Showing 3937–3948 of 4482 results

The Unicorn Project and the Five Ideals
In this talk, you'll learn about the goals and aspirations for The Unicorn Project, the Five Ideals, and why DevOps will be one of the most potent economic forces for decades to come.

The Way to Go
This Golang course covers core constructs and advanced error-handling, networking, and templating techniques of Go for enterprise systems developers.

Things I Learned About Software from Musicals
In this 5-minute session, Victoriya Kalmanovich will share things learned about software from musicals.

Thirst-quenching Streams for the Reactive Mind
This talk will cover how streams leverage on the underlying multicore processor to achieve parallelism, the push vs. pull streaming model, a simple use case with code examples to illustrate different API usages, and runtime processing analysis.

Threat Hunt with IBM Security QRadar
The threat hunter is responsible for investigating malicious activity on the environment and detecting advanced persistent threats (APTs). This course will teach you how to hunt for threats using the IBM Security QRadar SIEM.

Threat Hunt with PowerShell
As a defensive security professional, you're responsible for improving defenses by performing threat hunting exercises. This course will teach you how to perform threat hunting with PowerShell within a Microsoft environment.

Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.

Threat Hunting with Yara
With the battle on cyber threats becoming an uphill battle for current security capabilities, Threat Hunting with Yara will uplift your skills for detecting and defending against modern threats.

Threat Hunting: Endpoint Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through endpoint artifacts to find malicious behavior.

Threat Hunting: Hypothesize and Plan
Being responsible for finding malicious anomalies within an environment can be a daunting task. This course will teach you about different methodologies for threat hunting, and how to take action on indicators provided through threat intelligence.

Threat Hunting: Network Hunting
Being responsible to go find the anomalies within an environment can be a daunting task. This course will teach you how to hunt through network traffic to find malicious behavior.

Threat Hunting: Review, Automate, and Improve
What are the follow-on tasks after completing a threat hunt? This course will teach you how to generate tangible outcomes and improve your threat hunting process.