Tag Archives: video tutorial

Basic Consumers… Deal with Breaches

After a breach to a business you frequent or used to frequent now has extra steps. This news video has some basic steps on what to do after a breach. Don’t ignore it, just do it. Check your balances. Check … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Basic Consumers… Deal with Breaches

An Introduction to Cyber Security

The Open University Presents: An Introduction to Cyber Security, which starts on October 13th, so register now! This free online course will help you to understand online security and start to protect your digital life, whether at home or work. … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Introduction to Cyber Security

Cyber Risk & Internet of Things

I made this video for work, but modified it a bit so it’s not directly work related, but I didn’t edit the audio… Don’t hate! It’s my first one. The intended audience is for those who don’t think with a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Cyber Risk & Internet of Things

More James Lyne, Anatomy of an Attack

I really like how passionate James Lyne is about his field. It was a presentation very similar to this that got me intrigued into the security field. It was a Cisco security conference in Tucson where the presenter hacked a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on More James Lyne, Anatomy of an Attack

Some CISSP Webcasts

Some CISSP Webcasts that I reviewed last year prior to my test, which I passed in January of 2014. Access Control  Telecommunications and Network Security  Information Security Governance and Risk Management  Application Development Security  Cryptography  Security Architecture and Design  Operations … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Some CISSP Webcasts

Hacking Cars

A news bit about car hacking And Dr. Charlie Miller @0xcharlie presents how he has done this Car_Hacking_Hacktivity_2013_whitepaper What’s next? Well, eventually, there will be Google car hacking, I’m sure of it. Update 20140723. The good Dr. Charlie Miller will … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Hacking Cars

Get Comfortable: @SecureNinjaTV Free Training

Going through my twitter feed, I enjoyed an embedded secureninjatv video and then decided to check out their youtube page. I’ve embedded it for your convenience. There are about 22 videos in the playlist embedded above. Get comfortable, take frequent … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , , , , , | Comments Off on Get Comfortable: @SecureNinjaTV Free Training

An Oldie, but a Goodie: An Intro to Armitage

Rob Fuller, aka Mubix, created Armitage, a cool gui to work with Metasploit. Here is a demo on using this tool. At the time of this posting, the video is over 3 years old.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Oldie, but a Goodie: An Intro to Armitage

Bennett Arron: How to Steal an Identity

Bennett Arron. Bennett is a stand-up comedian, award-winning writer and a major victim of Identity Theft. Years after having his identity stolen – which resulted in his losing everything – he wrote a comedy show about his experience. The video … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Bennett Arron: How to Steal an Identity

Botnet Command and Control

James Lyne explains some botnet command and control.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Botnet Command and Control