone can benefit from ChatGPT AI, whether Engineer or not, using it for Emails, Summaries, Brainstorming, Code Snippets, Documentation, Fixing Bugs and even for Git commands you often forget
Tutorial using ChatGPT Artificial Intelligence to improve your Coding skills, covering how to Prompt with general programming questions, using GPT for Code Generation, Code Completion and Code Documentation and atGPT API
Understand how to implement Data Protection strategies such as GDPR for Database Management and Data Protection, and legal responsibilities around Information Governance
Learn about Information Systems Risk, including Security Control Policies, Risk Response, Risk Monitoring, Risk Governance, Infosystems Control Design and implementation of Risk Registers
Workshop to gain familiarity with AWS Security Services such as AWS Systems Manager, Session Manager, EC2 Instance Connect, Identity and Access Management and related DevOps and Infrastructure Tooling
Introduction to ChatGPT AI tool for business professionals to stay ahead. Learn how to harness ChatGPT to automate idea generation, write drafts, clean data and more!
Ready for the next step up from quick search and basic search? This free self-paced course from Atlassian University will get you started with the most flexible and powerful way to search in Jira Software
Application Programming Interfaces (APIs) provide a consistent, programmatic, reliable way to interact with the Network in a DevOps-aligned manner. This course introduces the basics of APIs, including related libraries such as Python Requests and HTTP Status Codes
Webinar series covering foundational public Cloud services, such as deployment models, management layers and shared responsibility model as well as DevOps concepts
Learn core practices, terminology, and challenges around ITSM, plus how to asses the IT maturity of your organization. This course is designed for anyone, from any team, interested learning more about ITSM and the Atlassian ITSM solution
Linux is everywhere in the Networking World - from Cisco IOS-XR to F5 TMSH to Palo Alto Panorama, it's really just Linux under the hood. This Course takes you through Linux 101-style Basics, including the Bash Shell, useful CLI Commands and Linux File System Management
This course will introduce you to DevOps principles, processes, applicability, and tools for Network Engineers to improve to meet the demands expected of modern networks. It focusses on the NetDevOps Pipeline, Model-driven Programmability and DevOps Tools used
Webinar covering foundational understanding of SDN concepts and technologies, explaining centralised control planes, software-based packet forwarding, whitebox switching and network programmability
Fundamentals of Project Management frameworks such as Agile, Scrum and Waterfall, for Software Projects and the unique activities required in the Software Development Lifecycle (SDLC) to deliver successful IT Infrastructure Projects
Webinar to introduce technologies that form the backbone of SDDCs, including software-defined storage, network connectivity and network services such as VMware NSX and VSAN
A big part of DevOps culture is the emphasis on collaboration, using Version Control Systems (VCS) such as Git, GitHub and GitLab. This course will introduce Git and related workflow such as commit, push, pull, pull request and branching
You never need to use Vim (also called "vi")... until you suddenly do. While there are other Linux Text Editors, Vim is often installed by default on every Linux machine, making it an editor of last resort
Introduction to AWS Web Application Firewall (WAF) and concerns around L4 and L7 Firewalling using WAFs and some if the attacks such as cross-site scripting CSS/XSS injection they can help to mitigate
Learn about the Cilium Service Mesh and how it's eBPF-based Distributed Backplane allows multi-networking using Kubernetes Pods that are distributed between differing Cloud or Hybrid Underlays
Hubble compliments Isovalent Enterprise by adding observability features into Cilium Service Mesh, such as DNS-aware, label-aware, API-aware and other data as visualised through Hubble Timescape
Cilium Hubble and Cilium Network Policy can provide zero-trust security to a k8s Cluster of Pods, allowing for Enterprise-class control on hosted Application Container workloads. Learn how to use this in a hands-on demo lab
Learn how an attacker might intercept a NodeJS application by spawning a reverse shell inside a Container and moving laterally within a k8s environment, and how to detect this via Process and Network Event logs
Isovalent Enterprise for Cilium is able to provide visibility into TLS traffic, useful for Security Audits and other compliance needs. Learn how to use this within a short lab
Creating the right Network Policies can be difficult. In this lab, you will use Hubble metrics to build a Network Policy Verdict dashboard in Grafana showing which flows need to be allowed in your policy approach
This free Skillbuilder course will demnostrate how to finely control access at the issue level in Jira. Learn the most common use cases for issue security in Jira, and how to meet business requirements with step-by-step configuration examples
In JQL for Admins, you'll review the basics of JQL (Jira Query Language), learn JQL syntax including operators, functions, and keywords to execute these advanced searches. You’ll level up when you learn the usage of relative and calendar functions
Free Skillbuilder course to learn about JQL operators, functions, and keywords. You'll apply complex JQL queries specifically to Jira Service Management including SLA status and time. Explore typical use cases and troubleshooting scenarios
