Denisa Olteanu8/30: Packing up and moving to cloudMigrating Terraform state and changing execution environments4d ago
InILLUMINATIONbyWendy ScottHow to Create a Lesson Plan for a Training SessionLessons Plans are ideal for longer courses delivered by multiple trainersFeb 15
Vedang RanmaleHow I Cracked (ISC)² Certified in Cybersecurity Certification on My First AttemptHello readers, I am Vedang Ranmale, BTech in Electronics Engineering from Sardar Patel Institute of Technology, Mumbai. I am a…Jul 18, 20231Jul 18, 20231
InILLUMINATIONbyAiden (Owner of Illumination Gaming)New Training Program: From Zero to Substack HeroSmart Strategies to Write, Engage, and Earn — Without Losing Your Mind2d ago122d ago12
Denisa Olteanu8/30: Packing up and moving to cloudMigrating Terraform state and changing execution environments4d ago
InILLUMINATIONbyWendy ScottHow to Create a Lesson Plan for a Training SessionLessons Plans are ideal for longer courses delivered by multiple trainersFeb 15
Vedang RanmaleHow I Cracked (ISC)² Certified in Cybersecurity Certification on My First AttemptHello readers, I am Vedang Ranmale, BTech in Electronics Engineering from Sardar Patel Institute of Technology, Mumbai. I am a…Jul 18, 20231
InILLUMINATIONbyAiden (Owner of Illumination Gaming)New Training Program: From Zero to Substack HeroSmart Strategies to Write, Engage, and Earn — Without Losing Your Mind2d ago12
Bytecode SecurityDo You Need Math to Be an Ethical Hacker?In the world of cybersecurity, ethical hackers play a crucial role in safeguarding sensitive data and protecting systems from cyber…Jul 23, 2023
InEnvoy ProxybyPeter JausovecEnvoy Fundamentals, a training course to enable faster adoption of Envoy ProxyEnvoy Proxy, an open-source edge and service proxy, is a vital part of today’s modern, cloud-native application and is used in production…Feb 10, 2022