🟠
00:00 Intro
🟠
00:44 IT Supply Chain Security
🟠
07:22 Deploying Linux Updates and Trusted Repositories
🟠
12:14 Configuring Windows Server Update Services (WSUS)
🟠
18:57 Object-Oriented Programming (OOP)
🟠
25:38 Insecure Deserialization Attacks
🟠
32:08 Mitigating Insecure Deserialization Attacks
🟠
38:04 Digitally Signing PowerShell Scripts
🟠
46:29 Hashing Files in Windows
🟠
51:52 Hashing Files in Linux
🟠
59:10 Using the OWASP Dependency-Check Tool
🟠
01:04:23 Summary of key concepts covered in this course
Welcome to AV Cyber Active channel where we discuss cyber Security related topics. Feel free to
Comment if you want more contents. In this video I discuss WHAT is OWASP Top 10 list | Cyber security 2024 Introduction . It can even casue loss to business or money if not used using propper techniques.
OWASP
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
https://owasp.org/www-project-top-ten/
Download DVWA
https://www.vulnhub.com/entry/damn-vulnerable-web-application-dvwa-107,43/
MITRE ATT&CK® Navigator
https://mitre-attack.github.io/attack-navigator/
HOW to use MITRE ATT&CK Framework in SOC Operations | Explained by a Cyber Security Professional
https://youtu.be/ULh0W08ZMDQ
DLP | Explained by a cyber security Professional
https://youtu.be/K6a4eKsLNFQ
IPSEC and Why its Important | Explained by a cyber security Professional
https://youtu.be/F_wusi8_svY
Statefull vs Stateless Firewall
https://youtu.be/AbUwV6Ai8DA
SSL and TLS Encryption
https://youtu.be/YVHth7afwPQ
Instagram :
https://www.instagram.com/avcyberactive/
Website : https://avcyberactive.my.canva.site/
Contact:
[email protected]