• Explore
  • Curator's Pick
  • Login
  • Sign up
stem stemsocial hive-130906 neoxian archon waivio nature natureobserver insect waiv science ecency palnet hive-196387 ctp proofofbrain programming steemstem discovery-it cent amazingnature photos flower technology hive-111030 vyb physics education chessbrothers scifimultiverse math hive-128780 hive security scifiverse photography calculus spanish pob threespeak

#security

avatar
@scipio 0
about 24 hours ago
StemSocial
Learn Ethical Hacking (#35) - Cloud Security - AWS Attack and Defense Learn Ethical Hacking (#35) - Cloud Security - AWS Attack and Defense What will I learn Why cloud changes the attack surface -- shared responsibility, identity-first security, an
411
0
1
237.268 STEM
avatar
@scipio 0
2 days ago
StemSocial
Learn Ethical Hacking (#34) - Pivoting and Lateral Movement - Spreading Through Networks Learn Ethical Hacking (#34) - Pivoting and Lateral Movement - Spreading Through Networks What will I learn What pivoting is and why the first compromised machine is rarely the fi
22
0
0
190.974 STEM
avatar
@scipio 0
3 days ago
StemSocial
Learn Ethical Hacking (#33) - Active Directory Attacks - The Crown Jewels Learn Ethical Hacking (#33) - Active Directory Attacks - The Crown Jewels What will I learn What Active Directory is and why it is the single most valuable target in enterprise n
28
0
0
226.931 STEM
avatar
@scipio 0
4 days ago
StemSocial
Learn Ethical Hacking (#33) - Active Directory Attacks - The Crown Jewels Learn Ethical Hacking (#33) - Active Directory Attacks - The Crown Jewels What will I learn What Active Directory is and why it is the single most valuable target in enterprise n
570
0
1
278.626 STEM
avatar
@scipio 0
5 days ago
StemSocial
Learn Ethical Hacking (#32) - Privilege Escalation - Windows Learn Ethical Hacking (#32) - Privilege Escalation - Windows What will I learn Windows privilege model -- local accounts, service accounts, SYSTEM, and the difference between Adm
500
0
1
272.613 STEM
avatar
@scipio 0
6 days ago
StemSocial
Learn Ethical Hacking (#31) - Privilege Escalation - Linux Learn Ethical Hacking (#31) - Privilege Escalation - Linux What will I learn What privilege escalation is and why it is the single most critical post-exploitation step; **SUID/
23
0
0
259.322 STEM
avatar
@scipio 0
9 days ago
StemSocial
Learn Ethical Hacking (#30) - Wireless Network Attacks - Breaking Wi-Fi Learn Ethical Hacking (#30) - Wireless Network Attacks - Breaking Wi-Fi What will I learn Wi-Fi security protocols : WEP, WPA, WPA2, WPA3 -- what is broken and what is not; **Mo
353
0
1
236.592 STEM
avatar
@scipio 0
10 days ago
StemSocial
Learn Ethical Hacking (#29) - Network Sniffing - Seeing Everything on the Wire Learn Ethical Hacking (#29) - Network Sniffing - Seeing Everything on the Wire What will I learn Packet capture fundamentals with tcpdump and Wireshark; ARP spoofing : becom
28
0
0
230.339 STEM
avatar
@scipio 0
11 days ago
StemSocial
Learn Ethical Hacking (#28) - The AI Web Attack Surface - AI Features as Vulnerabilities Learn Ethical Hacking (#28) - The AI Web Attack Surface - AI Features as Vulnerabilities What will I learn Prompt injection : the new SQL injection for AI-powered applications;
347
0
1
238.253 STEM
avatar
@themarkymark 0
12 days ago
security
Tan Stack Scanner If you heard of the shai hulud exploit, you know how serious this is. Another supply chain attack hit and this one is rough. If attacked
394
20
6
13.134 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap