Friday, July 31, 2015

End of Summer Flash Sale! 10,000+ courses for only $10! 72 hours only

End of Summer Flash Sale! 10,000+ courses for only $10! 72 hours only.

Thursday, July 30, 2015

Endpoint Exploitation Trends (but what of Hacking Team!?) [feedly]



----
Endpoint Exploitation Trends (but what of Hacking Team!?)
// A Collection of Bromides on Infrastructure

Today, Bromium released "Endpoint Exploitation Trends 1H 2015," a Bromium Labs threat report that analyzes security trends from the first six months of 2015. One of the primary themes to emerge from the report should come as no surprise: cyber criminals are attacking targets that have the most users. Pragmatically, this means that malvertising campaigns are being conducted primarily through news and entertainments Web sites and that Flash has been exploited more than any other popular software this year. It's no surprise that exploits targeting the Windows Kernel are getting more popular for launching targeted attacks. The discovery of Duqu 2.0 targeting high-profile groups including a large cybersecurity company clearly proves this. As the industry adopts application sandboxing on popular apps, kernel exploits are expected to gain more attention by malware authors.

Threat Report Exploits

Hackers continue to innovate. Malware evasion technology continues to evolve to bypass the latest detection mechanisms deployed by security professionals. Ransomware has exploded in growth, more than doubling in size year-over-year. In 2013, there were just two ransomware families; today there are 16.

Ransomware

If you're interested in these trends, you should read the full report; however, it is also interesting to note that this report does not address the recent Hacking Team disclosures since it only analyzed the first six months of 2015. Bromium Labs has conducted a thorough analysis of the Hacking Team, which is worth reading, but today I want to talk about the bigger trends and how they relate to this threat report.

In July, the Hacking Team, an Italian surveillance company was compromised, leaking customer lists, source code and internal emails. In the coming days and weeks, a Pandora's Box of exploits and vulnerabilities was unpacked; Flash, Internet Explorer and even Java were targeted.

These Flash exploits were incorporated into the Angler, Neutrino and Nuclear exploit kits. This development ties back into our research, as discussed in "Endpoint Exploitation Trends 1H 2015:"

Flash

In the past six months Adobe Flash Player took the coveted top space as the most exploited application. From an exploitation point of view, the architecture of Adobe's AVM has multiple flaws allowing attackers to craft ROP shellcode on the fly thus bypassing ASLR and DEP. This combined with evasion techniques described in this report makes a nasty combination, with practically every user vulnerable.

Angler Exploit Kit

All the Web attacks we've seen are still operated using exploit kits. We found Angler to be the most prevalent exploit kit for the last six months. Lately we have been seeing CVE-2014-6332 also known as 'IE Unicorn vulnerability' and several Flash exploits, such as CVE-2014-0497 and CVE-2015-0311 for propagating malware. Aside from that Nuclear Pack and Fiesta remain relatively popular.

These Flash exploits, coupled with this newest Flash zero-day, prompted Mozilla to temporarily block Flash from Firefox. Facebook's CSO wants to kill Flash. YouTube has dropped Flash for HTML5 and streaming video site Twitch.tv is making the same commitment. Will it really make any difference?

If these trends show us anything, it is that hackers have read "Who Moved My Cheese?" Internet Explorer was the most exploited software in the first half of 2014, but this year it is Flash; next year it will be whatever is easiest for attackers to compromise. What these trends really demonstrate is that all software is vulnerable.

More than 110 million records have been compromised in the first six months of 2015, which really demonstrates that the security industry is ineffective. I've written before about the challenge of patching never-ending zero days and I've called out the security industry on the vicious cycle of "assuming compromise."

Security is almost always an afterthought when developing technology. Perhaps someday in the future, suppose 100 years from now, technology will be secure by design, but in the meantime we are living in a "lawless" era of vulnerabilities and compromise. Detection-based technologies are trying to solve an unsolveable problem.

The only way to prevent compromise is to prevent the initial unauthorized access. Threat isolation enforces the principle of least privilege to achieve this goal; unknown and untrusted content is isolated from access trusted systems. Bromium vSentry is a perfect example of this threat isolation; micro-virtualization isolates each vulnerable user task, preventing it from modifying the operating system or gaining network access.



