Kali Linux is a powerful Linux based operating system specifically built for penetration testing. Viewers will hear a brief overview of the operating system and what kinds of things it can be useful for.
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies; the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
In this episode Wes and Don introduces the viewers to the VMware vSphere suite. They explain difference between Type 1, Type 2 hypervisors and the pros and cons of each. They discusses the multiple editions of vSphere.
Databases and the data they contain are crucial to every business and application out there today, which is why IT professionals with data-oriented skills are in constant demand! Whether you're looking to pick up basic SQL skills for data analysis or begin your journey to becoming a full-blown database engineer, this course is the starting line as it assumes no prior database or query experience, and will prepare you to delve deeper into the world of database platforms and certifications.
This course is the third of seven courses designed to fully prepare you for the JNCIS-ENT(JN0-343) exam.
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
Developers are notoriously lax in security. Part of the problem is not understanding how our applications are attacked. To protect your applications you need to BE a hacker. You need to understand how your applications are hacked, and therefore, how to protect them. This course goes over the most common hacking techniques using an array of current attacks to show how a web application is exploited. This course covers exploits and protections for both Web Forms and MVC. Covered are such topics as sql injection, parameter tampering, information leakage, cross-site scripting (xss), cross-site request forgery, encryption, hashing, and denial of service all with applicable demos.
Find a great woman in 60 days using your brain instead of your gonads.
It’s time to put in practice your detective skills! By using Virustotal Intelligence, we teach you how to hunt for malware, how to decompile VBA macros with Didier Steven tools to identify C&C Servers, how to cluster similar samples by running retrohunt, ssdeep or vthash scans, then we introduce Viper framework that help us to correlate and document the full attack flow, finally we walk you through techniques to identify the threat actors behind the attack and how to track their future movements! And finally how to take down the domain by using a technique called Sinkholing!