Search result for Social network analysis Online Courses & Certifications
Get Course Alerts by Email
Free Tools for Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 0.0
8.5 hours on-demand video
Learn hackers`Web Hacking, Network Scanning and Password Cracking tools such as Wireshark, Nmap, Metasploit, Maltego Network Scan Tools Social Engineering and Phishing Tools Network Scan Tools Wireshark: Sniffing the Network TrafficWireshark: Following a StreamWireshark: Summarise the NetworkTCPDump in ActionHping for Active Scan and DDoS Attacks Network Scan Tools - NMAPPing Scan to Enumerate Network HostsIntroduction to Port ScanSYN ScanPort Scan Details...
$16.99
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more! Vulnerability Analysis Password Complexity Analysis Network Traffic Analysis Social Engineering...
$16.99
Ethical Hacking & Penetration Testing with Kali Linux
by Packt Publishing- 0.0
14 hours on-demand video
You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. Use social engineering to compromise the weakest part of the network—the end users. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment....
$12.99
R Data Analysis - Time-Series and Social Media
by Packt Publishing- 3.2
2.5 hours on-demand video
Data analysis has recently emerged as a very important focus for a huge range of organizations and businesses. R makes detailed data analysis easier, by making advanced data exploration and insight accessible to anyone interested in learning it. You will learn to perform social network analysis, to uncover hidden insights and trends from data....
$12.99
Solarwinds Network Performance Monitoring Course
by Ali Mansouri- 0.0
8 hours on-demand video
Getting to know Solarwinds Monitoring Orion (NPM,NCM,NTA), Monitor Network Devices, Real lab images (IOSv) Maps & more Solarwinds training monitoring is designed to show all devices, applications, networks, and vendors in single-page path analysis for more signal and less noise to quickly isolate network slowdowns. Implementing additional polling and how to deploy it in a real network in solarwinds monitoring...
$15.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
The second stage of a pen test is scanning the target application or network to determine how they will respond to an attack. You can do this through a static analysis of application code and dynamic scans of running applications and networks. Network Fundamentals Network Security network security social engineering social engineering tool kitYou'll also get:...
$21.99
Text Mining and Analytics
by ChengXiang Zhai- 4.5
Approx. 33 hours to complete
Detailed analysis of text data requires understanding of natural language text, which is known to be a difficult task for computers. Social Media 1 Opinion Mining and Sentiment Analysis: Latent Aspect Rating Analysis Part 1 2 Opinion Mining and Sentiment Analysis: Latent Aspect Rating Analysis Part 2 6 Contextual Text Mining: Mining Topics with Social Network Context...
Related searches
Basic Mobile App Marketing for Beginners: 7 Courses in 1
by Creative Online School- 4.4
1 hour on-demand video
Analysis of a push message Social Network Marketing Facebook Ad analysis for mobile targeted user base Analysis of install ads: perfect choice for mobile apps...
$12.99
Ethical Hacking - Most Advanced Level Penetration Testing
by ITNuggets Institute- 0.0
10 hours on-demand video
We are giving you a tricks that how attackers attack on our network and how we can defend it by attacking on our own computer networks and devices. We are using our own computer network to perfrom Ethical hacking that we have full permission to launch attack. Network scanning overview and methodology...
$12.99
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Risk Management Process: Quantitative Analysis Risk Management Process: Qualitative Analysis Risk Management Process: Quantitative Analysis BCP and DRP: Business Impact Analysis BCP and DRP: Business Impact Analysis...