Boolean Math using XOR Logic

Boolean Math (XOR Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time will be on the XOR logic.  The XOR stands for exclusive OR, and we will go ...
Professionally Evil Fundamentals: Introduction

LD_PRELOAD – Introduction

    Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is related to Linux based systems and revolves around the loader system and ...
2021 MSSE Cloud Security Elective

2021 MSSE Cloud Security Elective

| | MSSE, Tech Teaching, training, UMN
Members of the University of Minnesota’s MSSE Class of 2021: I am offering a Cloud Security elective based on the Coursera Cloud Security specialization currently under development. The first course, Cloud Security Basics, ...

Lessons From Teaching Cybersecurity: Week 2

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a ...
Professionally Evil Fundamentals: Introduction

Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things.  However, to me, these terms could mean the same thing too.  A ...

Lessons From Teaching Cybersecurity: Week 1

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a ...

Helping Inspire the Next Generation of Cybersecurity Professionals

| | Cyber Security, education, training
If you had asked 10 year old Tyler what he wanted to be when he grew up, the answer would have been a very enthusiastic, “Teacher!” Over time, however, that desire lessened ...
Android Virtual Device for a Mobile PenTest

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...
Socially Engineered - Humans

Socially Engineered – Humans 

In This Issue: "Socially Engineered —Humans". From Fortune 500 companies, to kids and retirees, and everyone in between, we are all potential targets of social engineers. In this newsletter we examine social ...

Video: TryHackMe – Behind the Curtain

Watch Now for Your Very Own Backstage Pass! Video and Slide Deck from EH-Net Live! Aug 2020 With the growing need for security professionals, a huge number of people are flooding the ...