Zero-Day Attacks

A zero-day attack takes advantage of a previously-unknown vulnerability. In this video, you’ll learn about zero-day attacks and how organizations can react to a zero-day vulnerability.

Password Attacks

Our passwords are often the only protection our applications have from an attacker. In this video, you’ll learn about password hashing, brute force attacks, and dictionary attacks.

Insider Threats

Internal employees and contractors can be a significant threat to an organization’s security. In this video, you’ll learn how attackers take advantage of insider threats and ways to protect against this attack type.

SQL Injection Attacks

A SQL injection can provide an attacker with access to everything in your database. In this video, you’ll learn how a SQL injection is constructed and you’ll see a live demonstration of a SQL injection on a vulnerable application.

Cross-site Scripting

A cross-site scripting attack takes advantage of the trust associated with our browser. In this video, you’ll learn how a cross-site scripting attack can be carried out and you’ll see a live demonstration of an XSS attack against a vulnerable application.

Business Email Compromise

A business email compromise is a challenging social engineering attack to protect against. In this video, you’ll learn how a BEC attack can be carried out and how to prevent a compromise from occurring.

Supply Chain Attacks

A supply chain attack takes advantage of the trust we have for our vendors and partners. In this video, you’ll learn about identifying and preventing supply chain attacks from our service providers, hardware providers, and software providers.

Security Vulnerabilities

Protecting against vulnerabilities is a constant challenge. In this video, you’ll learn about standard operating environments (SOE), unpatched systems, end of service life (EOSL), and more.

2.6 – Malware Removal

Removing Malware

There are times when removing malware may be the best option available. In this video, you’ll learn about identifying malware, quarantining systems, remediating the malware, and other malware removal options.

2.7 – Security Best Practices

Security Best Practices

It’s important to always follow best practices when securing a network. In this video, you’ll learn about data encryption options, password complexity, account disabling, locking the desktop, and much more.

2.8 – Mobile Device Security

Mobile Device Security

Mobile device security includes a number of best practices specific to these unique platforms. In this video, you’ll learn about full device encryption, screen locks, configuration profiles, remote wipe, and more.

2.9 – Data Destruction

Data Destruction

There may be circumstances where the destruction of a storage device is the best way to keep the data safe. In this video, you’ll learn about physical destruction options, formatting best practices, and the importance of a certificate of destruction.

2.10 – SOHO Networks

Securing a SOHO Network

The security concerns of a SOHO (small office home office) network are very similar to those of a large corporate network. In this video, you’ll learn about default passwords, IP filtering, firmware updates, content filtering, and much more.

2.11 – Browser Security

Browser Security

A browser is one of the most important application environments. In this video, you’ll learn about hash verification, browser patching, secure extensions, password managers, and more.