Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- Session 1 - Why Linux and motivation behind learning Linux? | Operating System(OS) | Why Multiple OS?,Linux Distributors | What is Linux and Linux Community?, Virtualisation | Installation of Oracle Virtual Box | Installation of OS (RHEL V9.2) (162:37)
- Summary - Session 1
- Session 2 -Root Users|Non Root User|GUI|CLI|WebUI|Right "ctrl"|Left "ctrl+c"|Left "ctrl+x"|jobs|network connectivity b/w windows & linux|RAM size|location of program|command to create new user ,setting password,perticular terminal,manual,to see terminal|mutliuser facility (139:44)
- Summary - Session 2
- Session 3 - How to take screenshot | Gnome terminal | Run any command in background | RPM | How to see all files of a software | Install and uninstall software using rpm | Package management | Dependencies problem of the software and how to solve it | What is yum | How to configure yum (147:58)
- Summary - Session 3
- Session 4.- Network and it's types | Asterisk | LAN | ipv4 | Changing Boot order in Virtual box | IP Address Mystry Solved | Map of Submarine Cables for Internet | traceroot in GUI and CLI | DNS | Network Interface Card (NIC) | Ping in depth (161:15)
- Summary - Session 4
- Session 5 - Type of Linux os CLI, GUI & WebUI | local, remote & webUI login | SSH | vi, vim & gedit | Web server, Clint server configuration | Setting up any server | Process |type of web server IIS, nginx, HTTPD | Creating a web page | server start, status | folder directory, Secuirty | Textediter (142:30)
- Summary - Session 5
- Session 6 - Why we need port number | what is httpd and how to start it's services | Netstat command| how to configure the httpd file | SElinux | Changing default port number and landing page in httpd file | PublicIP and PrivateIP | ngrok software (128:52)
- Summary - Session 6
- Session 7 - Port no | Default port no of - web server, mail, ssh & https server | Systemctl status, start & enabled command | netstat command | Steps for changing settings in httpd | httpd.conf file | getenforce & setenforce | /etc/httpd/conf.d file | Importance of public IP | Ngrok (124:01)
- Summary - Session 7
- Session 8 - remote login | RSH , Telnet , SSH | configure files | start service | OpenSSH server | clinet & server | iscup | netstat -tnlp | putty| sshd_config | semanage port -l | SELinux |linux user su| GitBash | private & public IP | useradd | authentication_keys |ssh_keygen.exe| authorized_keys (124:17)
- Summary - Session 8
- 8_1. Linux Revision Session on 28th Nov. 23 (88:35)
- Session 9 - networking | NIC | IP | IP4 & IP6 | internet protocol | switch | router | netmask | LAN | gateway | NAT | masqurade | SNAT | DNAT |PAT (125:18)
- Summary - Session 9
- Session 10 - NAT | public IP & private IP | LAN | NATing | gateway | source IP | Destination IP | Masquerade | SNAT | DNAT | Demilitarized zone | pating | switch | OSI MODEL | L2 device | bridge L3 | home broadband devices | mobile hotspot (118:53)
- Summary - Session 10
- Session 11 - Admin user , General user & Service user | escalation | sudo | useradd | passwd | configure file | wq! | which command | install httpd | ALL Keyword | NOPASSWD | sudo -l | /etc/sudoers.d | wheel | sudoedit | sudoreplay (104:13)
- Summary - Session 11
- Session 12. File handling using python | What is a file | Mode of operations | End of line(EOL) & End of file(EOF) character | read(r) & write(w) operation | file seeking (141:11)
- Summary - Session 12
- 13. ps-aux | systemd | PID | pgrep | killprocess_ID | free-m | dockerimages command | SELinux | runc| (152:25)
- Summary - Session 13
- 13_1. Linux v9- Revision Session on 24th Dec. 2023_GMT20231224-091853 (66:01)
- 14. command-line interface | graphical user interface | GNOME | KDE | Zsh ZShell | FISH Friendly Interactive SHell | DASH | Username | Password | UserID| GroupID | User Info | Home Directory | Login Shell | which command | Shell | Bash(Bourne Again SHell) | Quotes | Single quotes (97:32)
- Summary - Session 14
- 15. RHCSA EXAM guidance (67:38)
- Basic Concepts of Partition (100:24)
- Create a Partition (100:08)
- Partition | Format | Mount (94:24)
- LVM | Extend the LV (103:24)
- LVM | Reduce LV (79:12)
- FSTAB | Swap Space (72:08)
- NAS | NFS | Persistent Mount | NTP Servers and Clients (117:24)
- Logs Metrics Importance of Logs and Metrics (110:34)
- NAS | NFS | Autofs (79:21)
- Stratis | VDO | Crontab (44:02)
- SELinux Session 1 (116:19)
- SELinux Session 2 (98:12)
- SElinux Session 3 (57:59)
- Podman Session 1 (184:09)
- Podman Session 2 (155:06)
- Scope | Users | Cgroups - Part 1 (15:25)
