Monthly Archives: March 2023
139. Conducting Malware Analysis (OBJ 3.5) In this lesson, I’m going to do a little bit of static and dynamic malware analysis to demonstrate the concepts of how you might do this in the real world. We’re going to go through and look at how we can use a debugger and a decompiler to analyze […]
137. Mobile Device Attacks (OBJ 3.5) In this lesson we’re going to talk about mobile device attacks. Now, many of us carry mobile devices with us and most employees for organizations do as well. These mobile devices are essentially mini computers and therefore they’re still subject to the same types of malicious attacks and malicious […]
134. Mobile Reconnaissance Concerns (OBJ 3.5) In this lesson, we’re going to discuss the different reconnaissance concerns that you need to be aware of in terms of our mobile devices and wearables. This includes the type of data and information that can be accessed through physical reconnaissance of your mobile devices, including the implications of […]
131. Attacks on Mobile Devices (OBJ 3.5) In this section of the course, we’re going to discuss the different types of attacks that can be conducted against mobile devices, things like smartphones, tablets, smart watches, and other wearables. Now, due to the rapid expansion of mobile devices and networks they rely on, organizations are no […]
4. 15.3 Remote Access Methods Sometimes when we’re trying to do administration on a network device, like a router or switch, or maybe trying to get into a remote server, or even access a remote client that’s running a piece of application software that we need access to, oftentimes we’re not physically present at those […]
1. 15.0 Monitoring and Analyzing Networks We don’t just set up our network one time and it runs forever, we need to keep a constant eye on how it’s doing. We need to be able to gather information for troubleshooting issues that will most definitely come up. So in this module, we’re going to be […]
20. 14.19 Securing DHCP We love DHCP because it allows a new device to be added to the network, and we can automatically assign IP address information to that device. We could say, Here is your IP address, here is your subnet mask, here is your default gateway, here is the IP address of a […]
17. 14.16 Forensic Concepts As we are securing our network. It’s great to have devices like a firewall and intrusion prevention system, sensor use, strong hashing and encryption algorithms. But something that often gets overlooked or we don’t give it enough attention is physical security. We want to make sure that somebody doesn’t go in […]
14. 14.13 Authentication Servers In this video, we want to talk about some different types of authentication servers. First up, let’s consider AAA server. And we’re going to have a couple of categories of AAA servers. And the A’s here stand for authentication asking who are you? Authorization asking what are you allowed to do? […]
12. 14.11 Wireless Security Options In this video, we want to consider some wireless security options. And the big goal that we have is we want to protect the information flowing through radio waves from any potential eavesdroppers or have anybody get access to the network that should not have access to the network. Let’s […]