----

Shared via my feedly reader


Sent from my iPhone

The Cloudcast Future of Connected Clouds [feedly]



----
The Cloudcast Future of Connected Clouds
// The Cloudcast (.NET)

Aaron and Brian talk to Christian Reilly (@reillyusa; CTO @Citrix) about the future. They discuss how far we are from availability and adoption of many of the systems laid out in a futuristic video. They discuss the challenges of modifying long-held social norms and adapting legal environments to adjust to new technology.

Links from the show:

Topic 1 - How much of this is entirely public cloud based vs. on-prem?
- Tesla - Large Screens - Business Stuff in the Cars [TODAY]
- Self Driving Cars
- 3D Holograms with Tablets - Displays
- Seamless Collaboration Handoffs
- What do we call the workable, flat workspaces?
- Movable / Interactive Apps within touch screens

Topic 2 - Seamless blending of business and personal information (eg. calendars) - Embedded Internet in the TV
- A Useful UI on the TV (touch screen) - or is this just a display?
- Wearable medical monitoring ("the patch")
- Elimination of medical paperwork


Topic 3 - Google Glasses (wearable)
- Massively interactive 3D display
- Micro drones from the watch
- Collaboration Tables + Collaboration displays


----

Shared via my feedly reader


Sent from my iPhone

Security Tube: Useful Video Tutorials for IT Security. [feedly]



----
Security Tube: Useful Video Tutorials for IT Security.
// Null Byte « WonderHowTo

Hi everyone. I'm relatively new here and I have learned a great deal from many of you already and would like to try and give a little something in return. I haven't seen this site mentioned before and I think it could be of some use. Security Tube is a website that hosts a large range of video tutorials to do with the many aspects of IT security, including penetration testing. Thank you all for all the tutorials and insights into the field that is security. Link to the site is below. -Leo Welcome to SecurityTube.net.... more


----

Shared via my feedly reader


Sent from my iPhone

The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message [feedly]



----
The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message
// Null Byte « WonderHowTo

Welcome back, my rookie hackers! As most of you know, Mr. Robot is probably the best hacker TV show ever! This is a great show about a cyber security engineer who is being enticed to hack the very corporation he's being paid to protect. This show is so good, I began a series to demonstrate how to do the hacks he uses in the show. The Spoofed Text Message in Episode 5 In episode 5, when Elliot is able to social engineer his way into the Steel Mountain's state of the art, "impenetrable" storage facility, a manager gets suspicious and begins to escort him out of the building before he can... more


----

Shared via my feedly reader


Sent from my iPhone

Daily Hacker News for 2015-07-29 [feedly]



----
Daily Hacker News for 2015-07-29
// Hacker News Daily

The 10 highest-rated articles on Hacker News on July 29, 2015 which have not appeared on any previous Hacker News Daily are:


----

Shared via my feedly reader


Sent from my iPhone

Four New Official Repos in Docker Hub: Kibana, ownCloud, ArangoDB and Kaazing Gateway [feedly]



----
Four New Official Repos in Docker Hub: Kibana, ownCloud, ArangoDB and Kaazing Gateway
// Docker Blog

We're excited to announce four new Official Repos that we added to Docker Hub in June and July. These repos are the newest additions to a growing library of production-ready content maintained by Docker and our partners. Docker users have … Continued
----

Shared via my feedly reader


Sent from my iPhone

New Tool to Migrate From V1 Registry to Docker Trusted Registry or V2 Open Source Registry [feedly]



----
New Tool to Migrate From V1 Registry to Docker Trusted Registry or V2 Open Source Registry
// Docker Blog

written by Matt Bentley, Solutions Engineer at Docker, Inc.   Harder, Better, Faster, Stronger The distribution and management of Docker images are made possible by various registry services including: Docker Hub, Docker Trusted Registry and Docker Open Source Registry. Both … Continued
----

Shared via my feedly reader


Sent from my iPhone

Chef Community: How to engage with and learn from Chef practitioners [feedly]



----
Chef Community: How to engage with and learn from Chef practitioners
// Chef Software

