
Security awareness
Connecting a malicious thumb drive: An undetectable cyberattack
Did you know cybercriminals can pull off a nearly undetectable cyberattack using only a malicious thumb drive? Learn how.

Cloud security
Secure cloud computing: What you need to know
APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.

Network security
How to configure a network firewall: Walkthrough
Learn the basics of configuring a network firewall in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.

Phishing
How to set up a phishing attack with the Social-Engineer Toolkit
See a live demo of a phishing attack using the Social-Engineer Toolkit and learn how cybercriminals are using AI to make them more effective.

Phishing
Extortion: How attackers double down on threats
You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand. Learn how these extortion attacks work.

MITRE ATT&CK™
Advanced adversary tactics and defense evasion: Lab and walkthrough
Learn how advanced persistent threat groups use defense evasion to remain undetected in this walkthrough with Keatron Evans.

MITRE ATT&CK™
Privilege escalation via cross-site scripting: Lab and walkthrough
Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.

Network security
4 network utilities every security pro should know: Video walkthrough
When can a certain network utility do the most good for you? Learn how and when you can use Ping, Netstat, Traceroute and ARP in this video.

Security awareness
5 ways to prevent APT ransomware attacks
APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.

Cryptography
How does hashing work: Examples and video walkthrough
What is password hashing? Infosec Skills author Mike Meyers explains how a hash works and demonstrates common hashing use cases.

General security
Password security: Using Active Directory password policy
Learn how to implement password security policies using Active Directory in this walkthrough from Infosec Skills author Mike Meyers.

Phishing
How Zoom is being exploited for phishing attacks
Learn how easy it is to create a Zoom phishing email in this episode of Cyber Work Applied with Infosec Principal Security Researcher Keatron Evans.