Infosecinstitute – Active Directory with Windows Server 2016

Infosecinstitute – Active Directory with Windows Server 2016
English | Size: 1.55 GB
Category: Tutorial


Active Directory with Windows Server 2016 training
This learning path teaches you all about managing identities in Active Directory. As you progress through five courses, you’ll learn how Active Directory simplifies requirements to meet security policies and interconnection management, how to configure a secure system, how to set up and use Certificate Services and Federation Services, how Active Directory uses authorization and authentication for external system interactions, how to apply policies and organizational units for a quick response to resource or security issues, and how to manage Active Directory with the Users and Computers console and PowerShell. Upon completion, you’ll have the in-depth knowledge about Active Directory required to pass the Microsoft Identity with Windows Server 2016 certification exam.

Cloud Academy – Routing in React-STM

Cloud Academy – Routing in React-STM
English | Size: 212.18 MB
Category: Tutorial


This module looks at how to Route in React. You ll be looking at linking components, creating dynamic links parameterized routes, and how to install the React Router DOM

Smithsonian Ch. – Mystic Britain Secrets of Stonehenge (2019)

Smithsonian Ch. – Mystic Britain: Secrets of Stonehenge (2019)
English | Size: 1.57 GB
Category: Documentary


Ancient Britons built a huge circle using stones that had been dragged 180 miles from Wales 5,000 years ago. 500 years later, they introduced the mighty sarsen stones, creating the Stonehenge we know today. All these years later, questions still remain: who built it and why? Is it magical? A religious temple? A celestial clock? Was it built by druids? By Merlin? Hosts Clive Anderson and Mary-Ann Ochota are determined to get answers and reveal the hidden secrets of the stones.

PluralSight – Querying And Shaping Data In Power BI Using M

PluralSight – Querying And Shaping Data In Power BI Using M-REBAR
English | Size: 278.60 MB
Category: Tutorial


We all have to deal with dirty data. By using the M language, we can clean and prep our data for use in Power BI. M turns manual data cleanup into an automated process.

Infosecinstitute- Threat Modeling

Infosecinstitute- Threat Modeling
English | Size: 4.57 GB
Category: Tutorial


Threat modeling is a process to identify security weaknesses in software design and architecture. In this path, you will explore five courses, starting with a background and top-level view of threat modeling. The second course will describe three core security frameworks that can be used with threat modeling to find threats and mitigations. The third course covers the “moving parts,” or elements of a threat model and their relationship with each other. The fourth course covers the basics of threat modeling, the fifth course introduces secure agile architecture concepts, and the sixth is a lab bringing it all together.