Search result for Reverse engineering malware analysis Online Courses & Certifications
Get Course Alerts by Email
Learn how to hack any Computer,Mobile Phone and Account
by Diaa Nassar- 0.0
1.5 hours on-demand video
malware analysis malware analysis Social Engineering - In this section you will learn how to gather information from people by speech or messages (Such as emails or passwords, or security questions for their accounts. Hack secure systems using client-side and social engineering attacks...
$12.99
Complete Ethical Hacking & Cyber Security Masterclass Course
by Joe Parys- 4.4
13.5 hours on-demand video
Perform Vulnerability Analysis Create Undetectable Advance Malware In C For Ethical Hacking Make A Reverse Shell Using Python For Ethical Hacking Perform Vulnerability Analysis Create Undetectable Advance Malware In C For Ethical Hacking Make A Reverse Shell Using Python For Ethical Hacking Learn What Are Reverse & Bind Shells Are Bypass Antivirus By Changing The Malware Binary...
$20.99
Ethical Hacking - Most Advanced Level Penetration Testing
by ITNuggets Institute- 0.0
10 hours on-demand video
Malware overview , malware analysis, Social engineering...
$12.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
Social Engineering Terminologies Creating Malware - TerminologiesMSF VenomVeil to Create Custom PayloadsTheFatRat - Installation and Creating a Custom MalwareEmbedding Malware in PDF FilesEmbedding Malware in Word DocumentsEmbedding Malware in Firefox Add-onsEmpire Project in ActionExploiting Java VulnerabilitiesSocial Engineering Toolkit (SET) for PhishingSending Fake Emails for PhishingVoice Phishing: Vishing social engineering social engineering tool kitYou'll also get:...
$21.99
ISO 27001 Cybersecurity manager. Guidelines.
by Cristian Lupa- 4.4
4 hours on-demand video
- malware aspects (viruses, logic bombs, worms, trojans, spyware, adware and a detailed presentation of ransomware) - social engineering and phishing - managing cybersecurity incidents - from detection to closure and root cause analysis...
$15.99
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Risk Management Process: Quantitative Analysis Risk Management Process: Qualitative Analysis Risk Management Process: Quantitative Analysis BCP and DRP: Business Impact Analysis BCP and DRP: Business Impact Analysis...
How to Win a Data Science Competition: Learn from Top Kagglers
by Dmitry Ulyanov , Alexander Guschin , Mikhail Trofimov , Dmitry Altukhov , Marios Michailidis- 4.7
Approx. 54 hours to complete
- Be taught advanced feature engineering techniques like generating mean-encodings, using aggregated statistical measures or finding nearest neighbors as a means to improve your predictions. Exploratory Data Analysis Exploratory data analysis Exploratory data analysis Advanced Feature Engineering I Advanced feature engineering II Microsoft Malware Classification Challenge...
Related searches
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
Tools for schedulability analysis No reverse engineering...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
Malware Continued Heather Social Engineering Incident Reporting and Analysis...
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
by Andrei Neagoie- 4.6
27 hours on-demand video
Manual Vulnerability Analysis & Searchsploit Reverse Shells, Bind Shells . SOCIAL ENGINEERING - This is something we cover in almost every section. Social Engineering is an attack on humans since as we know people are always the weakest security! Learn how to perform Vulnerability Analysis...
$14.99