How Hackers Hack Your Assets – A Security Training Video for Everyone – May 23, 2017

Home > Videos > IT Security > How Hackers Hack Your Assets – A Security Training Video for Everyone – May 23, 2017

How Hackers Hack Your Assets – A Security Training Video for Everyone – May 23, 2017

Like This Video 0 61 Mike Danseglio
Added by January 7, 2016

In this recorded video from our Interface Webinar on May, 23 2017, IT Security Instructor Mike Danseglio presents the philosophy and processes hackers engage in when trying to hack your information and assets.

While this presentation is intended for System Administrators and those who defend assets, it’s really valuable for anyone who needs to understand how to protect and defend information.

Mike discusses the hacker’s attack methodology. From Setting Objectives, Recon, Exploitation and their need to hide what they’ve done.

For instructor-led IT Security training, see our course schedule:

IT Security Training CISSP / CEH / CHFI & CompTIA Security + Certification

 

 

Videos You May Like

Using Navigation Controls in a Collaboration Site in SharePoint

0 338 1

In this SharePoint training video, I want to talk about the Navigation Controls in SharePoint. They tend to fall into two kind of different categories; one with the navigation controls in a typical Collaboration Site such as a Team Site or a Project Site. These are Sites that are based on the Team Site Template … Continue reading Using Navigation Controls in a Collaboration Site in SharePoint

How to Configure Navigation in SharePoint Publishing Sites

0 1154 3

For more SharePoint training videos in this series, see: Part 1 – Using Navigation Controls in a Collaboration Site in SharePoint Part 2 – Using Navigation Controls in a Publishing Site in SharePoint Part 3 – Configuring SharePoint Navigation in a Publishing Site – Activating the Publishing Feature Part 4 – » How to Configure Navigation in … Continue reading How to Configure Navigation in SharePoint Publishing Sites

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.