John Stoner discusses ways to help you focus down your efforts into something more manageable; tailoring your studying for particular jobs and building a lab.
Cybersecurity Webinars | Cover6 Solutions
The Cover6 Solutions' webinars provide the latest information security news and hands-on cybersecurity tutorials from seasoned professionals..
Filipi Pires discusses how to implement defensive security analysis with an offensive mindset.
While there are overlapping skills, there are differences that will be discussed as Phillip Wylie shares his experience of going from a pentester to a red teamer.
Chris Pedigo, the CTO of Lacework and cloud aficionado covers the importance of visibility, baselining, and anomaly detection in ensuring the safety and compliance of cloud & containerized environments.
Join Mark Danner to hear how CIA methods of target assessment and AI tools can be leveraged to spot those individuals in most vulnerable to hacker attacks.
We will discuss some of the prospects and challenges of the major pathways for a successful cybersecurity career.
Filipi Pires demonstrates how to integrate malware analysis using sandbox techniques (dynamic analysis) to automate the analysis of malicious code.
We will learn how to setup Security Onion at home or on an enterprise network and use its features to complete various network defense challenges.
When we talk about election security, most people think of hacking voting machines. But what about other cyber methods and means of disrupting an election?
Learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise.
This is a quick talk on how to set up your attack machine, your practice environment, and helpful resources and tools that will help you prepare for and pass the major offensive practical exams. These exams include the eJPT, CEH Practical, the OSCP and many more. Let’s roll.
Have you ever watched an asset get infected a was unable to respond? This is probably one of the worst feelings as a security analyst. This might have been due to the approvals, tickets, or process needed for action. Nevertheless, these kinds of situations can be avoided with SOAR.