Catalog Search Results
Author
Summary
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting systems with common enumeration tools. Malcolm explains what enumeration...
Author
Summary
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions-the valid interactions of unsuspecting users-in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent...
Author
Summary
Learn strategies to influence others, avoid common missteps, and drive success.
Success in business depends on being able to get your viewpoint heard and your ideas taken seriously. So how do you feel about your powers of persuasion? If someone tries to talk you into doing something you'd really rather not, do you recognize their tactics? In this course, author and executive coach Don Gilman, PhD., explains how to recognize persuasion techniques...
Author
Summary
Learn about the practices needed to perform fairness testing and implement responsible AI systems.
How well do you understand the issues around algorithmic bias and unfairness? In this course, data scientist and AI ethicist Ayodele Odubela teaches you the principles of responsible AI, as well as the frameworks necessary to apply RAI techniques in AI systems. Ayodele explains modern AI development and problems in machine learning (ML) that differ...
Author
Summary
Learn how to move people to action using evolutionary psychology and neuromarketing.
Drop a rock. It falls and hits the ground. Once you understand brain evolution, many of your decisions will become easily predictable. To a scary degree, we are walking robots with knee-jerk responses, and not the rational geniuses with free will that we like to imagine. What if you understood how the brain really makes decisions, and could consistently influence...
Author
Summary
This mid-level course takes you through how to create one of the most common types of machine learning: supervised learning models.
Data scientists and ML/AI students may need some practical experience with supervised learning algorithms. In this course, instructor Ayodele Odubela teaches you to apply models you've created to new data and to assess model performance. First, Ayodele outlines what supervised learning is and how to make predictions...
Author
Summary
Learn how to use Kali Linux for advanced penetration testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Kali Linux is the penetration-testing professional's main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting....
Author
Summary
Learn how leaders can understand empathy and internalize it to help their teams drive towards results.
View Scott's LinkedIn Newsletter Leading with empathy has been identified as a top skill for the modern leader, but leaders must move beyond simply understanding empathy to intentionally developing it to help their team achieve their goals. In this focused course, leadership expert Scott Mautz offers specific practices that can help leaders express...
Author
Summary
Learn how to conduct a full analysis of healthcare datasets using R by analyzing the Behavioral Risk Factor Surveillance System (BRFSS), a public health surveillance survey.
Analyze behavior and risk using R, the open-source statistical computing software. R provides an environment and a language you can use to analyze data, including the publicly available Behavioral Risk Factor Surveillance Survey (BRFSS) dataset. This course teaches core healthcare...