Leverage the small but powerfully-formed Flask framework and its extensibility.
Master RESTful API development with Python and Flask
An in-depth video course that covers advanced Swift programming and focuses on writing highly performant, elegant, and readable code
Spark is one of today’s most popular distributed computation engines for processing and analyzing big data. This course provides data engineers, data scientist and data analysts interested in exploring the technology of data streaming with practical experience in using Spark. You’ll learn about the Spark Structured Streaming API, the powerful Catalyst query optimizer, the Tungsten execution engine, and more in this hands-on course where you’ll build small several applications that leverage all the aspects of Spark 2.0. While not a requirement, the course works best for those with some Scala experience.
Learn how to analyze and display geospatial information using QGIS and Python.
Artists, product designers, and inventors who understand the basics of Arduino prototyping can take their skills to the next level in this overview of how to work with input sensors: those multitude of devices that can monitor the physical world. You’ll start with the simple (temperature sensors, light sensors) and then move up to the complex (distance, accelerometer, object recognition), learning how each sensor functions, how to wire them up, and how to program them.
Small, lightweight, and powerful, Flask is ideal for both entry-level and more advanced Python coders who want to get started in web development. Designed as an extensible framework from the ground up, Flask lets you choose the extension packages that will work best for your project, resulting in a lean stack that does just what you need.
Rapidly build web applications with Python.
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.