Completed
CSC 3-SECURE CONFIGURATIONS
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security on the Cheap - Quick Wins and Affordable Tools - GrrCON 2014
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 BASICS FOCUS
- 3 WHAT RISK CAN WE CONTROL?
- 4 WHAT ARE YOUR STANDARDS?
- 5 CSC FIRST FIVE QUICK WINS
- 6 THE FIRST FIVE
- 7 QUICK WINS DEEP DIVE
- 8 73 QUICK WINS
- 9 CAVEAT EMPTOR
- 10 CHEAP FREE
- 11 TOOLS FOR CONTROLS
- 12 CSC 3-SECURE CONFIGURATIONS
- 13 DO YOUR RESEARCH
- 14 HARDENING EXAMPLES
- 15 CSC 12 - CONTROLLED USE OF ADMIN
- 16 PREVENT BRUTE FORCING
- 17 EASY 2ND FACTOR
- 18 THREAT MODELING FOR INCIDENT RESPONSE
- 19 POWERSHELL SCRIPTS
- 20 NETWORK FORENSICS
- 21 PASSWORD CRACKING
- 22 OFT OVERLOOKED
- 23 SOCIAL VECTORS
- 24 A WORD ON RECOVERY
- 25 TOOLS & REFERENCES LIST
- 26 CONTACT INFO