- Users Cgroups - Part 2 (26:55)
- Systemd | Cgroup (72:30)
- CPU Scheduling / Hardware Controlling (110:28)
- TestDisk Tool For File & Partition Recorvery (20:31)
- Recap (2:36)
- Cockpit Graphic Tool (From RedHat) (17:55)
- TCPDump ( Tracking Packets) (3:37)
- 0. Introduction to Python | Python usage | Latest Version of Python | Comparision of Python with different languages (101:30)
- 1. Operating system | Install python using anaconda | Coding | Syntax Error | function | Associative memory | Variable and reference | Different Ram and Storage Device | Read Entire Ram | python interpreter, REPL | List | Index | append() | len() | Slicing Operator | Boolean operator | Type() | dir (136:22)
- Summary - Session 1
- 2. Save source code | libraray | modules | functions | pip command use | Import keyword | Pyttsx3 library | Text To Speech | Send whatsapp, sms & email | Array | list | one dimension data and Vector | Metrix | Data Structure Planning | slicing in nested list | Numpy Library | Row & coloum operations (147:05)
- Summary - Session 2
- 3. Data types in python | type casting | how a program run | space complexity and time complexity | how to check memory usage of a variable | use of sys module | what is tuple | difference between list and tuple | swap operation in python | multi value assignment of variable | f- string (117:39)
- Summary - Session 3
- 4. Why do you code optimization | Split and join operation on string | What is iteration| what is the loop and why we need it | For loop | Block of code | Indentation | what is the ETL operations (106:33)
- Summary - Session 4
- 5. Python Operators | Relational /Comparison Operators(not equal != | equal to == | greater than >, less than <) | How to think before writing a code | Assignment Operator (=) | Decision control statement ( if, if else, if elif.....else) | input syntax | Logical Operator | Truth Table (99:57)
- Summary - Session 5
- 6. Escape Sequences (/n,/t) | Menu based Program | Integrating earlier given task program | Declaration of multiple sentences as a String (90:02)
- Summary - Session 6
- 7.list and numpy operations |Dictionay Data Structure | It's Methods | Accesing it's data | While loop |Incremental /Decremental operator | While loop Use Case (108:20)
- Summary - Session 7
- 8.Algorithm | Function | Function Call | Single Responsibility Principle (SRP)| pre build function Defferent : print() vs return() | parameterized / input Function | name argument | default argument (81:33)
- Summay -Session 8
- 9. Algorithm | Function | Function Call | Single Responsibility Principle (SRP)| pre build function Defferent : print() vs return() | parameterized / input Function | name argument | default argument (89:54)
- Summary - Session 9
- 10. How to set up environmental path of any software || How to create function || Function Call || len || CRUD Operation on Tuple || Dictionary Types (95:51)
- Summary - Session 10
- 10_1. Python Revision Session - 8th Nov (74:29)
- 11. Type and Id || Variable Memory Address || Python Memory Manager || dir || copy module|| Shallow Copy || Deep Copy || Lambda Function (81:38)
- Summary - Session 11
- 12. File handling using python | What is a file | Mode of operations | End of line(EOL) & End of file(EOF) character | read(r) & write(w) operation | file seeking (94:57)
- Summary - Session 12
- 13. file handling | mkdir() | Open() | write() function | writelines() | close() | Exits() | "\n" | lsof command | with keyword | remove() & removedirs() | pass keyword | r , w mode | readlines() | seek () function | head command | > option in cat (90:38)
- Summary - Session 13
- 14.Revision Session (59:33)
- 15. module | Calling function in module | dir keyword | help keyword | sys module | custom module (115:32)
- Summary - Session 15
- 16. Object Oriented Programming | Classes | Object | Methods | Attributes (79:38)
- Summary - Session 16
- 16.1 Revision Session (63:08)
- 17 Classes | Object | modifiers | crud operation | Access modifier | getter function | setter function | (99:30)
- Summary - Session 17
- 17.1 Revision session (67:38)
- 18. Inheritance | extend/derived/child class | base/parentclass | Hierarchical inheritance | dir | super()keyword | Method Overriding | constructor overriding | Single inheritance | Multilevel inheritance| Multiple inheritance | Hybrid inheritance | (100:43)
- Summary - Session 18
- 19. Process in Python | parallel processing | context switch | process explore | Multithreading | light weight process | (102:26)
- Summary - Session 19
- 20. Thread | Single-threaded | Multithreading | Synchronous programming | Global Interpreter Lock | (130:01)
- Summary - Session 20
- 21. Multi threading | Gil concept | Concurrency | Arthmatic operators | Stack memory | Activation report | Local variables | Global keyword | Shared memory | Global variable | Current thread | Race condition | Mutual exclusion | Mutex concept | Thread synchronization | Parallelism (127:10)
- Summary - Session 21
- 22. Concurrent processing | Python interpreter | Parallelism | CPU bound program | I/o bound programming | Contact switching | Sequential programming | multiprocessing module | Child process | Parent process | Shared variables | Global variables | Stack memory | Active child function (76:43)
- Summary - Session 22
- 23. Multi-processing | CRUD Operation | Global Scope | Process Communication | Global Variables | Parallelism | Queue & Pipe Communication | Queue Data Structure - FIFO | Enqueue(Put) & Dequeue(Get) | Uses Of Queue | Difference b/w Pipe & Queue | Producer & Consumer Concept (106:12)
- Summary - Session 23
- Summary - Session 24
- Server | networking | local program| Process | Local access | Remote Network acces | Socket programming | socket | IP and Port number | bind () | tuple | netstat -tnip | packages | (97:19)
- server | network programming | port number | conn variable | conn.recv | Client side | string | os.system | (67:16)
- file handling | read() | open() | close() | Exception Handling | interger | write() | input() | try & except keyword | TypeError | NameError | SyntaxError | I/O-Bound Processes | Finally Keyword | Raising Exception | (88:37)
- devices | Text-to-speech | pyttsx3 library | functions | program file | say() | runAndWait() | os.system | init() | type() | pip list |numpy | array | sliceing | if-else conditions | for loop | list | iteration | (134:37)
- range stack memory stack frame arguments and variables loop Stateful functions Yield List comprehension more readable and efficient manner main blocks Functional Programming (117:59)
- Open() | devices | context program | construct | With keyword | statement | speech_recognition | Pyaudio | Google Speech | GoogleRecognizeAPI | text.lower() | (90:28)
- 1. DevOps Tools | Configure Program | Type of configure | program code (Scripting, Intelligence) | Usecase | Installation on RHEL9 | Configuring host file | Resources | Control Node | Manger Node | AWS intance Lunche | Remote Login Using SSH | Ansible List Host configure | sshd configure | model (168:08)
- Summary - Session 1
- 2. Configuration Management | Controller Node & Target Node | Password Authentication Inventory | Configure Apache HTTPD Webserver | Idempotent (111:45)
- Summary - Session 2
- 3. Playbook | Configuring webserver | YAML language | Syntax check command | Running a playbook | Service module | present , true & enabled keyword | Ansible doc command (76:01)
- Summary - Session 3
- 4. Creating a playbook | debug module | variable & string in YAML | Gathering facts | vars & msg keyword | Syntax error | extra vars keyword | verbosity (116:26)
- Summary - Session 4
- 5.ansible-doc command | command module | File module | creating/ deleting directories | Target Node |copy module | playlist | sequencing (/n /t) | OS footprint | Controller Node | facts | User Defined Variable | debug module | Ansible gathering | syntax to print | httpd | apache2 | WAMP | (126:52)
- Summary - Session 5
- Ansible Revision Session on 28th Nov. 23 (100:42)
- Session 6.ansible-doc -l | AWS cloud | docker | Kubernetes | galaxy | yml file | namespace | FQMN/CN | FQCN | Python | rpm -q -l ansible-core | installing galaxy | boto3 | Security Credentials | Access Key | ansible-doc -l | ansible –version | (127:44)
- Summary - Session 6
- Revision Session (63:39)
- Session 7.Role/Template/jinja/Handler | local host | ansible localhost –list-hosts | Apache webserver | ansible-playbook web.yml | rpm -q httpd | docRoot | template | Jinja2 templating | copy and template | Template file | webport | semanage port -l |web service start | handlers | notify (112:18)
- Summary - Session 7
- Session 8.Role/Template/jinja/Handler | Apache webserver | ansible-playbook | docRoot | template | Jinja2 templating | copy and template | Template file | webport | semanage port -l |web service start | handlers | notify (112:09)
- Summary - Session 8
- Session 9.key-based authentication | key pair | Protocol-ssh | ec2-user | chmod o-r /etc/myserver.pem | admin-level commands | become true | SELinux security | vars | tasks | Role | ansible-galaxy role init | cp command | handlers | roles_path (91:14)
- Summary - Session 9
