Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

53 Results Found

Results per page: 10 40 80

How to Build a Web Server with Lambda

Webinar – Recorded | Sep. 14, 2018

The idea of building and running applications without thinking about the servers (AKA serverless computing) is a developers dream come true.  Watch expert Rich Morrow to understand: The benefits of using serverless computing Different architectures that use serverless computing How AWS services, like Lambda, S3, API Gateway and DynamoDB work together to enable faster and more flexible application deployment and management. This video also features a live demo: Building a web app with only serverless components.

How to Build a Pluggable IoT Pipeline in AWS

White Paper | July 23, 2018

As far as modern architectures go, there are few more complicated than an IoT pipeline. You’ve got to consider an ingestion layer (typically streaming) that may undergo manic load. You’ve got to think of data tagging, storage (probably across multiple engines), archival and access—both internal and external. And all of it has to scale like crazy, be as cost effective as possible, and use automation wherever it can. Oh, and your boss needs the IoT pipeline built by tomorrow. Short timelines? Tight budget? Unrealistic expectations? Unfortunately, these asks are realities for many cloud professionals. AWS knows this and is here to help.  

Fundamentals of Red Hat Enterprise Linux

Webinar – Recorded | March 09, 2021

For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>

From Analyst to Threat Hunter: How to Build the Skills for Tomorrow’s Hottest Cyber Jobs

Webinar – Recorded | Oct. 06, 2020

Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>

DevOps is the Missing Piece for Businesses that Demand Change

White Paper | Feb. 27, 2018

Building upon the IT best practices of Lean, Agile Scrum and IT Service Management, DevOps adds that “missing” layer to tie together the service lifecycle workflow across Development and Operations, while leveraging the latest in automation technology. Demand for skilled, open-minded, and collaborative professionals with DevOps knowledge is rapidly increasing. Are you ready for change?    

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Deploying MITRE ATT&CK Navigator to Improve Incident Response

Webinar – Recorded | Oct. 20, 2020

The world of Incident Response is evolving. No longer do we focus on indicators of compromise; we now focus on attacker behavior. MITRE has turned attacker behaviors into a usable framework shared both on their website and on GitHub. MITRE provides the MITRE ATT&CK Navigator on GitHub which includes a complete mapping of all techniques and sub-techniques to help you understand the attacker’s behavior. The Navigator can be leveraged to optimize Incident Response, evolving your team from responsive to predictive response.

Cybersecurity Awareness Fundamentals

Webinar – Recorded | Oct. 08, 2020

Expert Hesham Mahmoud discusses the importance of cybersecurity, how to secure your IT infrastructure and detect the latest vulnerabilities and threats your organization might encounter. This webinar will cover the latest cybersecurity trends and how to react to data breaches. View the slide deck>

Creating Reports with Excel's Power Pivot

Webinar – Recorded | Feb. 28, 2019

This recorded webinar will show you how to quickly summarize a large amount of data from different data sources using Power Query.

IT Certifications: 5 New Realities

Article | Aug. 27, 2019

The value of IT certifications has grown considerably over the last decade. Examine the evolution of certification trends, see the top-paying certifications and learn how decision-makers are struggling to hire certified employees.