Red Team Summit CFP now open! Register Here
Shopping Cart

No products in the cart.

From Zero to Hero: Beginner’s Guide to Active Directory

This webcast was originally published on September 19, 2024. In this video, Dale Hobbs discusses a beginner’s guide to Active Directory. He covers various components such as trusts, group policy, replication types, authentication protocols, and key features like single sign-on and multi-master replication. Additionally, Dale …

Lost and Found: My Path Into Cybersecurity

If you need help with your cybersecurity career, reach out to people. Often, our problems are in our heads and of our own making. We can’t see the solution because we get in our own way, and an outside perspective is all we need. Having someone see our blind spots and offer suggestions can help us overcome our limiting beliefs and offer the encouragement needed to push past rejection.

Becoming Robin: My Path from Sysadmin to Cybersecurity

At first, the idea of playing a “Robin” in the world of cybersecurity might sound a bit unconventional—after all, who wouldn’t want to be Batman, the caped crusader? But as I’ve discovered, sometimes the sidekick’s role is just as important (and sometimes a bit less dangerous).

Conquering your CISSP

In this video, Jason Gillum discusses the comprehensive subject of CISSP certification, offering insights into its importance, study strategies, and the maintenance of certification status.

What’s in the Box?? | I.R. Summit 2024

This webcast was originally published on July 19, 2024. In this video, the speaker discusses cybersecurity strategies for small businesses, focusing on cyber deception, Sysmon, and the ELK stack. They explore practical, low-cost solutions to help small businesses defend against cyber threats effectively. The video …

Dumpster Fires: 3 Things About IR I Learned by Being a Firefighter

This webcast was originally published on July 18, 2024. In this video, the speaker discusses the similarities and differences between incident response (IR) and firefighting. They delve into the methodologies and challenges of both fields, highlighting the importance of preparation, patience, and accountability. The speaker …

Think You’re Compromised? What Do We Do Next?

In this video, the speaker discusses the intricacies of incident response, highlighting the common pitfalls and emphasizing the importance of preparation. They critique the use of flowcharts in incident response, arguing that they are ineffective and often lead to paralysis when deviations occur.

Introduction to Pentesting

In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.