CyberHoot Training Videos:

  1. How to setup a DMARC record
  2. How Password Managers Work (an 11 min deep dive)
  3. An overview of PCI Compliance
  4. Physical Check Fraud Protections
  5. California Privacy Protection Act – 1 min Primer
  6. CyberHoot – Two-Factor Authentication – What is it and why is it Important?
  7. RDP Critical Vulnerability Proof of Concept Video (July 2019)
  8. Basic ITAR Training
  9. Sextortion Explained in 30 Seconds
  10. Two-Factor Authentication Explained (DUO)
  11. CyberHoot: WiFi Insecurities and How to Reduce WiFi Risks
  12. Virtual Private Networks (VPN) Explained
  13. CyberHoot – Spotting and Avoiding Phishing Attacks
  14. How to spot and avoid Social Engineering Attacks
  15. Phishing and Spear Phishing Explained
  16. HIPAA Training 2019
  17. CyberHoot – Passwords, Passphrases, and Password Managers
  18. CyberHoot Introductory Video
  19. What is Business Email Compromise?
  20. OSHA Safety Video Orientation for Healthcare Workers
  21. The dangers of Random USB Keys
  22. Physical Security Awareness Training for Employees
  23. Basic Physical Security Training
  24. The Importance of Social Media and Email Security
  25. Insider Threat 201
  26. LastPass 101 – Creating Secure Notes
  27. LastPass 101 – Generating a Secure Password
  28. LastPass 101 – Filling a Form
  29. LastPass 101 – Adding and Saving Sites
  30. LastPass 101 – Meet your LastPass Vault
  31. LastPass 101 – Meet the Browser Extension
  32. LastPass 101 – iOS Application Overview
  33. LastPass 101 – Android OS
  34. OWASP Top Ten Proactive Controls (Year 2)
  35. OWASP Top 10 Vulnerabilities: #10 Unvalidated Redirects and Forwards
  36. OWASP Top 10 Vulnerabilities: #9 Using components with Known Vulnerabilities
  37. OWASP Top 10 Vulnerabilities: #8 Cross-Site Request Forgery
  38. OWASP Top 10 Vulnerabilities: #7 Missing Function Level Access Control
  39. OWASP Top 10 Vulnerabilities: #6 Sensitive Data Exposure
  40. OWASP Top 10 Vulnerabilities: #5 Security Misconfiguration
  41. OWASP Top10 Vulnerabilities: #4 Insecure Direct Object Reference
  42. OWASP Top10 Vulnerabilities: #3 Cross-Site Scripting
  43. OWASP Top10 Vulnerabilities: #2 Broken Authentication and Session Management
  44. OWASP Top10 Vulnerabilities: #1 Injection Attacks