In this video, you will learn about USB devices that can be used in physical attacks against your network. Hackers can use different devices that mimic common USB devices to …
In this video, you will learn about a different category of attacks: physical attacks. One way that hackers may attempt to access your network is through the use of physical …
This video continues the focus on fear or greed as tools for hackers using social engineering. Hackers may try to use extortion to get you to respond to their messages. …
This video gives a detailed illustration of typical phishing attempts using social engineering that manipulate you through using fear to get you to respond. Fear is a powerful emotion, and …
This video will explain the Trace Labs OSINT virtual machine. In the last video, you learned about Open-Source Intelligence (OSINT). In this video, you will learn how to use Trace …
In this video, you will learn more about Open-Source Intelligence (OSINT). Open-Source Intelligence (OSINT) is a diverse tool that can be used by anyone, from hackers with malicious intent, to …
In this video, you will go through the considerations a user needs to take into account when deciding to set up a Red Team and/or a Blue Team for their …
There is a counterpart to the Red Ream called the Blue Team. The Blue Team’s role is to protect the network from the Red Team’s simulated attacks. In the last …
Red Teams are teams of ethical hackers who test a network’s security. An organization can have an in-house team or contract a team to test their network’s security. This team …
This video gives a detailed illustration of typical phishing attempts using social engineering and playing on greed by posing as Microsoft or Amazon representatives. Many of us will have received …
This video gives practical explanations on how to run a phishing campaign to test your network security. Once you had been through the necessary considerations we discussed in the previous …
In this video, you will learn about the use of scanning tools to protect your network from attacks. We will start by looking at the use of Nmap/Zenmap, and in …
In this video, you will learn more about the importance of understanding a hacker’s methodology to develop methods to protect your network. We will again base this on the five …
In this video, you will learn more details around a hacker’s methodology and approaches to breaching your network. You were previously given an overview of how hackers typically try to …
In this video, you will see a demonstration of how to conduct a DDOS attack. We have used Low Orbit Ion Cannon to demonstrate how to conduct a DDOS attack. …