IT Ops

Cloud computing challenges and opportunities for the public sector

A look at the current challenges and opportunities facing public sector organizations as they hope to adopt cloud...

PCI DSS 4.0: A guide to making your organization compliant

The new version of the Payment Card Industry Data Security Standard becomes mandatory on 1st April 2024. Here's how to...

The top ChatGPT plugins for developers

From plugins that let you run code inside of ChatGPT to search GitHub for helpful code snippets, here's some tools to...

Should I become a technology specialist or generalist?

We break down the pros and cons of both, how these might impact your salary and career options, and the benefits of...

Terragrunt: Simplifying Infrastructure as Code for the cloud

Terragrunt is an open-source IaC tool that can make managing infrastructure on cloud platforms a whole lot easier....

What is AWS CDK (and why should you use it?)

AWS CDK is an open-source framework that lets you use modern programming languages to create cloud infrastructure....

ChatGPT & GPT-4 for most leaders: It’s not ready for you (yet)

Why leaders should take a step back from the hype and check if GPT-4 is really going to add business value, and that...

7 benefits of AIOps for organizations

AIOps, or Artificial Intelligence for IT Operations, is one way leaders can leverage the latest tech to meet business...

Self-Fixing and Auto-Code with AI: Debating the Pros and Cons

Are scripts that fix themselves a neat idea, or a recipe for disaster? Our resident tech experts discuss the issues. We...

Security reviews and AI models: How to decide what to greenlight

It's tricky to balance security without being branded a blocker. We cover how to review AI products, from checking the...

Vulnerability Management: What it is, and how to go about it

We explain the anatomy of a cyberattack, how vulnerability management can be used to lower your organizational risk,...

Passwordless vs Passwords: Stopping identity-related breaches

Passwords are far from a perfect solution when it comes to stopping identity-related breaches. But is using a...

RDS Instances explained: Single-AZ, Multi-AZ & Multi-AZ Cluster

The difference between the single-AZ RDS instance, the multi-AZ RDS instance, and the multi-AZ cluster, and how they...

Platform Engineering: A DevOps evolution, not a replacement

Platform Engineering is not the DevOps killer. Here's what it is, its role in modern software development, and its...

What is lift and shift cloud migration?

An explanation of what lift and shift migration is, the pros and cons of using it for your cloud migration, and the...

How do I upskill into a DevOps role?

All about the modern DevOps landscape, why it's an attractive career choice, and how you can build your skillset to...

How can I get my boss to give me time/money to upskill in tech?

Trying to convince your boss to give you the resources you need to upskill? Here are six ways you can get them to sign...

GPT-4: All about the latest update, and how it changes ChatGPT

OpenAI recently released their latest AI language model, GPT-4. In this article, we'll dive into what's changed, and...

What tech skills should I learn to stay relevant?

If you work in tech, you always want to be upskilling. If you don't know what to pick, here's a step-by-step process on...

I work in tech: Should I always be upskilling?

"Should I always be working on getting my next certificate, or learning about a new technology?" The answer is yes, and...

Upskilling employees: How to overcome the top barriers

Upskilling employees? We found the top barriers to upskilling—and tips on how to overcome them—for technologists, tech...

What is R&D capitalization?

R&D capitalization is a process companies use to categorize research and development costs as investments rather than...

What are ChatGPT and Generative AI (and how can I use them)?

A lot of people know about the existence of ChatGPT, but not the specifics of the technology. Here's how it works, as...

Value stream mapping: What it is + how it relates to DevOps

Value stream mapping is an exercise that helps you visualize and improve your product lifecycle from ideation all the...

Bogged down in a data swamp? Here’s how to get unstuck

What are data swamps and data lakes? How do you clean up a data swamp once you've got one? We answer these questions...

Tech Your Facts: Is Cloud More Expensive Than On-Prem?

There is confusion about how much cloud computing costs. It’s common to hear people claim the cloud is more expensive...

Tech your facts: Five common myths about DevOps

The merging of “development” and “operations” into “DevOps” is an important tech advancement, but one riddled with...

Work in tech? The top soft skills to develop in 2023

Soft skills matter in tech more than you think. Here's the most important skills every professional should develop,...

What is Kubernetes, and why should I learn it?

Kubernetes expert and best-selling author Nigel Poulton explains the basics of the platform, the pros and cons of using...

Pluralsight’s top tech certifications for 2023

Looking to get more certifications? Here's a list of the top certs to take in cloud, cybersecurity, dev, and more. We...

