Udemy

Regular Expressions (Regex) for the Absolute Beginner!

This course takes you from zero to a level where you are confident in creating your own regular expressions!
Free tutorial
Rating: 4.8 out of 5 (162 ratings)
5,155 students
58min of on-demand video
English
English [Auto]

Regular Expressions (Regex) - How to formulate them
How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) )
Key Concepts in Regular Expressions
Confidence to author Regular Expressions

Requirements

  • Basic IT Knowledge
  • Ability to follow instructions

Description

This course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data.

The course is structured in the below manner:

  • Basic Concepts - Metacharacters and their usage.

  • Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml.


By the end of the course, you would be confident to create your own regular expressions!


Post any questions you may have and the instructor will get back to you the soonest!


Happy Learning and All the Best!

-----

What are Regular Expressions?

Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes.

Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time.

Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean.

Who this course is for:

  • Anyone curious about regular expressions
  • Anyone wondering how they could create their own regular expressions for pattern matching

Instructor

Cyber Security and Technology Risk Management Trainer
Risal Nasar
  • 4.4 Instructor Rating
  • 264 Reviews
  • 6,191 Students
  • 3 Courses

Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries.


Main areas of experience:
• Programmatic Data Analysis, Data Wrangling and extraction of Relevant Data Points for Management Action (Python, Pandas, Matplotlib, SQL, Excel Macros)
• Data Visualizations (Microsoft Power BI, Microsoft PowerPoint and Excel, Python Matplotlib)
• Containerization of Applications for Deployment to Cloud Platforms (Docker, Kubernetes)
• Experienced with Cloud Platforms and Provisioning Tools (Azure, AWS, Terraform)
• Scripting, Programming and Automation (Python, Powershell, Bash, C, C++, Java, SQL, PHP)
• Vulnerability Assessment, Triage and Remediation (Nexpose)
• Detailed and Thorough Proof-Of-Concept (POC) and Proof-Of-Value (POV) Implementations of Security Solutions
• Data Loss Prevention (DLP) Implementation (Symantec DLP, Microsoft IRM, Google Drive Access Control)
• Cloud Access Security Broker (CASB) (Netskope, McAfee SkyHigh, Cisco Cloudlock, BitGlass)
• Firewall Network Security Process Implementation (Algosec)
• Version Control Platforms (GitHub, GitLab)
• Issue, Project Tracking and Team Collaboration Tools (JIRA, Confluence)
• Cloud Document Collaboration Platform Security (Google GSuite, Microsoft 365)
• Web Application Security Implementation (OWASP Application Security Verification Standards)
• Application Security Assessment and Remediation
• Assessment of Compliance against Institutional and Regulatory Policies, Standards and Guidelines (MAS Technology Risk Management Guidelines – TRMG, Personal Data Protection Act - PDPA)

Top companies trust Udemy

Get your team access to Udemy's top 25,000+ courses