FREE Training Opportunity With MS Live 3 Day Event: Building Apps for Windows Phone 8.1
As we continue to bring you more free training opportunities from all over the web, here’s a truly exciting one. Windows Phone developers and wannabes, this one is truly for you! And for those of you undecided as to whether or not you want to switch to developing apps for Windows Phone 8, this is a great opportunity.
Microsoft organizes a FREE building Apps for Windows Phone 8.1 Jump Start virtual session, which you will be able to join live, from the comfort of your home, for absolutely free. It will be on for 3 days: April 29-May 1, 2014, 9-5 PDT (days 1 & 2), 9-12 PDT (day 3)
The event is open to all experienced software developers with knowledge of object-oriented design. Familiarity with C# or XAML is helpful. The great news is, no prior experience with developing Windows Phone 8 apps is required.
‘ Is this a good opportunity for me?’
If you’re an app developer willing to design and build Windows Phone 8.1 apps using XAML and C#, then YES. The two-and-a-half day, demo-rich course, taught by experts who have years of experience developing (and writing about the process), focuses on how to create apps for Windows Phone 8.1 in Visual Studio and how to create universal app projects that share a high percentage of code and that target both Windows and Windows Phone.
The course will bring you tips and tricks on maximizing your app compatibility and optimizing your code. Find out about new features, and learn how to program the many new Windows Runtime APIs that are available to both Windows Store apps and to Windows Silverlight apps. You can even get code samples. Sign up now to make your apps world-ready!
To prepare for the course, download the Windows Phone SDK, which includes all the tools you need to get started. And check out the Windows Phone sessions from Build 2014.
You can register for the event for free by clicking here.
CompTIA CYSA+ CS0-002 – Enumeration Tools Part 1
1. Enumeration Tools (OBJ 1.4) Enumeration tools. In this lesson, we’re going to talk about some of the enumeration tools that we’re going to experience as we’re trying to enumerate our networks. Now, what exactly is enumeration? Well, enumeration is the process to identify and scan network ranges and hosts that belong to the target… Read More »
CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 3
6. Scheduling and Constraints (OBJ 1.3) Scheduling and constraints. In this lesson, we’re going to talk about scheduling and constraints. So the first question I have for you is, how often should you scan? Well, this is going to be determined based on your internal risk management decisions of your organization. If you have a… Read More »
CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 2
4. Scanner Types (OBJ 1.3) Scanner types. In this lesson, we’re going to talk about the different ways you can configure your scanner. Now, different scanners have different capabilities. Some are going to be passive, some are going to be active, and some are going to be active with particular configurations that we’re going to… Read More »
CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 1
1. Identifying Vulnerabilities (OBJ 1.3) Identifying vulnerabilities. In this lesson, we’re going to talk about the importance of identifying vulnerabilities. And the way we do this is through a vulnerability assessment. Now, it is really important to identify vulnerabilities so that you can then mitigate those vulnerabilities. Remember, every vulnerability in your system represents a… Read More »
CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 2
4. Hardening and Patching (OBJ 1.3) Hardening and patching. In this lesson we’re going to talk about two key terms. And I know I’ve used these words before, but we’ve never really defined them. These are hardening and patching. Now, when I talk about system hardening, this is the process by which a host or… Read More »
CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 1
1. Mitigating Vulnerabilities (Introduction) In this section of the course, we’re going to cover how to analyze output from vulnerability scanners. We’re going to stay in domain one in this section of the course, but we are going to cover multiple objectives this time, including objective 1213 and one four. Now, objective one two states… Read More »