We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security by Design Thinking for Cloud Architects

Justin Marshall

In this series of tutorials, we will talk about some of the things Mudbox artists need to know when working in ZBrush. Software required: ZBrush 4R6, Mudbox 2014.

Read more

In this series of tutorials, we will talk about some of the things Mudbox artists need to know when working in ZBrush. Software required: ZBrush 4R6, Mudbox 2014.

In this series of tutorials, we will talk about some of the things Mudbox artists need to know when working in ZBrush. ZBrush and Mudbox are powerful sculpting and painting applications that each have their own strengths. Sometimes an artist who has primarily worked in one application, Mudbox for instance, finds that they need to be able to work on a project in another program. These artists know what they need to accomplish and how to finish their projects, but they just need to know the capabilities of the new application and where they can quickly find the tools and functions they're looking for. Rather than going through a long introductory project, with a lot of basic information, we'll cut straight to the information you need to start working quickly in ZBrush. We'll talk about how ZBrush deals with geometry and its 2.5D workflow. We'll talk about several of its geometry creation and concepting tools and explore the polypainting workflow. We'll cover brushes, UVs, layers, retopology, posing, and more. In the end, you'll be able to take your Mudbox knowledge and/or project and continue to work in ZBrush. Software required: ZBrush 4R6, Mudbox 2014.

Enroll now

What's inside

Syllabus

Introduction and Project Overview
ZBrush for Mudbox Artists

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Core target audience is Mudbox artists looking to work in Zbrush
Tailored to Mudbox artists' specific needs when transitioning to ZBrush
Covers essential ZBrush concepts and tools to enable Mudbox artists to quickly become productive
Taught by Justin Marshall, an experienced instructor specializing in 3D sculpting
Focuses on practical application rather than extensive theoretical background

Save this course

Save Security by Design Thinking for Cloud Architects to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security by Design Thinking for Cloud Architects. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security by Design Thinking for Cloud Architects will develop knowledge and skills that may be useful to these careers:
Technical Architect
Technical Architects design and implement technical solutions that meet the needs of an organization. They work with stakeholders to define requirements, develop and test solutions, and ensure that the solutions are deployed and managed effectively. This course can help Technical Architects develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Technical Architects build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
Cloud Engineer
Cloud Engineers design, build, and manage cloud-based solutions. They work with customers to identify their needs, develop and implement solutions, and ensure that the solutions are deployed and managed effectively. This course can help Cloud Engineers develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Cloud Engineers build secure, reliable, and scalable cloud-based solutions that meet the needs of their customers.
Security Architect
Security Architects design and implement security solutions for organizations. They work with stakeholders to identify security risks, develop and implement security controls, and ensure that the security controls are effective. This course can help Security Architects develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Security Architects build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
DevOps Engineer
DevOps Engineers work with developers and operations teams to ensure that software is developed, tested, and deployed efficiently and securely. They work with developers to develop and test software, and with operations teams to deploy and manage the software. This course can help DevOps Engineers develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help DevOps Engineers build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
Software Architect
Software Architects design and develop software systems. They work with stakeholders to define requirements, develop and test software, and ensure that the software is deployed and managed effectively. This course can help Software Architects develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Software Architects build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
Database Administrator
Database Administrators manage and maintain databases. They work with users to identify their needs, develop and implement database solutions, and ensure that the databases are available and secure. This course can help Database Administrators develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Database Administrators build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
Network Engineer
Network Engineers design and manage networks. They work with stakeholders to identify their needs, develop and implement network solutions, and ensure that the networks are available and secure. This course can help Network Engineers develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Network Engineers build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
Security Analyst
Security Analysts identify and mitigate security risks. They work with stakeholders to assess risks, develop and implement security controls, and ensure that the security controls are effective. This course can help Security Analysts develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help Security Analysts build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.
IT Manager
IT Managers plan and manage IT operations. They work with stakeholders to define IT strategy, develop and implement IT solutions, and ensure that the IT solutions are effective. This course can help IT Managers develop the skills and knowledge they need to design and implement secure cloud-based solutions. The course covers topics such as security best practices, cloud architecture patterns, and risk management. This knowledge can help IT Managers build secure, reliable, and scalable cloud-based solutions that meet the needs of their organizations.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security by Design Thinking for Cloud Architects.
Provides a comprehensive overview of security engineering, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.
Provides a comprehensive overview of cloud computing, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.
Provides an introduction to modern software security techniques. Useful as a reference.
Provides a comprehensive overview of cloud security, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.
Provides a comprehensive overview of cloud computing, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.
Security concerns in the DevOps process are split into DevOps security best practices and principles.
Provides a comprehensive overview of cloud computing, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.
Provides a focused approach to security engineering by providing the beginning stages of thought processes which will help prepare for future design challenges.
Provides a comprehensive overview of cloud computing, covering everything from the basics to the most advanced topics. It valuable resource for anyone who wants to learn more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security by Design Thinking for Cloud Architects.
70-461, 761: Querying Microsoft SQL Server with Transact...
Customer Service for Software Developers: Delighting...
Python for Time Series Data Analysis
Strategically Build and Engage Your Network on LinkedIn
Visualization of UK accidents using Plotly Express
Introducing Robotics: Making Robots Move
Introducing Robotics: Build a Robot Arm
Shakespeare’s Othello: The Moor
Robotic Vision: Making Robots See
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser