Loading... Please wait...

Free Videos

Access Control

In this lab you will learn about access control lists in Windows 7, what they do, and how to modify them. An access control list is a set of data that tells the computer’s operating system which users or groups have access privileges to specific files or objects. You can configure which users have access to specific files, folders, or hard drives. Access control lists should limit the permissions for each user so they can only perform the necessary actions to complete their jobs.

View Video


Anonymizer Universal

In this lab you are going to learn about anonymizers and I will show you how to use a tool called Anonymizer Universal. When you connect to the Internet, your computer is assigned an IP address. This IP address can be used to monitor your online activities and gather information about you. An anonymizer is a tool that allows you to surf the web anonymously by routing your Internet traffic through an encrypted tunnel to a server that changes your IP to a different one. This helps ensure that your activities remain confidential.

View Video

Assembly Language

This lab will be an introduction to assembly languages. It will cover what assembly languages are, their uses, and then an example. Assembly languages are essential for many reasons such as looking for insecure code. We will use Y86 Instruction Set Architecture to look at the assembly code for a simple c program.

View Video


Clam AV

This lab illustrates how to use an antivirus tool called Clam Antivirus. You will be shown how to install and configure the command line and graphical interface versions of the tool. ClamAV is a free antivirus tool used to detect malicious software. It is commonly used to protect mail servers.

View Video


Dictionary Password Attack

In this video I'm going to talk with you about dictionary password attacks and show you how to use a tool that can perform a dictionary attack called Cain and Abel. A dictionary attack is a method of breaking into a password protected system by systematically entering words from a dictionary file that are most likely to succeed as the password.

View Video


Hping

In this lab you will learn how to use a tool called hping. Hping is a TCP/IP packet assembler/analyzer tool. It can be used for a variety of purposes including port scanning, testing firewall rules, and OS fingerprinting. This lab will provide you with a basic overview of Hping, what it does, and some simple commands to use with it.

View Video


Metasploit

This lab will show you how to use a penetration-testing tool called Metasploit. Metasploit is a tool used by security professionals to test exploits against systems to determine if they are at risk. It also allows for the creation of custom exploits. In this lab you will see how Metasploit can be used to exploit a Windows 7 machine by sending it a malicious payload to download.

View Video


IPv6

This lab illustrates some of the differences between Internet protocol version 6 (IPv6) and Internet protocol version 4 (IPv4). You will learn about why IPv6 is needed and will see some of the different IPv6 configuration options in Windows 7.

View Video


 We Add New Items Constantly - Keep Checking Back with Us! 

contactus-banner.jpg

newsletter

From Our Blog



Logical Security is a Woman-Owned, Veteran-Owned Company

Shon Harris CISSP classes are designed to provide you in-depth knowledge about the ten CBK domains, which will help you in passing the CISSP exam.