Showing 13237–13248 of 14641 results
Thinking Functionally in Scala 2
Scala is emerging as a popular choice for working with large datasets and frameworks such as Spark. This course focuses on functional programming construct fundamentals and moves to first class functions and higher order methods of collections.
Thirst-quenching Streams for the Reactive Mind
This talk will cover how streams leverage on the underlying multicore processor to achieve parallelism, the push vs. pull streaming model, a simple use case with code examples to illustrate different API usages, and runtime processing analysis.
Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.
Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.
Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.
Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.
Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.
Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.
Threat Modeling Security Fundamentals
This learning path takes you through the four main phases of threat modeling, explains the differences between each data-flow diagram element, walks you through the threat modeling framework, recommends different tools and gives you a step-by-step guide on creating proper data-flow diagrams.
Threat Modeling: The Big Picture
In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
Threats, Vulnerabilities, and Mitigations for CompTIA Security+
This course will teach you the essential concepts necessary to assess, articulate, and mitigate threats and vulnerabilities within your company as well and prepare you for the Security+ exam.
Three.js & WebGL 3D Programming Crash Course (VR, OpenGL)
Learn how to create 3D web applications and games for web browsers with ease.