SECTION 9

SECTION 9

SECTION 9

Description: Cyber Security

Browse Archive

#42 Authenticated Scans With OpenVAS

Play Download media
In this episode we talk about authenticated scans with OpenVAS. We cover the planning process, implementing authenticated scans, & lesions […]...

#41 Implementing Vulnerability Scanning

Play Download media
I decided it was time to implement vulnerability scanning for Section 9.  We go over why we need it, & […]...

#40 Linux Commands: ifconfig vs ip

Play Download media
Once again Dorothy finds time to work on her Raspberry Pi Kali Linux project. This time we learn that the […]...

#39 Migrating Projects to The New Network

Play Download media
We begin migrating Dorothy’s Raspberry Pi project to the new network. She picks a vlan, subnet & switch ports. We […]...

#38 Forced to Implement a New Network

Play Download media
On Wednesday morning we had a power outage. We survived, but this experience forced us to implement a new network. […]...

#37 Network Design, Cable Management & Switching

Play Download media
We are struggling to figure out network design, cable management & switching, as we rebuild our network. We want to […]...

#36 Bypassing firewalls with Kali Linux & a Raspberry Pi

Play Download media
In this episode, Dorothy goes back to her Raspberry Pi & Kali Linux project. She talks about ssh, changing the […]...

#35 Password Management

Play Download media
It’s time for some password management. Like everyone else, we have too many usernames and passwords to remember. We cover […]...

#34 Building Dorothy’s New Computer

Play Download media
In this episode we talk about building Dorothy’s awesome Mini-ITX computer. This also included a new standing desk, and a […]...

#33 Maintaining Local Services for Section 9

Play Download media
In this episode we talk about the most important local service we have, Internet access. We go over the critical […]...
viewing 1 - 10 (28 total)

Subscribe & Follow