analysis

  1. protectaccount

    Mobile Malware Analysis Fundamentals | Cybrary

    Course Description The course will be divided into 6 modules, 2 labs and 2 case studies which will cover the mobile malware landscape, mobile architectures, static and dynamic analysis techniques and building your mobile analysis lab. Course Goals By the end of this course, students should be...
  2. protectaccount

    Maltrak Malware Analysis Mindset

    Maltrak Malware analysis mindset first 5 modules + what will cover in the course video. Maltrak Malware analysis mindset Part 2, 6 modules + Intro to Programming, Have fun guys The Complete Malware Incident Response Training will take you step-by-step, with lots of hands-on practice...
  3. protectaccount

    ELK for Security Analysis | Networkdefense

    ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful trio to perform security analysis. This isn’t just an ELK course; it’s a course on how to use...
  4. protectaccount

    Maltrak – Malware Analysis Training – Real Scenarios

    This is an intensive live training designed for cybersecurity professionals to master malware analysis, memory forensics, and enterprise-scale incident response. The curriculum uses real-world attack samples, including ransomware and APT toolkits, within risk‑free environments. Syllabus...
  5. protectaccount

    Mandiant – Essentials of Malware Analysis

    This course provides a beginner-level introduction to the tools and methodologies used to perform malware analysis on executables found in Windows systems using a practical, virtual hands-on approach. The course introduces students to Disassembly, including subtopics on x86 Architecture, The...
  6. protectaccount

    MAoS – Malware Analysis on Steroids

    The MAoS Bundle is your fast track to mastering malware analysis. From core concepts to hands-on reverse engineering, this bundle gives you the real-world skills needed to dissect malware with confidence. Perfect for aspiring analysts, SOC pros, and red teamers preparing to dive into advanced...
  7. protectaccount

    YARA – Malware Analysis and Threat Detection

    Blue Team Defensive Operations What you’ll learn: Learn to Write YARA Rules Based on Real World Scenarios Develop Your Own Custom Testing Tools Find Out How to Detect OS Manipulation and Network Recon Capabilities Learn How to Use YARA to Spot Covert Channels and Sensitive Data Leaks Develop...
  8. protectaccount

    CompTIA CySA+ (CS0-003) | ITProTV

    CYBERSECURITY CONCEPTS: Course Overview Common Log Ingestion Concepts Common Operating System Concepts Common Infrastructure Concepts Common IAM Concepts Common Encryption Concepts Protecting Sensitive Data Common Network Architecture Malicious Network Activity Malicious Host Activity...
  9. protectaccount

    SQL for Data Analysis: Beginner MySQL Business Intelligence

    See why this is one of the TOP RATED SQL/MySQL Courses on Udemy: “Clear presentation of information and with enough repetition of important SQL concepts to help make the information memorable. Loved the frequent practice examples and code debugging exercises!” – Maggi M. “I totally loved this...
  10. ABTrevor

    A detailed analysis of new approaches to deepfake technologies to bypass verification systems💰

    With the development of biometric verification systems (KYC — Know Your Customer) and liveness detection technologies, people have begun actively using deepfake technologies to bypass these security mechanisms. Deepfake, based on generative neural networks (such as GAN — Generative Adversarial...
  11. protectaccount

    Course Malware Analysis: Static, Dynamic, and Memory Techniques

    Unlock the world of malware analysis and become proficient in uncovering how malicious programs work. This course takes you from the foundations of reverse engineering to advanced techniques in static analysis, dynamic analysis, and memory forensics. You will learn to: Examine malware binaries...
  12. protectaccount

    Course Reverse Engineering and Malware Analysis x64/32: CRMA+ 2022

    Learn Malware Analysis and Reverse Engineering Deeply with CRMA+ 2022 Course. Breaking something down and putting it back together is a process that helps people understand how things were made. A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work...
  13. Serradni

    DEEP DIVE INTO CARDING METHODS: A COMPREHENSIVE ANALYSIS✅

    Are you interested in carding? Do you need carding guides and methods? Are you looking for good sources for credit cards, dumps, enrolls and bank logs? Let's talk better on telegram @Forlaxv Carding has roots in the 1980s dial-up fraud but exploded with e-commerce in the 2000s. By 2025, it's a...
  14. d0j0

    GMV Checker (EDR for ATMs) Technical Analysis (Part 1) / TUTORIAL

    http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/b6b521b55c5fe6a2777514cd4c001b9f2b14b99bbe81df/03e2cf584e03ed44de94b4.bmp Hey there this is a series of tutorials based on the GMV Checker structure, components, protocol, client/server architecture, potential attack...
  15. Serradni

    How do carders use BIN (Binary Identification Number) analysis software to determine card type?

