Pluralsight – Conducting Network Vulnerability Analysis

Pluralsight – Conducting Network Vulnerability Analysis
English | Size: 405.68 MB
Category: CBTs


This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. [Read more…]

O’Reilly – Conducting Competitive Research and Analysis

O’Reilly – Conducting Competitive Research and Analysis
English | Size: 1.00 GB
Category: Tutorial


Conducting Competitive Research and Analysis
Harvesting Insights for Devising an Innovative Product

UX expert Jaime Levy has a proven formula for performing UX strategy based on four tenets. In this course (number two of her five part series), she explores the first of those tenets: Business strategy. Peppered with stories of triumph and hard knocks (e.g., an illuminating tale about a lunatic Hollywood producer), Levy describes what business strategy is before diving deep into her Competitive Analysis Matrix Tool – a methodology successful entrepreneurs employ to plan their digital futures. She shows you how to use the tool, how to source the information required by the tool, and how to take advantage of the insights provided by the tool. By the end you’ll have a definitive understanding of how to do competitive research and why it’s needed to survive and thrive in the digital marketplace.
[Read more…]

Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector

Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector
English | Size: 3.84 GB
Category: Tutorial


Memory leaks are a common cause of unexpected crashes in Windows applications. It’s important to detect them before your apps go live. Luckily, there is a tool to help. Intel Inspector XE is a memory and threading debugger that can be used to detect memory leaks in C, C++, and Fortran applications running on Windows. Learn to use the Intel Inspector to easily find and repair memory leaks in any of your own Windows applications, with this installment of Windows Performance Tools. [Read more…]

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda
English | Size: 467.03 MB
Category: Tutorial


Application threads often wait too long on synchronization objects (locks), which results in processor cores being underutilized. Discover how to use the Locks and Waits analysis in Intel’s VTune Amplifier to identify and remove deadlocks: one of the most common reasons for inefficient parallel execution within a Windows application. Follow along with instructor Thomas Pantels as he demos the analysis tool and shows where to locate and enhance source code to remove deadlocks. [Read more…]

Pluralsight – Wireshark Core Protocol Analysis

Pluralsight – Wireshark Core Protocol Analysis
English | Size: 722.8 MB
Category: Networking


Wireshark is a network packet analysis tool that enables you to see the traffic going over the network. At the end of 2015, Wireshark 2.0 was released. This release radically changed the GUI, and added several major improvements. This course is based on this new version of Wireshark. It is recommended that you take the Wireshark 2.0 Fundamentals as a prerequisite to this course. In Wireshark Core Protocol Analysis, you will look at the key TCP/IP protocols used in today’s enterprise networks. First, you’ll learn about the four-step methodology for analyzing any network protocol. Next, you’ll explore the eight most core protocols that are on today’s enterprise networks. Finally, you’ll wrap up the course by understanding key security protocols running on your network, and learn how to get yourself ready to support IoT on your enterprise network. By the end this course, you will have reinforced your understanding of how these eight core protocols work, be familiar with the key fields carried in the protocol header, and most importantly, you’ll know what to look for when analyzing your enterprise (or even your home) network. [Read more…]

Data Wrangling and Analysis with Python, OReilly

Data Wrangling and Analysis with Python, OReilly

English | Size: 1.41 GB (1,508,736,759 Bytes)
Category: CBTs


Discover the data analysis capabilities of the Python Pandas software library in this introduction to data wrangling and data analytics. Designed for learners with some core knowledge of Python, you’ll explore the basics of importing, exporting, parsing, cleaning, analyzing, and visualizing data.The course focuses on Pandas, where you’ll learn to filter, group, match, and join data and then move on to advanced functions like analyzing trends and normalizing your data. There is also an introduction to some nifty skills like web scraping, working with API data, fuzzy matching, multiprocessing, and analyzing code performance. [Read more…]

Technical Analysis Of The Financial Markets (1999) by John J. Murphy [1 pdf, 1 mobi, 1 epub]

Technical Analysis Of The Financial Markets (1999) by John J. Murphy [1 pdf, 1 mobi, 1 epub]
English | Size: 65.29 MB (68,462,556 bytes )
Category: Stock


This outstanding reference has already taught thousands of traders the concepts of technical analysis and their application in the futures and stock markets. Covering the latest developments in computer technology, technical tools, and indicators, the second edition features new material on candlestick charting, intermarket relationships, stocks and stock rotation, plus state-of-the-art examples and figures. From how to read charts to understanding indicators and the crucial role technical analysis plays in investing, readers gain a thorough and accessible overview of the field of technical analysis, with a special emphasis on futures markets. Revised and expanded for the demands of today’s financial world, this book is essential reading for anyone interested in tracking and analyzing market behavior. [Read more…]

Financial Planning Analysis Building a Comp Budget

Financial Planning Analysis Building a Comp Budget
English | Size: 273.28 MB (286,553,306 bytes)
Category: CBTs


Financial Planning & Analysis: Building a Company’s Budget from Scratch is our newest course on Udemy. It guides you through the core principles of Financial Planning and helps you to understand how a company prepares its budget. The video lessons touch on several technical topics such as revenue forecasting, cost planning, working capital development, fixed assets roll-forward, and cash flow calculation. Besides that, we will discuss why firms need budgets, which are the financial statements that a company uses to create its budget, what types of budgets are there, which are the main techniques used in financial planning, who is involved in the preparation of a budget, and who is interested in the final numbers that are signed-off in the budget. Specializing in these topics will turn you into a valuable, indispensable member of any company’s Finance team. [Read more…]

Pluralsight – Advanced Malware Analysis Combating Exploit Kits

Pluralsight – Advanced Malware Analysis: Combating Exploit Kits

English | Size: 662.45 MB (694,628,352 Bytes)
Category: CBTs


Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you’ll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you’ll explore the tools and techniques you’ll be using as well as analyze events collected by Bromium micro-VMs. Next, you’ll work on unraveling the exploit kits–figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in “the wild.” Finally, you’ll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you’ll not only have a better understanding of what exploit kits are and how to detect them, but you’ll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime. [Read more…]

Pluralsight Advanced Malware Analysis Combating Exploit Kits

Pluralsight Advanced Malware Analysis: Combating Exploit Kits

English | Size: 730.23 MB (765,701,972 Bytes)
Category: CBTs


Cyber-crime is rampant, and it’s only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.
[Read more…]