Stephen HasfordDiscover Cybersecurity Talents Without Certifications."I believe that HR or hiring managers should not solely rely on certifications during the hiring process, but rather consider the…Feb 11Feb 11
Stephen HasfordVolatility Commands for Basic Malware Analysis: Descriptions and ExamplesCommand and DescriptionDec 22, 2023Dec 22, 2023
Stephen HasfordCorporate Cybercrime Policies, Procedures and InvestigationsOverview of CybercrimeOct 2, 2022Oct 2, 2022
Stephen HasfordHow to Analyse a Windows 10 Workstation for Digital ForensicsIn this episode I will show you how to perform a Digital Forensics Analysis of a compromised Windows 10 Workstation.Sep 21, 2022Sep 21, 2022
Stephen HasfordEthical Hacking | Exploiting Apache Tomcat Port 8180In this episode, we will exploit the apache tomcat version 5.5 service running on port 8180 to get a meterpreter session of the server…Sep 21, 2022Sep 21, 2022
Stephen HasfordEthical Hacking | Exploiting FTPThis course is for individuals interested in learning ethical hacking or penetration testing skills. It also serves as an exam preparation…Aug 28, 2022Aug 28, 2022
Stephen HasfordEthical Hacking | Network ScanThis course is for individuals interested in learning ethical hacking or penetration testing skills. It also serves as an exam preparation…Aug 28, 2022Aug 28, 2022
Stephen HasfordIncident Response using IBM QRadar — WalkthroughIn this episode, we will respond to an incident using IBM QRadar SIEM by investigating a compromised network. Let demonstrates how soc…Aug 28, 2022Aug 28, 2022