MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Latest Online IT & Technology Training Courses, Course Reviews, Paid & Free Technology Courses and MOOCs in Information Technology domain. Share your e-Learning experience with IT community and submit your Online IT Course Reviews today.

Technology Courses for Brute Force
    All IT Courses and Reviews can be editable through Desktop/Tablet.
  • An Introduction to Algorithmics

    An Introduction to Algorithmics

    An introductory guided tour to the field of data structures, algorithms, and complexity analysis. This course is loaded with a ton of practical examples, and focuses on intuition, rather than formulas and mathematical proofs.

  • After Effects CC Animating Lip Sync

    After Effects CC Animating Lip Sync

    Lip Sync is a vital part of almost any cartoon, and animating lip sync by hand can be a grueling process. Expressions in After Effects CC provide powerful tools you can use to automate the lip sync process. Software required: After Effects CC.

  • Hack Your API First

    Hack Your API First

    Recent years have seen a massive explosion in the growth of rich client apps that talk over the web using APIs across HTTP, but unfortunately, all too often they contain serious security vulnerabilities that are actually very easy to locate. This course shows you how.

  • Practical Cryptography in .NET

    Practical Cryptography in .NET

    As a software developer you have a duty to your employer to secure and protect their data. In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.

  • Securing Linux Servers

    Securing Linux Servers

    Linux is widely used to host critical services in Internet-facing settings. This course will show you how to take control of your servers, assess their vulnerability, and significantly reduce their attack surface by hardening the system.

  • Implementing Wireless Security in a BYOD Environment

    Implementing Wireless Security in a BYOD Environment

    This course explains Wi-Fi security with a focus on implementing WPA2 to meet the growing demands for BYOD. The course begins with a discussion of common wireless attacks and countermeasures, and then details the different Wi-Fi security mechanisms. It compares and contrasts the different encryption, authentication, and message authentication options to help you select the right security mechanisms for your organization.

  • Secure Account Management Fundamentals

    Secure Account Management Fundamentals

    Secure Account Management Fundamentals is all about exploiting then protecting security weaknesses in the features we often take for granted in websites today such as registration, logon, changing account info, and logoff.

Please login to view more courses
 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top