resource header

Canadian Cyber Defence Challenge

Student Resources

Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.
Understand the ins and outs of Windows Task Scheduler
Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.
Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily. GPO's or Group Policy Objects are the actual Security Policies that will be assigned.
The Windows Firewall is a security application created by Microsoft and built into Windows, designed to filter network data transmissions to and from your Windows system and block harmful communications and/or the programs that are initiating them.
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Hashing Algorithms are used to ensure file authenticity
Secure Hashing Algorithm (SHA1) explained.
How SSL/TLS ensure confidentiality, integrity, and authenticity to secure communications over a network. This video explains Certificates of Authority (CA), public and private keys, the recent POODLE Attack of October 2014, and the common exploits of SSL.
Explanation of asymmetric encryption, the principle of Public/Private Key Cryptography.
End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea?
How do we exchange a secret key in the clear? Spoiler: We don't
The the key to all those cool Javascript and AJAX affects is found in understanding what the document object model is - in short, we call this the DOM.
How to manipulate the DOM using Javascript
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server.
Explanation of cross site scripting and the importance of sanitizing user input on a website.
Today's computers have tons of processing power, but are those resources being used efficiently? Not really, if only a single computer is run on a single set of computer hardware. With computer virtualization multiple virtual machines can be run on a single host computer this leads to increased efficiency and multitasking while improving manageability, sustainability, availability, and security.
Installation of VirtualBox and setting up a Linux Ubuntu virtual machine on your host computer.
Learn and practice security concepts in the form of fun-filled games.
Powershell is a versatile tool for configuring windows clients.
Technical documentation for IT professionals using Microsoft products, tools, and technologies.
A free online course to introduce some key concepts to Cyber Security and help protect your digital life.
How to create and use virtual machines with VirtualBox
Security Awareness for Teens
A list of resources to help you prepare for the Cyber Defence Challenge
This guide explains what your team can expect at the Cyber Defence Challenge event.
The forwarding of IP packets by routers is called IP routing. In this lesson, you will learn the steps a router has to perform to forward an IP packet.
A video series is intended to help you gain an understanding of fundamental network concepts. It includes IP addressing, binary math, address classes., CIDR notation, what a subnet is, how to subnet, and supernetting.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
The transmission control protocol (TCP) provides an additional level of naming that helps organize data transfer between computers connected to the internet.
What is a three-way handshake in TCP? What is flow control? What is a syn and an ack as part of the three-way handshake?
Explains the basics of transport protocols and compares the two major options: UDP and TCP.
A series of videos about DNS, the Domain Name System. We'll start from the basics (terminology and how DNS is structured), take you step-by-step through actual DNS queries using common tools such as nslookup and dig, and finish with setting up a DNS server.
In this beginner tutorial, we demonstrate capturing packets with Wireshark. Protocols that are analyzed are Telnet, SSH, FTP, and HTTP web traffic.
The Swiss Army Knife of Network Tools
A video series introducing Nmap, an open-source security scanner used to discover hosts and services on a computer network, thus building a "map" of the network.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Introduction into Windows Firewall, differences between public, private and domain profiles. Some general do's and dont's to secure your Windows Server.
Remote Desktop Protocol (RDP) is a tool inside Windows that lets you connect to computers via a remote connection.