[Pluralsight] Creating Machine Learning Models

By Janani Ravi

This course covers the important types of machine learning algorithms, solution techniques based on the specifics of the problem you are trying to solve, as well as the classic machine learning workflow.

Course info

Level Intermediate
Updated Oct 29, 2019
Duration 2h 44m


As Machine Learning explodes in popularity, it is becoming ever more important to know precisely how to frame a machine learning model in a manner appropriate to the problem we are trying to solve, and the data that we have available.

In this course, Creating Machine Learning Models you will gain the ability to choose the right type of model for your problem, then build that model, and evaluate its performance.

First, you will learn how rule-based and ML-based systems differ and their strengths and weaknesses and how supervised and unsupervised learning models differ from each other.

Next, you will discover how to implement a range of techniques to solve the supervised learning problems of classification and regression. You will gain an intuitive understanding of the the model algorithms you can use for classification and regression. Finally, you will round out your knowledge by building clustering models using a couple of different algorithms, and validating the results.

When you’re finished with this course, you will have the skills and knowledge to identify the correct machine learning problem setup, and the appropriate solution and evaluation techniques for your use-case.

About the author

A problem solver at heart, Janani has a Masters degree from Stanford and worked for 7+ years at Google. She was one of the original engineers on Google Docs and holds 4 patents for its real-time collaborative editing framework.


Size: 390MB


[Pluralsight] Global Transit Network Architectures with Azure Virtual WAN

By Microsoft Ignite 2019

Course info

Level Advanced
Updated Feb 14, 2020
Duration 47m


Global transit network architectures are being adopted by enterprises to consolidate, connect, and control the cloud-centric modern enterprise IT footprint. In this session, we describe how new Azure Virtual WAN service use cases and functionalities help you do that. Learn how we enable simplification and ubiquitous network connectivity between hyper-distributed applications, branches, and users across the cloud and on premises.

About the author

Microsoft Ignite is the place to learn from the experts, connect with your community, and explore the digital session catalog of the latest technology.


Size: 393MB


[Pluralsight] Working with Git Branches

By Craig Golightly
Git branches help you manage your daily tasks easier. If you’re working in a shared codebase, then branching is essential. Packed full of demos, this course will guide you through Git branches and the tools available to help you along the way.

Course info

Level: Intermediate
Updated: Jan 31, 2020
Duration: 1h 19m


Working in a large, shared codebase is complex. How do you make progress when everyone is working at the same time? Git branches help you organize and scale concurrent work on your codebase. Branches are also great to organize your daily tasks and manage what you are doing on your own machine. In this course, Working with Git Branches, you will gain the ability to incorporate branches into your daily workflow. First, you will learn the basics of branches. Next, you will discover the tools of merge, rebase, and cherry-pick to help you do even more. Finally, you will explore how to use branches across distributed remotes in a team environment, and how to understand, avoid, and deal with code conflicts when they come up. When you are finished with this course, you will have the skills and knowledge of Git branching needed to boost your individual productivity, work as a team, and lower your stress level.

About the author

Craig has over 15 years of software development on a variety of teams, including,, F-16 aircraft, and several startups. Craig is passionate about solving problems with the right tools and enjoys teaching and mentoring others so they can save time and accomplish their goals faster.

Course Overview
[Autogenerated] Hi, everyone. My name is Craig Golightly, and welcome to my course, working with get branches. I’m a senior software consultant. You may have used get before, but maybe branching seemed complicated. What are all of the commands for and how can they help make your day easier? In this course, you’ll experience both the why and how of get branches so that you can be comfortable using this amazing feature as part of your workflow. There are multiple demos throughout the course to help you see it in action. Some of the major topics that we will cover include the basics of using branches, merged re base and cherry pick promotes def and pull requests and strategies to avoid and resolve code conflicts. By the end of this course, you will be able to use get branches to better manage and track your own code, and more effectively coordinate work on your team’s shared code base. Before beginning the course, you should have a basic understanding of get. I hope you’ll join me on this journey to learn about managing your code with branches with the working with get branches course at plural site.


Size: 277MB

PacktPub Pluralsight The Great Courses

[The Great Courses] A Historian Goes to the Movies: Ancient Rome

Professor Gregory S. Aldrete, Ph.D. University of Wisconsin, Green Bay


What Will You Learn?

