analysis

  1. Sauron

    Malware Science: A comprehensive guide to detection, analysis, and compliance

    Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscape Key Features Get introduced to three primary AI tactics used in malware and detection Leverage data...
  2. Shadow Warrior

    CIA LEAK --- ANALYSIS AND ASSESSMENT OF GATEWAY PROCESS

    CIA LEAK --- ANALYSIS AND ASSESSMENT OF GATEWAY PROCESS I m Swissgoradan and i found a Leak from the CIA above the analysis and assessment of gateway process. I will be happy when you give me a like (Only if you want and celebrate this Leak Hidden content
  3. Sauron

    List of top .DE domains (66,000+) with SEO analysis, traffic and categorization

    Hidden content
  4. Sauron

    SEC587 ADVANCED OSINT GATHERING AND ANALYSIS WITH LAB

    SANS SEC587 is an advanced Open-Source Intelligence (OSINT) course for those who already know the foundations of OSINT. The goal is to provide students with more in-depth and technical OSINT knowledge. Students will learn OSINT skills and techniques that law enforcement, intelligence analysts...
  5. Sauron

    Metrics for Test Reporting: Analysis and Reporting for Effective Test Management

    Part of any software development is to regularly inform management about the progress and any problems of the project. This book presents various test parameters and metrics that can be used to vividly illustrate the progress of a software test and easily identify any need for action. The key...
  6. LeakGod

    Incident Response: Detection and Analysis

    In an incident response scenario, it’s hard to know where to start. In this course, Incident Response: Detection and Analysis, you’ll learn to how to accomplish the first phase of an incident response scenario, the initial detection and analysis. First, you’ll validate and confirm that a...
  7. LeakGod

    Learning Pandas 2.0: A Comprehensive Guide to Data Manipulation and Analysis for Data Scientists and Machine Learning Professionals

    Learning Pandas 2.0: A Comprehensive Guide to Data Manipulation and Analysis for Data Scientists and Machine Learning Professionals Mastering Data Wrangling and Analysis for Modern Data Science "Learning Pandas 2.0" is an essential guide for anyone looking to harness the power of Python's...
  8. Sauron

    Malware Analysis: Initial Access Techniques

    Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise. Malware is distributed through a wide variety of...
  9. Sauron

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU]

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU] This book is about network protocol security. James Forshaw, a world-renowned bug bounty expert, looks at the network from an attacker's perspective to help...
  10. Sauron

    Malware Analysis Technique

    Malware Analysis Technique Malicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute...
  11. Sauron

    Wireshark Packet Analysis Training

    Wireshark Packet Analysis Training IT & SOFTWARE / NETWORK & SECURITY Wireshark Packet Analysis Training June 9, 2022 Wireshark Packet Analysis Training Description Welcome guys my name is Anwer Khan and I will be your instructor throughout this course. In this course we will talk straight to...
  12. Sauron

    Google ethical hacking, how to gather sensitive data

    Google ethical hacking, how to gather sensitive data Google is a great tool that must of us use on a daily basis, however it’s real power and capacities are hidden to the vast majority of us. Since it fetches data from all over the internet (or most of it) some sensitive data also stays...
  13. Sauron

    Hardening Ubuntu Server

    Hardening Ubuntu Server This is a beginners course that teaches you how to harden your Ubuntu Linux Server. It is aimed at total beginners and teaches you how to setup Ubuntu Linux Server, how to secure user accounts, how to lock down accounts, how to hack into a server and and how to setup...
  14. LeakGod

    Accelerated Linux Core Dump Analysis Training Course Transcript with GDB and WinDbg Practice

    Learn how to analyse Linux process crashes and hangs, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more. This book uses a unique and innovative pattern-oriented diagnostic analysis approach to...
  15. LeakGod

    Network Science with Python: Explore the networks around us using network science, social network analysis, and machine learnin

    Create networks using data points and information Learn to visualize and analyze networks to better understand communities Explore the use of network data in both - supervised and unsupervised machine learning projects Book Description Network analysis is often taught with tiny or toy data sets...
  16. Sauron

    Mastering Malware Analysis (Second Edition)

    New and developing technologies inevitably bring new types of malware with them, creating a huge demand for IT professionals that can keep malware at bay. With the help of this updated second edition of Mastering Malware Analysis, you’ll be able to add valuable reverse-engineering skills to your...
  17. ASMODEUS

    Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  18. Mr.Robot

    [Download] Technical Analysis Trading Bootcamp - Stocks, Crypto & Forex For Free

    Technical Analysis Trading Bootcamp - Stocks, Crypto & Forex Download For Free What you’ll learn Analyze any market whether it’s stocks, crypto, forex, or comodities Make consistent profits using technical analysis in a scientific way Create your own trading strategies as the well known ones...
  19. Mr.Robot

    Akshat Shrivastava's Cryptocurrency Analysis and Stock Market Course

    Hey Hacksnation, This has been a very helpful website for learning perspective to me and many others I believe, reading from the comments. So, thank you for that. I was wondering if you could provide Akshat’s course. Here is the link to it. Stock Market Course Crypto Course Thank you.
  20. Sauron

    ChatGPT/AI for Finance Professionals: Investing & Analysis

    In this course you will learn how to use ChatGPT and other AI products to do investment research on any company, including in depth qualitative, quantitative research and financial and accounting research. In addition, we will teach you how to use ChatGPT and other AI products to help you create...
Top