Category Archives: Uncategorized
146. ICS Protocols and Vulnerabilities (OBJ 3.5) In this lesson, we’re going to talk about the different industrial control system protocols that you may come across in your position as a cyber security practitioner. These protocols include the controller area networks, or CAN, the Modbus, the data distribution service, or DDS, and the safety instrumented […]
141. Attacks on Specialized Systems (OBJ 3.5) In this section of the course, we’re going to discuss the different types of attacks that can be conducted against specialized systems. Such as the internet of things devices, embedded systems, ICS and SCADA devices, data storage systems, virtual machines, hypervisors, and containerized services. The internet of things […]
144. Embedded Systems (OBJ 3.5) In this lesson, we’re going to start talking about some embedded system vulnerabilities. Because we talked about the fact that a lot of these devices that we connect to the internet as part of the internet of things at large, do have embedded operating systems, like Linux or Android or […]
139. Conducting Malware Analysis (OBJ 3.5) In this lesson, I’m going to do a little bit of static and dynamic malware analysis to demonstrate the concepts of how you might do this in the real world. We’re going to go through and look at how we can use a debugger and a decompiler to analyze […]
137. Mobile Device Attacks (OBJ 3.5) In this lesson we’re going to talk about mobile device attacks. Now, many of us carry mobile devices with us and most employees for organizations do as well. These mobile devices are essentially mini computers and therefore they’re still subject to the same types of malicious attacks and malicious […]
134. Mobile Reconnaissance Concerns (OBJ 3.5) In this lesson, we’re going to discuss the different reconnaissance concerns that you need to be aware of in terms of our mobile devices and wearables. This includes the type of data and information that can be accessed through physical reconnaissance of your mobile devices, including the implications of […]
131. Attacks on Mobile Devices (OBJ 3.5) In this section of the course, we’re going to discuss the different types of attacks that can be conducted against mobile devices, things like smartphones, tablets, smart watches, and other wearables. Now, due to the rapid expansion of mobile devices and networks they rely on, organizations are no […]
4. 15.3 Remote Access Methods Sometimes when we’re trying to do administration on a network device, like a router or switch, or maybe trying to get into a remote server, or even access a remote client that’s running a piece of application software that we need access to, oftentimes we’re not physically present at those […]
1. 15.0 Monitoring and Analyzing Networks We don’t just set up our network one time and it runs forever, we need to keep a constant eye on how it’s doing. We need to be able to gather information for troubleshooting issues that will most definitely come up. So in this module, we’re going to be […]
20. 14.19 Securing DHCP We love DHCP because it allows a new device to be added to the network, and we can automatically assign IP address information to that device. We could say, Here is your IP address, here is your subnet mask, here is your default gateway, here is the IP address of a […]