Category Archives: Uncategorized
6. Behavior Analysis (OBJ 3.1) Behavioral analysis. Now, in the last lesson, we talked about shellcode. And shellcode is really easy to hide and obfuscate because you can do a lot of things with it to evade signature-based antivirus detection if you’re an attacker. Because of this, threat hunting and security monitoring must use behavioral-based […]
1. Email Monitoring (Introduction) In this section of the course, we’re going to discuss COVID email monitoring. Now, our focus in this section is going to continue to be in domains three and four, with objectives three one and four three. Again, objective three states that, given a scenario, you must analyses data as part […]
7. Network Segmentation (OBJ 1.1) When building the architecture of our enterprise networks, we should consider how to utilise network segmentation to increase our security. We may achieve this segmentation by using access control lists, virtual local area networks, or even physical routers, switches, and firewalls. Many organisations will create zones or segments for different […]
1. Utilizing and configuring the Event Viewer logging system in Windows 10 Sometimes, Event Viewer can take a little while to load just because there are a lot of logs. But when I expand Windows logs, I can click on the different logs that I’ve got available. Alright, so I got the application log. The […]
1. Introduction to the Microsoft Windows 10 Update Model First off, understand this. Microsoft has an acronym they use; it’s called WAAS, which is Windows as a Service. And they call this their servicing model. Windows as a service means that Microsoft gives you Windows 10. Well, they don’t give it to you. It’s part […]
1. Enabling and Configuring File History Go to my Documents folder here. So go to the documents. and I’m just going to create a file. I’m just going to call it Important Info for lack of a better name. We’ll go into that file, and we’re just going to put something like, “This is the […]
1. Understanding Virtual Private Networks (VPNs) in Windows 10 I want to spend some time now talking about the concept of a VPN. Okay? So you’ve seen this drawing before. In this case, you’ll notice we’ve got our Microsoft domain here. We got our client computers, and we got a file server. We could have […]
4. Understanding WiFi standards First off, wireless is based on a set of standards. The wireless standards are based on what are called 800 and 211. A lot of people, when they hear that word 811, that term 811, immediately think, “Oh, that’s wireless.” Just so you know, 802 is not just wireless. 802 is […]
113. Outsourced Security Providers A lot of corporations these days are trying to find a way to reduce their costs so that they can focus on whatever their core competencies are. One way of doing that is to sometimes use third parties to take care of certain needs, which could also, you know, be security […]
95. Lesson 11: Strategy Resources We’re going to take a look at our strategic resources. Now, as an information security manager, we should determine what resources are available as well as be aware, as we’ve said, of those potential constraints. And as a reminder, we said there were some constraints. Things that may be cultural, […]