Attacking System Logs and Accounting Files in Linux / Unix | Log files: attacks & defenses [FREE COURSE CONTENT]
In this video tutorial, you will hear about attacking system logs and accounting files in Linux / Unix! It …
Read MoreIntroduction | Investigate Cyber Fraud - Real-Life Cases [FREE COURSE CONTENT]
In this video tutorial, you will see the introduction to investigating cyber fraud! It is a part of our …
Read MoreAudit Dispatcher Plugins | Linux Kernel Security [FREE COURSE CONTENT]
In this video tutorial, you will go through audit dispatcher plugins. It is a part of our online course …
Read MoreKibana | Network Monitoring with Security Onion [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to Kibana. It is a part of our online …
Read MoreSQL Introduction | iOS Social Media Forensics [FREE COURSE CONTENT]
In this video tutorial, you will go through an introduction to SQL - what it is, what it is …
Read MoreHate Speech Models | Natural Language Processing for OSINT & Threat Analysis [FREE COURSE CONTENT]
This video tutorial shows how to train the model in order to recognize hate speech sentences. It is a …
Read MoreHow to Integrate Biometric Authentication into Your Mobile App
App developers are always striving to make mobile applications more user-friendly and easier to use. They are in constant …
Read MoreWeighing the Security Benefits & Drawbacks of Open-Source
These days, open-source software can be found everywhere as innovation is unmatched among organizations. That being said, the accessibility to …
Read More