we’ve just posted some interesting (and free) tutorials on data security, SQL injection attacks and data analysis techniques in Wireshark. From the first video you’ll learn why ensuring and maintaining confidentiality, integrity and authenticity of data is the main purpose and role of computer security policies. Second video presents one of the most popular attack vectors, frequently exploited by attackers. Last two videos cover some of useful wireshark-related techniques. There’s more to come in next blog posts, so feel free to visit us again soon.
[ Advertisement ]