MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + .srt | Duration: 55 lectures (8h 13m) | Size: 4.61 GB Learn about Pointers Arrays, Linked Lists, Stacks and Queues, Graph, Binary Trees, Heap & Priority Queue, Sorting etc.
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 15 lectures (2h 26) | Size: 2.05 GB Learn Data Modelling and Database Design to become a successful Business Analyst
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 1.23 GB | Duration: 2h 35m
Duration: 1h 30m | Video: .MP4 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | Size: 1.39 GB Genre: eLearning | Language: English Ready to get your hands a little dirty? Landscape designer Sara Bendrick walks you through eight stylish landscapes in this beginner's garden design class.
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 391 MB | Duration: 2h 9m
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 661 MB | Duration: 2h 51m
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 15 lectures (2h 19m) | Size: 693.1 MB Control Valves-Throttling Type;Construction;Sizing Software;Selection of valve and actuators;Pneumatic actuators
Duration: 2h 45m | Video: .MP4 1920x1080, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | Size: 4.27 GB Genre: eLearning | Language: English Learn how to build a coffee table of superior quality as you hone your woodworking skills alongside fine furniture-maker Craig Vandall Stevens.
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz Language: English | VTT | Size: 5.42 GB | Duration: 8 sections | 86 lectures | (14h 35m)
Duration: 3h 56m | Video: .MP4 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | Size: 811 MB Genre: eLearning | Language: English Networks carry sensitive data between systems and users. To protect the confidentiality, integrity, and availability of network traffic, cybersecurity professionals