    Hello🤍 Someone asked me this question and I also decided to give answers here so everyone can also learn. I believe this will be helpful. Are you interested in carding? Do you need carding guides and methods? Do you need good sources for credit cards, dumps, enrolls and bank logs? Do you have...
  16. Shadow Warrior

    Data Analysis And Machine Learning - Python + Gpt 3.5 And Gpt 4

    Data Analysis And Machine Learning - Python + Gpt 3.5 And Gpt 4 Hidden content
  17. Sauron

    Malware Science: A comprehensive guide to detection, analysis, and compliance

    Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscape Key Features Get introduced to three primary AI tactics used in malware and detection Leverage data...
  18. Sauron

    SEC587 ADVANCED OSINT GATHERING AND ANALYSIS WITH LAB

    SANS SEC587 is an advanced Open-Source Intelligence (OSINT) course for those who already know the foundations of OSINT. The goal is to provide students with more in-depth and technical OSINT knowledge. Students will learn OSINT skills and techniques that law enforcement, intelligence analysts...
  19. Sauron

    Metrics for Test Reporting: Analysis and Reporting for Effective Test Management

    Part of any software development is to regularly inform management about the progress and any problems of the project. This book presents various test parameters and metrics that can be used to vividly illustrate the progress of a software test and easily identify any need for action. The key...
  20. LeakGod

    Incident Response: Detection and Analysis

    In an incident response scenario, it’s hard to know where to start. In this course, Incident Response: Detection and Analysis, you’ll learn to how to accomplish the first phase of an incident response scenario, the initial detection and analysis. First, you’ll validate and confirm that a...
  21. LeakGod

    Learning Pandas 2.0: A Comprehensive Guide to Data Manipulation and Analysis for Data Scientists and Machine Learning Professionals

    Learning Pandas 2.0: A Comprehensive Guide to Data Manipulation and Analysis for Data Scientists and Machine Learning Professionals Mastering Data Wrangling and Analysis for Modern Data Science "Learning Pandas 2.0" is an essential guide for anyone looking to harness the power of Python's...
  22. Sauron

    Malware Analysis: Initial Access Techniques

    Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise. Malware is distributed through a wide variety of...
  23. Sauron

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU]

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU] This book is about network protocol security. James Forshaw, a world-renowned bug bounty expert, looks at the network from an attacker's perspective to help...
  24. Sauron

    Malware Analysis Technique

    Malware Analysis Technique Malicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute...
  25. Sauron

    Wireshark Packet Analysis Training

    Wireshark Packet Analysis Training IT & SOFTWARE / NETWORK & SECURITY Wireshark Packet Analysis Training June 9, 2022 Wireshark Packet Analysis Training Description Welcome guys my name is Anwer Khan and I will be your instructor throughout this course. In this course we will talk straight to...
  26. Sauron

    Google ethical hacking, how to gather sensitive data

    Google ethical hacking, how to gather sensitive data Google is a great tool that must of us use on a daily basis, however it’s real power and capacities are hidden to the vast majority of us. Since it fetches data from all over the internet (or most of it) some sensitive data also stays...
  27. Sauron

    Hardening Ubuntu Server

    Hardening Ubuntu Server This is a beginners course that teaches you how to harden your Ubuntu Linux Server. It is aimed at total beginners and teaches you how to setup Ubuntu Linux Server, how to secure user accounts, how to lock down accounts, how to hack into a server and and how to setup...
  28. LeakGod

    Accelerated Linux Core Dump Analysis Training Course Transcript with GDB and WinDbg Practice

    Learn how to analyse Linux process crashes and hangs, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more. This book uses a unique and innovative pattern-oriented diagnostic analysis approach to...
  29. LeakGod

    Network Science with Python: Explore the networks around us using network science, social network analysis, and machine learnin

    Create networks using data points and information Learn to visualize and analyze networks to better understand communities Explore the use of network data in both - supervised and unsupervised machine learning projects Book Description Network analysis is often taught with tiny or toy data sets...
  30. Sauron

    Mastering Malware Analysis (Second Edition)

    New and developing technologies inevitably bring new types of malware with them, creating a huge demand for IT professionals that can keep malware at bay. With the help of this updated second edition of Mastering Malware Analysis, you’ll be able to add valuable reverse-engineering skills to your...
  31. ASMODEUS

    Reverse Engineering 3: x64dbg Graphical Static Analysis

    If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg...
  32. Mr.Robot

    [Download] Technical Analysis Trading Bootcamp - Stocks, Crypto & Forex For Free

    Technical Analysis Trading Bootcamp - Stocks, Crypto & Forex Download For Free What you’ll learn Analyze any market whether it’s stocks, crypto, forex, or comodities Make consistent profits using technical analysis in a scientific way Create your own trading strategies as the well known ones...
  33. Mr.Robot

    Akshat Shrivastava's Cryptocurrency Analysis and Stock Market Course

    Hey Hacksnation, This has been a very helpful website for learning perspective to me and many others I believe, reading from the comments. So, thank you for that. I was wondering if you could provide Akshat’s course. Here is the link to it. Stock Market Course Crypto Course Thank you.
  34. Sauron

    ChatGPT/AI for Finance Professionals: Investing & Analysis

    In this course you will learn how to use ChatGPT and other AI products to do investment research on any company, including in depth qualitative, quantitative research and financial and accounting research. In addition, we will teach you how to use ChatGPT and other AI products to help you create...
  35. Sauron

    [PHP] Aikeedo [v1.3.5] - AI Content Generator Platform - SaaS Ready - OpenAI - NULLED

    The most widely used AI models Unlock the full potential of instant, high-quality content creation with Aikeedo. Our platform harnesses a diverse array of renowned AI models, providing you with the tools to ignite your creativity effortlessly. Dive into the world of Aikeedo, where innovation...
  36. Mr.Robot

    ⭐HOW TO MAKE MONEY FROM TRADING⭐

    Hidden content
  37. Mr.Robot

    ❤️HOW TO MAKE 10K WITH SEO OVERVIEW ❤️

    Google Analytics: A free tool from Google to track and analyze your website traffic. Google Search Console: Another free tool from Google that allows you to see how your pages are performing in Google search results. Ahrefs: A powerful tool for analyzing your site's inbound and outbound links...
Top