Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Packt
CompTIA Network+ Certification N10-007: The Total Course - Malware
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - System vulnerabilities, threats, and countermeasures
CISSP Domain 7: Security Operations: System vulnerabilities, threats, and countermeasures. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - CSE-Lab
In this video, we will look at CSE-lab. This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating VM with PowerShell and...
IDG TECHtalk
Pegasus spyware and iPhone security
Amnesty International's Security Lab revealed that a handful of iPhones, mostly belonging to journalists and human rights activists, were successfully infected with Pegasus spyware. While the majority of iPhones users are not affected,...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Fake Antivirus
You will learn about fake antivirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with...
Next Animation Studio
Iranian hackers target corporate VPN servers
A new report by cyber security firm ClearSky has found that hackers backed by the Iranian government have been exploiting bugs in corporate VPN servers.
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
Curated Video
Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1
Exam questions. • Practice questions • Solutions • Explanation of answer
IDG TECHtalk
Windows 10: Answers to your most important issues, Sept 24 | TECH(talk)
Computerworld contributor Preston Gralla and editor Ken Mingis have returned and are answering questions about Windows 10. If you have questions, feel free to post them in the comments to be featured in our next TECH(talk) about Windows 10.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules
This video introduces you to exploitation modules. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Sending Malware with Spoofed Email
This video teaches you to send malware with spoofed emails. This clip is from the chapter "Developing a Brute Force Attacker" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking - sidejacking, XSS and malware
Session Management: Session hijacking - sidejacking, XSS and malware This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security...
Curated Video
Python for Network Forensics 4.1: Analyzing Windows Memory
In this video, we will use the powerful Python based Volatility, learn to import and analyze volatile memory images of Windows-based systems. • Learn the basics of how to use the Volatility framework • Learn the importance of Volatility...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
IDG TECHtalk
Answering your Windows questions: February 2020
Computerworld contributor Preston Gralla and Executive Editor Ken Mingis are answering viewers' questions about the latest Windows 10 release. If you have a question, post it as a comment.
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 2
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Next Animation Studio
Google removes over 500 Chrome extensions containing malware
Google has removed hundreds of extensions for their internet browser Chrome after they were found to have malware.
Next Animation Studio
European Union rolls out tough new privacy legislation
Businesses operating in the European Union could be fined $20 million Euros or 4% of their global turnover for violating new privacy laws. The fine amount is determined by whichever figure is larger. According to the New York TImes, 4%...
Curated Video
Describe the different types of malware that could affect a computer system or network : The Course Overview
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Next Animation Studio
How spies hacked US secrets via Solarwinds’ Orion software
Officials say at least six government agencies were infiltrated and thousands of companies were infected with malware.
Curated Video
Ukraine govt and private firms hit by cyber attack
A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across the world, hitting companies and governments in Europe especially hard.Officials in Ukraine reported serious intrusions...
Curated Video
British Cybersecurity Expert Appears In Court
A British cybersecurity researcher credited with helping curb a recent worldwide ransomware attack appeared in a federal courtroom in Milwaukee Thursday.
He has pleaded not guilty to federal charges accusing him of creating...