In this video, you will learn about denial of service (DOS) attacks and distributed denial of service (DDOS) attacks. DOS attacks refer to cyber-attacks where the attacker tries to disrupt …
In this video, you will continue to learn about the typical strategies used by hackers to breach a network, with a focus on insider threat as the most dangerous threat …
In this video, you will learn about the typical strategies used by hackers to breach a network. Common attack types used by hackers are: reconnaissance phishing and spear phishing DOS …
In this video, you will learn why you are a target for hackers in a personal and professional capacity, even if you are not running a huge corporation. You will …
This video explains why you would run a phishing campaign to test your network security and important considerations to make before doing so. A good way to test if your …
Exploit Database (ExploitDB) is an archive of exploits for the purpose of public security, and it explains what can be found on the database. The ExploitDB is a very useful …
This video explains how to use DVWA to monitor network traffic to identify MiTM attacks. DVWA is a web application that is vulnerable to attacks and is therefore useful for …
This video explains how the Social Engineering Toolkit is used in phishing attempts and includes further advice on how to assess an email’s authenticity. You have already seen several phishing …
In this video, you will learn SpiderFoot and Nikto as alternate scanning tools. SpiderFoot and Nikto are two other scanning tools that can be used to protect your network. It’s …
This video uses common phishing email examples to show you how to identify immediate red flags. You probably receive many emails every day and do not have time to check …
Social engineering is used in phishing attacks, which are highly prevalent and surprisingly successful. Phishing attacks can target anyone with an email address. These attacks use amygdala hijacking by evoking …
An IP is an internet protocol address. Essentially, it is a numeric value assigned to a network device, and it is used for the identification and location of a network …
Cisco Meraki is a mobile device management system. There are different MDMs; Meraki is of interest because it has free and paid versions and can work on a wide range …
This article covers monitoring software. It is important to identify a breach in your network as quickly as possible, and monitoring software helps an organization do this. The importance of …
In the coming week, we will cover the following topics: logs, auditing, and using monitoring software what IP addresses can tell you about network users or hackers phishing and spear …