In this video, you will learn how to look at the email source code to identify phishing attempts. In the previous article, you learned how easy it is for hackers …
After an attack, the reporting and portmortem phase is very important. If your network is attacked, the focus is often on the recovery plan. It is also important to improve …
This video explains the link between phishing attacks and social engineering and why these attacks are so prevalent. We have discussed social engineering several times, and by now you know …
Almost all networks will experience an attack at some point, and you need to know how to learn from these attacks. This video explains the process a user needs to …
This video explains how to use an IP address to identify a possible location of an individual or to assess the authenticity of a possible phishing email. In a previous …
In this video, you will be taken through examples that illustrate the practical issues you should consider when setting up your backup and recovery plan. In previous videos, you learned …
This video discusses Meraki as a software solution for network alert monitoring with mobile device management. In the previous article, you learned about the importance of including mobile device management …
This video explains the importance of a data backup plan. We store and transmit a lot of data over our personal and organization’s networks, and you have just learned about …
This video will help you set up your own damage control plan for if your network is breached. As discussed in the previous video, you need to plan for the …
This video explains that users need to plan for a possible breach of their network, regardless of the extent of their protection. You have been learning about the different ways …
This video explains how Bitcoin can be used to track a hacker. This video illustrates how you can use a Bitcoin address to see information on the account’s activity and …
This video explains what canary tokens are and how to generate these yourself. You will learn how canary tokens can be set up as a type of honey pot to …
In this video, you will learn how to set up Snort, an open-source IDS and IPS monitoring software package. Snort is a free, open-source software used for network intrusion detection …
This video expands on why monitoring software is needed and the importance of rapid response to network attacks. There are three types of monitoring software systems. IPS tries to prevent …
How can you access log files on different operating systems and which third-party tools can be used to increase the readability of these files? In the last video, you learned …