Showing 1537–1548 of 4482 results

Ethical Hacking: Network and Perimeter Hacking
This course will teach Network and Perimeter Hacking concepts needed for the Certified Ethical Hacking Exam.

Ethical Hacking: Scanning Networks
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.

Ethical Hacking: Sniffing
Sniffing is a skill that attackers use to monitor and capture data that is passing through a network. This course will teach you the skills required to successfully gather data from a target as well as the information needed for the CEH 312-50 exam.

Ethical Hacking: Social Engineering
This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.

Ethical Hacking: System Hacking
This course will teach you the techniques of hacking systems that you’ll need for the 312-50 exam

Ethical Hacking: Vulnerability Analysis
Vulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats. This course will teach you vulnerability analysis techniques needed for the Certified Ethical Hackers exam

Ethical Hacking: Web Application Hacking
Want to learn more about hacking web servers, web applications, and performing SQL injection attacks? This course will teach you all about web application hacking needed for the CEH exam

ETL and ELT in Python
Learn to build effective, performant, and reliable data pipelines using Extract, Transform, and Load principles.

ETL vs. ELT: Who Cares?
In this session, we will explore why ELT is the key to taking advantage of Cloud Data Architecture and give IT and your business the approach and insight that can be discovered from your companies greatest asset – your data.

EU Panel: The Joys of Integrating Security Testing into Your Pipeline
Watch this panel on integrating security testing into your pipeline.

Evaluating Model Effectiveness in Microsoft Azure
This course is intended for data science practitioners who work with Azure Machine Learning Service and who seek to improve their ML model accuracy, efficiency, and explainability.

Evaluating Your Organization’s Security Posture
This course will teach you about completing a holistic security evaluation, and how to shape it into a repeatable practice that helps raise the IT security posture for the whole company.