  •  Draw fascinating (and surprising) connections between films set in ancient Rome and science fiction films.
  •  Explore two big-budget film takes on the mysterious legend of ancient Rome’s “lost legion.”
  •  Dispel the myth of lively recreational drug use in ancient Rome and Egypt presented by HBO’s Rome series. 


When most of us think of the ancient Roman world, we don’t think about the scholarship of hard-working historians or the discoveries of patient archaeologists. We think, first and foremost, of what we’ve seen at the movies.


From the sword-and-sandal epics of the 1950s to the resurgence of grittier stories in the 21st century, cinema has exerted an undeniable power over our cultural understanding of ancient Rome. The iconography is always fresh in our minds: gladiatorial battles and chariot races, defiant slaves and nefarious emperors, magnificent public structures and white toga costumes. But just because these and other sights are popular in movies doesn’t mean they should always be taken as historical fact.

What would an award-winning historian think of films like Ben-Hur, Spartacus, Gladiator, or even a satire like Monty Python’s Life of Brian? How have these and other movies created our popular perceptions of ancient Roman history—and in what ways have they led us astray? And why, despite the occasional box-office flop, do movies set in ancient Rome still have the power to captivate us, and to turn each of us into theater-going history buffs?

In A Historian Goes to the Movies: Ancient Rome, Professor Gregory S. Aldrete uses his prolific scholarship to give you a front-row look at the great movies that have shaped ancient Rome’s role in popular culture and memory. Packed with insights into both history and filmmaking, these 12 lectures immerse you in the glory and grandeur (and, sometimes, the folly) of classic and contemporary films featuring over 50 years of cinematic talent, including directors like Stanley Kubrick, Federico Fellini, and Ridley Scott, and actors such as Charlton Heston, Rex Harrison, Elizabeth Taylor, Patrick Stewart, and Russell Crowe. You’ll investigate portrayals of ancient Roman life on the big screen and small screen; learn how to tease out fact from fiction in some of Hollywood’s most stunning spectacles; and deepen your appreciation for films that, when made right, are thrilling time machines into the past.

Survey Landmark Film and TV

For A Historian Goes to the Movies: Ancient Rome, Professor Aldrete has assembled 13 of what he and many other film buffs consider to be the most important films set in ancient Rome. These are movies we remember for their performances, their costumes and set designs, and the ways they influenced the movies made in their wake. A few of the features you will explore include:

  • Quo Vadis: This high-profile 1951 film, starring Peter Ustinov as the tyrannical emperor Nero and Deborah Kerr as a virtuous young Christian girl, established a successful (and lucrative) template for movies about classical antiquity and the early Christian world, and sparked a cultural fire for sword-and-sandal flicks.
  • I, Claudius: Based on two novels by Robert Graves, this BBC miniseries tracks the intimate lives of the Julio-Claudian dynasty, which includes the emperors Claudius, Caligula, and Tiberius. The show also captured the attention of a second group of viewers: those obsessed with England’s royal family.
  • Fellini Satyricon: Italian director Federico Fellini’s experimental film, based on the ancient novel Satyricon by Petronius, was very much a product of the cinematic and social revolutions of the 1960s—both of which left an indelible mark on this picaresque story of a pleasure-seeking young Roman man.
  • Gladiator: Essentially a remake of the 1964 film, The Fall of the Roman Empire, Ridley Scott’s blockbuster film from 2000 was a commercial and cultural triumph that snagged Academy Awards, spawned memorable catchphrases, and inspired a host of new sword-and-sandal epics in the subsequent decade, including Troy and 300.

Some films you may already be a fan of; other films you might have only heard of in passing. But all of them are essential to a well-rounded understanding of the intricate relationship between the world of ancient Rome and the world of the movies.

Walk the Line between Truth and Fiction

A scholar who’s spent his entire career immersed in the history of the ancient Roman world (from ancient body armor to everyday life), Professor Aldrete reveals the historical accuracies and inaccuracies of the ancient Roman world depicted in these films. When filmmakers seemingly got certain aspects of history wrong, Professor Aldrete provides a window into how and why the creators made certain decisions and navigated the tenuous line between truth and entertainment. For example, you’ll discover that:

