✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,486📚 Coursera 18,246🎤 TED 1
Batch 50 Deleting Files
Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 49 Copying Files
Copywriting & Content Strategy
Batch 49 Copying Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 42 Breakin' Outta the For Loop
Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 32 "While Loop"
Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
Batch 10 Parameter Help
Cybersecurity
Batch 10 Parameter Help
John Hammond Intermediate 13y ago
Batch 09 Command Arguments
Cybersecurity
Batch 09 Command Arguments
John Hammond Intermediate 13y ago
Batch 00 The Windows Command-Line
Cybersecurity
Batch 00 The Windows Command-Line
John Hammond Intermediate 13y ago
Batch 01 Commands
Cybersecurity
Batch 01 Commands
John Hammond Intermediate 13y ago
Batch 02 Data Types
Cybersecurity
Batch 02 Data Types
John Hammond Intermediate 13y ago
Batch 03 Variables
Cybersecurity
Batch 03 Variables
John Hammond Intermediate 13y ago
Batch 04 Environment Variables
Cybersecurity
Batch 04 Environment Variables
John Hammond Intermediate 13y ago
Batch 05 String "Concatenation"
Cybersecurity
Batch 05 String "Concatenation"
John Hammond Intermediate 13y ago
Batch 06 Scripts
Cybersecurity
Batch 06 Scripts
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Scaling E-Commerce with Kubernetes: Deploy Web Apps
📚 Coursera Course ↗
Self-paced
Scaling E-Commerce with Kubernetes: Deploy Web Apps
Opens on Coursera ↗
Building Test Automation Framework using Selenium and TestNG
📚 Coursera Course ↗
Self-paced
Building Test Automation Framework using Selenium and TestNG
Opens on Coursera ↗
Apply AI Techniques & Prescriptives
📚 Coursera Course ↗
Self-paced
Apply AI Techniques & Prescriptives
Opens on Coursera ↗
Fundamentals of Data Science in Healthcare
📚 Coursera Course ↗
Self-paced
Fundamentals of Data Science in Healthcare
Opens on Coursera ↗
Introducción a la producción de música
📚 Coursera Course ↗
Self-paced
Introducción a la producción de música
Opens on Coursera ↗
La Philanthropie : Comprendre et Agir
📚 Coursera Course ↗
Self-paced
La Philanthropie : Comprendre et Agir
Opens on Coursera ↗