- Session10.Reverse Proxy set up | Load balancer | Horizontal Scaling | Scale Out | Scale In | setup.yaml file | file setup | yaml file | HA proxy | HA proxy services | (121:12)
- Summary - Session 10
- Summary - Session 12
- 13. Ansible - Specialisation in Devops on 20th Jan. 2024_GMT20240120-110856 (108:29)
- Dynamic inventory (118:59)
- Regex (98:23)
- ssh Protocol Web Service Web Hosting Configuration of Webserver Firewall default document root (83:00)
- Port Numbers | Curl Command | httpd (84:16)
- SSH key-gen: - Refer the Video - From Time Stamp (50:00) (83:00)
- Sudo Concepts (85:30)
- Basic of Ansible Core | Ansible controller |Limitation of ansible engine | Use Case of Ansible Tower | Ansible Inventory | Role base access control | Ansible tower installation | Preflight Check | Monitoring tools | Dynatrace | Dynatrace integration with ansible tower | (192:49)
- Session 1 - Operating system | Containerization | Containerization products | OS Environment | AWS Cloud |AWS Linux operating system | sudo su |docker install |docker start | docker ps | docker image | use different docker image | docker run | exit | docker ps -a | docker attach | ping (136:33)
- Summary - Session 1
- Session 2 - Docker Stop | Docker rm | ifconfig | whatprovides | docker stop $(docker ps -q) | docker rm -f $(docker ps -q) | docker custom image create | docker commit | docker file |FROM & RUN keyword | docker build | docker image | echo 3> / proc/sys/vm/drop_caches (109:47)
- Summary - Session 2
- Session 2_1 - Revision Session (88:37)
- Session 3 - Webserver | httpd webserver | install httpd | systemctl start httpd | systemctl status httpd | ps -aux | docker start | curl | docker file | RUN echo "hi LW" > /var/www/html/index.html | docker build | CMD keyword | docker cp | COPY keyword | docker history | "bin/bash" (125:27)
- Summary - Session 3
- Session 4 - docker -h | dockerfile | base image | centos | Ubuntu | docker build | ---ulimit | --ulimit nofile=1024000:1024000 | docker run | DIND | create docker file | ps _aux | RUN&CMD | docker history | DFORGROUND | docker inspect | horizontal scaling | public & private IP | patting (123:41)
- Summary - Session 4
- Session 5 -Networking | Switch | Router | Docker networking | SDN | L3 Bridge | docker network ls | private LAN | private IP&public IP | Masquerade | SNAT | docker attach | install net-tools | ether | rount -n | -host | overly | MVLAN | IPLAN | docker network | DHCP | IPAM | docker network (107:48)
- Summary - Sesison 5
- Session 6 -docker run | ping | docker inspect | Dynamic IP | client & server | static IP | # | --ip | --link | connecting two container | Domain name| Multi tier application | wordpress | MYSQL | LAN | docker pull | docker logs | enviroment variable | port 8080 | wordpress container (95:40)
- Summary - Session 6
- Session 7 - docker images | free ram | lscpu | df & df -h | hard disk | Persistent & Ephemeral | ls | mount | /cdata & /mydata | docker rm | mysql image | docker exec | clienttool | /var/lib/mysql | mkdir /lwfolder | container | \ | mysql –u root –p |wordpress | server | /blogdb | Resilient set up (107:26)
- Summary - Session 7
- Session 8 - Container | Dockerfile | docker history | FROM | RUN | CMD | ENTRYPOINT | ls | docker build | docker history | python3 | COPY | Docker image | -DFOREGROUN | EXPOSE | port number | 3333 port | patting | –P | registry | share our file | docker save | myaa.tar | docker load -i (87:02)
- Summary - Session 8
- 9. Repository | Dockerfile | mkdir | vim Dockerfile | 4 layers | docker build –t | centos:7 | intermediate image | def | ID | layers | docker history | UFS(union file system) | overlay file system | e / drive | echo | touch | docker inspect | hash | tar xvf layer.tar (88:49)
- Summary - Session 9
- 10.kernel | nested process | namespeace | ps –aux | grep bash | docker attach | lscpu | free –m | c group | docker run --help | -- privileged keyword | docker run –it --memory 100M | runc | crun | nsenter | docker hub | docker search |e/root/.docker/config.json | docker push | tag | versioning (116:58)
- Summary - Session 10
- 11. Revision Session (75:05)
- 12. tcp / socket | c group | docker service | containerd.sock |/dev/sda| vim/usr/lib/system/docker.serivce | execstart | dind | docker daemon | containerd.runtime |docker hub |rancher/dind| -- privileged | apache webserver | jenkins | kubernetes| podman | /run/podman/podman.sock (114:57)
- Session 1 - Running Container in Detached Mode | Docker Compose | Docker Engine | YAML Language | Multicontainer (129:33)
- Session 2 - Network Infrastructure | Docker Compose | Multicontainer Concepts (119:15)