Save time with Jira automation. Dive deep into configuring complex automation rules, understand the caveats of rule scope and permissions, and become familiar with global administration to view rule usage and performance
Learn how to get the most out of Jira in this on-demand course. Discover expert tips and strategies to optimise your Jira experience. Advance your skills and become the Jira champion on your team
Built for new Jira users, this collection of self-paced courses will help you get up and running in Jira in just 90 minutes. Complete all three courses and pass a 30-question assessment to earn your Jira Fundamentals badge
Learn the best ways to set up and to keep Jira instances healthy for the long haul. Get to know best practices, pitfalls, limitations, and tradeoffs as you explore Jira administration at a high level understand the balance between customisation
Designed for new agents, this self-paced learning path gets you up and running in Jira Service Management. Learn key concepts like issues, queues, and service projects. And, discover how to manage and organise your work in Jira Service Management
Spend too much time answering repetitive questions? Take this free Atlassian University Skillbuilder course to set up a ticket-deflecting knowledge base connected to Jira Service Management (Cloud). Empower your customers and team to self-serve
Kubernetes does not natively support gRPC Load Balancing out of the box. Learn how to use Cilium's embedded Envoy proxy to achieve load-balancing for L7 services, with a simple annotation
Get a practical introduction to using Cilium as the networking plug-in for Kubernetes, including installation, observability with Hubble, securing network
Learn how Network Functions Virtualisation (NFV) is moving the industry from fixed-function, proprietary devices to flexible, software-driven environments
Gain a solid foundation on self-sovereign identity (SSI) with a 360 degree overview of its evolutionary journey, key concepts, standards, technological
LDP is the backbone functionality of any MPLS Service Provider Network, providing an encapsulation for various L2 Protocols to work, not just Ethernet. Learn how LDP is configured and works in this tutorial
In this workshop you learn about the fundamentals of EC2 Spot Instances and recommended tools to launch Spot Instances, test for resiliency, and view pricing history
Webinar covering leaf-and-spine (Clos fabric) designs, including large, all-point-equidistant Data Centre networks spanning Layer 2, Layer 3 and multi-stage designs for efficient DC network architecture
Learn the differences in the Cloud Platform Providers, from Azure, through aWS to GCP and OCI, and how they are often same but different, and related constructs that approximate on-premises Data Centres in more abstracted ways
Security is the biggest challenge to Cloud computing. Learn how DevOps can compliment Security, common techniques, protocols, tools and ways of codifying this via CI/CD, Pipelines, shift-left and more
DevOps is all about getting your solutions to run efficiently from development to updates. Learn how to use DevOps Engineering practices in conjunction with Public Cloud to deploy an Application or Architecture
Cloud is a bunch of Linux Servers networked together. Learning the fundamentals of how networking works, and how to interact with these servers via commands
Use code to automate tasks, deploy infrastructure and work with services. Learn how to work with APIs and apply software version control to your code, and accelerate code development with AI
Learn how to write your first eBPF Hello World program and dive into all the key concepts and tools of eBPF such as eBPF maps, bytecode, bpftool, xdp and the eBPF verifier
An MPLS VPN (L3VPN or IP-VPN) is not the same as VRF Lite. Learn the differences between them, and how BGP RT, RD and LDP interact to propagate an MPLS L3VPN across the Service Provider core
Fine-tune your team’s work in Jira with either kanban and scrum boards. Learn how to pick the right board type for your team, and then customize it to fit your specific requirements. This course is designed for Jira project administrators
In this webinar, you'll learn about the two types of agile boards in Jira Software, so you can determine the right board type for your team and then customize it to fit your specific requirements
How to use Infrastructure as Code tools to manage infrastructure in a declarative way, including GitOps to iterate and modify declarations, including predictability, repeatability and safety controls
Learn a systematic approach to permissions in Jira Data Center with real-world business requirements and appropriate Jira permission design. This course will teach you to configure global and project permissions and troubleshoot permission-related problems
Permissions are a vital part of Jira administration and something anyone who is involved in administrating a Jira site must understand. In this webinar, we provide an overview of the new Managing Permissions in Jira Cloud
This course provides an an overview of managing the Jira user lifecycle and a review of the key concepts and configuration areas. Through exploration of real-world use cases, you'll learn a step-by-step approach to meeting business requirements, including design
Meltdown and Spectre are new processor vulnerabilities that affect most PCs and smartphones. There are patches available, but they affect processor performance
Explore the fundamentals of Azure Big Data solutions such as Azure Synapse and Azure Data Factory and related concepts around Data ETL and Data Warehousing
Online Learning Labs, Videos and content relating to the Microsoft Dataverse - including Azure, PowerApps, Power BI, Dynamics, 365, .NET, Windows Server and other Microsoft-centric technologies and products.
