PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING

PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING
English | Size: 366.93 MB
Category: Tutorial

Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the
knowledge and skills to effectively tackle packing! [Read more…]

PLURALSIGHT MICROSOFT AZURE DEVELOPER IDENTIFYING AN APPROPRIATE INTEGRATION SOLUTION

PLURALSIGHT MICROSOFT AZURE DEVELOPER IDENTIFYING AN APPROPRIATE INTEGRATION SOLUTION
English | Size: 248.04 MB
Category: Tutorial

Integration is complex and even harder at scale. In this course, Microsoft Azure Developer: Identifying an Appropriate Integration Solution, you will learn and gain the ability to architect and build different Integration Architectures to solve your challenge. First, you will explore different Integration approaches. Next, you will discover how Microsoft Azure comes to the party making it easy. Finally, you will see how to connect APIs/Services from wherever they are into your Integration Solution. When you re finished with this course, you will have the skills and knowledge of being able to Architect and Integrate using Microsoft Integration Services within Azure [Read more…]

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information
English | Size: 144.27 MB
Category: CBTs

As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated-and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations. [Read more…]

Packt Publishig – Identifying Behaviour Patterns using Machine Learning Techniques

Packt Publishig – Identifying Behaviour Patterns using Machine Learning Techniques
English | Size: 237.00 MB
Category: Tutorial

Learn to identify behaviour patterns based on the user actions on the web site using ML techniques

Nowadays web-sites needs to handle huge amount of traffic. We can leverage that fact and capture user interactions with the application. For further analysis. Next, we can analyze users behavior and capture patterns on which we are able to react properly.
[Read more…]

Skip to toolbar