iDigitalClassroom is a reliable source of first-class remote learning and remote work resources where eLearning content creators and remote technology providers are empowered by providing insight from a user perspective to enable the production of engagement tools and resources. Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
…
continue reading
1
Basic Principles of Information Security
19:04
19:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
19:04
Information is the lifeline of an organization. Think about what blood does to a human being. That is actually how the data and information that flow through our network is importance for our organization. Data and information are essential in our private lives as we monitor our homes using remote cameras. We want to know where our kids are, what t…
…
continue reading
1
Identifying the IT Infrastructure for IT Security
20:49
20:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
20:49
As you can see in today's world, so many devices are now classified as a computer. In the past, people think that the computer is the big bulky device you see on tables in many offices and organizations. You are right. Those devices are still considered computers. However, many other devices are now behaving and acting the same way those computers …
…
continue reading
1
Use Defensive Cybersecurity to Mitigate Cyber attack
11:02
11:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:02
It is essential to understand what could go wrong in a system and to use mitigation action to protect the system from potential threats. In recent weeks you may have heard of an incident that explained why there is a need to take a defensive approach to protect your digital assets and infrastructures. The incident is that of Kaseya. Wired.com repor…
…
continue reading
1
The Human Factor in a Ransomware Attack Part-2
10:52
10:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:52
Kaspersky Lab conducted a study to determine what role employees play in a business's fight against cybercrime. The study used over 5,000 businesses around the globe and found out that (52%) of the businesses surveyed believed they are at risk from within and that their employees either intentionally put the businesses at risk or are put the busine…
…
continue reading
1
The Human Factor in a Ransomware Attack Part-1
18:51
18:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
18:51
Ransomware is a type of malware that creeps into a network, scans the network to identify targets, and then uses encryption to seize all or some parts of the network. Thus, the victim's information is held at a ransom. After encrypting the files, the attacker becomes the only one with the decrypting key. In a network that experienced a ransomware a…
…
continue reading
1
Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
13:49
13:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:49
Network configuration refers to the process of setting a network's controls, flow, and operation to support the network infrastructure of an organization or for an individual owner. Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network co…
…
continue reading
1
Security Implication Of Web Frameworks
8:52
8:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
8:52
Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes appl…
…
continue reading
1
HOW TO USE COMMENTS AND METADATA INFORMATION TO GATHER INTELLIGENCE FOR PENETRATION TESTING
11:31
11:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
11:31
The head section of web pages contains troves of information that can be used to ensure that the site is efficiently crawled or positioned for search engine optimization. There is information about the name of the author, the description of the page, and the language used on the web page. Some sites have information about the Twitter account, the U…
…
continue reading
1
How to Use Robots.txt File to Gather Intelligence for Penetration Testing
12:13
12:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:13
In the head section of web documents, there is meta-information used to describe the page, including helping search engines categorize the page. The meta-information that is of utmost importance to the discussion is the meta information for robots that refers to the robots.txt file. The roborts.txt is a file that website owners use to inform web cr…
…
continue reading
1
Gathering Information for Penetration Testing Using Search Engines Discovery and OWASP ZAP
15:43
15:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:43
Using a search engine discovery is another great option for gathering intelligence about a penetration testing target. A search engine query can be direct or indirect. The direct method is where the search engine can be sued to dig into the indexes and contents from caches. The indirect method is where sensitive information such as the design and c…
…
continue reading
1
Penetration Testing Information Gathering For Web Server Fingerprinting
16:32
16:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
16:32
One of the available options is to gather information about the server is to understand the server configuration. This is referred to as web server fingerprinting. With the web server fingerprinting, the pentester tries to identify the type and version of the web server that a target application or website is using. The information gathered from th…
…
continue reading
1
Approaches to Penetration Testing
15:11
15:11
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:11
The need to discuss testing is borne out of the desire to ensure the safe and secure use of the software. Almost everyone that has access to the internet uses some software or the other. The pandemic era has even made the use of computer software more prevalent than any other time since the origin of the internet. Some people might say that they ar…
…
continue reading
1
Tool Selection for Penetration Testing
10:29
10:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:29
There are several types of tools for penetration testing. The number of available tools is so many that it will be practically impossible to learn all of them. Using the wrong set of tools can be a problem because the pen tester would have wasted so much time trying to gather the wrong information. As a beginner, it may take some guidance to be abl…
…
continue reading
1
Planning for Penetration Testing
13:37
13:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:37
The decision to conduct penetration testing is an indication of the importance of risk management in any organization. It is a good professional practice to document security policies that outlines how penetration testing should be conducted and how it relates to different types of systems, such as servers, wen applications, laptops, desktops, tabl…
…
continue reading
1
Penetration Testing as a Cybersecurity Survival Technique
12:58
12:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
12:58
Many organizations spend their IT budgets on the wrong technology infrastructure. Would you consider knowing where to spend your IT budget? Even when an organization makes the right expenditure on the right IT infrastructure, would it not be competitive to protect those infrastructures? What would your customers do if they have the slightest reason…
…
continue reading
1
Security Challenges In eLearning Systems
13:20
13:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:20
As eLearning is emerging as a good alternative for learning in situations where learners and instructors cannot meet in a physical location, the need to ensure confidentiality, integrity, and availability of eLearning systems are growing just as the demand for eLearning is growing. Elearning depends on the internet and its availability and suffers …
…
continue reading
1
Challenges of Social Engineering
15:57
15:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:57
Social engineering has been described from many perspectives, but it is not a new concept. Social engineering refers to a deceptive activity that is used to trick a victim or a person into taking certain actions that may be beneficial to the attacker and detrimental to the victim. Social engineering has been used all the ages in human history. All …
…
continue reading
1
ONLINE SECURITY AND PRIVACY FOR ELEARNERS AND REMOTE WORKERS
10:36
10:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
10:36
Using the Internet can be very interesting, exciting, especially for new users. There are many exciting things to do online. The excitement of using the Internet can be marred by malicious hackers and other groups that want to collect personal information about online users. Though some organizations use some of the information they collect about o…
…
continue reading
1
Responsibilities of Web Users in a Digital Society
15:55
15:55
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:55
Competency with the use of technology is essential, but it is also essential to understand how to behave in a digital society. The explosive use of the internet and social media has created enormous opportunities for users to express themselves in unprecedented ways. Though all the innovative ideas of sharing content are exciting, there are associa…
…
continue reading
1
Challenges and Benefits of Elearning and Remote Work
14:43
14:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
14:43
The COVID-19 pandemic has created an unprecedented challenge that forced learners and several other institutions to move to the virtual world. Many learners woke up one day and realized that the physical classroom has suddenly moved online due to Covd19. Challenges of sudden migration to remote work and remote learning are not only felt by the lear…
…
continue reading