Having the proper response plan in place in case of a security breach can stop it from becoming a major disaster.
Fast fact: A recent study showed that 70% of U.S. security executives do not have a ...
AppLocker, Windows Information Protection, Device Guard, WDAG - there are many ways to secure Windows 10. Not all ways are compatible with enterprise requirements. In the session, we look at what we a...
This playlist/video has been uploaded for Marketing purposes and contains only selective videos.
For the entire video course and code, visit [http://bit.ly/2o97mkI].
We learn how use Nmap and its a...
English
- 8 min
- 564
- 0
0
- Last Edit: 24.04.2025
Rootkits are one of the most challenging malware types to identify and remove. In this video, you’ll learn how rootkits are able to avoid detection and what you can do to protect against a rootkit inf...
English
- 3 min
- Beginner
- 585
- 0
0
- 4.7
- Last Edit: 24.04.2025
In this Video, I explain how source routing works and how hackers can use it to spoof IP Addresses.
To learn how to turn off source routing on your network devices.
This was taken Christmas morning/afternoon. Taking down the Playstation and Xbox networks. It's a 22 minute video I processed at 4x as to not waste a bunch of time.
https://youtu.be/YNWXZ16TPlg
English
- 4 min
- Beginner
- 1044
- 0
0
- Last Edit: 24.04.2025
See how an effective ransomware attack comes together. This is why today's enterprises require effective security. For more on how Cisco looks to keep ransomware at bay, go to: http://cs.co/9001BAFGf.
English
- 4 min
- Beginner
- 601
- 0
0
- 4.0
- Last Edit: 24.04.2025