Skip main navigation

System Log Files

This video offers a description of system log files, which are files that are targeted in Phase 5 of the typical hacking methodology. In step 1.9 you were introduced to …

Scareware

This video describes how scareware works and shares examples of these attacks. In previous videos, we reviewed how hackers can use social engineering to target you. To review social engineering, …

Patching Everything

This video addresses the importance of patches and the cycle one should use to ensure all patches are updated to ensure the network is secure. Keeping software updated is an …

Antivirus and Console Tools

In this video, you will learn about the importance of antivirus protection. Viruses can gain access to your device through physical devices or through emails or websites. Even the most …

Employee Reporting

In this video you will learn about the importance of having structures in place for employees to report questions or incidences of suspicious activity. The goal of network security is …

What Is an Insider Threat?

This video gives a deeper explanation of what an insider threat is and how to mitigate these threats. You have already heard insider threats mentioned in previous videos. Security often …

Tracking by IP

This video explains how you can use the IP address of a hacker to track their location. In previous videos, we discussed DNS leaks and what you can do to …

VPN: VPNs and DNS Leaks

This video goes through how to test whether you have a domain name server (DNS) leak that exposes your IP address. When you access the internet and your DNS is …

VPN: What It Is, Why It Is Important

This video explains what a virtual private network (VPN) is and how it protects the privacy of users’ data. A VPN can protect your network by providing a secure, encrypted …

Limiting User Rights

This video explains the importance of limiting users’ rights on a network and the considerations needed to allocate access rights. You have already learned about the importance of educating network …

Physical Attacks: Specific USB Attacks

In this video, you will learn about USB devices that can be used in physical attacks against your network. Hackers can use different devices that mimic common USB devices to …