Chef has an active community of smart, caring, practitioners who want to help you succeed with Chef. There are a number of ways for you to engage with, learn from, follow, and contribute, such as going to Meetups, listening to podcasts, taking some training, contributing code, and more. In this webinar, Nathen Harvey, Chef Community Director, will cover many of the different pieces and ways to interact with the community.
----

Shared via my feedly reader


Sent from my iPhone

Monday, July 27, 2015

Kali 2.0 Teaser - Kali Sana! [feedly]

Kali 2.0 Teaser - Kali Sana!
https://vimeo.com/132329259


Kali 2.0 Teaser - Kali Sana! from Offensive Security on Vimeo.
A Kali Linux 2.0 teaser, showcasing the features and new user interface. Release date set to 11th of August, 2015.
 -- via my feedly.com reader

An Awesome Chef’s Thoughts on the Community Summit [feedly]

An Awesome Chef's Thoughts on the Community Summit
https://www.chef.io/blog/2015/07/27/an-awesome-chefs-thoughts-on-summit/

By now, hopefully all of you know we have Chef Community Summits in Seattle (Oct. 14-15) and London (Nov. 3-4) this Fall. Always some of the most engaging events of the year for the Chef Community, the Summits are organized as facilitated Open Space events. This helps ensure everyone has a chance to participate, the topics discussed are the right topics, and the outcomes are best for everyone.

But you don't need to take our word for it. Official Awesome Chef Matt Wrock was kind enough to share his experience at last year's Summit in Seattle – his first – and what made the biggest impressions on him after two days in the heart of our Community. Here's what Matt had to say:

"Last year was my first Community Summit and also my first open space event. I was a little apprehensive at first. I'm not a naturally outgoing person and I was envisioning awkward silence as people stared at me wondering why I was not gregariously blabbing or perplexed at my incoherent ramblings.

Turned out these fantasies were unfounded and this ended up being one of the most enjoyable and productive social events I have attended in years.

First, there were a ton of interesting topics and it was easy to find many I was passionate about. Since I was passionate about them, it made it easy to participate.

Second, I learned that the Chef Community is composed largely of just plain "good people" (this was reinforced at ChefConf 2015). I like to think that a good Chef slogan would be:

Chef – I came for the technology and stayed for the community.
People are nice, welcoming and fun to be with. This is a vibe I totally appreciate. I consider myself a stereotypical privileged straight white dude, but it gives me hope for our species when I see communities eagerly grant privilege broadly to those who are not like me. I really think it says something when members of a community are comfortable to be openly different and their fellow community members treat them with respect.

Finally, sessions had real impact. The most notable of these for me was the Test-Kitchen session. This session continued beyond the Summit in the 'Community collaborative form', resulting in Test-Kitchen 1.4.

Cant wait to do this again this year."

We'd like to thank Matt for not only his time and thoughtfulness in this assessment of the Summit experience, but for all his contributions to the Chef Community. And speaking (again) of Community, we hope to see you all at one (or both!) of the Summits this Fall.

Register today!



 -- via my feedly.com reader

Videos of Customer Success with Chef [feedly]

Videos of Customer Success with Chef
https://www.chef.io/blog/2015/07/27/videos-of-customer-success-with-chef/

Chef is everywhere, or at least we try to be. From DevOpsDays to reInventmeetups to ChefConf, to the constant stream of field engagements, success engineering projects, trainings, and much more, our team is out there and engaging with every aspect of the Chef community and the broader IT industry on a daily basis.

Quite often we're asked for real world examples of Chef success – who's done it, what they achieved, and, most importantly, how did they get there? To take a phrase from our friend Rob Cummings at Nordstrom, what's success look like on "the DevOps Roller Coaster"?

Until now, we've often pointed folks to our Customers page for a variety of case studies and videos that detail the what and how of success with Chef (and DevOps). However, over the course of the past few ChefConfs, we've collected a diverse and compelling collection of customer stories about much more than just "using Chef", but about why to automate at all, how to spread the DevOps vision across an organization, why "speed" isn't enough, and many more topics critical to achieving success in today's tumultuous world of IT.

For example, our friends at Intuit gave a dynamite session at ChefConf 2015 diving deep into not just their use of Chef, but how they evolved the entire company's culture using the core principles of DevOps:

There are, of course, hard business decisions to be made in IT today, and improving efficiency is still paramount to success. Take the case of Target, incredible Chef community contributors and a template for achieving tangible business results with DevOps and Chef:

These are just a sampling of the 30 videos currently available on our "Customer Success with Chef" YouTube playlist, which includes presentations from Bloomberg, Gap, Standard Bank, Yahoo and many more. Some are deep technical dives, others philosophical discussions on driving change. Hopefully, no matter your interest in Chef and/or DevOps, there is something for you.



 -- via my feedly.com reader

Friday, July 24, 2015

Audit Mode & Compliance [feedly]

Audit Mode & Compliance
http://foodfightshow.org//2015/07/audit-mode-and-compliance.html

Listen in as we discuss Chef's Audit Mode, Analytics, and compliance.

Watch Now

Panel

Outline

Picks

Joshua Timberman

Kyleen

Julian

Joshua Schipper

Elliott

Steven

Nathen

Download

The Food Fight Show is brought to you by Bryan Berry and Nathen Harvey with help from other hosts and the awesome community of Chefs.

The show is sponsored, in part, by Chef.

Feedback, suggestions, and questions: info@foodfightshow.com or http://github.com/foodfight/showz.


 -- via my feedly.com reader

Over 200 Docker Meetups! [feedly]

Over 200 Docker Meetups!
https://blog.docker.com/2015/07/over-200-docker-meetups/


Big thank you to our Docker community for the support in helping us grow to now over 200 Docker meetup groups! Without all of the Docker meetup organizers, sponsors, speakers and attendees, none of this would be possible – we are … Continued

 -- via my feedly.com reader

Intro to Docker Webinar: Q&A [feedly]

Intro to Docker Webinar: Q&A
https://blog.docker.com/2015/07/intro-docker-webinar-qa/

Many great questions popped up in this week's Introduction to Docker webinar where we covered the basics of the Docker technology, discussed the Continuous Integration (CI) use case and a product demo of Docker Trusted Registry and Docker Engine. Instead of keeping … Continued

 -- via my feedly.com reader

Rebooting a XenServer cluster while all VMs keep running [feedly]

Rebooting a XenServer cluster while all VMs keep running
http://blog.remibergsma.com/2015/07/11/rebooting-a-xenserver-cluster-while-all-vms-keep-running

 -- via my feedly.com reader

Zero Day vulnerabilities – much to do about nothing [feedly]

Zero Day vulnerabilities – much to do about nothing
http://blogs.bromium.com/2015/07/24/zero-day-vulnerabilities-much-to-do-about-nothing/

Zero day vulnerabilities and hacking teamexploits have been back in the news again recently. The recent breach of Hacking Teamrevealed insights into the grey market for zero-day exploits as well as new exploits against Adobe Flash and Microsoft Windows. Here we are just a couple of weeks later and 4 new zero day vulnerabilities in Microsoft Internet Explorer were revealed by HP's Zero Day Initiative group.

Zero Day exploits are often considered to be the ultimate weapon in the hackers' arsenal. After all, how do you detect and block something if no one knows it exists?  Zero Days attacks are considered to be so dangerous that the security industry developed ethical guidelines on how to deal with the discovery of software flaws or vulnerabilities that could provide attackers with a new "undetectable" weapon.

For the most part the industry has followed these guidelines by notifying the makers of the vulnerable software of the problem and allowing them to develop and release a fix or "patch" for the vulnerability to ensure that bad guys can't use it to attack users or organizations. This process has come under criticism by some when vendors don't develop patches "quickly enough" leaving potential victims exposed if bad guys manage to discover and exploit the vulnerabilities during the "window of vulnerability".

Of course all of these concerns are based on the inability of the industry to reliably detect and block Zero Day exploits. Bromiums' approach to the problem of malware, isolating all POTENTIAL malware entering the system in a hardware enforced microVM changes the equation completely. Encountering a true Zero Day attack in a system protected by Bromium is now an opportunity for the defender to quickly and reliably identify the new vulnerability rather than an opportunity for the attacker to execute an undetectable attack.

