Go slowly and simplify your task with Pandas .pdf
700.3 KB
15 pandas functions for 90% of your work : cheatsheet with examples pdf
#notes #pandas #cheatsheet
@pyguru
#notes #pandas #cheatsheet
@pyguru
Forwarded from Chrome's Cavern (Monochrome)
This media is not supported in your browser
VIEW IN TELEGRAM
Here's something that I just found. if you wanna run a video inside a terminal and not on a video player (for random reason) then its actually pretty simple.
You can also use
mpv --vo=tct <your video file/youtube url etc etc
>
You can also use
--no-config
if you wanna skip mpv from loading your config as well.๐ Free Cybersecurity Certifications ๐งจ
1. NSE 1,2 & 3
[https://training.fortinet.com]
2. Introduction to Cybersecurity
[https://netacad.com/courses/cybersecurity/introduction-cybersecurity]
3. Cybersecurity Essentials
[https://netacad.com/courses/cybersecurity/cybersecurity-essentials]
4. Networking Essentials
[https://netacad.com/courses/networking/networking-essentials]
5. Android Bug Bounty Hunting: Hunt Like a Rat
[https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat]
6. Ethical Hacking Essentials (EHE)
[https://codered.eccouncil.org/course/ethical-hacking-essentials]
7. Website Hacking Techniques
[https://codered.eccouncil.org/course/website-hacking-techniques]
8. Digital Forensics Essentials (DFE)
[https://codered.eccouncil.org/course/digital-forensics-essentials]
9. Network Defense Essentials (NDE)
[https://codered.eccouncil.org/course/network-defense-essentials]
10. Introduction to Dark Web, Anonymity, and Cryptocurrency
[https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency]
11. Certified in Cybersecurityโ - CC
[https://isc2.org/Certifications/CC]
12. 20+ Free AWS Certs Related to Cybersecurity
[https://explore.skillbuilder.aws/pages/16/learner-dashboard]
1. NSE 1,2 & 3
[https://training.fortinet.com]
2. Introduction to Cybersecurity
[https://netacad.com/courses/cybersecurity/introduction-cybersecurity]
3. Cybersecurity Essentials
[https://netacad.com/courses/cybersecurity/cybersecurity-essentials]
4. Networking Essentials
[https://netacad.com/courses/networking/networking-essentials]
5. Android Bug Bounty Hunting: Hunt Like a Rat
[https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat]
6. Ethical Hacking Essentials (EHE)
[https://codered.eccouncil.org/course/ethical-hacking-essentials]
[
8. Digital Forensics Essentials (DFE)
[https://codered.eccouncil.org/course/digital-forensics-essentials]
9. Network Defense Essentials (NDE)
[https://codered.eccouncil.org/course/network-defense-essentials]
10. Introduction to Dark Web, Anonymity, and Cryptocurrency
[https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency]
11. Certified in Cybersecurityโ - CC
[https://isc2.org/Certifications/CC]
12. 20+ Free AWS Certs Related to Cybersecurity
[https://explore.skillbuilder.aws/pages/16/learner-dashboard]
Netacad
Introduction to Cybersecurity
Learn cybersecurity basics to protect your personal digital life and the biggest security challenges companies face today.
This media is not supported in your browser
VIEW IN TELEGRAM
This made my day ๐
Surprisingly Unknown Linux Tools
https://www.youtube.com/watch?v=s0qx0UFw4MQ
https://www.youtube.com/watch?v=s0qx0UFw4MQ
YouTube
Linux Tools: A โ๐ ๐๐๐ช Guide
In today's behemoth of a video, Denshi tries his luck at a grab-bag of Linux tools that both casual and advanced users may find useful.
Submit fanart at alex@denshi.org
00:00 Preface and Fanart
00:36 Intro
01:34 Network Manager Applet
02:32 cbatticon
03:07โฆ
Submit fanart at alex@denshi.org
00:00 Preface and Fanart
00:36 Intro
01:34 Network Manager Applet
02:32 cbatticon
03:07โฆ
Search Engine for Hackers
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
#recontools #links
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
#recontools #links
Forwarded from Computer Science and Programming (Abdulaziz Gaibullayev)
This media is not supported in your browser
VIEW IN TELEGRAM
Gen-1: The Next Step Forward for Generative AI
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
โญ๏ธ Project:
https://research.runwayml.com/gen1
โ Paper:
https://arxiv.org/abs/2302.03011
๐Request form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
๐@computer_science_and_programming
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
โญ๏ธ Project:
https://research.runwayml.com/gen1
โ Paper:
https://arxiv.org/abs/2302.03011
๐Request form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
๐@computer_science_and_programming
Free University Courses/Materials for CyberSecurity
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
online.umich.edu
Internet History, Technology, and Security
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over theโฆ