✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,538📚 Coursera 18,120🎤 TED 1
Batch 50 Deleting Files
🔐 Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 49 Copying Files
🖊️ Copywriting & Content Strategy
Batch 49 Copying Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
🔐 Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
🔐 Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
🔐 Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
🔐 Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
🔐 Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 42 Breakin' Outta the For Loop
🔐 Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
🔐 Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
🔐 Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
🔐 Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
🔐 Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
🔐 Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
🔐 Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
🔐 Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
🔐 Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
🔐 Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 32 "While Loop"
🔐 Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
🔐 Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
🔐 Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
🔐 Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
🔐 Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
🔐 Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
🔐 Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
🔐 Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
🔐 Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
🔐 Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
🔐 Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
🔐 Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
🔐 Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
🔐 Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
🔐 Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
🔐 Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
🔐 Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
🔐 Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
🔐 Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
🔐 Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
🔐 Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
🔐 Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
Batch 10 Parameter Help
🔐 Cybersecurity
Batch 10 Parameter Help
John Hammond Intermediate 13y ago
Batch 09 Command Arguments
🔐 Cybersecurity
Batch 09 Command Arguments
John Hammond Intermediate 13y ago
Batch 00 The Windows Command-Line
🔐 Cybersecurity
Batch 00 The Windows Command-Line
John Hammond Intermediate 13y ago
Batch 01 Commands
🔐 Cybersecurity
Batch 01 Commands
John Hammond Intermediate 13y ago
Batch 02 Data Types
🔐 Cybersecurity
Batch 02 Data Types
John Hammond Intermediate 13y ago
Batch 03 Variables
🔐 Cybersecurity
Batch 03 Variables
John Hammond Intermediate 13y ago
Batch 04 Environment Variables
🔐 Cybersecurity
Batch 04 Environment Variables
John Hammond Intermediate 13y ago
Batch 05 String "Concatenation"
🔐 Cybersecurity
Batch 05 String "Concatenation"
John Hammond Intermediate 13y ago
Batch 06 Scripts
🔐 Cybersecurity
Batch 06 Scripts
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Analyze and Predict Shipping Time Using Machine Learning
📚 Coursera Course ↗
Self-paced
Analyze and Predict Shipping Time Using Machine Learning
Opens on Coursera ↗
Introduction to Digital Marketing
📚 Coursera Course ↗
Self-paced
Introduction to Digital Marketing
Opens on Coursera ↗
The Music of the Rolling Stones, 1962-1974
📚 Coursera Course ↗
Self-paced
The Music of the Rolling Stones, 1962-1974
Opens on Coursera ↗
Apply R Techniques for Telecom Customer Churn Prediction
📚 Coursera Course ↗
Self-paced
Apply R Techniques for Telecom Customer Churn Prediction
Opens on Coursera ↗
Generative Deep Learning with TensorFlow
📚 Coursera Course ↗
Self-paced
Generative Deep Learning with TensorFlow
Opens on Coursera ↗
Get started with Microsoft Planner
📚 Coursera Course ↗
Self-paced
Get started with Microsoft Planner
Opens on Coursera ↗