Most cyber-attacks are financially motivated, and developing Zero Day attacks can be an expensive proposition. With Bromium it is much cheaper for the defender to defeat and expose the attack than for the attacker to develop and deploy the attack. With this fundamental change in the profit equation it is just a matter of time before the latest announcement of a new Zero Day becomes just a matter of passing interest to software developers rather than a hot story demanding headlines around the world.



 -- via my feedly.com reader

Pay What You Want: Web Hacker Bundle for $1 [feedly]

Pay What You Want: Web Hacker Bundle for $1
https://stacksocial.com/sales/pay-what-you-want-cloud-hacker-bundle?aid=a-d4vjx5x0&utm_campaign=feed&utm_medium=RSS&utm_source=www

Become a Bonafide Coder with This Complete, Front-to-Back, 73+ Hour Developer Training
Expires October 14, 2015 23:59 PST
Buy now and get 99% off

Learn Docker from Scratch 


KEY FEATURES

  • Watch over 22 lectures & 4 hours of content
  • Master one of the fastest growing virtualization technologies on the market (used by many large-scale companies)
  • Learn to easily get more apps running on the same hardware
  • Seamlessly manage & deploy applications
  • Understand the basics behind the container technology
  • Install & set up Docker successfully
  • Get comfortable w/ the Docker workflow
  • Follow an in-depth training on Docker security

COMPATIBILITY

  • Internet required
  • Basic knowledge of web development required
  • Knowledge of git suggested

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Learn Apache Cassandra from Scratch


KEY FEATURES

  • Dive into over 24 lectures & 4 hours of content
  • Build your next application using Cassandra DB, the high-performing database management system
  • Seamlessly install Cassandra to get started
  • Understand CQL( Cassandra Query language)
  • Use Cassandra in conjunction w/ NodeJS
  • Learn NoSQL DB concepts while building a Twitter clone application
  • Study tables & queries in Cassandra

COMPATIBILITY

  • Internet required
  • Basic knowledge of web development required
  • Knowledge of JavaScript, HTML, CSS & RDBMS system will be useful to grasp the concepts

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Learn Web Programming in Django & Python 


KEY FEATURES

  • Study Python & Django w/ over 28 lectures & 6.5 hours of content
  • Ease into programming by studying one of easier languages, Python
  • Compliment your knowledge of Python w/ knowledge of the popular framework, Django
  • Utilize your knowledge to build smart web apps quickly & easily
  • Work on diverse practice projects like ecommerce sites, message boards, image gallery sites & a blogging app

COMPATIBILITY

  • Internet required
  • Knowledge of basic Python syntax required
  • Knowledge of HTML & basic programming

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Learn Bootstrap Development by Building 10 Projects


KEY FEATURES

  • Learn to build impressive mobile-ready websites w/ 74 lectures & 13.5 hours of content
  • Understand the uses of Bootstrap Components
  • Master the best practices for HTML, CSS & JavaScript development
  • Use SASS & Bootstrap to learn about grid systems, list styling, and progress bar componenets
  • Explore Nested grids, buttons groups, a gallery plugin & responsive queries
  • Develop a landing page using LESS, a CSS preprocessor
  • Implement an image carousel & more

COMPATIBILITY

  • Internet required
  • A basic understanding of HTML, CSS & JavaScript recommended

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Projects in JavaScript & JQuery


KEY FEATURES

  • Learn these essential, widely-used technologies w/ over 50 lectures & 9 hours of content
  • Add JavaScript projects to your resume
  • Look at the event handlers, variables, loops & arrays by building a JavaScript quiz
  • Study image galleries, sliders, scrollers, etc. w/ jQuery
  • Create a YouTube Data API & content accordion
  • Connect to MySQL database via PHP
  • Explore using Git & Github
  • Utilize jQuery Mobile to make a mobile-based app
  • Build a simple game

COMPATIBILITY

  • Internet required
  • Basic knowledge of JavaScript, HTML & CSS

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Projects in PHP & MySQL


KEY FEATURES

  • Build practical projects to round out your programming knowledge w/ over 88 lectures & 23 hours of content
  • Study programming technologies such as PHP, MYSQL, JavaScript & JQuery
  • Work on the projects in any order you want
  • Utilize the royalty-free code on any future project 
  • Use the MySQL API w/ PHP to power a Shoutbox
  • Create a MySQL/PHP-based quiz engine
  • Make a WordPress plug-in & much more!

