In this video you will learn about DDoS attacks such as: network DDoS, application DDoS, & operational technology. You will also learn about malicious code...
In this video you will learn about threat actors such as: advanced persistent threats, insider threats, state actors, hacktivists, script kiddies, criminal syndicates, hackers, shadow...
In this video you will learn about attack vectors such as: direct access, wireless, email, supply chain, social media, removable media, and cloud attack vectors.
In this video you will learn about threat intelligence sources such as: open-source intelligence, vulnerability databases, public/private information sharing centers, the dark web, indicators of...
In this video you will learn about threat intelligence research resources such as: vendor websites, vulnerability & threat feeds, conferences & local industry groups, academic...
In this video you will learn about the basics of cloud-based computing such as: cloud services & cloud delivery models. In addition you will be...
In this video you will learn about zero-day attacks and weak configurations such as: open permissions, unsecure root accounts, errors, weak encryption, unsecure protocols, default...
In this video you will learn about third-party risks such as: vendor management, supply chain issues, outsourced code development, & data storage. In addition you...
In this video you will learn about the potential risks of utilizing legacy systems in addition to learning about various impacts of cybersecurity attacks such...
In this video you will learn about cyber threat hunting aspects such as: intelligence fusion, threat feeds, & security advisories & bulletins. Also you will...