An in-depth video course that covers advanced Swift programming and focuses on writing highly performant, elegant, and readable code
Learn to develop powerful iOS and WatchOS applications by harnessing the full potential of Swift 2
Welcome to the world's most comprehensive course on iOS development. This course is designed like an in-person coding bootcamp to give you the most amount of content and help with the least amount of cost.
Tackle common machine learning problems with Google’s TensorFlow library and build deployable solutions
After taking this course, you can start mastering ExpressJS by building RESTful APIs for your single-page applications (powered by AngularJS, ReactJS, BackboneJS or any other front-end framework). With ExpressJS, developers can easily organize their code (middleware pattern), add more functionality (npm modules) and configure the server (configuration over convention).
If you're building relational, time series, IoT, or real-time architectures using Hadoop, you should be familiar with Apache Kudu. Kudu enables fast analytics on fast data by completing Hadoop’s storage layers, providing a new option to achieve fast scans and fast random access from a single API. This Learning Path introduces you to Apache Kudu, exploring what it is, when to use it, and how to use it in conjunction with popular Hadoop ecosystem tools. You’ll apply this knowledge by building and running a real-time analytical application using Kudu, Impala, Kafka, and Spark.
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.