Learn how to migrate from another Container Network Interface (CNI) - such as Istio, Calico or Flannel - to the Cilium Service Mesh, without disrupting existing traffic or requiring a complete cluster outage
Learn to utilise Azure Synapse for Big Data and Data Science applications utilising data stored in a Data Warehouse such as Azure Data Factory or Azure Databricks
Learn how to use TLS Mutual Authentication in conjunction with Cilium Service Mesh to provide communication in transit encryption via TLS handshakes by modifying Cilium Network Policy YAML files
NETCONF and RESTCONF are the new kids on the block when it comes to replacing the Network Programmability and Network Telemetry offered by legacy protocols such as SNMP, Syslog, SSH, Telnet and CLI. In this course your learn how these protocols work and interface with Network Devices
Opinionated roadmap (infographic) of NetEng Tools, Vendors, Technologies and Frameworks worth learning to go down the path of all things NetEng and Network Engineering at Scale
Webinar that introduces the fundamental concepts of network automation, explaining what it is, why it is beneficial, and the tools available to get started
pyATS is a Framework of Python Libraries allowing for Network Testing and "What If?" scenario planning, using Python and the Cisco EXPRESSO dashboard to manage Network Configuration state and changes as orchestrated via NetDevOps practices
Webinar with detailed exploration of various open-source tools used in network automation, such as Ansible, Git, Vagrant, NetBox, pmacct and the ELK stack
Webinar covering real-life scenarios where Network Automation has been successfully implemented, including abstracted network state, automated IPv6 deployments, and automated data center fabric deployments
Ansible has found relevance and has been adopted by many Network Engineering teams for Network Automation, building upon its Python underpinning. This course will introduce you to Ansible basics, including Inventory Files, Variables and Playbooks biased to Cisco IOS devices
Getting started with the world of NetDevOps Coding with practical tips and tricks around Coding Languages, Data Structures, Version Control, Text Transformation, RegEx, Git and Python
Webinar covering fundamental concepts of graph theory and its applications in network design, with topics such as graph connectivity, spanning trees, and network reliability
Introduction to the use of Network Functions such as DHCP and DNS Servers within a Telco, and hosting options around Virtualised Network Functions (VNFs) and Cloud-native Network Functions (CNFs)
Webinar to introduce you to start your journey with Network Programmability, with programming skills and where to begin learning to automate SDN and more
Journey into Network Programmability with this expert-led video course covering Network Programming, APIs, REST, Data Formats, DNA Center, ACI Fabric, Application Hosting and NetDevOps
Network Technology Fundamentals course, covering a wide range of topics from OSI 7-Layer Model, through Encryption, DDoS, DNS, Containers, Backups and DR. Everything an aspiring Network Engineer needs to full understand the ever-changing world of Network Technology
Short video seriesfocussing on common Network Security and Cybersecurity concepts, technologies and techniques - including Canary Tokens, ATT&CK, SASE, Kill Chain and AI
Webinar covering theoretical and practical aspects of network buffering including buffer sizing, complexities of buffering in modern networks, buffer bloat and TCAM considerations
The Palo Alto Networks Next-Generation Firewall course covers essential features of PA Firewalls such as Deployment, Tuning, AIOps for NGFW, Feature-sets and Labs
Keep your customers informed and communicate better with your team using notifications in Jira Service Management. Take this free Atlassian University Skillbuilder course to help your team and customers stay aware of important events, updates, and announcements
Get to grips with the basics of the Microsoft Office365 (O365) Collaboration Suite, including Outlook for email, OneDrive for files, Delve, Video, SharePoint, Teams and integrations possible
Webinar deep dive on the OpenFlow protocol including protocol specific, real-life deployment, data and control plane seperation and progammable network concepts
Webinar on available VPN technologies from MPLS-based services provided by service providers (such as Layer-3 MPLS/VPN, point-to-point links, and VPLS) to VPN services that can be built on top of generic IP infrastructure (including GRE, IPsec, DMVPN, GETVPN, and SSL VPN)
Learn how Oracle eBusiness Suite (eBus) acts as an Enterprise Resource Planning (ERP) tool, and integrates with Oracle Modules for ERP, HRP, CRM and how the SOA architecture in eBusiness works
