Network Forensics Explore network forensics, along with case studies, best practices, and online analysis techniques.
In this eye-opening journey, venture into the very heart of social media platforms to discover how they really... read more
Lecture 4: Hardening Operating Systems Hardening Modems Hardening Networks Patch Management Log Analysis Network Vulnerability Assessment DEMO:... read more
I am proud to announce that I am working with Logical Operations together, along other Cybersecurity Industry Experts on... read more
Windows Forensics Explore Digital Forensics, and find out what to do as a first responder to preserve evidence... read more
Lecture 2: Creating virtual machines Virtual machine hardware, and virtual machine files Deploying a virtual machine Hyper V... read more
If you want to really protect your Windows environment, then you should know what is used by the... read more
In this article I am going to share with you a real Social Engineering attack , where we worked... read more