Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
Identity and Data Protection Tools
This video will introcude you to many technologies that serve to protect your identiy and protect your data online
Curated Video
Endpoint Protection Tools
This video will introcude you to many technologies that serve to protect your endpoints and workstations
Curated Video
Modern Security Solutions
This video will introcude you to the state of the art cyber security tools such as IAM, DLP, CASB, WAF, SIEM
Curated Video
LAB 3: How to Enable a Firewall
I will show you how to enable the firewall on your Windows OS
Curated Video
Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Curated Video
Cloud and Network Protection tools
This video will introcude you to many technologies that serve to protect your cloud and network
Curated Video
Structural Design Patterns in Modern C++ - Handle-Body
This video discusses the handle-body idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn about...
Curated Video
Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Bring Your Own Device (BYOD) Security
The video highlights the security you need to implement when you bring your personal device to work
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Account Management
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Types and Roles
Protecting personally identifiable information, or PII, is crucial and required by security regulations such as GDPR, but of the vast amounts of data in an organization, how do you know which data is sensitive? The answer is through data...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Business Impact Analysis
In addition to deploying effective security controls to protect assets, what can be done to ensure business continuity in the event of a security incident. A business impact analysis involves proactive planning to help reduce downtime...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Controls
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threats and Vulnerabilities
The CIA security triad (confidentiality, integrity and availability) describes how solutions such as encryption, hashing, and data backups can address potential attack vectors that might be exploited by threat actors. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authorization
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...