
MasterClass: 12/15/2022
MasterClass for 12/15/2022 presents: Shaun PhillipsWalkthrough on the Precious HTB machineMarkus ClayWirelessKoko GorvegoMac OS vs WindowsMauricio RamirezMalware Reverse Engineer
MasterClass for 12/15/2022 presents: Shaun PhillipsWalkthrough on the Precious HTB machineMarkus ClayWirelessKoko GorvegoMac OS vs WindowsMauricio RamirezMalware Reverse Engineer
MasterClass presents for 12/08/2022: Eduardo MartinezPen Testers Hardware/SoftwareApril WilsonBuilding an Analytics Dashboard with MS BIDevin BrewingtonHelpful Techniques in Unity
MasterClass for 12/01/2022 presents: Robin ClarkKeys to Implementing a Vulnerability Management ProgramLauren GalvinCyber-attacks and How They Have Changed Over TimeWyatt KnappConditional Access Policies in the Microsoft 365 EnvironmentMichael HuskenSecurity Technical Implementation Guide (STIG)
MasterClass for 11/17/2022 presents: James NormanResume Cover LettersMichael CelestinRaspberry Pi TutorialEdward FernandezVi, Vim, and Neovim: an important skill for administrators or working with Linux
MasterClass for 11/10/2022 presents: Frank KianosOWASP tool known as amassJackson NanGeneral Guide to TroubleshootingLucian OlaruTools and Gadgets Used by Red Teams for Physical Assessments
MasterClass for 11/03/2022 presents: Aaron LimaOperations on AWS using AWS Systems ManagerFallon BrownMy experience at Purdue Global and How it has Contributed to my Professional Success
MasterClass for 10/27/2022 presents: Scott TebebiMalware AnalysisBlake McCannObject-Orientated Programming
MasterClass for 10/13/2022 presents: Daelano PachecoWiresharkSrinivas ManduData Analytics TechniquesAngelica RamseyGoogle Doc Suite
MasterClass for 10/06/2022 presents: Yavor KuzovThe different types of threat actors, how they are classified, and what is defined as their motivationsAnne FellerMy experience in the internshipDerek DueckerDigital Forensics and a brief Autopsy demonstrationAaron ProtheroScripting with BashShawn PerryTime managementKari LewisHistory of Women in ITBenjamin OguguoCreating Active Directory Objects such as Organizational […]