We use cookies to improve your experience on our site. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Operating Systems
Linux Kernel Development Model and Compilation
Understand the Development process of Linux Kernel and install the latest mainli...
Oracle Solaris 11 System Administration from Zero to Hero
Oracle Solaris 11.4 course covering all exam objectives including lot of step by...
Build Custom Windows Images & Make Use of Unattend.XML File
Use SysPrep & ImageX to create custom Windows 7, 8 & 10 images, add SW, language...
How to install an Open Source LMS - Part 1
Learn how to install an LMS such as Moodle, Claroline, Chamilo or Opigno on a Li...
Operating System Project - Develop Heap Memory Manager in C
Operating System UG/PG Seminar Projects in C on Windows/Linux Platforms, Memory ...
An Introduction to Wait Statistics in SQL Server 2019
A Hands-On Guide to Using Wait Statics in the Applied Space
Building Hadoop Clusters
Deploy multi-node Hadoop clusters to harness the Cloud for storage and large-sca...
Linux System Programming - A programmers/Practical Approach
Files, Memory and Process management, Fork, Signals, Threads, IPC - Pipes, FIFO,...
Physical Access Hacking Windows Xp, 7, 8, 10, Linux & Typing
Learn hacking, and how to type from someone who has reached 120 W.P.M. This Spee...
Run Linux on Windows with VirtualBox!
Create a Linux virtual machine on your Windows computer. Step by step instructio...
Dependency Injection in .NET 5 (.NET Core)
Learn the basic foundation of Dependency Injection in ASP.NET Core / .NET 5 web ...
Desktop Support / Troubleshooting- Healthcare IT Technicians
Learn about some of the unique challenges as well as the typical hardware & soft...
Essentials of UNIX Administration with FreeBSD 12.1
Learning to manage your FreeBSD 12.1 Unix system
Mastering Putty for beginners (+ Session Manager, MobaXTerm)
Handy little tool to quickly launch SSH sessions to UNIX/Linux Servers. PLUS.. A...
Fundamentals of Pentest, Ethical Hacking and Cyber Security
Easy to follow hands-on training on offensive ethical hacking and penetration te...