COMPATIBILITY

  • Internet required
  • Basic knowledge of HTML & PHP required

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

Learn Ruby on Rails by Building Projects


KEY FEATURES

  • Upgrade your Ruby on Rails skills w/ over 47 lectures & 13 hours of content
  • Install Ruby on Rails & MySQL to build a simple web app
  • Create a complete blog management system like WordPress while mastering Ruby technique
  • Explore professional Ruby techniques while creating a Ruby image gallery
  • Extend your code to make a shopping cart
  • Learn to use Ruby code effectively in commercial projects
  • Study best software development practices

COMPATIBILITY

  • Internet required
  • Basic knowledge of Ruby and Rails & Linux suggested

PRODUCT SPECS

  • Lifetime access

THE EXPERT

Eduonix creates and distributes high-quality technology training content on the web! Their team of industry professionals have been training manpower for more than a decade, and aim to teach technology the way it's used in the professional world. They have a professional team of trainers for technologies ranging from mobility to web to enterprise to database and server administration. For more details on this course and instructor, click here. This course is hosted by StackSkills, the premier eLearning destination for discovering top-shelf courses on everything from coding—to business—to fitness, and beyond!

 -- via my feedly.com reader

Raspberry Pi Hacker Bundle for $39 [feedly]

Raspberry Pi Hacker Bundle for $39
https://stacksocial.com/sales/raspberry-pi-hacker-bundle?aid=a-d4vjx5x0&utm_campaign=feed&utm_medium=RSS&utm_source=www

Introduction to Raspberry Pi


KEY FEATURES

What in the world is Raspberry Pi? It's a simple, affordable, miniature computer and the gateway to endless projects. Apart from being a great learning tool for languages like Python, Raspberry Pi can interact with the outside world. Program it to turn on lights, start motors, or even build a robot—it will teach you all about computing from the inside out, and you may even have fun in the process.
  • Get a crash course in using Raspberry Pi to perform basic computing functions w/ over 22 lectures & 1.5 hours of content
  • Interact & tinker w/ the hardware
  • Consolidate your knowledge by completing hands-on projects
  • Write a Python program that powers a simple number guessing game 
  • Connect your Pi to Christmas lights & run various lighting patterns
  • Turn your Pi into a low cost computer by hooking it up w/ a keyboard & monitor
  • Master basic programming by course's end

COMPATIBILITY

  • Internet required
  • Raspberry Pi Model B Kit required
  • Linux & Python knowledge recommended
  • No prior computing or programming knowledge required

PRODUCT SPECS

  • Length of time users can access this course: lifetime
  • Access options: web streaming & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

THE EXPERT

Venkatesh Varadachari and Satyajeet Sah are technology enthusiasts who are passionate about the Raspberry Pi. Venkatesh is founder of the e-learning conglomerate Money-Wizards Global, while Satyajeet is a product engineer at subsidiary company Pi-Wizards. Both are passionate about imparting their knowledge of the Raspberry Pi through the online courses they administer. For more details on the course and instructor, click here.

Hardware Projects Using Raspberry Pi


KEY FEATURES

  • Build Raspberry Pi-controlled physical devices w/ over 32 lectures & 1.5 hours of content
  • Complete three hardware projects to gain practical, hands-on knowledge
  • Retrofit the Pi into a Linux-powered walkie talkie
  • Use Python code to turn the Pi into a light detector mechanism
  • Build a teddy bear that laughs when it senses nearby motion
  • Solidify your coding skills & get comfortable working w/ hardware

COMPATIBILITY

  • Internet access required
  • Basic Linux & Python knowledge required
  • Raspberry Pi Model B or B+ running the Raspbian OS required

PRODUCT SPECS

  • Length of time users can access this course: lifetime
  • Access options: web streaming & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

THE EXPERT

Venkatesh Varadachari and Satyajeet Sah are technology enthusiasts who are passionate about the Raspberry Pi. Venkatesh is founder of the e-learning conglomerate Money-Wizards Global, while Satyajeet is a product engineer at subsidiary company Pi-Wizards. Both are passionate about imparting their knowledge of the Raspberry Pi through the online courses they administer. For more details on the course and instructor, click here.

