Interfacing with the Raspberry Pi

Unfortunately Coursera (CC)'s trainings are no longer available on Springest

check_box_outline_blank

Assessing and exploiting control systems & IIoT

Logo SevenShift GmbH
|META_INFO|

This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded elec…

check_box_outline_blank

Reading Body Language as a Sales Tool Training Course

Logo Professional Development Training USA / pdtraining
|META_INFO|

Body language is an authentic medium of expression. Therefore, reading body language can help in understanding the hidden needs, wishes and…

check_box_outline_blank

Learning VPN

Logo IT-Learning
|META_INFO|

In this course, Scott Simpson delves into the essentials of Virtual Private Networks (VPNs), including how they function and their signific…

check_box_outline_blank

Advanced Cisco Routing: OSPF

Logo IT-Learning
|META_INFO|

OSPF, or Open Shortest Path First, is one of the most widely-used routing protocols in the world, and it brings many features and great fle…

check_box_outline_blank

Cryptography II

Logo Stanford Online
|META_INFO|

Cryptography is an indispensable tool for protecting information in computer systems. This course is a continuation of Crypto Iand explains…

check_box_outline_blank

Data Acquisition with LabVIEW

Logo IT-Learning
|META_INFO|

There are thousands of different types of sensors out there, acquiring and measuring data from the real world. But how do you get that data…

check_box_outline_blank

CertNexus Certified IoT Security Practitioner Cert Prep by InfoSec

Logo IT-Learning
|META_INFO|

Securing IoT systems can be a complicated process. Solutions may involve resource-constrained IoT devices and technologies from many differ…

check_box_outline_blank

Flash Media Server 4.5 Beta Preview

Logo IT-Learning
|META_INFO|

In this course Lisa Larson-Kelley offers a sneak peak at how video streaming delivery protocols work with Flash Media Server 4.5. Delivery …

check_box_outline_blank

Ethical Hacking: Hacking IoT Devices (2019)

Logo IT-Learning
|META_INFO|

The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In t…

check_box_outline_blank

Course 5411: Installing and Configuring Devices in Windows Vista

Logo Microsoft Learning
|META_INFO|

Introduction This online course covers how to install hardware, software, and other Windows Vista operating system components. You will lea…