This course will take you through the basics as well as advanced concepts in TestNG and automation framework building. The course focuses on important concepts such as TestNG, Java, Maven, Selenium WebDriver, page object model, and page factory design. You need to know the basics of core Java and Selenium to get started.
In this course, you'll learn all the tools you need to become an ethical hacker, with a keen sense of knowledge in the cybersecurity domain. You'll start with the fundamentals of hacking and work your way up to use all the modern hacking tools at your disposal. In this course, you'll learn how to think and operate like an ethical hacker.
Code along with the course to create responsive, mobile-first websites that look stunning using CSS. Test the skills you've learned in the course by attempting the projects at the end of every section.
In this course, we will explore some features introduced recently in the language and a few important things that should be kept in mind while programming JavaScript. Learn some important JavaScript concepts and hacks to eliminate your fear of coding and improve your JavaScript coding skills. This course expects a fair understanding of JavaScript to start with.
A beginner's level course that will help you learn website development using HTML and its concepts from the start. Learn to create web pages by formatting text and adding images, links, and tables. In addition, gain knowledge about creating and functioning a website and web pages. You will also explore the CSS styles used in HTML webpage design.
This course is designed to guide you through Selenium WebDriver and Java, right from the basic to the advanced aspects. Loaded with exercises and examples, this course provides an interactive learning experience.
We are in such an era where cyber security plays an important part. With systems getting smarter, we are seeing machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it is important for pentesters and security researchers to understand the working of these systems and how to breach them.