
Mobile Malware by Marita Fowler
This video covers Mobile Malware and some effects of it during our International Pandemic. Mobile Malware is known to be a dangerous software that mainly targets mobile devices that causes personal information to get leaked or collapse within the hardware/system. We have provided some basic information that will help you gain some more information about…

Open Systems Interconnection Model Troubleshooting and Mitigation
Created by Kim Green Kim Green is an IT Professional passionate about networking. She is CCNA Routing & Switching and CCNA Security certified, and has achieved Security+ and CySA+.

Surprising Secrets by Steve Hunt (March B2B)
Steve Hunt Steve Hunt is an executive strategist who is passionate about mentoring the next generation of security leaders. He served on the ISSA International Board of Directors, has served as a judge at RSA, founded the Communities of Excellence, was inducted into the ISSA Hall of Fame, and CSO Magazine presented him with the…


Google Dorking (Google Hacking) – A Form of Passive Recon
Title: Google Dorking By: Christy Long Kushner Year: 2018 Google Dorking Overview Google Dorking (Google Hacking) is a form of passive reconnaissance allowing you the White Hat tester to use search strings, operators, Boolean, regular expression (Reg-Ex) to search files, websites to find information that is not readily available with a generic Google search. Disclaimer…
