3. Import Northwind Traders Database
Tom Buck
3. Import Northwind Traders Database
5:18
2. SQL Server Install
Tom Buck
2. SQL Server Install
8:51
1. Introduction
Tom Buck
1. Introduction
1:10
11. CSS Files
Tom Buck
11. CSS Files
6:11
10. CSS Styles
Tom Buck
10. CSS Styles
8:14
9. Tables
Tom Buck
9. Tables
13:19
8. Links
Tom Buck
8. Links
8:26
7. Images
Tom Buck
7. Images
6:02
6. Fonts
Tom Buck
6. Fonts
3:16
2. Tags: br, b, i, and u
Tom Buck
2. Tags: br, b, i, and u
4:35
1. HTML - Setup and Introduction
Tom Buck
1. HTML - Setup and Introduction
7:49
4. Readable HTML
Tom Buck
4. Readable HTML
2:21
3. Cleanup and title tag
Tom Buck
3. Cleanup and title tag
4:18
5. Colors
Tom Buck
5. Colors
11:43
Install Visual Studio Code
Tom Buck
Install Visual Studio Code
6:57
Install Python
Tom Buck
Install Python
2:39
Software Part 2 5 Types of Business Applications
Tom Buck
Software Part 2 5 Types of Business Applications
4:02
HTML Class
Tom Buck
HTML Class
1:32:57
ITIL Part 8   Continual Service Improvement
Tom Buck
ITIL Part 8 Continual Service Improvement
1:18
ITIL Part 6   Service Transition
Tom Buck
ITIL Part 6 Service Transition
1:42
ITIL Part 7   Service Operation
Tom Buck
ITIL Part 7 Service Operation
1:26
ITIL Part 5   RACI Charts
Tom Buck
ITIL Part 5 RACI Charts
0:32
ITIL Part 4   Service Design
Tom Buck
ITIL Part 4 Service Design
1:28
ITIL Part 3   Service Strategy
Tom Buck
ITIL Part 3 Service Strategy
1:50
ITIL Part 2   ITIL Introduction
Tom Buck
ITIL Part 2 ITIL Introduction
1:29
ITIL Part 1    IT Functions
Tom Buck
ITIL Part 1 IT Functions
2:34
BIS part 9   DIKW
Tom Buck
BIS part 9 DIKW
1:40
BIS part 8   IoT
Tom Buck
BIS part 8 IoT
1:42
BIS part 7    Publishing Data
Tom Buck
BIS part 7 Publishing Data
1:27
BIS part 6   Analyzing Data Part 3
Tom Buck
BIS part 6 Analyzing Data Part 3
1:09
BIS part 5   Analyzing Data Part 2
Tom Buck
BIS part 5 Analyzing Data Part 2
0:56
BIS part 4   Analyzing Data Part 1
Tom Buck
BIS part 4 Analyzing Data Part 1
3:34
BIS part 3   Structured and Unstructured Data
Tom Buck
BIS part 3 Structured and Unstructured Data
1:16
BIS part 2   Acquiring Data
Tom Buck
BIS part 2 Acquiring Data
2:38
BIS part 1   Introduction
Tom Buck
BIS part 1 Introduction
0:46
Security part 13   Agility
Tom Buck
Security part 13 Agility
1:51
Security part 12   Social Engineering
Tom Buck
Security part 12 Social Engineering
0:50
Security part 11    Man in the MIddle
Tom Buck
Security part 11 Man in the MIddle
1:25
Security part 10   Brute Force Attacks
Tom Buck
Security part 10 Brute Force Attacks
2:05
Security part 9   SQL Injection
Tom Buck
Security part 9 SQL Injection
1:59
Security part 8   DDOS
Tom Buck
Security part 8 DDOS
3:12
Security part 7   Access
Tom Buck
Security part 7 Access
0:56
Security part 6   Accuracy
Tom Buck
Security part 6 Accuracy
2:38
Security part 5   Replication
Tom Buck
Security part 5 Replication
3:25
Security part 4   RTO and RPO
Tom Buck
Security part 4 RTO and RPO
3:12
Security part 3    Backups and Replication
Tom Buck
Security part 3 Backups and Replication
2:11
Security part 2   IT and Risk
Tom Buck
Security part 2 IT and Risk
2:44
Security part 1   Introduction
Tom Buck
Security part 1 Introduction
1:32
The Cloud part 9   Cloud Offerings
Tom Buck
