Skip main navigation

About Phishing Emails

This video explains the link between phishing attacks and social engineering and why these attacks are so prevalent. We have discussed social engineering several times, and by now you know …

Developing and Learning From Your Attack

Almost all networks will experience an attack at some point, and you need to know how to learn from these attacks. This video explains the process a user needs to …

IP: What We Can Learn from an IP Address

This video explains how to use an IP address to identify a possible location of an individual or to assess the authenticity of a possible phishing email. In a previous …

Backup and Recovery: Designing Your Plan

In this video, you will be taken through examples that illustrate the practical issues you should consider when setting up your backup and recovery plan. In previous videos, you learned …

Backup and Recovery

This video explains the importance of a data backup plan. We store and transmit a lot of data over our personal and organization’s networks, and you have just learned about …

Damage Control and Assessment

This video explains that users need to plan for a possible breach of their network, regardless of the extent of their protection. You have been learning about the different ways …

Bitcoin Tracking

This video explains how Bitcoin can be used to track a hacker. This video illustrates how you can use a Bitcoin address to see information on the account’s activity and …

Canary Tokens

This video explains what canary tokens are and how to generate these yourself. You will learn how canary tokens can be set up as a type of honey pot to …

Snort (IDS)

In this video, you will learn how to set up Snort, an open-source IDS and IPS monitoring software package. Snort is a free, open-source software used for network intrusion detection …

Monitoring Software Continued

This video expands on why monitoring software is needed and the importance of rapid response to network attacks. There are three types of monitoring software systems. IPS tries to prevent …

Reading System Log Files

How can you access log files on different operating systems and which third-party tools can be used to increase the readability of these files? In the last video, you learned …