Cisco Network Services Orchestrator (NSO) is a purpose-built unifying orchestration platform for Cisco and third-party network devices, services, and applications. This course will introduce the basics of NSO, including its architecture and functions, and APIs
Webinar providing in-depth exploration of overlay virtual networks, which are essential for IaaS cloud and virtualisation computing, including packet walks and distributed L3 forwarding
PAN-OS is the Operating System for the Palo Alto Networks Firewall, which enables ACLs, NAT, IDP, SSL/TLS Decryption and security on the PA Firewalls and is used for Troubleshooting
Webinar covering Path Computation Element Communication Protocol (PCEP) and BGP Link-State (BGP-LS) including ow BGP-LS conveys topology and Traffic Engineering (TE) link-state information to the controller, and how PCEP is used for reporting LSP status
Webinar providing a detailed exploration of the Payment Card Industry Data Security Standard (PCI DSS) from an engineering perspective, including the six domains and twelve requirements of PCI-DSS
Understand the process-based methodology of PRINCE2 for effective Project Management, through exploring the techniques, themes, principles and applications of this Project Management Framework
Panorama is the centralised Firewall Management Platform used by PAN-OS and this course covers initial configuration, adding Firewalls, Firewall Groups, Administration and Troubleshooting
Webinar introducing the basics of PowerShell and it applications in Network Automation, including essential concepts, commands, use for pushing device config, REST API calls and more
Learn to utilise Primavera P6 Project Management Tool to create plans, schedules and organise your Projects, including Scheduling, Resource Management, Activity Codes and P6 tips and tricks
Prisma SD-WAN creates what Palo Alto Networks refer as the AppFabric, enabling the thin-branch by using CloudBlades platform for DevOps-style automation, BGP Routing and Alerting
Explore Project Management in practice from Living Order through Planning, Geometric Order, Push and Pull Planning, Demand Forecasting, Contingency Plans, Resource Allocation and Sustainability
Microsoft's beginners guide to all things Coding with Python, including VSCode as an IDE, Jupyter notebooks and Python Data Structures such as Dict, Tuple and List
Learn RegEx inside-out with this 16-part Tutorial, covering everything from Escape Characters, Match Groups, Nested Groups, Conditionals, Parsing, Trimming and Lab Exercises to complete
AWS Batch for Amazon Elastic Kubernetes Service (EKS) provides a fully-managed service to run batch compute. This workshop explores the use of Batch and running Batch Workloads via an EKS Cluster
Utilise Microsoft Cloud technologies such as Microsoft Defender, Microsoft Sentinel and Azure Active Directory to implement a Zero Trust strategy for application access
SCTP (Stream Control Transmission Protocol) is a transport-layer protocol used for communication between applications. Similar to TCP, but it provides additional feature- learn how this is used by Mobile Operators and MVNOs
Introduction to Software Defined WAN network approaches and products, including OMP, Tunneling, SLA-based Routing, contrasts with MPLS IP VPN approaches, overlay and underlay routing approaches with LISP and SSL-based Tunnels
Webinar covering data center fabrics, network monitoring, traffic tapping, scale-out network services, and DDoS mitigation, service insertion, forwarding optimisation and traffic engineering with SDN
This free Atlassian Skillbuilder course begins with an overview of Service Level Agreements (SLAs)—what they are and why they’re used. The course then advances to teach you how to create, configure and use both out-of-box SLAs and custom ones for specific use
Learn SQL inside-out with this 18-part Tutorial, covering everything from Select, Inner and Outer Joins, CRUD operations, Queries with Aggregates, Multi-table Queries and Lab Exercises to complete
Explore the role of the Scrum Master in Agile Project Management, including the role, responsibilities, concepts of Scrum Practices and Processes and become a Certified Scrum Master
Exploit the three pillars of Scrum to best effect in undertaking an Agile approach to Project Management to reduce the cause of Project Delay and ensure Scrum Focus is optimised
Seamless MPLS is a way to scale very large Networks, often seen in the Telco and Service Provider Space, and uses BGP as a label transport mechanism via BGP-LU rather than BGP-IPv4
Learn how to use Private S3 Endpoints via AWS PrivateLink to allow private access to S3 Storage Buckets from both Private VPCs and on-premises via AWS DirectConnect, covering detail of AWS PrivateLink
A hands-on look at best practice techniques to optimise Serverless workloads with a mind to FinOps practices around cost and performance optimisation for API Gateway, DynamoDB, Step Functions and AWS SAM
