Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

DOS and DDOS Attacks: Theory

In this video, you will learn about denial of service (DOS) attacks and distributed denial of service (DDOS) attacks. DOS attacks refer to cyber-attacks where the attacker tries to disrupt …

Typical Attacks Against a Network

In this video, you will learn about the typical strategies used by hackers to breach a network. Common attack types used by hackers are: reconnaissance phishing and spear phishing DOS …

Yes, You Are a Target!

In this video, you will learn why you are a target for hackers in a personal and professional capacity, even if you are not running a huge corporation. You will …

ExploitDB

Exploit Database (ExploitDB) is an archive of exploits for the purpose of public security, and it explains what can be found on the database. The ExploitDB is a very useful …

Scanning Tools and Methodology Continued

In this video, you will learn SpiderFoot and Nikto as alternate scanning tools. SpiderFoot and Nikto are two other scanning tools that can be used to protect your network. It’s …

What is Cisco Meraki?

Cisco Meraki is a mobile device management system. There are different MDMs; Meraki is of interest because it has free and paid versions and can work on a wide range …

What is monitoring software?

This article covers monitoring software. It is important to identify a breach in your network as quickly as possible, and monitoring software helps an organization do this. The importance of …

Learning Outcomes

In the coming week, we will cover the following topics: logs, auditing, and using monitoring software what IP addresses can tell you about network users or hackers phishing and spear …