✕ Clear filters
1,802 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,650📚 Coursera 18,121🎤 TED 1
Batch 60 Modifying "Create String" Function
🔐 Cybersecurity
Batch 60 Modifying "Create String" Function
John Hammond Intermediate 13y ago
Batch 59 Continuing "Create String" Function
🔐 Cybersecurity
Batch 59 Continuing "Create String" Function
John Hammond Intermediate 13y ago
Batch 58 Building "Create String" Function
🔐 Cybersecurity
Batch 58 Building "Create String" Function
John Hammond Intermediate 13y ago
Batch 57 String Quotations
🔐 Cybersecurity
Batch 57 String Quotations
John Hammond Intermediate 13y ago
Batch 56 String Substitution
🔐 Cybersecurity
Batch 56 String Substitution
John Hammond Intermediate 13y ago
Batch 55 Substrings
🔐 Cybersecurity
Batch 55 Substrings
John Hammond Intermediate 13y ago
Batch 53 Changing the Prompt
🔐 Cybersecurity
Batch 53 Changing the Prompt
John Hammond Intermediate 13y ago
Batch 52 Command Prompt Properties
🔐 Cybersecurity
Batch 52 Command Prompt Properties
John Hammond Intermediate 13y ago
Batch 51 Console Color
🔐 Cybersecurity
Batch 51 Console Color
John Hammond Intermediate 13y ago
Batch 50.5 Quick Output of File
🔐 Cybersecurity
Batch 50.5 Quick Output of File
John Hammond Intermediate 13y ago
Batch 50 Deleting Files
🔐 Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 49 Copying Files
🖊️ Copywriting & Content Strategy
Batch 49 Copying Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
🔐 Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
🔐 Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
🔐 Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
🔐 Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
🔐 Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 43 Intro to Redirection
🔐 Cybersecurity
Batch 43 Intro to Redirection
John Hammond Beginner 13y ago
Batch 42 Breakin' Outta the For Loop
🔐 Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
🔐 Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
🔐 Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
🔐 Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
🔐 Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
🔐 Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
🔐 Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
🔐 Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
🔐 Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
🔐 Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 33 For Loop Introduction
🔐 Cybersecurity
Batch 33 For Loop Introduction
John Hammond Beginner 13y ago
Batch 32 "While Loop"
🔐 Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
🔐 Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
🔐 Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
🔐 Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
🔐 Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
🔐 Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
🔐 Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
🔐 Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
🔐 Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
🔐 Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
🔐 Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
🔐 Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
🔐 Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
🔐 Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
🔐 Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
🔐 Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
🔐 Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
🔐 Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
🔐 Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Concurrent Programming with GPUs
📚 Coursera Course ↗
Self-paced
Introduction to Concurrent Programming with GPUs
Opens on Coursera ↗
The Cybersecurity Career Ladder
📚 Coursera Course ↗
Self-paced
The Cybersecurity Career Ladder
Opens on Coursera ↗
SEO Foundations: Analyze, Optimize & Grow
📚 Coursera Course ↗
Self-paced
SEO Foundations: Analyze, Optimize & Grow
Opens on Coursera ↗
Coding Algorithms with AI
📚 Coursera Course ↗
Self-paced
Coding Algorithms with AI
Opens on Coursera ↗
Sync CRM & ESP
📚 Coursera Course ↗
Self-paced
Sync CRM & ESP
Opens on Coursera ↗
Master TQM and Six Sigma: Build Quality, Reduce Errors
📚 Coursera Course ↗
Self-paced
Master TQM and Six Sigma: Build Quality, Reduce Errors
Opens on Coursera ↗