Showing 3241–3252 of 18767 results
Combining and Filtering Data with PostgreSQL 9
This course will teach you how to use PostgreSQL to expand your queries to filter and combine data. Using SQL, you’ll learn how to join data from multiple tables, combine result sets, and use aggregate and window functions.
Combining and Filtering Data with T-SQL 2019
Following along with the exercise files, this course takes you from setting up the environment through writing more advanced queries using T-SQL functions, expressions, and logic.
Combining and Shaping Data
This course covers both conceptual and practical aspects of pulling together from different data sources, with different schemas and orientations, into a cohesive whole using Excel, Python, and various tools available on the Azure cloud platform.
Combining Machine Learning and Rules for Cybersecurity
Learn how to integrate machine learning with rule-based systems for enhanced cybersecurity. Discover techniques for detecting threats and automating security responses using AI.
Command and Control with Covenant
Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.
Command and Control with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.
Command and Control with Merlin
In this course, you will learn Command And Control using Merlin. Merlin’s “magic” is in the usage of modules (for attack automation), HTTP/3 (for evading packet inspection), and Golang (for cross-compiling agents on multiple Operating Systems).
Command and Control with PoshC2
PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.
Command and Control with Pupy
Learn how to use the Pupy server to connect to exploited clients over different encryption protocols and use these sessions to run additional attacks, dump credentials, and collect information.
Command and Control with Sliver
Are you looking for a versatile command and control server with implants for almost every architecture? In this course, you will learn Command and Control using Sliver.
Common Challenges Facing Angular Enterprises
There are common challenges facing Angular teams who are building applications at scale. In this talk, Stephen will demystify these questions, share what is known, and what the teams need your help with.
Common Data Analysis Techniques
Analyze relationships between variables and model patterns in data.