The Cloud part 9 Cloud Offerings
2:00
The Cloud part 8   Pros and Cons
Tom Buck
The Cloud part 8 Pros and Cons
1:51
The Cloud part 7   TCO
Tom Buck
The Cloud part 7 TCO
0:50
The Cloud part 6   CapEx vs  OpEx
Tom Buck
The Cloud part 6 CapEx vs OpEx
2:11
The Cloud part 5   Four Cloud Advantages
Tom Buck
The Cloud part 5 Four Cloud Advantages
1:23
The Cloud part 4   Pooling and Elasticity
Tom Buck
The Cloud part 4 Pooling and Elasticity
4:21
The Cloud part 3   What is virtualization
Tom Buck
The Cloud part 3 What is virtualization
2:30
The Cloud part 2   Why do we call the  The Cloud
Tom Buck
The Cloud part 2 Why do we call the The Cloud
1:28
The Cloud part 1  What is the Cloud
Tom Buck
The Cloud part 1 What is the Cloud
1:46
Networks and Communication Part 10   IoT and IPV6
Tom Buck
Networks and Communication Part 10 IoT and IPV6
1:37
Networks and Communication Part 9   DNS
Tom Buck
Networks and Communication Part 9 DNS
3:34
Networks and Communication Part 8   Routers, Firewalls, and VPNs
Tom Buck
Networks and Communication Part 8 Routers, Firewalls, and VPNs
4:56
Networks and Communication  Part 7   Subnets
Tom Buck
Networks and Communication Part 7 Subnets
3:19
Networks and Communication  Part 6   TCP, UDP, and Ports
Tom Buck
Networks and Communication Part 6 TCP, UDP, and Ports
1:43
Networks and Communication  Part 5   IP Addresses
Tom Buck
Networks and Communication Part 5 IP Addresses
1:11
Networks and Communication  Part 4   TCPIP Introduction
Tom Buck
Networks and Communication Part 4 TCPIP Introduction
3:47
Networks and Communication  Part 3   Mac Addresses
Tom Buck
Networks and Communication Part 3 Mac Addresses
1:13
Networks and Communication  Part 2   Bandwidth and Latency
Tom Buck
Networks and Communication Part 2 Bandwidth and Latency
2:21
Networks and Communication  Part 1   Introduction
Tom Buck
Networks and Communication Part 1 Introduction
0:40
Software Part 7   In House or Off the Shelf
Tom Buck
Software Part 7 In House or Off the Shelf
2:31
Software Part 6   SDLC
Tom Buck
Software Part 6 SDLC
3:57
Software Part 5   Licensing Models
Tom Buck
Software Part 5 Licensing Models
4:03
Software Part 4   Open Source
Tom Buck
Software Part 4 Open Source
3:03
Software Part 3   Virtualization
Tom Buck
Software Part 3 Virtualization
2:12
Software Part 2   Operating Systems Drivers Applications
Tom Buck
Software Part 2 Operating Systems Drivers Applications
2:56
Software Part 1   Introduction
Tom Buck
Software Part 1 Introduction
0:53
Hardware Part 9   RAID
Tom Buck
Hardware Part 9 RAID
4:47
Hardware Part 8   Storage
Tom Buck
Hardware Part 8 Storage
2:49
Hardware Part 7   CPU
Tom Buck
Hardware Part 7 CPU
2:18
Hardware Part 6   3 Components
Tom Buck
Hardware Part 6 3 Components
1:54
Hardware Part 5   How a Computer works, Part 3
Tom Buck
Hardware Part 5 How a Computer works, Part 3
3:10
Hardware Part 4   How a Computer Works, Part 2
Tom Buck
Hardware Part 4 How a Computer Works, Part 2
3:13
Hardware Part 3   How a Computer Works, Part 1
Tom Buck
Hardware Part 3 How a Computer Works, Part 1
3:35
Hardware Part 2   Three Main Components
Tom Buck
Hardware Part 2 Three Main Components
1:02
Hardware Part 1   Introduction to Hardware
Tom Buck
Hardware Part 1 Introduction to Hardware
1:46