Skip main navigation

Alternatives to Password Authentication

This video will introduce alternatives to password authentication. Alternatives include the following: multi-factor authentication biometrics Windows Hello mTAN certificates You will learn about the advantages and disadvantages of these alternatives.

Keylogger Attacks

This video will describe what a keylogger attack is and explains common ways these attacks are spread. Keylogger attacks are one of the oldest forms of cyber threats. It reads …

Password Spraying

This video explains how password spraying works and presents remedies to prevent it from happening. Password Spraying is a type of brute force attack where the attacker finds a common …

Credential Stuffing

This video will define credential stuffing and explain how to prevent it from happening. Remedies that will be presented include multifactor authentication (MFA), and CAPTCHA. We’ll also explore retroactive strategies …

Using Rules in a Dictionary Attack

This video will demonstrate how to use rules to apply transformations and filters to word lists. You can use rules in existing word lists, or create your own custom sections, …

What Are Rainbow Tables?

This video will further explain rainbow tables, how they work, and how a rainbow table can be used and created. Rainbow tables are not just a simple look-up table. One …