IT & Software
Enable Any Frontend App with Login using Google & SpringBoot, Enable Login with Google on your Frontend application using Google Oauth2 and SpringBoot by Implementing it end to end.
In this ...
Cybersecurity: Security Operations Center (SOC) Analyst NOW! Learn how to begin your career in cybersecurity from the gateway to success: A Security Operations Center (SOC) Analyst.
The ...
Microsoft Azure Cloud, Learn how to deploy, automate, secure and architect cloud applications with Microsoft Azure cloud platform.
Important notice: The current version of this course is a ...
Check Point Firewall CCSA R80.40 Training Part1/2, Learn CheckPoint Firewall CCSA R80.40 with Step by Step Lab Workbook.
Check Point CCSA certification is the very important for IT admins who ...
FortiGate Firewall NSE4 Version 7 Training Part1/2, Learn FortiGate Firewall NSE4 Version 7 with Step by Step Lab Workbook.
Fortinet NSE 4: Network Security Professional:
The Network Security ...
AWS Services for Solutions Architect Associate , The best guide for various AWS certifications such as AWS Solutions Architect, AWS SysOps and AWS Developer Associates.
UPDATE: New Content ...
Graph Theory and it's Algorithms, Learn the concepts of Graph Theory, it's Algorithms and Implement them in Python.
I welcome you all to my course on 'Graph Theory and it's Algorithms - Advanced ...
Graph Neural Networks: Theory, codes and simulations for AI, GNNs, GNN Explainer & PyNeuraLogic through 100 + Resources: Code Implementations in Python (StellarGraph & PyG)
Graph AI ...
Learn C# Programming With Database from Scratch, Detailed C# Programming with Database.
Detailed and structure course for students to learn how to develop window application using CSharp(C#) ...
Learn OpenSSL with a real world cheatsheet, Learn real world commands from the OpenSSL Cheat Sheet to troubleshoot Open SSL.
OpenSSL is the universal tool for inspecting, diagnosing, and ...
Wireshark Crash Course For Ethical Hackers, Learn Wireshark for Ethical Hacking and Start your Career in Cyber Security.
Ethical hacking is a process of detecting vulnerabilities in an ...