An advanced level certification that validates the skills, knowledge, and abilities required to be a senior system administrator responsible for Red Hat Enterprise Linux systems.
You will find this term commonly used in System Administration, Linux
An open source, enterprise-level Linux operating system developed by Red Hat.
You will find this term commonly used in General IT, Operating Systems
In cybersecurity, a group that plays the role of an adversary to test or evaluate the security of a system.
You will find this term commonly used in Security, Cybersecurity
Simulated cyber attacks against an organization's security posture to test its defenses.
You will find this term commonly used in Security, Cybersecurity
A type of self-balancing binary search tree, used in computer science to implement associative arrays, and multi-dimensional indexes.
You will find this term commonly used in Algorithms, Data Structures
The process of editing text for publication or removing sensitive information from a document before publication.
You will find this term commonly used in Security, Data Privacy
The duplication of critical components or functions of a system with the intention of increasing reliability of the system.
You will find this term commonly used in General IT, Networking
A power supply system designed to ensure that a system continues to operate in the event of one power supply failing.
You will find this term commonly used in Hardware, Reliability
An open-source JavaScript library for managing application state, commonly used with React for building user interfaces.
You will find this term commonly used in Software Development, Web Development
A toolset for efficient Redux development, providing simplified APIs and utilities to reduce boilerplate code in projects using Redux.
You will find this term commonly used in Software Development, Web Development
The process of restructuring existing computer code without changing its external behavior, intended to improve nonfunctional attributes of the software.
You will find this term commonly used in Software Development, Quality Assurance
An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.
You will find this term commonly used in Software Development, System Architecture
Data used to categorize or classify other data within a system or application.
You will find this term commonly used in Data Management, Databases
A type of XSS attack where the malicious script is reflected off a web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request.
You will find this term commonly used in Security, Web Development
In computer science, the ability of a program to examine and modify its own structure and behavior at runtime.
You will find this term commonly used in Software Development
An API that allows a program to perform operations on itself, such as inspecting classes and invoking methods at runtime.
You will find this term commonly used in Software Development
The number of times in a second that a display hardware updates its buffer. A higher refresh rate results in a smoother picture.
You will find this term commonly used in Hardware, Display Technology
In computing, a hierarchical database that stores low-level settings for the operating system and for applications that opt to use the registry.
You will find this term commonly used in General IT, Operating Systems
A graphical tool in Windows that allows authorized users to view and edit the registry.
You will find this term commonly used in Operating Systems, Windows
A statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables, when the focus is on the relationship between a dependent variable and one or more independent variables.
You will find this term commonly used in Data Analysis, Machine Learning
Regression testing is a software testing technique that verifies whether recent code changes have affected the existing functionality of an application, ensuring that previously developed and tested features still perform as intended.
You will find this term commonly used in Software Development, Testing
A sequence of characters that define a search pattern, mainly for use in pattern matching with strings.
You will find this term commonly used in Software Development, Data Processing
Adhering to laws, regulations, guidelines, and specifications relevant to business processes.
You will find this term commonly used in General IT, Compliance
A procedural query language, which takes instances of relations as input and yields instances of relations as output. It uses operators to perform queries.
You will find this term commonly used in Database
A database structured to recognize relations among stored items of information according to a relational model of data.
You will find this term commonly used in Database, Data Management
A database model based on first-order predicate logic, establishing a relationship among stored items of information.
You will find this term commonly used in Database, Data Modeling
The process of managing, planning, scheduling, and controlling a software build through different stages and environments; including testing and deploying software releases.
You will find this term commonly used in Software Development, Project Management
The process and stages a code change goes through from development to deployment.
You will find this term commonly used in Software Development, DevOps
The probability that a system will perform its intended function without failure under stated conditions for a specified period of time.
You will find this term commonly used in General IT, Quality Assurance
The ability to connect to and use a computer or network from a remote location, typically over the internet.
You will find this term commonly used in General IT
A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
You will find this term commonly used in Networking, Security
A security vulnerability that allows an attacker to execute arbitrary code on a victim's system remotely.
You will find this term commonly used in Security, Cybersecurity
Remote desktop refers to a technology that allows users to access and control a desktop or application hosted on a remote computer over a network connection, typically using remote desktop software or protocols.
You will find this term commonly used in Networking, Remote Work, Software Development
A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.
You will find this term commonly used in Networking, Security
A type of software designed to help managed IT service providers (MSPs) remotely and proactively monitor client endpoints, networks, and computers.
You will find this term commonly used in Networking, IT Management
A protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details.
You will find this term commonly used in Networking, Distributed Systems
Remote sensing is the acquisition of information about an object or phenomenon without physical contact, typically using sensors mounted on satellites, aircraft, or drones to gather data about Earth's surface or atmosphere.
You will find this term commonly used in Environmental Monitoring, Geospatial Analysis
A method of implementing fault-tolerance mechanisms in distributed computing systems by ensuring that multiple copies of data are kept in sync across different servers.
You will find this term commonly used in Distributed Systems, Fault Tolerance
The process of copying and maintaining database objects, like tables, in multiple database servers that are distributed across different physical locations.
You will find this term commonly used in Database, General IT
In distributed computing, the number of copies of data that are kept in a distributed storage system to ensure data availability and durability.
You will find this term commonly used in Database, Distributed Systems
Software applications that collect data from various sources, process it, and present it in a readable format.
You will find this term commonly used in Data Analysis, Business Intelligence
In version control systems, a repository is a central file storage location. It is used by version control systems to store multiple versions of files.
You will find this term commonly used in Software Development
A design pattern that mediates between the domain and data mapping layers, acting like an in-memory domain object collection.
You will find this term commonly used in Software Development, Design Patterns
A publication from the technology community to describe methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.
You will find this term commonly used in Networking, Standards
Limiting the number of user requests to a service within a certain timeframe to prevent overuse of resources.
You will find this term commonly used in Web Development, Security
The process of determining user expectations for a new or modified product.
You will find this term commonly used in Software Development, Project Management
The risk that remains after all efforts to identify and eliminate risk have been made.
You will find this term commonly used in Security, Risk Management
The ability of a system to handle and recover from faults and failures.
You will find this term commonly used in General IT, Security
In display technology, the number of distinct pixels that can be displayed in each dimension. In networking, the process of resolving a domain name to its corresponding IP address.
You will find this term commonly used in Hardware, Networking
The process of assigning and managing assets in a manner that supports an organization's strategic goals.
You will find this term commonly used in General IT, Project Management
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
$129.00 Original price was: $129.00.$51.60Current price is: $51.60.
Start for only $1. Unlock endless learning opportunities with over 2,600 hours of IT training at our lowest price ever. Plus, get all new and updated online courses for free while your subscription remains active.
Cancel at your convenience. This exceptional deal on IT training provides you access to high-quality IT education at the lowest monthly subscription rate in the market. Boost your IT skills and join our journey towards a smarter tomorrow.
ENDING THIS WEEKEND: Train for LIFE at our lowest price. Buy once and never have to pay for IT Training Again.