Keep an eye out for these top tech careers in 2023

The top tech careers to consider if you're after a higher salary, as well as the cities in the world where you'll have...

Pluralsight’s top tech skills for 2023

Looking to keep your skills relevant in 2023? Here are the top tech talents you might want on your resume, and how to...

Pluralsight 2022: The Year in Tech

A tech retrospective of 2022: The most popular programming languages and technologies, what professionals were...

How is the higher education industry using the cloud?

Explore the benefits of deploying cloud computing in higher education such as cost savings, security, flexibility, IT...

10 tech articles our readers loved in 2022

These were the articles that resonated most with our talented tech audience (that's you!) in 2022. We've also listed...

How to Rollback Changes with the DNF History Command

What is the DNF history command, and how do you use the DNF history rollback command to undo transactions? We answer...

Endpoint security and cloud architecture

Endpoint security protects enterprises by safeguarding end-user devices from breach or physical theft. Learn how cloud...

I’m a Software Developer: Do I need to know about cloud computing?

Wondering if you should know about cloud computing? Here’s why all devs should be cloud capable, and why cloud...

World Podcast Day: 5 top podcasts for IT & tech pros

It’s World Podcast Day! To celebrate, we’ve put together a list of great podcasts you should listen to, compiled by...

Preventing advanced persistent threat (APT) attacks

Terumi defines an advanced persistent threat attack and discusses steps you can take to prevent an APT attack or...

Windows 11, beneath the hood: A complete guide

What’s the state of Windows 11, and is it worth it? Where can I find training resources? We answer these questions and...

Developer onboarding for new college grads

Pluralsight’s Erik Gross walks through developer onboarding best practices for college grads who need to learn your...

Do corporate universities create a competitive advantage?

Corporate Universities are gaining popularity as employers move to centralized training functions so they can align...

8 benefits of insourcing: Filling tech roles from within

Insourcing (sourcing talent internally) reduces attrition and helps you staff mission-critical software, IT and data...

Test-driven development: Avoiding implementation mistakes

Test-driven development reduces rework and associated costs. Learn about TDD benefits, downsides, & barriers to...

Matching learners to the right introductory software courses

For people new to coding, it's vital to know the differences between courses that teach software languages and courses...

Recruiting tips for a coding bootcamp

How do you identify employees (or external candidates) who will thrive—or at least persevere—in an intense reskilling...

Developer onboarding checklist: 8 best practices

Effective developer onboarding programs have eight key elements. Do you have a plan for each element and all work...

What’s the top barrier to cloud maturity?

Pluralsight’s Drew Firment, who holds a patent for measuring cloud maturity, offers insights on what’s required to...

Technical debt poses a cybersecurity risk

Get a layperson’s explanation of “technical debt” and the implications for business leaders in this brief interview...

5 essential fintech skills organizations need to develop now

Learn what fintech skills are more critical to organizations now than ever before, including DevSecOps, AI/ML, data,...

The ultimate guide to tech certifications

With coverage for the top cloud, IT, security and project management certifications around the world, Pluralsight has...

How are different industries using cloud tech in 2023?

2023 survey on cloud computing usage from over 1000 leaders and technologists in multiple industry verticals, from...

State of Cloud 2023: Cloud computing trends across tech

The current state of cloud computing for organizational leaders, including challenges, trends and key cloud services...

Using the cloud: Navigating risks and ensuring data security

What to look for in cloud security for leaders unsure about cloud computing: evaluate your ability to navigate risks...

How to fill your federal agency’s cloud computing jobs

Upskill your workforce by developing a learning culture, focusing strategy on cloud skills, emphasizing certifications,...

How to determine if your team is ready for a multicloud environment

Considering a multicloud strategy? Learn how a lack of skills creates the obstacles organizations face in multicloud...

Tech-wide layoffs and the volatile demand for cloud talent availability

The market for cloud talent was flooded in late 2022 and early 2023 as some of the world's largest tech organizations...

How to develop security policies for multicloud environments

Learn about the three pillars that make up a successful multicloud security strategy: abstraction, automation, and...

CI/CD explained: Methods, tools, pipelines, and beyond

CI/CD is a method that merges continuous integration with delivery. Learn why it’s useful, and how CI/CD tools and...

The 5 pillars of cloud security

Cloud security is a shared responsibility between cloud providers and organizations. Learn how it works and how your...

Cloud Transformation Day: 5 Challenges of Cloud Computing

Pluralsight’s Aaron Skonnard sits down with Google Cloud’s VP of Migrations, Stephen Orban, to talk about the...

