What’s new

Your source for what’s next

New in live online training

See all

November 13, 2023

Linux Under the Hood

Presented by Sander van Vugt

Become a Linux Power User in 4 Hours Learn the power of Linux in 4 hours. To truly get the most out of Linux you need to understand Linux internals. In ...

November 13, 14 & 15, 2023

Certified Kubernetes Application Developer (CKAD) Crash Course in 3 Days

Presented by Benjamin Muschko

In-depth and Hands-on Practice for Acing the Exam The ability to use, troubleshoot, and monitor Kubernetes as an application developer is in high demand. In response, the Cloud Native Computing Foundation ...

November 17, 2023

Better Meetings in 60 Minutes

Presented by John Hartley

Plan, run, and manage meetings that drive results Course outcomes Lead effective meetings regardless of content or audience Improve collaboration, participation, and facilitation in meetings across your company Course description Meetings ...

November 15, 22 & 29, 2023

Java Microservices with Spring in 3 Weeks

Presented by Marcin Grzejszczak

Spring Boot and Spring Cloud best practices for creating effective and resilient microservices Microservices have become a de facto standard architecture pattern of today’s software because they give developers a lot ...

November 17, 2023

Smarter pandas for Data Science

Presented by James Powell, Cameron Riddell

Rising to the Challenge of Data Science Develop an understanding of the underlying design of the pandas API Dive into the “why” behind pandas Reduce reliance on external resources like StackOverflow ...

November 16 & 17, 2023

Creative Coding with JavaScript and p5.js Bootcamp

Presented by Elisabeth Robson, Eric Freeman

Learn JavaScript the fun way and expand your programming skills This course is designed to provide a foundation in creative coding skills using JavaScript and p5.js in a web-based environment. With ...

New in interactive learning

See all

Ethical Hacking: Capturing and Analyzing Packet Packets with TShark and TCPDump

By Omar Santos, Derek Santos

Capturing network traffic is often a task during a penetration testing engagement or while participating in a bug bounty. One of the most popular packet capture tool (sniffer) is Wireshark. Many ...

Ethical Hacking: Web Application Vulnerability Scanning with Nikto

By Omar Santos, Derek Santos

Reconnaissance and information gathering is essential when formulating an attack and targeting a system. You can enumerate and scan web applications using open-source tools like Nikto. With Nikto you can perform ...

Ethical Hacking: Advanced Nmap Scanning and the Nmap Scripting Engine

By Omar Santos, Derek Santos

Nmap provides a foundation for a thriving community of pentesters to create and use their own scripts. Hundreds of commonly ran scans are shipped with Nmap, making it easy to run ...

Ethical Hacking: Active Recon - Fuzzing web applications using the FFUF fuzzer

By Omar / Derek Santos / Santos

In this scenario you will learn how to perform web application recon using one of the most popular web application discovery and fuzzing tool called FFUF. ...

Ethical Hacking: Scanning Docker Containers with Grype

By Omar Santos, Derek Santos

Knowing what third-party and open-source software your systems and applications is extremely important. Having a Software Bill of Materials (SBOMs) allows you to know what security vulnerabilities may affect your systems ...

Ethical Hacking: Active Recon - Enumeration and Fuzzing with feroxbuster

By Omar / Derek Santos / Santos

In this scenario, you will learn the details about how to find resources the may store sensitive information about web applications and operational systems. ...