Network security
Network security
What is zero trust architecture (ZTA)? Pillars of zero trust and trends for 2024
Explore the essentials of Zero Trust Architecture, its impact on cybersecurity in 2024 and how it shapes modern digital security strategies.
Network security
A deep dive into network security protocols: Safeguarding digital infrastructure 2024
Explore the vital role of network security protocols in safeguarding digital infrastructure in 2024, covering types, trends and best practices.
Network security
Asset mapping and detection: How to implement the nuts and bolts
Learn how to approach asset mapping and detection.
Network security
The Pentagon goes all-in on Zero Trust
With a four-year deadline to meet, how will the military and defense sector respond to the Pentagon’s zero-trust mandate?
Network security
How to configure a network firewall: Walkthrough
Learn the basics of configuring a network firewall in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.
Network security
4 network utilities every security pro should know: Video walkthrough
When can a certain network utility do the most good for you? Learn how and when you can use Ping, Netstat, Traceroute and ARP in this video.
Network security
How to use Nmap and other network scanners
Learn how to use free network scanning tools like Nmap, Zenmap and Advanced Port Scanner in this episode of Cyber Work Applied.
Network security
Security engineers: The top 13 cybersecurity tools you should know
Security engineers utilize a range of tools to prevent cyber threats. These are the top 13 tools security engineering industry leaders are using now.
Network security
Converting a PCAP into Zeek logs and investigating the data
Learn how to better understand the Zeek log file structure and how to use the logs when investigating events.
Network security
Using Zeek for network analysis and detections
Learn about how to use Zeek, a free, powerful open-source network traffic analyzer.