Live at AWS re:Invent: Building a talent pipeline

Talent pipelines help leaders develop skills they need from talent they already have. Join Pluralsight as we discuss...

AWS re:Invent: How to become a cloud-native enterprise

Cloud-native enterprises are organizations using the benefits of the cloud to innovate and improve apps faster and more...

What you missed at Pluralsight’s Cloud Transformation Day

Pluralsight’s Cloud Transformation Day 2022 brought in some of the leading cloud experts to talk about successful cloud...

7 Tips for Better Cloud Apps with Azure App Service and More

Microsoft Azure offers robust tools for successful app deployment. Learn about features like Azure App Service, Azure...

Enterprise cybersecurity: 4 roles your organization needs

When it comes to enterprise cybersecurity, you need to stay on top of the ever-changing threat landscape with...

6 best cybersecurity tools to prevent cyber attacks

As cyber attacks grow more sophisticated, you need to stay one step ahead. Discover the 6 best cybersecurity tools to...

AWS re:Invent: Cloud-based talent management strategies

At AWS re:Invent 2022, Pluralsight’s Drew Firment, Head Cloud Strategist, shared the three phases of building a...

Building a hybrid multicloud strategy

A hybrid multicloud strategy blends on-premises resources with cloud resources hosted in multiple public cloud...

VMware Workstation vs. VMware Fusion

While VMware provides the same service for both Mac and PC, there are notable differences between VMware Fusion and...

A day in the life of a threat hunter

In cybersecurity, threat hunters proactively search an organization’s systems, networks, and infrastructure for threats...

What is a penetration tester? | Pluralsight

A penetration tester simulates cyber attacks and exploits cybersecurity weaknesses to find vulnerabilities before bad...

A day in the life of a SOC analyst

SOC analysts, or Security Operations Center analysts, regularly monitor and investigate security alerts. Learn about...

A day in the life of an incident responder

Incident responder is a type of cyber security job responsible for mitigating immediate cyber threats. To learn more,...

Expert insights and strategies from the 2022 State of Cloud report

Get the inside scoop on Pluralsight’s 2022 State of Cloud report. Spoiler: leaders want more, but the workforce must...

Learn-to-code bootcamps: Social-emotional considerations

Learn-to-code bootcamps are inherently stressful. Instructor Dana Wyatt describes the social-emotional aspects and how...

9 overlooked steps to create a successful cloud migration strategy

A successful cloud migration strategy includes these 9 most overlooked steps. Make sure you’ve covered all your bases...

How government agencies can build Zero Trust security models

Tips and timeline for government agencies developing Zero Trust security models against cyber threats, following the...

Data pipeline Q&A

We recently fielded questions about data pipelines and transformation. Here’s some advice for any organization looking...

Going the distance faster with Agile methodology

What is agile methodology, and how can it help your business achieve its goals? Find out how cloud technology can help...

Stop pulling from thin air: The benefits of cloud computing

We answer important questions about the benefits of cloud computing, including what cloud computing and serverless...

Reinforced self-paced learning: sticky training for new tech skills

When employees need new tech skills to support a significant digital transformation, organizations benefit from...

10 tips for honing cybersecurity intuition

Security team members must hone a variety of skills. Cybersecurity training can jumpstart this process, but one key...

Prioritizing cybersecurity

Prioritizing cybersecurity is ultimately about people, processes and technology (in that order). Well-trained humans...

Code hoarders, heroes, and having difficult conversations on Zoom

Pluralsight developer advocate Jeremy Morgan discussed code hoarders and heroes with DevelopIntelligence CEO Kelby...

Big data terminology: A layperson's guide

If you’re wondering about the differences between data lakes and data warehouses (or other Big Data terminology), you...

Big data pipeline: The journey from data lake to actionable insights

With an end-to-end Big Data pipeline built on a data lake, organizations can rapidly sift through enormous amounts of...

Insights from IDC: Selecting the right tech skill development partner

IDC analyst Cushing Anderson and Pluralsight executives discuss IDC’s new research and hot topics IT leaders need to...

Reskilling programs: Preparing non-tech employees for tech roles

Where do you begin when reskilling non-tech employees for software development jobs? Start with this three-step...

DevOps implementation: Why is it so hard?

DevOps implementation is tricky—fundamental changes in culture always are. Explore four key challenges and their...

The pros and cons of a multicloud strategy

Multicloud investments are common but risky for organizations. Cloud guru Scott Pletcher explains the pros and cons of...