  • Ben-Hur‘s naval battle, while a reasonable depiction of naval warfare in the ancient Roman world, nevertheless, depicts the oarsmen of the warships as slaves (they weren’t) and being sent to the galleys as punishment (it wasn’t);
  • Spartacus misrepresents the title character’s historical legacy by depicting his revolt as a growing movement challenging slavery, when in reality, it marked the end of popular opposition to the institution;
  • I, Claudius portrays the character of Livia as a mass murderer who kills multiple members of her own family to clear the way for her son, Tiberius—a notion that has been proven to likely be false, and can be traced to a specific ancient historian, Cassius Dio.
  • Gladiator uses the familiar “thumbs down” gesture to indicate a defeated gladiator should be killed, whereas, recent scholarship has revealed this gesture was most likely a way of calling for the victor to drop his weapon and spare his enemy;
  • HBO’s Rome gets many things right about everyday life in ancient Rome, including two characteristics of Roman religion—that it’s a component of nearly all facets of life and that individuals differ in their degrees of belief; and
  • Fellini Satyricon, despite its surreal components, depicts a marriage ceremony accurately by dressing the bride with an orange veil and having the guests throw nuts at the couple and shout “feliciter” in congratulations.

Go behind the Scenes of Cinematic Classics

Along with a revealing look at ancient history, these lectures also examine the art and craft of big-budget filmmaking. A Historian Goes to the Movies: Ancient Rome takes you behind the scenes to reveal how iconic films can be made—or unmade—by everything from clashes between directors and actors to out-of-control budgets.

For example, you’ll learn how:

  • Early epics like Ben-Hur couldn’t rely on the luxury of computer-generated effects and, therefore, had to construct impressive, full-sized replicas of ancient Roman sites like the Forum or the Circus Maximus;
  • Fall of the Roman Empire was the true box-office bomb that tanked the sword-and-sandals genre for decades (not Cleopatra, as popularly believed); and
  • Creative differences between a historical consultant and the producers of Gladiator reflect the way filmmakers ditch historical accuracy for the sake of drama.

Professor Aldrete also highlights profound connections between these films and the wider historical culture in which they first appeared. Quo Vadis, for example, made only a few years after the end of World War II, noticeably portrays the Romans as mirror images of the Nazis. And Spartacus, despite its message of freedom, became the target of McCarthy-era conservative and religious groups who condemned it for being anti-American.

A Guide for Tomorrow’s Great Films

Of course, the end of this exciting lecture series doesn’t mean there isn’t more to come. Roman history continues to inspire new cinematic depictions, and A Historian Goes to the Movies: Ancient Rome is a welcome guide to settings, themes, and “bread-and-circus” plots that popular culture just can’t let go of.

Professor Aldrete’s lectures leave you excited about how tomorrow’s movies will depict the ancient world—and eager to discover what those creative works will reveal about both the past and the times in which they’re made.

12 lectures |  Average 32 minutes each | PDF

Size: 4.04GB
PacktPub Pluralsight

[PacktPub] Metasploit Unleashed: Build defense against complex attacks [Video]


Shane Hartman
January 21, 2020

5 hours 54 minutes

Add superior end-to-end security to your network using Metasploit

More Information

  • Understand Metasploit and the Metasploit commands used in the command line interface
  • Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
  • Meterpreter commands to get you started and help familiarize you with this most powerful tool
  • Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
  • Use Pivoting for routing traffic from a normally non-routable network
  • Perform test services such as SCADA, and test in a highly secured environment
  • Simulate attacks on web servers and systems with Armitage
About Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.
  • Gain the skills to carry out penetration testing in complex and highly-secured environments
  • Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios
  • Practical guide to understand and implement new useful methods and techniques to make your network robust and resilient
Course Length 5 hours 54 minutes
ISBN 9781789618846
Date Of Publication 21 Jan 2020

Size: 1.69GB

PacktPub Pluralsight

[Pluralsight] Analyzing Network Protocols with Wireshark

By Christopher Greer
This hands-on course will teach you how to quickly understand and analyze core network protocols. Get out your copy of Wireshark, because you’ll go deep into the critical underlying packets that support your business applications.

Course info

Level Intermediate
Updated Dec 20, 2019
Duration 2h 8m


There are billions of packets flying through the network every minute. Which ones matter? Which ones hold the keys to troubleshooting network and application problems? In this course, Analyzing Network Protocols with Wireshark, you’ll gain the ability to capture, interpret, and dissect network problems at the packet level. First, you’ll explore core protocols and services, such as ARP, IPv4, and DHCP. Next, you’ll discover how the UDP and DNS protocols work. Finally, you’ll learn to analyze HTTPs and TLS based application traffic. When you’re finished with this course, you’ll have the skills and knowledge of packet analysis with Wireshark needed to isolate and resolve network problems.

