Filters:

  • Technologies

  • Instructors

  • Category: Security

    The Importance of Maintaining Apple iPhone Security Engineering – Technology – People – Process

      Video Transcription: I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. I teach IT Security courses, so I’m plugged-into a lot of what goes on in the security field. I keep abreast of situation. I tend to write a lot of blogs around what’s going on in security and how to … Continue reading The Importance of Maintaining Apple iPhone Security Engineering – Technology – People – Process

    Adding a New Non-Root User in Kali Linux

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. For instructor-led Security training see our course schedule.  I created a new installation of Kali Linux … Continue reading Adding a New Non-Root User in Kali Linux

    Upgrading Kali Linux to Rolling Distribution

    Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project. Kali recently began moving towards a rolling distribution. This allows both the core Debian operating system … Continue reading Upgrading Kali Linux to Rolling Distribution

    Here’s how you can make your own bootable Kali Linux installer on USB

    I use Kali Linux extensively when doing penetration testing and security assessments. Besides being fast, Kali Linux has pretty much every security tool I need built right in. On top of that, it’s free! Another benefit, the topic of a previous blog, is that Kali Linux is easily installed on and run from a USB … Continue reading Here’s how you can make your own bootable Kali Linux installer on USB

    Forensic Investigation of Malware – What’s going on Behind the Scenes

    This post is an excerpt from a previous webinar – Live Detailed Forensic Investigation of Malware Infection with Mike Danseglio. April 21, 2015. You can watch the replay of this webinar on our website Detailed Forensic Investigation of Malware Infections. In this webinar, Mike Danseglio setup three computers with a fresh installation of Windows 7, each … Continue reading Forensic Investigation of Malware – What’s going on Behind the Scenes

    Finding Rogue Wireless Access Points with Kali Linux

    Many Wi-Fi network administrators have trouble dealing with unauthorized Wi-Fi access points on their networks. Users bring in their own APs so they can connect their iPad, their phone, their gaming device, even their non-approved laptops to the corporate network. These rogue APs can be difficult to physically locate. Several companies sell specialized hardware and … Continue reading Finding Rogue Wireless Access Points with Kali Linux