How do superstar software developers affect team morale?

Having a superstar on your software development team is great—but it also comes with a unique set of challenges. Here’s...

Top influencer reshapes the learning platform conversation

Pluralsight Skills is the first 100% skills learning platform ever to break into the CWG Top 10 Learning Systems...

Tips for ensuring training effectiveness

When you train software developers in new technologies, how do you ensure they can apply their new learning on the job?...

5 tips for talking tech with non-technical decision makers

Equip yourself to present proposed technical solutions in a compelling, understandable way—and get your CEO and CFO on...

How to rekindle innovation in your organization

In this interview, entrepreneur Kelby Zorgdrager shares insights and tips on how employers can reignite a culture of...

Career growth requires career development

Career development can help you reach your career growth goals. In this interview, Jeff Moore shares insights on how to...

Which cloud certification is right for you?

There are several cloud providers out there, but which cloud certification is right for you? Check out this article for...

AWS basics: 10 tips and tricks for a smooth start

Learn AWS tips and tricks to accelerate your start and help you avoid common pitfalls. Get a deeper understanding of...

Deploying containers: AWS vs. Azure

In this blog post, we’ll look at two options to quickly get started deploying container applications to AWS and Azure....

CCNP Enterprise Certification

To earn the CCNP Enterprise certification, candidates will need to pass just two exams: a core exam and an enterprise...

10 dos and don’ts of agile transitions

Transitioning to agile? Here’s a list of ten dos and don’ts to make your transition as successful as possible.

Acquiring DevelopIntelligence and launching new experiences to help you build better

See how new releases and improvements to Pluralsight Flow and Skills can help transform your team into your competitive...

Top 10 Network Troubleshooting Tools for IT Pros

Our top 10 network troubleshooting tools include Ping, Traceroute, Ipconfig/Ifconfig, NSlookup, and more. Read on to...

How to manage VMFS datastores in VMware

Learn how to manage VMFS datastores in VMware. From creating a new datastore, to mounting and unmounting datastores, to...

Binary code explained simply

This step-by-step guide explains what binary code is, how to read binary ,how a computer understands it, and even how...

A practical guide to routing and subnetting

What is subnetting? Why use subnetting? How do you calculate a subnet mask? You've got the questions and we've got all...

Buying SSDs: Pluralsight's guide for consumers and companies

An overview of SSD advantage and, enterprise HDD usage, and advice on selecting between SATA and NVMe SSDs, touching on...

Move away from wagile: How to break anti-patterns in agile transitions

Adopting a hybrid of waterfall and agile is worse than just using one. Check out this guide to learn how to effectively...

Cisco Commands Cheat Sheet: Top 5 for Network Admin

A Cisco commands cheat sheet for network admin including show running config, show IP interface brief, and more. Study...

Top 10 TCP/IP tools every networking pro should know

Wanna be a networking pro? Here are the top 10 TCP/IP tools that every networking pro should be using!

Webinar | How to create a mature cloud practice

Demystify cloud migration with the Cloud Maturity Matrix, a device we created to help plot your way forward through...

5 core benefits of DevOps

Keep hearing about DevOps but not totally sure what it is or why it matters? Here are five core benefits you should...

Career guide: Start and grow your career in tech

Get insights and advice from leading technology experts on how you can best start and grow your tech career.

The secret to creating your own career-defining moments

Advance your career by creating your own opportunities with these five steps.

The Remote Work Guide

“How do I work from home effectively?” This guide will provide you with helpful tips on how you can collaborate and get...

Install Remote Server Administration Tools (RSAT) on Windows

Download RSAT or Remote Server Administration Tools for IT admin to remotely manage roles and features on Windows 10...

4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security

A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...

4 reasons to not go multicloud: data storage, vendor lock-in, and multicloud security

A multicloud strategy isn't for everyone. Between managing vendor lock in, data storage choices, and multicloud...

Webinar: Top 5 cloud migration challenges

Learn why some cloud migrations fail while others succeed—and ensure you don’t fall into common mistakes!

How to change directory permissions in Linux | Pluralsight

Change Linux file permissions with the Linux chmod command, including chmod +rwx, chmod +x, chmod 777, and more.

One year of GDPR: What we’ve learned, and what’s next

Whether you were an org leader, IT professional or just a consumer, it seemed every technology conference, company,...

High performance teams: Authority, ownership and motivation

Building better teams is made simpler with a little expert advice. Learn how to properly distribute authority and...

