In this video, Serena discusses the fundamentals of networking for beginners, emphasizing the importance of understanding network infrastructure for security professionals. She introduces key concepts such as the OSI model, IP addressing, and the use of tools for reconnaissance, such as DNS and ARP.
In this video, Cameron from Black Hills Information Security discusses how to proxy traffic through Burp from the Android emulator Genymotion. She demonstrates the setup process from creating a virtual device to intercepting application traffic using advanced network configuration and proxy settings.
In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.
In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.
In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.
In this video, Jason and John discuss the intricacies and challenges of job hunting in the cybersecurity field, especially during the COVID-19 pandemic. The presentation offers practical advice on improving job search strategies, enhancing resumes, and effectively using LinkedIn to connect with potential employers.
In this video, the speakers discuss the card game ‘Backdoors and Breaches’ which involves incident response and cybersecurity tactics. They explain the rules, procedures, and strategies for playing the game, using it as a tool for security training and awareness.
In this video, John and Alyssa discuss advanced memory analysis techniques. They delve into the use of tools like Volatility and Rekall for dissecting memory dumps, and demonstrate how to extract critical data from a Windows operating system.
In this video, seasoned experts discuss effective strategies for starting and advancing a career in computer security. They emphasize the importance of understanding core principles over chasing buzzwords like ‘blockchain’ and ‘AI’ initially.