About the author

Chris Greer is a network analyst for Packet Pioneer, delivering training and packet analysis consulting services to customers all over the world. He specializes in using Wireshark to combat network and application performance problems on networks of all sizes. Chris leverages his 20 years of practical experience in network monitoring, analysis, and troubleshooting to heighten the experience of any attendee to his interactive and energetic courses.

Course Overview
Hi, everyone. My name is Chris Career and welcome to my course, analyzing network protocols with wire shark. I’m a packet analyst and trainer with Packet Pioneer, and I love digging in the network problems at the packet level. I’ve spent years traveling all over the world, helping people make sense of the traffic on their networks. Let’s face it, packet analysis can be overwhelming, especially considering the enormous amount of data we need to sift through on the wire. I want to show you howto filter through that packet haystack. How to understand the core protocols that you see and how to quickly identify common issues on the network. When a problem strikes, you’ll be able to isolate and resolve the problem faster because you’ll thoroughly understand the core protocols in place. Some of the major topics that will cover with hands on exercises include the function of our I. P V four and I p V six. The role of I, C, M, P, D, H, C, P and D. N s, How FTP works and https and T. L s. $1 3 By the end of this course, you’ll be comfortable with configuring filters, creating profiles and analyzing core protocols in where shark Before beginning the course, you should be familiar with basic networking fundamentals and have a functional understanding of wire shark. I hope you’ll join me on this journey to learn how to dig into packets with the course analyzing network protocols with wire shark here at plural site.


Size: 659MB

Frontend Masters Linkedin Mindvalley O'REILLY PacktPub Pluralsight

[O’REILLY] Java Lambdas and the Stream API: Bringing Functional Programming to Java

by James McLaughlin
Publisher: Apress
Release Date: November 2019
ISBN: 9781484255940

Video Description


Come up to speed with Java functional programming and write effective Java code with less effort using lambdas and the stream API. Make your Java project code more reliable by using the declarative approach provided by these new Java features. Learn how to leverage the updated collections API to facilitate common functional programming patterns such as map/filter/reduce. If you’ve ever stumbled through constructing for loops and while loops, this video will add to your programming toolbox and allow you to leave such heavy lifting to the stream API.
You’ll begin your journey with the syntax of Java lambdas, what they are, and how to use them. You will then be introduced to Java streams and the various ways of creating them for the purpose of processing data. You will also learn about the updates which have been made to the Java collections API for supporting streams. Along the way you will be taught the streams API and how to use the methods defined in the Stream class to process data sources to obtain the results you desire by employing lambdas with the Stream class’ operations.
What You Will Learn
  • Write functional interfaces for defining lambdas
  • Master lambda syntax for implementing anonymous functions
  • Create streams associated with data sources
  • Process data through stream operations
  • Use method references for simplifying lambda expressions
  • Discover parallel and sequential streams and how they differ

Who This Video Is For

Software developers familiar with Java who wish to employ functional programming techniques in their software projects in order to write reliable, compact, and easy-to-read Java code.
Size: 543MB
Frontend Masters Linkedin Mindvalley O'REILLY PacktPub Pluralsight

[Pluralsight] Android: SQLite Fundamentals

By Annapurna Agrawal
This course will guide you through how to use Android SQLite to create a database for your application. All the details you need on saving data persistently using SQLite and keeping it private to the application are covered here.

Course info

Level: Beginner
Updated: Nov 25, 2019
Duration: 1h 60m


Most android apps need to save data persistently, like some user settings, structured lists, or files. To save these kinds of data in bulk, android provides full support for SQLite databases which remains private to the app and is persistent until the app is uninstalled. In this course, Android: SQLite Fundamentals, you will learn foundational knowledge of using SQLite in your own app. First, you will learn what SQLite is and how to get started with it. Next, you will discover how to design and create the database and insert data into it for your app. Finally, you will explore how to interact with the data in the database. When you are finished with this course, you will have the skills and knowledge of handling data for your app in a well structured and secure way using SQLite in Android.

About the author

Annapurna is a full stack developer and has experience in Android App and web development. She likes sharing knowledge so that the developers around get boost for their passion.