Python Programming for Beginners


KEY FEATURES

  • Master Python (commonly used w/ Raspberry Pi) w/ over 26 lectures & 3.5 hours of content
  • Use variables, loops & statements to automate the execution of tasks
  • Create functions w/ defined parameters to refine your code
  • Avoid common Python errors while programming
  • Work w/ files & classes to organize large chunks of code
  • Seamlessly handle errors to keep your code pristine
  • Utilize Python to calculate statistics & create modules
  • Complete a final project w/ your acquired knowledge

COMPATIBILITY

  • Internet access required

PRODUCT SPECS

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming, download for offline access
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: beginner

THE EXPERT

Stone River eLearning is an online technology academy that presently serves 250,000 students enrolled in over 400 courses. These courses encompass topics such as IT certification and are geared towards both newbies and experienced users alike. For more details on the course and instructor, click here..

Real World Guide to Hardware Design


KEY FEATURES

  • Learn from real world hardware design experience w/ over 50 lectures & 2 hours of content
  • Set up a lab & know where to spend your limited budget 
  • Avoid costly schematic & circuit mistakes while doing a board layout
  • Select components to make your design a success
  • Debug & test your design like a professional
  • Develop skills to confidently populate & assemble prototype boards

COMPATIBILITY

  • Internet access required

PRODUCT SPECS

  • Length of time users can access this course: lifetime
  • Access options: web streaming & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate

THE EXPERT

Mike Ingoldby was born and raised in the mountains of Colorado and graduated from the University of Colorado with a B.S. in Electrical and Computer Engineering. Mike is also Founder of Bonsai Networks, Fob Foundry and Trango Engineering, a electronics design consulting firm. Previously Mike was part of the start-up Mosoro, which was to provide the first inertial measurement unit on the market that was affordable and small enough to use everyday. Mike was also one of the first engineers of Kerpoof, a successful start-up company that was bought by Disney Internet Media Group in the Fall of 2008. Mike has led several FPGA designs at Radix4 and Xilinx and released several products in consumer, B2B, telecommunications and classified government contracts for communication and space systems. For more details on this course and instructor, click here.

PiBot: Build Your Own Raspberry Pi-Powered Robot


KEY FEATURES

  • Master Raspberry Pi w/ over 19 lectures & 2 hours of content
  • Gain the knowledge necessary to construct a small, mobile robot with a Raspberry Pi brain
  • Install the libraries needed to access the GPIO pins
  • Configure a wireless adapter
  • Follow suggestions (not explicit instructions) for constructing the bot's body
  • Receive an electronic copy of the book
  • Absorb information regarding the Raspberry Pi version 2 
  • Study how to interact with servos using a different library, PiGPIO

    COMPATIBILITY

    • Internet required
    • Raspberry Pi minicomputer required
    • Robot-building parts (wheels, servos, etc.)
    • Some knowledge of Linux and Python suggested

    PRODUCT SPECS

    • Length of time users can access this course: lifetime
    • Access options: web streaming & mobile streaming
    • Certification of completion included
    • Redemption deadline: redeem your code within 30 days of purchase
    • Experience level required: all level

    THE EXPERT

    Wolfram Donat is a graduate of the University of Alaska Anchorage, with a B.S. degree in Computer Engineering. Along with an interest in robotics, computer vision and embedded systems, his general technological interests and Internet expertise serve to make him an extremely eclectic programmer. He specializes in C and C++, with additional skills in Java, Python, and C#/.NET. He is a bestselling author on Amazon and has received funding from NASA for his work in autonomous submersibles. For more details on the course and instructor, click here.

  •  -- via my feedly.com reader