Webinar offering a detailed examination of SD-WAN technology focussing on design components, management, control, data and failover mechanisms used in SD-WAN solutions
ByteByteGo course covering Systems Design all the way from REST API, through HTTP, CI/CD concepts, Database, Cache, Architecture Patterns, Payment Systems, Linux, Git, DevOps, OAuth and real-world system design
Webinar covering TCP and HTTP web application transport and application layer protocols, including how to exploit them for web applications, SPDY, QUIC, HTTP/2 and other web enhancements
Carefully curated Technical Engineering questions asked at interviews seen by many experienced Engineers to use as a learning compass towards interview experience
Optimise your use of AI and Machine Learning (ML) using the TensorFlow deep learning toolset in conjunction with Jupyter Notebooks and other Data Sciences techniques
Learn how to use Terraform to deploy preconfigured Nginx Web Server Virtual Machines using Azure VNETs into Azure Cloud, including concepts such as Resource Tagging, Cloud-init, Git and Azure CLI
Workshop to deploy Amazon Elastic Kubernetes Service using Terraform, implementing features such as customised managed node groups, advanced networking, and a sample load balanced application via Terraform
Workshop to teach the primary features of AWS Step Functions which covers Task Orchestration, Choice and Parallel State, AWS SDK, Amazon API Gateway integration, Error Handling and IO Data Processing
Webinar to provide a foundational understanding of the principles and mechanisms used to secure network and transport infrastructures, such as cryptographic protocols, encryption keys, key exchange mechanisms, and network encryption options
The TIC 3.0 Architecture Lab will help you learn Platfors, Hosting, Security and Tools to build a Trusted Internet Gateway capable of providing Governement Clients secured Internet Access
This course will teach the fundamentals of YANG structures and the various elements used in the YANG modules. You will also learn about the multiple tools used for YANG development, which will also help you become better acquainted with YANG and Data Modelling in general
Understand the asics of IPv6 networking and what it takes to build a simple IPv6-capable web server on AWS, including load balancing and DNS and migration activities to move from IPv4 to IPv6 within AWS
Need a frontend website for a Project but have no knowledge of HTML, CSS, jQuery or other Frontend? Let ChatGPT do the heavy lifting for you - from creating the About page, to coding the Landing Page and beyond
This free Skillbuilder course covers useful techniques to surface relevant documentation and standardise your Confluence content using templates and blueprints. Llearn how to set up a knowledge-base in Confluence for self-service customer support in Jira Service Management
Python is a popular general purpose programming language with a rich ecosystem of Libraries, Frameworks and Modules within the Network Automation and NetDevOps space. This courses focusses on Python for Network Engineering usage, including PIP and Netmiko
Detailed view into VMware Cloud on AWS including Virtual Machines, Migrations with VMware Hybrid Cloud Extension (HCX) and native AWS Service intergation
Webinar covering foundational understanding of VMware NSX, focusing on the principles of overlay virtual networking, including the core principles of NSX operation
An HTTP cookie stores information in a user's web browser. Web servers generate cookies and send them to browsers, which then include the cookies in future HTTP requests
Embeddings represent real-world objects, like words, images, or videos, in a form that computers can process. Embeddings enable similarity searches and are foundational for AI
HTTP live streaming (HLS) is a widely used video streaming protocol that can run on almost any server and is supported by most devices. HLS allows client devices to seamlessly adapt to changing network conditions by raising or lowering the quality of the stream
A next-generation firewall (NGFW) is a firewall with advanced features, while firewall-as-a-service (FWaaS) is a cloud-delivered firewall for protecting networks and cloud infrastructure
Network-as-a-service (NaaS) is a cloud service model in which customers rent networking services from a cloud vendor instead of setting up their own network infrastructure
Secure Sockets Layer (SSL) is a security protocol that provides privacy, authentication, and integrity to Internet communications. SSL eventually evolved into Transport Layer Security (TLS)
TLS is a security protocol that provides privacy and data integrity for Internet communications. Implementing TLS is a standard practice for building secure web apps