- Session 3 - Integrate docker file and docker-compose | Tomcat Server | Docker attach Command | Bash Program |ROOT Directory | Docker-compose build Command | Patting in docker-compose | ADD Keyword in Docker File | Archive File | Copy Files | Expose Ports | Expose & ENV Keyword (116:42)
- Session 4 - PID | Why Docker is Superfast? | Need of OS | Process | Nested Process | Pgrep Command | /proc directory | Bash Shell | Kernel | Cgroup (98:19)
- Session 5 - " Data Structure | Data Member| Create Class | Create Object | Use of Objects | Methods/ Functions | Mutator |Accesor | Validation | Mutable Property | Immutable Property | Control access of variable" (124:11)
- Session 6 - " Horizontal Scaling | SPOF | Container Cluster | Create Cluster | Swarm Tool | Why Cluster? | Master Node | Slave Node | Docker Swarm Command | Launch Container through Swarm | Docker Service Command (92:16)
- Session 7 - Cluster | Create Cluster using docker- swarm | Encapsulation | Task | Replication | Pre-created Load Balancers | Replicas Keyword | Fail Over| Fault Tolerance | State| Scaling | Scale Out | Scale In | Orchestration (127:05)
- Session 8 - Docker Engine | Distributed Network | Overlay Network | Network Connectivity | docker network command| Encrypt the packets | Opt Option| VXLAN | Docker Compose with Swarm| Single Node | Stack | Docker Compose File | Redis (113:16)
- Session 9 - Leader Node | Worker Node | High Availability | Fault Tolerance | Replicas by Manager Node| SPOF |Quorum | Election | Split Brain Problem | Raft Consensus Algorithm (111:25)
- Session 10 - Docker inside docker | Dockerd program | Container socket | Sharing base system socket | Chattr command | docker capabilities | Removing capabilities in a container | Adding capabilities in a container | privileged keyword | Cap-drop keyword | Cap-add | Server hardening | Security (124:03)
- 1. Use case of C++ | speed of C++ | Compiler | Machine code | Low level language | GCC compiler | MinGW-w64 | ‘cout’ keyword | DEV C++ installation (125:07)
- Summary - Session 1
- 2.RAM | Memory Manager | Physical memory address | High-level language | Low-level language | Data type | Integer | Variable | mkdir command | Dir command | std | '&'(symbol) | Pointer |asterisk (*) symbol | (121:20)
- Summary - Session 2
- 3.OS (operating system) | CPU | Space Complexity | Time Complexity | initialization | sizeof keyword | pointer to pointer (105:46)
- Summary - Sesison 3
- Python Presentation 13th Dec 2023 (59:34)
- 4.short int | long long int | MSB - Most Significant bit | INT_MIN | INT_MAX | SHRT_MIN (104:23)
- Summary - Session 4
- 5.Compiler| IDE | RAM | Memory | Primitive data type | Non primitive data type | ASCII | Keyword auto | Keyword cin | decltype | String | (77:17)
- Summary - Session 5
- 6.Function | using namespace std; | endl | Block of code | Stack memory | Entry point | user define function | local scope | Single resposibility principle | Memory management | (107:14)
- Summary - Session 6
- 7.Code redundancy | Algorithm | Arguments | input data | Parameter | Parameterized function | Return value | (102:10)
- Summary - Session 7
- 8.Data type | Function definitions| Output data type | Return type | Argument | Entrypoint | Stack memory | Activation record | Stack Frame | Main() Function | Instruction/ Operation/Process | Heap memory | Memory Address | Dereferencing Operator | Pass by Address & value (103:26)
- Summary - Session 8
- 9.Data variable | Assignment operator | & operator | Pointer | Memory address | Reference variable | Swapping | pass by value (69:46)
- Summary - Session 9
- Summary - Session 10
- loop | Iteration | Recursion | “for” loop and “while” | function | stack memory | activationrecord(AR) | multiple activation records | stackoverflow | Directrecursion | Indirectrecursion | factorial (130:26)
- Precedence of Operation | Post and Pre Increment Operator | Array | Static Array | Arithmetic Operation in Pointers | Dereferencing (134:31)
- Boolean Data Type | Conditions | Operators | Block of Code | Inline Code (110:37)
- Session -"Data Manupulation| SetFname | Methods | Inheritance | Multi - level Inheritance | Hirarachical Inheritance | Single- level Inheritance | Multiple Inheritance | Parent Class | Child Class" (104:09)
- Session - " Data Structure | Data Member| Create Class | Create Object | Use of Objects | Methods/ Functions | Mutator |Accesor | Validation | Mutable Property | Immutable Property | Control access of variable" (124:39)
- Session - " Class | Constructor | Method Overloading | User- Defined Constructor | Default Constructor | Use of Constructor | Create Object | Inheritance | Parent Constructor" (121:30)
