Posts
Introduction2m 19sWelcome1m 9sWhat you should know1m 10s1. AWS Security Foundations18m 27sThe AWS shared responsibility model5m 25sThe AWS security landscape1m 31sThe importance of separation of duties2m 58sImplement separation of...
IntroductionWelcome1. Cabling and TopologyCoaxial cablingUTP and STP cablingFiber-optic cabling2. Ethernet BasicsIntroduction to EthernetEarly EthernetThe daddy of Ethernet, 10BaseT3. Modern EthernetModern Ethernet, switches, and...
Introduction4m 4sWelcome58sPrerequisites3m 6s1. Using DNS Every Day36m 42sHow DNS works: The executive summary5m 43sHow split-horizon DNS works5m 25sWeb browsing by number and name3m 9sLookups in Network Utility (OS X)2m 55sLookups in...
0 Introduction1 Core Security Principles2 Spyware, Malware, Worms & Viruses3 Browser Security4 Wireless Security Basics5 Encryption's Role in Security6 Conclusion