IT & Software
Showing 5497–5508 of 16328 results

Execution with Unicorn
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.

Exercise your emotional intelligence
Learn how to use your emotional intelligence to help your peers.

Exercise: Use IBM Log Analysis to Troubleshoot a Problem
This exercise uses IBM Log Analysis to troubleshoot a 500 internal server error.

Exfiltration with CloakifyFactory
This course will teach you Exfiltration using CloakifyFactory.

Exfiltration with Dnscat2
Maintaining access into a targeted network requires multiple C2 channels. In this course, you will learn data exfiltration using dnscat.

Exfiltration with Powershell-RAT
In this course, you will learn exfiltration over alternative protocol: exfiltration over unencrypted/obfuscated non-C2 protocol using Powershell RAT.

Expand query and transaction functionality in Azure Cosmos DB for NoSQL
Author user-defined functions and triggers using JavaScript in Azure Cosmos DB for NoSQL.

Expand the capabilities for Java apps on Azure
Start here and learn how you can get the full power of Azure with your Java apps - use idiomatic libraries to connect and interact with your preferred cloud services, including:

Expediting Deep Learning with Transfer Learning: PyTorch Playbook
This course covers the important design choices that a data professional must make while leveraging pre-trained models using Transfer Learning. It also covers the implementation aspects of different Transfer Learning approaches in PyTorch.

Experiment with Azure Machine Learning
Learn how to find the best model with automated machine learning (AutoML) and by experimenting in notebooks.

Experimental Design and Recommendations
Study the methods of experimental design and personalized recommendations in data science.

Experimental Design for Data Analysis
This course covers conceptual and practical aspects of building and evaluating machine learning models in a way that uses data judiciously, while also accounting for considerations such as ordering and relationships within data and other biases.