✅
00:00 Course Overview
✅
00:43 Cryptographic Failures Attack
✅
09:43 Public Key Infrastructure ( PKI )
✅
16:30 Personally Identifiable Information ( PII )
✅
21:23 Data Privacy Security Standards
✅
27:22 Using Microsoft File Server Resource Manager ( FSRM )
✅
37:30 Classifying Data with Amazon Macie 6
✅
44:28 Classifying Data with Encrypting File System ( EFS ) 7
✅
50:27 Encrypting Data at rest with Microsoft BitLocker 8
✅
57:02 Capturing HTTP Cleartext Credentials 9
✅
01:02:59 Enabling HTTPS for a Web Application 10
✅
01:10:00 Enable IPsec to protect LAN traffic 11
✅
01:18:54 Encrypt Cloud Storage with Key Vault Keys 12
✅
01:24:55 End and Summary Outro
Welcome to AV Cyber Active channel where we discuss cyber Security related topics. Feel free to Comment if you want more contents. In this video I discuss WHAT is OWASP Top 10 list | Cyber security 2024 Introduction . It can even casue loss to business or money if not used using propper techniques.
OWASP
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
https://owasp.org/www-project-top-ten/
Download DVWA
https://www.vulnhub.com/entry/damn-vulnerable-web-application-dvwa-107,43/
MITRE ATT&CK® Navigator
https://mitre-attack.github.io/attack-navigator/
HOW to use MITRE ATT&CK Framework in SOC Operations | Explained by a Cyber Security Professional
https://youtu.be/ULh0W08ZMDQ
DLP | Explained by a cyber security Professional
https://youtu.be/K6a4eKsLNFQ
IPSEC and Why its Important | Explained by a cyber security Professional
https://youtu.be/F_wusi8_svY
Statefull vs Stateless Firewall
https://youtu.be/AbUwV6Ai8DA
SSL and TLS Encryption
https://youtu.be/YVHth7afwPQ
Instagram :
https://www.instagram.com/avcyberactive/
Website : https://avcyberactive.my.canva.site/
Contact:
[email protected]
If You Like my Work
Consider Donating at - https://paypal.me/avcyberactive