How to Add Users to a Group in Linux | Pluralsight

How to add a user to a group in Linux, create a new group, add a new user, delete a user, change a password, and modify...

4 essential skills for Microsoft Azure Administrators

Skill up to be a Microsoft Azure Admin with advice from pro. Learn how compute, storage, network and security skills,...

Use Role IQ to accelerate value realization from digital transformation

IDC’s Cushing Anderson evaluates how Pluralsight’s Role IQ helps organizations upskill teams into modern tech roles.

29 things you need to know about the new Azure certifications

Microsoft MVP Tim Warner answers the top questions about the new Azure certifications.

9 essential skills for Microsoft Azure developers

Microsoft Azure is a growing enterprise cloud platform. Learn how to scale your applications, choose the right Azure...

Release Triage: Managing your IT emergency room with a 4-step process

Business it alignment is critical when it comes to releases. An IT triage process is only successful if there is...

Ask 3: Why you should learn Windows PowerShell

An expert’s take on why you should grow your PowerShell skills.

The Ultimate Guide on how to Become a Database Administrator

Every day, we create an estimated 2.5 quintillion (that’s a 1 with 18 zeros, just FYI) bytes of data, and this amount...

Case study: Cerner transforms learning to revolutionize healthcare IT

Tackling healthcare’s big challenges means staying ahead of the phenomenal pace of IT innovation. Cerner transforms...

DEVintersection and IT Transformation 2017: What's new with Microsoft?

DEVintersection and IT Transformation are the top events for learning what’s new in Microsoft tech. We’ve got the...

Linux Hardening: Secure a Linux Server in 15 Steps

Use penetration testing and Kali Linux to secure a server in 15 steps. Your Linux distribution may vary, but our...

The big picture: Cloud provider offerings

Can’t decide between Azure and AWS for your company? Pluralsight expert Don Jones goes through the options to help you...

State of the Cloud: AWS and Azure

Join Pluralsight Author Tim Warner and IT Ops Curriculum Director Don Jones for a strategic look at today's major cloud...

The Ultimate Guide to Microsoft Azure Certification

All 26 Microsoft Azure Certifications broken down by career path, including information about exam support from...

Webinar | Understanding the Difference Between Microsoft Azure and Amazon AWS

In this webinar, Pluralsight author & IT Consultant Elias Khnaser, walks listeners through the differences between...

Guide | 2016 skills report: Top tech and creative trends to drive your learning and hiring programs

Keeping your teams up to date is more important than ever. It’s easier to set them up for success when you know what to...

Guide | Aberdeen Group & Pluralsight: Best practices of best-in-class IT organizations

This Aberdeen Group report takes a look at the actions, plans and processes top organizations embrace to earn their...

Guide | IT professionals & lifelong learning: The challenges and opportunities impacting your team

Learn how your organization can, and must, introduce new ways of learning.

10 tips and tricks for a smooth start with Amazon Web Services (AWS)

Ready to get Amazon Web Services up and running? Here are 10 tips for a smooth start with AWS. Learn more.

Which Cisco certification should I get?

Not sure which Cisco cert to get? Pluralsight gives an overview of the CCT, CCNA, CCNP and CCIE, and provides in-depth...

Webinar | BI in the cloud: Should you make the jump?

The world of business intelligence is growing into the cloud, and as such, a whole new list of vendors have emerged. In...

Microsoft Ignite 2016: What to watch for

Pluralsight's IT expert Don Jones highlights what to look for at Microsoft Ignite 2016. Learn more.

Guide | 3 ways to make time for learning

Setting aside time for your team to train can actually save time. Here’s how to build a culture of learning within your...

The Ultimate List of Hadoop Frameworks for Devs | Pluralsight

See our list of the top 15 Apache open source Hadoop frameworks! See what frameworks you should know to help build a...

PowerShell + DevOps Summit 2016: a complete recap in HD & enhanced audio

In case you missed the exclusive PowerShell + DevOps Global Summit 2016, you can tune in or relive it all with our...

IT Ops: Scholarship opportunity for entry-level workers

Pluralsight's Curriculum Director for IT Ops Content, Don Jones, announces plans for an upcoming scholarship for...

Implementing Microsoft Azure infrastructure 70-533

Prepare for the 70-533 exam, which aims to measure your ability to implement websites, virtual machines, cloud...

5 big misconceptions about virtual LANs

There are several misconceptions out there about VLANs. We've compiled a list of 5 of the most common misconceptions...

Integrating Linux in a Windows Enterprise Environment

This course shows you how to use Samba and other interoperability tools to integrate Linux systems into an existing...

