In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.
In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.
This webcast was originally published on June 26, 2024. In this video, Carrie and Zach discuss the Cyber Ninja training plan. They delve into Carrie’s personal journey, effective learning resources, and practical tips for entering the cybersecurity field. The video also covers strategies for obtaining …
In this video, Tim Medin from Red Siege Information Security discusses the fundamentals and intricacies of Kerberos authentication within Windows environments. He explains how Kerberos functions as the main authentication mechanism in Windows Active Directory, detailing its components and the process of ticket granting.
In this video, John and Ean discuss techniques and methods used by criminals that can be employed to enhance personal privacy and security. They delve into how these tactics can help individuals protect themselves in a digital age where surveillance and data monitoring are pervasive.
In this video, Carrie Roberts delves into the intricacies of the Atomic Red Team project. He explains how to use the library of scripted cyber attacks to enhance security testing and training, demonstrating practical applications and configurations.
In this video, Michael Allen discusses operational security fundamentals for remote red teams. He delves into the importance of maintaining secrecy in red team operations and the potential risks of exposure.
In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.
In this video, Jason and John discuss the intricacies and challenges of job hunting in the cybersecurity field, especially during the COVID-19 pandemic. The presentation offers practical advice on improving job search strategies, enhancing resumes, and effectively using LinkedIn to connect with potential employers.