
My Review of Next Level OSINT at WWHF 2024
This year’s WWHF quickly became WWTF as I sat through Mishaal Khan’s Next Level OSINT course during pre-conference training.
This year’s WWHF quickly became WWTF as I sat through Mishaal Khan’s Next Level OSINT course during pre-conference training.
Network Security Monitoring (NSM) is a critical component of modern cybersecurity strategies, providing continuous surveillance of network traffic to detect and respond to potential threats. Join us for a free one-hour Antisyphon Anti-cast on “Intro to Network Security Monitoring (NSM): Implementation & Analysis,” with instructor, …
In this video, a senior security consultant discusses the basics of using Burp Suite Community Edition for web application testing. The speaker highlights common issues faced by beginners and shares tips for troubleshooting and utilizing Burp’s features effectively.
This webcast was originally published on September 25, 2024. In this video, Josh Mason discusses the principles of influence and how they can be applied to cybersecurity. He delves into using techniques from Dale Carnegie and Robert Cialdini to build better relationships within a company, …
Burnout isn’t just about being tired or not wanting to go to work. It might show up as avoiding anything work-related or getting easily irritated when work comes up in conversation. Your emotional fuse may become shorter, and your mind may not be as sharp as you know it can be.
Adopting a Hacker DJ mindset is about blending different facets of your personality so you are happier at work and more valuable to your company.
This webcast was originally published on September 19, 2024. In this video, Dale Hobbs discusses a beginner’s guide to Active Directory. He covers various components such as trusts, group policy, replication types, authentication protocols, and key features like single sign-on and multi-master replication. Additionally, Dale …
If you need help with your cybersecurity career, reach out to people. Often, our problems are in our heads and of our own making. We can’t see the solution because we get in our own way, and an outside perspective is all we need. Having someone see our blind spots and offer suggestions can help us overcome our limiting beliefs and offer the encouragement needed to push past rejection.
Markus Schober discusses how to set up and use attack and defend labs for incident response and digital forensics.
At first, the idea of playing a “Robin” in the world of cybersecurity might sound a bit unconventional—after all, who wouldn’t want to be Batman, the caped crusader? But as I’ve discovered, sometimes the sidekick’s role is just as important (and sometimes a bit less dangerous).