- Session - Local Variable | Activation Record | Static Keyword in Function | Static Keyword in Class | Class Space or Class Variable or Sharable Space | Context Switching | Inline Function | Method | Prototype or Method Signature | Scope Resolution Operator (113:29)
- Session - Access Control | Control the access of data | Parent Class | Derived Class | Inheritance | Protected Access Modifier | Least Privilege Concept | Constructor | Multiple Inheritance | Hierarchical Inheritance | Methods (117:10)
- Session - Compile time | Run time | Static memory allocation | Dynamic memory | Stack memory | Heap memory |Organizing data | Array | Data structure | Continuous and Non-continuous way | Linked List | Demo of C programming language | printf function | scanf function | studio.h library (98:46)
- Session - Heap Memory | Stack Memory | Mallock Function | Dereferencing | Static Memory Allocation | Dynamic Memory Allocation | Compile Time | Allocation at Run Time | Stack Frame | Dynamic Array (126:38)
- Session - Access data value after function finished | Pointer to pointer or Double pointer | Use of * and ** in Double pointer | Use case of double pointer | Allocate heap memory using function | Allocation heap memory for array in C++ | De-allocation heap memory for array in C++ (126:16)
- Summary - Session 1
- Summary - Session 2
- Summary-Session-3
- Summary-Session-4
- Summary - Session 5
- Summary - Session-6
- Summary - Session-7
- Summary - Session-8
- Summary - Session-9
- Summary - Session-10
- Summary - Session - 11
- Summary - Session - 12
- Summary - Session - 13
- Summary - Session 14
- Summary - Session 15
- Summary - Session 16
- 16.1 Revision Session (63:07)
- Summary - Session 17
- Summary - Session 18
- Summary - Session 19
- Ingress Controller | DNS and its uses | Routing (73:03)
- Summary
- Network policy (54:26)
- Summary - Network Policy
- Design Pattern (84:59)
- Summary - Design
- Container Security (66:28)
- Summary - Container Security
- Service Account (45:10)
- Summary - Service Account
- Custom resource & Custom resource definition (58:14)
- Summary - Custom resource & Custom resource definition
- Summary - Session 20
- Environmental Variables (36:42)
- Secret (12:55)
- Namespace (21:17)
- Configmap (71:17)
- DNS Services - CoreDNS ConfigMap (127:42)
- CRI - O Podman (114:46)
- NAS | NFS | Persistent Mount | NTP Servers and Clients (117:24)
- NAS | NFS | Autofs (79:21)
- Authentication Part 1 (37:05)
- Authentication Part 2 (74:25)
- Role Based Access Control - Part 1 (18:37)
- Role Based Access Control - Part 2 (63:46)
- User Management - part 1 (57:43)
- User Management - part 2 (63:46)
- Summary - Session-1
- Summary - Session-2
- Summary - Session-3
- Summary - session-4
- Summary - Session 5
- Summary - Session 6
- Summary - Session 7
- Summary - Session 8
- Summary - Session 9
- Summary - Session 10
- Summary - Session 11
- Summary - Session 12
- Summary - Session 13
- 13.1_ Data Structures & Algorithms training By the world Record Holder Mr. Vimal Daga on 8th Mar. 24 _GMT20240308-132519 (61:32)
- Summary - Session 14
- Summary - Session 15
- Summary - Session 16
- Summary Session 17
- Summary Session 18
- Summary Session 19
- Session 1 - STL (Standard Template Library) Time Complexity Extend Array Append Data CPU Time POP Vector Capacity Function push_back Size Function (116:21)
- Session 2- Create dynamic array | Vector | Traversal Operation | Iterator Class | push_back keyword | itr object | foreach loop | Challenges in array (102:50)
- Session 3 - Limitation of Array| OutOfMemory Exception | Continuous way | Non-continuous way | Linked List | Node | Self-referencing class (67:01)
- Session 4 - Linked List | Head Node| Last Node | Create Node | Updating Memory Address of a node | Linked List Variables | Insertion Operation in linked list | Traverse into linked list using loop (112:45)
- Session 5 - Create Linked List Using Constructor | Read Operation | Length Operation | Abstract Data Type(ADT)| Destructor | Delete Linked List Using Destruction (118:28)
- Session 6 - Insertion Operation on Array | Time Complexity of Insertion Operation on Array | Insertion Operation on Linked List | Time Complexity (Best Case Scenario) of Insertion Operation on Linked List | Time Complexity (Worst Case Scenario) of Insertion Operation on Linked List (106:34)
- Session 7 - LINKED LIST | GET | SET | UPDATE | ARROW OPERATOR | ITERATION | CONSTRUCTOR | DESTRUCTOR | ACCESSING THE DATA | Best Case and Worst Case scenarios | Head node | Tail node (103:38)
