Skip to content
4

Intermediate Ruby courses

Search results

  • DevOps Engineer - Classroom

    London School of Emerging Technology
    Apply now to become a professional DevOps Engineer
    • Classroom
    • 3 months · Part-time or full-time
    • Certificate(s) included
    • Tutor support
    ...tools facilitate the tracking and storage of any changes to software projects over different periods. Popular source control tools include GitHub, Subversion, AWS CodeCommit, and Microsoft Team Foundation Server. Container Management: Containers make it easier for DevOps engineers …
    £2,000
  • Software Automation Testing with Selenium - Instructor-Led Online Live

    London School of Emerging Technology
    Instructor-led online course with study materials, tutor support, and final exam included
    • Online
    • 12 weeks · Part-time or full-time
    • Certificate(s) included
    • Tutor support
    ...different browsers and platforms. It provides a single interface which allows to write test scripts in various programming languages like Ruby, Java, NodeJS, PHP, Perl, Python, and C#, among others. It comes with Selenium WebDriver also known as Selenium 2.0 which executes test scripts …
    £1,600
  • Complete Ethical Hacking and Penetration Testing Course

    Oak Academy
    Ethical Hacking course includes Web Hacking, Phishing, NMAP, Password Cracking, Penetration Testing, Metasploit &more
    • Online
    • 27.4 hours · Self-paced
    • Certificate(s) included
    ...Attacking HTML5 Insecure Local Storage Druppal SQL Injection Drupageddon (CVE-2014-3704) SQLite Manager File Inclusion (CVE-2007-1232) SQLite Manager PHP Remote Code Injection SQLite Manager XSS (CVE-2012-5105) Bypassing Cross Origin Resource Sharing XML External Entity Attack Attacking …
    £49
  • Complete Ethical Hacking and Penetration Testing Training

    Oak Academy
    Learn Ethical Hacking, Network Security, Nmap, Metasploit, OSINT, Wi-Fi Security and Web Application Testing
    • Online
    • 30.4 hours · Self-paced
    • Certificate(s) included
    ...Compromising SNMP_ Grabbing SNMP Configuration Using Metasploit Weaknesses of network devices Password Creation Methods of Cisco Routers Identity Management ACL – Access Control Lists SNMP Security quiz quiz Passive Scan - ARP Tables What is Nmap_ Nmap First Scan What is Subnet_ Interpretation …
    £49

FAQs