Netquarks Technologies: Cybersecurity, Networks, Tech trends and all sorts of geekness
8. Threat Categories - Part 2
Not all threats look the same, furthermore, the more technology advances the larger the attack surface and the possibilities to compromise systems. Today we will continue to discuss threat categories.
74
views
5. Attack Vectors
How does a hacker manage to compromise your network?
There's no single answer to it, attack verctors are the "angles" which may be taken advantage of, but in the end "All roads lead to PWNED"
179
views
3.Using Opposites
In the past video we learnt about 5 core pillars of security, now let's analyze their opposites!
If you'd like to connect with me or request future topics for the series you can find me on Bizfluence: https://join.bizfluenceapp.com/?ref=josue_vargas (Join the I.T & Cyber Network and tag me )
153
views
2. 5 Security Elements
In this video we discuss the 5 pillars that help define security objectives and controls, but... what does that mean?
If you'd like to connect with me or request future topics for the series you can find me on Bizfluence: https://join.bizfluenceapp.com/?ref=josue_vargas (Join the I.T & Cyber Network and tag me )
Well, when you think of "security", what are you aiming to secure or protect? - Here's the answer to this question!
153
views
1. State of Cyber Security
We begin the series providing context on what kind of Internet we're dealing with and how impactful security breaches are.
If you'd like to connect with me or request future topics for the series you can find me on Bizfluence: https://join.bizfluenceapp.com/?ref=josue_vargas (Join the I.T & Cyber Network and tag me )
67
views
Introduction to "The Language of Cyber Security"
I initially recorded this video series as part of a course I intended to sell; but I decided to release it free of charge, as I do believe this will help anyone working in technology and/or cybersecurity wether they're engineers or not.
Video #1 will follow and I will release a new one each week!
If you'd like to connect with me or request future topics for the series you can find me on Bizfluence: https://join.bizfluenceapp.com/?ref=josue_vargas (Join the I.T & Cyber Network and tag me )
209
views
7. Threat Categories - P1
Not all threats look the same, furthermore, the more technology advances the larger the attack surface and the possibilities to compromise systems.
Today we will discuss threat categories.
70
views
6. Attacker Motivations
Hacking is one of the most severely penalized crimes in the U.S and many countries are increasing the punishment for cyber criume.
How then is it that cyber crime seems to multiply every year? In this video we explore some of the reasons why people are willing to take the risk.
73
views
4. A Sensitive Balance
Don't hate cyber security pros, sincerely!
We know you'd like to use all technology with no restriction, but hey they hire us to protect. In this video I talki about the sensitive balance between security and usability.
If you'd like to connect with me or request future topics for the series you can find me on Bizfluence: https://join.bizfluenceapp.com/?ref=josue_vargas (Join the I.T & Cyber Network and tag me )
86
views