In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …
Tag: learn
Month of AI Video – Practical LLM Security
Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …
Conference Video – Dirty Red Team tricks
Let’s time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East and Mid Atlantic Collegiate Cyber Defense competition events. Raphael Mudge, the developer of the Armitage Metasploit GUI, will guide you on this journey. You will learn how to automate Metasploit, nmap, and Read More …
Studio Notes – Exploring Modulation
In this overview, Berklee Online instructor Loudon Stearns gives a broad overview of synthesis and the function of modulation within synthesis. When modulation is assigned in a synth or sampler the user must define the modulation source, destination, amount, and direction.
InfoSec TV – Decoupling CI from CD with ArgoCD
In this video we are going to cover Decoupling CI from CD with ArgoCD Image Updater
GRE Tunnels in Modern Networking
In the world of modern networking, flexibility, security, and efficiency are paramount. As the Internet continues to evolve, so do the methods by which data is transmitted across complex infrastructures. One such method is the use of Generic Routing Encapsulation (GRE) tunnels. In this article, we’ll explain what a GRE tunnel is, how it works, Read More …
What is Network Address Translation
Network Address Translation (NAT) is a method used in networking to modify the IP address information in the headers of data packets as they traverse a router. NAT allows multiple devices on a local network to share a single public IP address, facilitating efficient use of IP address space and adding a layer of security Read More …
Conference Video – Dirty Secrets They Didn’t Teach You In Class
This talk is about methodologies and tools that we use or have coded that make our lives and pentest schedule a little easier, and why we do things the way we do. Of course, there will be a healthy dose of Metasploit in the mix.
What is a VPN?
A Virtual Private Network, commonly referred to as a VPN, is a technology that creates a secure and encrypted connection between your device and the internet. It acts as a private tunnel for your online activities, shielding them from prying eyes and potential cyber threats. Originally developed to enable secure communication within corporate networks, VPNs Read More …
Conference Video – Fantastic OSINT and where to find it
Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.