Botnet attacks are responsible for the largest DDoS attacks on record. Learn how devices become infected with botnet malware, how bots are remotely controlled, and how to protect a network from a botnet infestation
A bot is a software program that operates on the Internet and performs repetitive tasks. While some bot traffic is from good bots, bad bots can have a huge negative impact on a website or application
A data breach involves the release of sensitive information. Many types of online attacks have a primary goal of causing a data breach to release information such as login credentials and personal financial data
Large language models (LLMs) are machine learning models that can comprehend and generate human language text. They work by analyzing massive data sets of language
A vector database stores pieces of information as vectors. Vector databases cluster related items together, enabling similarity searches and the construction of powerful AI models
A warrant canary is a public statement describing an action that a service provider has not done; the statement is removed if the service provider gets a legal order to take that action but is prohibited from disclosing it
An SSL certificate displays important information for verifying the owner of a website and encrypting web traffic with SSL/TLS, including the public key, the issuer of the certificate, and the associated subdomains
In a credential stuffing attack, collections of stolen login credentials from one service are used to attempt to break into accounts on various other services
Data privacy is the protection of personal data from those who should not have access to it and the ability of individuals to determine who can access their personal information
Edge computing optimizes Internet devices and web applications by bringing computing closer to the source of the data. This minimizes the need for long distance communications between client and server, which reduces latency and bandwidth usage
Email security is the practice of preventing email-based cyber attacks, protecting email accounts from takeover, and securing the contents of emails. Email security is multifaceted and may require several different layers of protection
Network latency is the amount of time it takes for a data packet to go from one place to another. Lowering latency is an important part of building a good user experience
Serverless computing is a method of providing backend services on an as-used basis. Servers are still used, but a company that gets backend services from a serverless vendor is charged based on usage, not a fixed amount of bandwidth or number of servers
Streaming is a method of viewing video or listening to audio content without actually downloading the media files. Streaming performance can be improved, and buffering time reduced, if the owner of the files uses a CDN
Zero Trust is a security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter
If a website takes a long time to load, this can have adverse effects on the user experience, site traffic, and SEO. Websites that are optimized for performance have an advantage over slow websites
Serverless computing offers a number of benefits to web developers, including scalability, faster time-to-market, and lower expenses. However, in some cases these benefits may be outweighed by other concerns
Using Amazon EKS Cluster for Windows Containers to handle multi-session Windows Environments within one Cluster, setting up gMSA, Kerberos Authentication and EBS Volumes for persistent storage
This free Skillbuilder course will teach you all the ways Jira system fields can be used to respond to your team’s needs, while keeping your instance organized. You’ll quickly gain a practical understanding of the status, priority, and resolution fields
This self-paced course takes advanced search to the next level - helping you write complex functions, keywords, and operators. Explore a wide range of customisable queries, plus how to search with text-based fields and dates
Introduction to Zero Trust network security approaches and framework, including ZTNA, Private Applications, contrasts with SSL-VPN approaches and integration to NAC platforms such as Cisco ISE
Primer for newbies to the Technology world of IT, Cloud, Telco, Network and Automation including concepts, topics, frameworks, languages and popular buzzwords
cURL is a fantastic Command Line Tool to do all things HTTP, from GET, POST, DELETE, PATCH and PUT to a HTTP API, through to even Telnet or FTPing to a Device, or testing TCP Port liveliness; cURL can do that that for you - learn curl now!
Webinar with extensive exploration of vSphere networking, covering everything from basic vSwitch functionality to advanced topics like vMotion, security solutions, and network management