- Session 8- Singly linked list using STL | forward_list library | Doubly Linked List | Create Node in Doubly Linked List (80:11)
- Session 9- Create Doubly Linked List | Insert Operation | Forward Display Operation | Reverse Display Operation | isEmpty method (104:47)
- Session 10 - push back operation | push front operation | Time complexity of push back & front method | peek operation | Time complexity of peek operation | pop operation | Time complexity of pop operation (114:28)
- Session 11 - FIFO(First In First Out) | Queue Data Structure | Push Operation in Queue | Pop Operation in Queue (63:50)
- Session 12 - Queue : Using Doubly Linked List | Enqueue | Time Complexity of enqueue method | Dequeue | Time Complexity of dequeue method | Display Method | Time Complexity of display method | isEmpty method | Time Complexity of isEmpty method (95:48)
- Session 13 -stack data structures|Time complexity | space complexity |queue |array|list|pop operation|puch back |pop back |activation record |LIFO| (97:02)
- Session 14 - Basics about Tree | Data structure | Terminologies used in Tree Data Structure such as (Leaf, root, sibling, etc) | Ancestor and Descendants | Implement a Tree DS | Binary Search Tree(BST) (132:47)
- Session 15 - linear and nonlinear (difference, example) | Travers Binary Tree | Difference between Depth first traversal and Breadth first traversal | Traverse using pre-order (130:02)
- Session 16 - Strict binary tree | Space and time complexity of pre-order & in-order traversal | In-order & post-order traversal (114:57)
- What is Devops ? (27:38)
- Continuous deployment | Continuous testing | Continuous Integration (74:49)
- Maven integration with Jenkins (79:20)
- Windows as a Slave node (36:07)
- Jenkins Integration with Kubernetes (128:36)
- Different ways to interact with Jenkins | Environmental variable| IAM & RBAC in Jenkins| Environmental variable (88:56)
- 1. Cloud Computing Concept | Importance of OS & Physical Devices | Concurrent Connection Limit | Scalability Concepts | Netflix History | CSP(Cloud Service Provider) | Servers Or Instances | AWS Data Center | Availability & Availability Zones | Regions | Latency Concepts | Launch Instance In AWS (165:18)
- Summary - Session 1
- 2. Cost Management | Computational Complexity | CSP | AWS-EC2 Service | Python program in EC2-CLI | Provisioning | Fully Managed Services(Serverless) | Lambda Service | Monolithic Approach | Mirco-services | FAAS(Function As A Services) | Use Cases Of Lambda | Function Creation In Lambda (134:42)
- Summary Session 2
- 3. EC2 Service infrastructure | Lambda Service For Serverless | WebApp Via EC2 service | Security Groups | OS Images(AMI) | Yum Software | HTTPD(Apache) Software | Serverless Service | Physical Devices-RAM, CPU, HD, N/W | Real-Time Monitoring | Cloud Watch Service | Data Points | Lambda Function (133:54)
- Summary - Session 3
- Summary - Session 4
- Summary - Session 6
- Summary - Session 7
- Summary - Session 8
- Summary - Session 9
- Summary session 10
- 12. "What is a Platform | Platform as a service | Infrastructure as a service | AWS Elastic Beanstalk | Setting up apache webserver in EC2 instance | EC2 vs Beanstalk uses | Setting up AWS Elastic Beanstalk | Domain name | Environment | Creating and uploading the code in Beanstalk " (127:10)
- Summary Session 12
- 13. AWS Cloud Training By the World Record Holder Mr Vimal Daga on 24th April 2024_GMT20240424-152344 (123:08)
- EFS | EFS filesystem | Geo-replication | PERFORMANCE | IOPS, Throughput | HDD | SSD | Pricing | EBS (113:09)
- Summary -EFS | EFS filesystem | Geo-replication | PERFORMANCE | IOPS, Throughput
- Session 27 - Global Accelerator | cache | TTL | CDN | S3 | Bucket | CloudFront | Edge location | Static Content (125:41)
- Session 28 - CloudWatch dashboard | Creation of dashboard | detailed monitoring | Custom metrics | standard resolution | high resolution | AWS namespace | Custom namespace | dimension | CloudWatch Agent (168:07)
- Summary - CloudWatch dashboard | Creation of dashboard | detailed monitoring
- Session 29 - CDN (Content Delivery Network) | cache | Cloud Front | Cache Miss | Cache Hit | Cloud Front classes | TTL ( Time-To-Live) | OAC (Origin Access Control) | S3 (118:58)
- Summary - CDN (Content Delivery Network) | cache | Cloud Front | Cache Miss
- Session 30 - Cloud Front With Api Gateway Integration | Query String | Cache Policy | CloudFront | Distributions | AWS Shield (119:17)
- Summary - Cloud Front With Api Gateway Integration | Query String | Cache Policy
- Session 32 - CloudWatch | log group | log management | sys logs | Log Agent Program | AWS System Manager Parameter Store (150:16)
