Search result for Open source quantum computer services Online Courses & Certifications
Get Course Alerts by Email
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
How open source intelligence (OSINT) can be gathered and used for hacking into systems OSINT (Open Source Intelligent ) Learn how to collect information about people by using OSINT (Open Source Intelligence)...
$17.99
OpenShift, Docker & Kubernetes - Perfect Container Platform
by TetraNoodle Team- 2.6
4 hours on-demand video
OpenShift is an open source, cloud-based platform-as-a-service that combines everything into a single platform and allows you to manage tasks easily. Launch unique businesses or containerised application development services for the next generation in computer science or the patience to self-teach from scattered sources and dense textbooks, not to forget the bank-busting financial investment!....
$11.99
Deep Learning for Business
by Jong-Moon Chung- 4.4
Approx. 8 hours to complete
This course has three parts, where the first part focuses on DL and ML technology based future business strategy including details on new state-of-the-art products/services and open source DL software, which are the future enablers. Deep Learning Products & Services 1 Deep Learning Open Source Software / 3....
Mathematics & Statistics of Machine Learning & Data Science
by Cinnamon TechX- 4.2
11 hours on-demand video
In deep learning, a computer model learns to perform classification tasks directly from images, text, or sound. Machine learning is the process that powers many of the services we use today—recommendation systems like those on Netflix, YouTube, and Spotify; search engines like Google and Baidu; social-media feeds like Facebook and Twitter; voice assistants like Siri and Alexa....
$12.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
OSINT (Open Source Intelligent) & Information Gathering Over the Internet OSINT (Open Source Intelligent ) However, if an ethical hacker attacks an area of a network or computer without getting expressed permission from the owner, they could be considered a gray hat hacker, violating ethical hacking principles. Gain control over computer systems using server side attacks...
$21.99
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
How to scan TCP or UDP services In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting....
$23.99
Related searches
Learn Data Science Deep Learning, Machine Learning NLP & R
by Cinnamon TechX- 4.5
70.5 hours on-demand video
Machine learning is the process that powers many of the services we use today—recommendation systems like those on Netflix, YouTube, and Spotify; search engines like Google and Baidu; social-media feeds like Facebook and Twitter; voice assistants like Siri and Alexa. Structuring a highly unstructured data source...
$12.99
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting....
$15.99
Ansible Automation For Beginners to Advance - Step by Step
by Up Degree- 3.8
4 hours on-demand video
When you are installing and configuring services manually, it is almost always necessary to know whether your actions were successful or not. Combining host and group definitions as we learned about in the first tutorial, and using available variables to fill in information, we can begin to put together complex computer systems that interact with each other....
$12.99