Showing 9265–9276 of 18767 results
Initial Access with Gophish
Gophish is an open source phishing tool written in the Go programming language for use by businesses and penetration testers to test for phishing awareness in their organization. In this course, you will learn Initial Access using Gophish.
Initial Access with King Phisher
King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.
Initial Access with Luckystrike
Malicious office documents are an effective way to gain an initial foothold into a network. In this course, you will learn how to use Luckystrike to create custom malicious office documents, manage multiple payloads, and utilize custom templates.
Initial Access with sqlmap
sqlmap is a powerful automation tool for identifying and exploiting SQL injection flaws. Add another tool to your toolbox by using sqlmap to exfiltrate data and gain initial access.
Initial Access with the Bash Bunny
In this course, you will learn how to gain that crucial initial access using a hardware device called a Bash Bunny. You will explore how to leverage Human Interface Device (HID) emulation to compromise targets, and how to write your own scripts to create custom payloads.
Initial Access with WiFi-Pumpkin
During a red team exercise, getting access to the internal network is one of your first tasks. In this course, we cover the WiFi-Pumpkin tool, which allows you to create rogue access points with fake captive portals.
Initialize data during extension installation in Dynamics 365 Business Central
Do you want to know how to initialize data during extension installation for Microsoft Dynamics 365 Business Central? Initializing data when you are installing an extension will automate many steps that you must otherwise perform manually. By automating this process, you can quickly set up an extension and it will become more user-friendly.
Initializing Data Members: From C++11 till C++20
Explore the changes in C++ from C++11 to C++20, focusing on how data members are initialized in modern C++.
Innovating with Google Cloud Artificial Intelligence
Discover innovative applications of AI technologies on Google Cloud to drive business solutions.
Innovation in Risk 2020 with HSBC and Google Cloud
How we evaluate and mitigate risk is continually evolving. Hear how global leaders HSBC and Google Cloud work together to have an innovative approach to risk, from how they skill up their people to how they're taking advantage of automation.
Innovation in the Workplace
Explore different techniques for coming up with and refining ideas, as well as cognitive biases that can get in the way of the innovation process.
Inspecting Open Source Software Packages for Security and License Compliance
This course will teach you about the inherent risks with leveraging open source libraries and components in your solutions, and how you can mitigate those risks using a software composition analysis tool, called WhiteSource Bolt, to scan your code.