play_arrow

keyboard_arrow_right

skip_previous play_arrow skip_next
00:00 00:00
playlist_play chevron_left
volume_up
chevron_left

QT-Series

182 Results / Page 9 of 21


Background
PGMasterClass03 (1000 × 500 px)
PGIP-Tech Internship
play_arrow
share playlist_add
close
  • 59

QT-Series

MasterClass: 12/01/2022

Purdue Global Internship Program - Technology December 1, 2022

MasterClass for 12/01/2022 presents: Robin ClarkKeys to Implementing a Vulnerability Management ProgramLauren GalvinCyber-attacks and How They Have Changed Over TimeWyatt KnappConditional Access Policies in the Microsoft 365 EnvironmentMichael HuskenSecurity Technical Implementation Guide (STIG)

PGMasterClass03 (1000 × 500 px)
PGIP-Tech Internship
play_arrow
share playlist_add
close
  • 45

Cybersecurity Webinars

MasterClass: 10/06/2022

Purdue Global Internship Program - Technology October 6, 2022

MasterClass for 10/06/2022 presents: Yavor KuzovThe different types of threat actors, how they are classified, and what is defined as their motivationsAnne FellerMy experience in the internshipDerek DueckerDigital Forensics and a brief Autopsy demonstrationAaron ProtheroScripting with BashShawn PerryTime managementKari LewisHistory of Women in ITBenjamin OguguoCreating Active Directory Objects such as Organizational […]

PGMasterClass03 (1000 × 500 px)
PGIP-Tech Internship
play_arrow
share playlist_add
close
  • 44

QT-Series

MasterClass: 09/29/2022

Purdue Global Internship Program - Technology September 29, 2022

MasterClass of 09/29/2022 presents: Brett Bahrke Who needs Cybersecurity?Shane FolkertsHow Firewalls work: Cisco, ASA, and Palo AltoSteven DeckingaTechnological Advances in the Intermodal Transportation IndustryNick HuserNIST Compliance and AuditingJason AndersonLaunching a Windows Server 22 EC2 Instance

PGMasterClass03 (1000 × 500 px)
PGIP-Tech Internship
play_arrow
share playlist_add
close
  • 31

QT-Series

MasterClass: 09/22/2022

Purdue Global Internship Program - Technology September 22, 2022

MasterClass for 09/22/2022 presents: Tariq Marji Penetration Testing – MetasploitLucas Greenwood Cyber WarfareChristopher Shuck Using the attack machines on THM until HomebrewJosiah Sprunger Data-Oriented Design