- Summary - CloudWatch | log group | log management | sys logs
- Session 33 - How to connect with s3 when it's private with cloudfront | S3 policy | OAC | ARN | Placement Group (Cluster , spread , partition) | Elastic IPS | EIP aws cost (112:53)
- Summary - How to connect with s3 when it's private with cloudfront | S3 policy
- Session 34 - Event | Event Management | Cloud Watch | Bus | Event Buses | Pub-Sub Model | Event Driven Architecture | Rules | Partner Event source (102:20)
- Summary - Event | Event Management | Cloud Watch | Bus | Event Buses
- Session 35 - Event Bridge | Custom Bus and Product Bus | Creating Buses | Creating Rules | Send Events | Log Group | Event pattern | Custom event | Create pattern with json - event pattern | Clodwatch | lambda function |prefix matching | Content based filtering (123:08)
- Summary - Event Bridge | Custom Bus and Product Bus | Creating Buses
- Session 36 - Decision Latency | Real Time Fraud Detection | Aws Kinesis | Data Analytics | MessageQ Stream | Kafka (MSK) | Kinese Analytics | Cloud Formation | Dynamo DB (130:52)
- Summary - Decision Latency | Real Time Fraud Detection | Aws Kinesis
- Session 37 - CloudFront & Edge Locations | Use cases of Edge location | CloudFront Function | Lambda@Edge | Difference between CloudFront Function and Lambda@Edge | Create a function with CloudFront Function (108:01)
- Summary - CloudFront & Edge Locations | Use cases of Edge location
- Session 38 - lambda@edge | A/B Testing | Http Header | Cookie | Event Trigger | Lambda Code | Policy | CloudFront Event | CloudWatch Metrics and logs (123:44)
- Summary - lambda@edge | A/B Testing | Http Header | Cookie
- Session 39 - Difference between IAM and CIAM | Customer IAM (CIAM) | Amazon Cognito | Call back URL | Identity Providers | Cognito User Pool | Integrate API Gateway with Cognito | Identity Token (138:05)
- Summary - Difference between IAM and CIAM | Customer IAM (CIAM)
- Session 40 - Amazon Macie | Data lake | Senstitive Data | jobs | Custom data identifiers | Aws gaurdduty | Vpc Flow logs | Aws cloudTrail | Finding (125:33)
- Summary - Amazon Macie | Data lake | Senstitive Data | jobs
- Session 42 - AWS Kinesis|Kinesis Data Streams| Big Data | Serverless model | auto-scaling of shards|Partition | Kinesis Cloud Shell| (101:35)
- Accessing EC2 instance using SSH protocol | Internet's networking over the globe | Proxy concept | Socks5 Proxy with implementation | Deploying simple web page on EC2 | Global Accelerator | AWS's Global Network Infrastructure (142:03)
- Summary
- Utility/Standalone Service | AWS Global Network | Global Accelerator | Edge locations | AWS Compute Optimizer | regional service | global service (126:27)
- Summary
- Storage | EBS | Persistent Storage | S3 | NFS | Storage as a service | Block, File, Object Storage | Partition | Disaster Recovery | EFS (152:42)
- Summary
- Summary Session 1
- Summary Session 2
- 3. EBS volume | ssh using key | Lauching ec2 instancing | Creating And Attaching EBS volume | aws_instance resource | aws_volume_attachment resource | Data Sources | Configuring webserver | remote-exec provisioner | connection keyword | automating login | inline[] | null resource | command keyword (122:31)
- Summary Session 3
- 4. Creating a project using the Terraform | VPC in AWS cloud | Setting up VPC using Terraform code | Cidr block | DNS | What is Subnet | Setting up Subnet using Terraform code | Internet Gateway | Setting up Internet Gateway using Terraform code | What is Route table (118:12)
- Summary Session 4
- 5. Multi-tier application | Deploying Multi-tier application(WordPress) using Terraform | Private and public subnets | Security groups | Inbound and outbound rules | Setting up Security groups using Terraform | Creating inbound and outbound rules using Terraform | Amazon RDS service (139:49)
- Summary Session 5
- 6. Variables in Terraform | How to pass variable value in command line | Multi environment setup | Functions in Terraform | tfvars file | Optimising the code using variables | What are modules | Creating modules | How to use the module (148:19)
- Summary Session 7
- 1. Need of the cloud | Public cloud | Ec2 and azure virtual machine | Multicloud strategy | Cost optimisation | Latency issue | Infrastructure as a service | Region and Location | Multicloud architecture | Storage(EBS and Azure disk storage) | Auto scaling (ASG and auto scaling sets) (123:03)
- Session 1
- Session 2
- Session 3
- Summary Session 4
- Summary Session 5
- Summary Session 6
- Summary Session 7
- Summary Session 8
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.