SECTION 9

SECTION 9

SECTION 9

Description: Cyber Security

Browse Archive

#44 Taking a Break

Play Download media
We’ve decided to take a break for the holidays. We we will be back in January. This should give us […]...

#43 Prioritizing Vulnerabilities & Application Security

Play Download media
This week we learned a few things about prioritizing vulnerabilities and OWASP application security. When it comes to vulnerabilities, you […]...

#42 Authenticated Scans With OpenVAS

Play Download media
In this episode we talk about authenticated scans with OpenVAS. We cover the planning process, implementing authenticated scans, & lesions […]...

#41 Implementing Vulnerability Scanning

Play Download media
I decided it was time to implement vulnerability scanning for Section 9.  We go over why we need it, & […]...

#40 Linux Commands: ifconfig vs ip

Play Download media
Once again Dorothy finds time to work on her Raspberry Pi Kali Linux project. This time we learn that the […]...

#39 Migrating Projects to The New Network

Play Download media
We begin migrating Dorothy’s Raspberry Pi project to the new network. She picks a vlan, subnet & switch ports. We […]...

#38 Forced to Implement a New Network

Play Download media
On Wednesday morning we had a power outage. We survived, but this experience forced us to implement a new network. […]...

#37 Network Design, Cable Management & Switching

Play Download media
We are struggling to figure out network design, cable management & switching, as we rebuild our network. We want to […]...

#36 Bypassing firewalls with Kali Linux & a Raspberry Pi

Play Download media
In this episode, Dorothy goes back to her Raspberry Pi & Kali Linux project. She talks about ssh, changing the […]...

#35 Password Management

Play Download media
It’s time for some password management. Like everyone else, we have too many usernames and passwords to remember. We cover […]...
viewing 1 - 10 (30 total)

Subscribe & Follow