CompTIA A+ (220-901 & 220-902) Learning Path

Prepare for the CompTIA A+ certification and gain a baseline knowledge of PC maintenance, mobile devices, laptops,...

Linux LPIC-2 Certification Preparation

With the Linux Professional Institute’s LPIC-1 exam already under your belt, getting the LPIC-2 Linux Network...

Technical Debt: Warnings & Responsibilities

Are you constantly making fixes to an imperfect technological solution that was once implemented? This is known as...

PowerShell Start Process & External Processes

PowerShell offers a few different ways to execute external processes that allow you to better control their execution,...

IT Ops industry update with Don Jones

In this post, you'll get Don Jones' take on Windows 10, Windows Server 2016, Docker and containers, and the...

Learn BizTalk Through Online Training Courses

Want to learn BizTalk? This path will take you from little to no knowledge of BizTalk, all the way up to using more...

3 Reasons Why Web Standards Matter

We sat down to chat with Susan about one of her favorite topics: web standards, a perfect blend of two things she loves...

If Statements: Do You Really Need Them in Your Code

While there's nothing really wrong with using if statements, it can help to avoid them when possible. Here are some...

Using PERT Estimations for Programmers

The PERT formula creates the arithmetic mean for a bell-shaped, statistical curve to help make practical estimations...

CompTIA Security+ (SY0-401) Courses

The CompTIA Security+ (SY0-401) exam is intended for IT Professionals seeking certification, as well as basic job...

PowerShell Exit Function & Code Execution

PowerShell isn't necessarily a programming language, but it exhibits many of the same characteristics. Learn some tips...

VMware's VCP6-DCV Certification

With the Foundations under your belt, you're ready to tackle this 11-course series on Data Center Virtualization, which...

Microsoft WebMatrix Features & Benefits

I use Microsoft WebMatrix to work with the code on my websites, and since I know I'm not alone here, I'd like to share...

Learn VMware vSphere 6 Hypervisor

VMware vSphere is the leading hypervisor in the world today. Why should you invest your time in learning vSphere 6? The...

Cisco CCNP Security Skills Training

The Cisco Certified Networking Professional (CCNP) Security track is designed to test your skills & knowledge in secure...

Create Character Rig & Set up the Armature

Rigging is the process of creating bones and joints for 3D models which allows the animators to pose and manipulate...

Ethical Hacking Tutorial and Course Path

Want to learn ethical hacking skills? Pluralsight has created this series of courses to help guide you through the core...

Using Azure Rights Management Software (RMS)

Azure rights management software encrypts files so only specific people can open them and it lets you choose what those...

Design & Implement Server Infrastructure (MS 70-413)

This series is designed to help prepare you to design and implement a Windows Server 2012 (and Windows Server 2012 R2)...

PowerShell Foreach Loop & ForEach-Object

A PowerShell foreach loop is a simple language construct that enables you to iterate through a set of items in a...

How to use Elasticsearch with SQL Server

If you administer a SQL Server database but you'd like to expose all the data you've collected in more interesting and...

Microsoft MCSA Windows Server 2012

Microsoft's MCSA certification for Windows Server 2012 requires that you pass three exams. Pluralsight has published a...

MCSA: Office 365

This series provides a good foundation for Office 365 management, and serves as a foundation for more advanced training...

Linux LPIC-1 - Linux Administration Skills

This series of courses will help you develop fundamental Linux administration skills, including command-line interface...

Citrix Certified Associate - Virtualization (CCA-V)

This series will teach you how to successfully manage, monitor, support and troubleshoot a XenDesktop 7 solution. Intro...

VMware Access Control 101: Roles and Permissions

If the proper access controls aren't in place, virtual machines are vulnerable to abuse. In VMware, you can manage...

CompTIA Storage+

CompTIA's Storage+ Powered by SNIA is a certification that strengthens your knowledge in storage concepts, storage...

UNIX & Linux SSH Jumpbox Scripts

If you are a UNIX sysadmin for any number of servers, you need to build yourself a Linux secure shell (SSH) jumpbox....

SQL 2012 MCSA Certification Upgrade

With the revamped SQL 2012 MCSA and MCSE certification, Microsoft did a much better job of mapping certification...

SATA Hard Drive vs SSD Hard Drive

Are you in the market for a new hard drive? Do you know what kind of hard drive you want? There are so many different...

Find an Affordable Cisco Router for Home Lab

Want to learn the Cisco equipment and the systems without completely breaking the bank? Compare and contrast several...