Pluralsight – Malware Analysis Fundamentals

Pluralsight – Malware Analysis Fundamentals
English | Size: 658.94 MB
Category: Tutorial


The ability to analyze malware has become a necessary skill for anyone performing incident response. This course will teach the skills required to properly, quickly, and safely analyze malware by examining both its characteristics and behavior.
Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you’ll gain the ability to analyze malware. First, you’ll explore how to keep yourself and your systems safe when analyzing malware. Next, you’ll discover how to get information on the malware by examining its characteristics. [Read more…]

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits
English | Size: 662.34 MB
Category: Tutorial


Course Overview 1m 19s
Introduction
16m 15s
Introduction to Malware 1m 32s
Demo: Analyzing a Bromium Alert 8m 10s
Security Tool Follow-up 5m 46s
First Malware Analysis Lab 0m 45s
Recognizing the Exploit Vector
15m 19s
[Read more…]

Troubleshooting with Wireshark- Fundamental Protocol Analysis, Pluralsight

Troubleshooting with Wireshark- Fundamental Protocol Analysis, Pluralsight
English | Size: 977.50 MB
Category: Tutorial


Wireshark is a very powerful tool for troubleshooting, but getting started with it can be overwhelming when it comes to the protocols for solving network behavior issues.
This course, Troubleshooting with Wireshark: Fundamental Protocol Analysis, will help you to understand how fundamental protocols operate using Wireshark as the mechanism for observing protocol logic in action.
[Read more…]

Pluralsight – Malware Analysis -The Big Picture

Pluralsight – Malware Analysis -The Big Picture
English | Size: 264.98 MB
Category: Tutorial


Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company’s reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you’ll need in place to effectively combat these breaches. [Read more…]

Pluralsight – Conducting Network Vulnerability Analysis

Pluralsight – Conducting Network Vulnerability Analysis
English | Size: 405.68 MB
Category: CBTs


This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. [Read more…]

O’Reilly – Conducting Competitive Research and Analysis

O’Reilly – Conducting Competitive Research and Analysis
English | Size: 1.00 GB
Category: Tutorial


Conducting Competitive Research and Analysis
Harvesting Insights for Devising an Innovative Product

UX expert Jaime Levy has a proven formula for performing UX strategy based on four tenets. In this course (number two of her five part series), she explores the first of those tenets: Business strategy. Peppered with stories of triumph and hard knocks (e.g., an illuminating tale about a lunatic Hollywood producer), Levy describes what business strategy is before diving deep into her Competitive Analysis Matrix Tool – a methodology successful entrepreneurs employ to plan their digital futures. She shows you how to use the tool, how to source the information required by the tool, and how to take advantage of the insights provided by the tool. By the end you’ll have a definitive understanding of how to do competitive research and why it’s needed to survive and thrive in the digital marketplace.
[Read more…]

Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector

Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector
English | Size: 3.84 GB
Category: Tutorial


Memory leaks are a common cause of unexpected crashes in Windows applications. It’s important to detect them before your apps go live. Luckily, there is a tool to help. Intel Inspector XE is a memory and threading debugger that can be used to detect memory leaks in C, C++, and Fortran applications running on Windows. Learn to use the Intel Inspector to easily find and repair memory leaks in any of your own Windows applications, with this installment of Windows Performance Tools. [Read more…]

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda
English | Size: 467.03 MB
Category: Tutorial


Application threads often wait too long on synchronization objects (locks), which results in processor cores being underutilized. Discover how to use the Locks and Waits analysis in Intel’s VTune Amplifier to identify and remove deadlocks: one of the most common reasons for inefficient parallel execution within a Windows application. Follow along with instructor Thomas Pantels as he demos the analysis tool and shows where to locate and enhance source code to remove deadlocks. [Read more…]

Pluralsight – Wireshark Core Protocol Analysis

Pluralsight – Wireshark Core Protocol Analysis
English | Size: 722.8 MB
Category: Networking


Wireshark is a network packet analysis tool that enables you to see the traffic going over the network. At the end of 2015, Wireshark 2.0 was released. This release radically changed the GUI, and added several major improvements. This course is based on this new version of Wireshark. It is recommended that you take the Wireshark 2.0 Fundamentals as a prerequisite to this course. In Wireshark Core Protocol Analysis, you will look at the key TCP/IP protocols used in today’s enterprise networks. First, you’ll learn about the four-step methodology for analyzing any network protocol. Next, you’ll explore the eight most core protocols that are on today’s enterprise networks. Finally, you’ll wrap up the course by understanding key security protocols running on your network, and learn how to get yourself ready to support IoT on your enterprise network. By the end this course, you will have reinforced your understanding of how these eight core protocols work, be familiar with the key fields carried in the protocol header, and most importantly, you’ll know what to look for when analyzing your enterprise (or even your home) network. [Read more…]

Data Wrangling and Analysis with Python, OReilly

Data Wrangling and Analysis with Python, OReilly

English | Size: 1.41 GB (1,508,736,759 Bytes)
Category: CBTs


Discover the data analysis capabilities of the Python Pandas software library in this introduction to data wrangling and data analytics. Designed for learners with some core knowledge of Python, you’ll explore the basics of importing, exporting, parsing, cleaning, analyzing, and visualizing data.The course focuses on Pandas, where you’ll learn to filter, group, match, and join data and then move on to advanced functions like analyzing trends and normalizing your data. There is also an introduction to some nifty skills like web scraping, working with API data, fuzzy matching, multiprocessing, and analyzing code performance. [Read more…]