
IPv6 Enumeration & Attacks
No more avoiding it, it’s time to learn what IPv6 is and what tools you can use to enumerate and attack the protocol.
No more avoiding it, it’s time to learn what IPv6 is and what tools you can use to enumerate and attack the protocol.
Having a home or online lab is crucial for the advancement of your career in information security (#infosec). It is also a great way to gain hands-on experience which greatly improves your chances of obtaining a job.
John Stoner discusses ways to help you focus down your efforts into something more manageable; tailoring your studying for particular jobs and building a lab.
Filipi Pires discusses how to implement defensive security analysis with an offensive mindset.
While there are overlapping skills, there are differences that will be discussed as Phillip Wylie shares his experience of going from a pentester to a red teamer.
Chris Pedigo, the CTO of Lacework and cloud aficionado covers the importance of visibility, baselining, and anomaly detection in ensuring the safety and compliance of cloud & containerized environments.
Join Mark Danner to hear how CIA methods of target assessment and AI tools can be leveraged to spot those individuals in most vulnerable to hacker attacks.
We will discuss some of the prospects and challenges of the major pathways for a successful cybersecurity career.
Filipi Pires demonstrates how to integrate malware analysis using sandbox techniques (dynamic analysis) to automate the analysis of malicious code.
We will learn how to setup Security Onion at home or on an enterprise network and use its features to complete various network defense challenges.
When we talk about election security, most people think of hacking voting machines. But what about other cyber methods and means of disrupting an election?
Learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise.