2:09
6.9.12 Analyze a DDoS Attack
Waheed Rahimi
Shared 1 month ago
556 views
2:34
6.9.11 Analyze a DoS Attack
347 views
2:36
6.9.10 Analyze ICMP Traffic in Wireshark
368 views
3:41
6.8.5 Analyze Email Traffic for Sensitive Data
404 views
2:27
6.8.4 Analyze Email Traffic for Spoofed Addresses
360 views
1:53
6.6.7 Analyze HTTP POST Packets with Wireshark
361 views
7:29
6.5.11 Filter and Analyze Traffic with Wireshark
450 views
2:37
6.5.10 Analyze DNS Spoofing
386 views
1:52
6.5.9 Analyze ARP Poisoning with Wireshark
379 views
4:11
6.4.9 Detect SQL Injection Flaws with Burp Suite
433 views
6.4.8 Explore SQL Injection Flaws
364 views
2:25
6.3.11 Hijack a Web Session
Shared 4 months ago
635 views
4:00
6.3.4 Evaluate Webserver Security
470 views
1:37
6.2.8 Locate a Rogue Wireless Access Point
447 views
1:49
6.2.7 Discover a Rogue DHCP Server
449 views
2:01
6.2.6 Discover a Hidden Network
514 views
6.2.5 Scan for Open Ports from a Remote Computer
522 views
6.1.14 Perform a Decoy Scan
3:08
6.1.13 Configure a Perimeter Firewall
464 views
3:33
6.1.12 Implement Intrusion Prevention with pfSense
403 views
0:39
6.1.11 Prevent Zone Transfer
221 views
3:58
5.4.16 Test the Security of a Web Application 2
304 views
1:39
5.4.15 Test the Security of a Web Application 1
426 views
5.4.13 Scan for Vulnerabilities on a Linux Server
3:25
5.4.12 Scan for Vulnerabilities on a Windows Workstation
508 views
1:23
5.3.12 Perform Enumeration of MSSQL with Metasploit
329 views
1:26
5.3.11 Perform Enumeration with Metasploit
346 views
3:56
5.3.10 Perform Enumeration with Nmap
479 views
4:09
5.2.15 Troubleshoot Connectivity with ping_hping3
411 views
1:38
5.2.14 Scan for Vulnerabilities on IoT
358 views
0:54
5.2.13 Bypass Windows Firewall with Nmap
323 views
2:42
5.2.12 View Open Ports with netstat
407 views
2:50
5.2.11 Detect Open Ports with Nmap
380 views
0:57
5.2.10 Perform an External Scan Using Zenmap
432 views
0:41
5.1.17 Hide the IIS Banner Broadcast
218 views
2:58
5.1.15 Analyze a SYN Flood Attack
490 views
3:40
5.1.12 Extract Web Server Information with Nmap
431 views
0:43
5.1.10 Perform an Internal Scan with Nmap
156 views
3:07
5.1.5 Perform Reconnaissance with Nmap
2:11
Analyze FTP Credentials with Wireshark
Shared 5 months ago
87 views
5:00
Evaluate Network Security with Hunter 2
147 views
2:29
Evaluate Network Security with Hunter 1
104 views
1:25
Evaluate Network Security with Kibana
120 views
1:44
Identify Social Engineering
62 views
3:13
Configure URL Blocking
137 views
4:19
Configure Windows Defender Application Control
337 views
1:42
Counter Malware with Windows Defender
36 views
3:03
Enforce User Account Control
45 views
Scan for Zombie Processes
72 views
8:17
Examine a Forensic Drive Image
174 views
2:21
Compare an MD5 Hash
194 views
3:11
Encrypt a Hard Drive
23 views
Create a Remote Access Policy
43 views
Evaluate Windows Log Files
Shared 6 months ago
341 views
0:55
Evaluate Event Logs in pfSense
106 views
Log Events with pfSense
71 views
1:47
View Process Information
63 views
3:26
Disable Windows Services
51 views
Enable and Disable Linux Services
31 views
1:31
Manage Linux Services
26 views