Course Overview

[Autogenerated] Hi, everyone. My name is on a bona approval on Welcome to my course on what s you like fundamentals. I’m a four star develop. Oh, and I like teaching and sharing knowledge. I aim to make your day to day development task easy. For a very long time, Escalate has been our main Joyce for storing structure data persistently on mobile. It is a self contained silver less zero configuration under transactional SQL database engine, which is Burton in Android. In this course, we are going to see howto use esque alight to store our AB data Persistently, some off the meter topics that will cover includes using escalate open helper class on the contract class using goes oh to the right data into the Escalade database using SQL methods like insult update on delete to work with the skylight performing DW migrations on. We will also discuss why should we use a skylight over other storage options? By the end of the scores, you will know all the fundamentals off using escalate as a persistent storage solution for your android app. Before beginning the course, you should be familiar with the basics off Android. You should know how to implement recycle of you into your demo applications, and you should understand how to write SQL queries. I hope you’ll join me on this goals to loan under an Escalade fundamentals only at your insight.

Size: 614MB

Frontend Masters Linkedin Linux Academy Lynda Mindvalley PacktPub Pluralsight

[PackPub] Crazy about Arduino: Your End-to-End Workshop – Level 3 [Video]

Author: Idan Gabrieli
Released: October 25, 2019

Duration: 4 hours 4 minutes

Learn to build a complete Internet of Things solution with Arduino, a SQL Database, and a web server


More Information

  • Build an end-to-end Internet of Things (IoT) data logger
  • Collect data using multiple sensors: DHT11, LDR, and ultrasonic
  • Set up a personal web and database server (MySQL)
  • Connect the Arduino to the Internet using the Ethernet module
  • Design and use a web API to send sensor data from the Arduino to the webserver
  • Analyze data logger data
About The best way to find out whether this course is really for you is by asking yourself a few basic questions:

• Do you like building things yourself?

• Are you looking for ways to easily combine software and hardware components?

• Did you ever wonder how electronic devices really work?

• Do you have a creative idea and are just looking for ways to easily prototype it?

If your answer to most of the questions above is “Yes,” then you’re in the right place. The Arduino is probably one of the most amazing developments and prototyping platforms today with endless possibilities for Do-It-Yourself hobbyists looking for ways to express their creativity and technical capabilities.

This course is LEVEL 3 and is part of a larger comprehensive training program divided into levels that are all about the Arduino and its surrounding ecosystem. Each course covers a specific group of subjects to lets you develop and grow your skills step-by-step while enjoying the journey. Join us and learn to build a complete data-logger solution including a web server and a database to store and analyze the collected data.

All the code and supporting files for this course are available at –—Level-3

  • A complete and well-organized course
  • Build an interesting IoT project with sensors, an Apache web server, and a MySQL database
  • Design and program a smart sketch code to run the overall project
Course Length 4 hours 4 minutes
ISBN 9781839210808
Date Of Publication 25 Oct 2019

Size: 0.98GB 

Frontend Masters Linkedin Linux Academy Lynda Mindvalley PacktPub Pluralsight

[Frontend Masters] Introduction to the JAMStack

Author: Jason Lengstorf – Gatsby
Released: October 22, 2019
Video Parts: 12 (MP4)
Duration: 6 h 24 min
Dimension: 1280x720p

Some Key Takeaways!

By coding along with us in the Workshop, you’ll:

  • Understand the advantages of building with the JAMstack
  • Learn how to create dynamic apps by only shipping static assets
  • Take advantage of serverless functions to replace traditional APIs

Your (Awesome) Instructor

Jason Lengstorf

Jason Lengstorf is a developer advocate, senior engineer, and occasional designer at Gatsby. He’s an advocate for building highly productive teams through better communication, well designed systems and processes, and healthy work-life balance, and he blogs about that sometimes. He lives in Portland, Oregon.

Workshop Details

The architecture of modern apps is changing. More and more of the back-end has been moved into services, giving front-end developers significantly more power and autonomy to create full-featured apps than ever before. In this workshop, you’ll learn how the different parts of the JAMstack fit together, from creating apps out of only static assets, to handling asynchronous interactions with serverless functions, to setting up advanced features like authentication and databases.

Is This Workshop for Me?


This course is targeted toward developers who are comfortable with front-end development, but are interested in taking more control over what they can create on their own. They want to build and deploy complex apps entirely on their own using the tools available in the JAMstack ecosystem.

Any Prerequisites?

  • Some familiarity with React
  • Comfortable writing JavaScript

Size: 1.90GB