training

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has…

3 weeks ago

Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a…

4 weeks ago

Boolean Math (NOT Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re going to take a…

1 month ago

The Death and Rebirth of Musashi.js OR How I turned personal failure into better teaching tools.

A little background… As I stood in front of a class of developers trying to explain cross-origin resource sharing (CORS),…

2 months ago

Boolean Math (XOR Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time will be on the…

2 months ago

LD_PRELOAD – Introduction

Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…

2 months ago

2021 MSSE Cloud Security Elective

Members of the University of Minnesota’s MSSE Class of 2021: I am offering a Cloud Security elective based on the Coursera…

2 months ago

Lessons From Teaching Cybersecurity: Week 2

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a…

2 months ago

Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things. …

2 months ago

Lessons From Teaching Cybersecurity: Week 1

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a…

2 months ago