top of page
Log In
Home
Member
Subscribe
Cyber Range
Webinars
Awards
CNE TV
Courses
On-Demand Courses
Apply for Credentials
Shop
Community
Knowledge Base
Jobs
The Book
Spotlight
Forum
Groups
About
Meet the Team
Contact
SOC Analyst FAQ
More
Use tab to navigate through the menu items.
Welcome
to Webinars
Premium content for premium members
Subscribe
Webinars
$
Subscribe
Subscribe
18:06
How cybersecurity began to what you need to know today
The speaker recounts their journey in cybersecurity, starting as a mischievous teenager experimenting with hacking and eventually becoming involved in the IRC and Yahoo chat room communities. They attended cybersecurity meetups, including a defunct one at Lennox Mall and another at Auburn, before meeting industry peers online. Pursuing a career, they earned a Bachelor's degree from DeVry, partly online in Hawaii, and engaged with the Information Security Podcast community. The speaker highlights the evolution of the industry, from the early days of cybersecurity "rock stars" to the current emphasis on soft skills and cultural fit for entry-level positions, despite the abundance of training resources and advanced technology.
$
Subscribe
Subscribe
12:31
KevTechIT - Active Directory Tutorial
Follow along with Kevin as he explains an Active Directory tutorial in this help desk series.
$
Subscribe
Subscribe
59:23
How To Hack A Car Webinar
Join us and Dr. Bryson Payne as he explains how to hack a car!
$
Subscribe
Subscribe
09:31
Approach your Career in Increments (if you have to).
Approach your career in increments (if you have to).
$
Subscribe
Subscribe
09:33
Basics of the Internet and Cybersecurity
Understanding the basics of the internet and cybersecurity with Michael Archuleta.
$
Subscribe
Subscribe
09:26
Fundamentals of Cloud Computing
This is a video from Cloud Security NOW! and it explains the fundamentals of Cloud Security.
$
Subscribe
Subscribe
04:02
How to setup a live phishing website
In this video I will show you how to easily set up a real live phishing website in the cyber range using the Social-Engineering Toolkit.
$
Subscribe
Subscribe
07:05
Accessing the Dark Web
This video shows you how to access the dark web using TOR.
$
Subscribe
Subscribe
24:05
Introduction to Splunk and Security Analysis
This video introduces Splunk and demonstrates live security analysis of attacker data inside Splunk.
Load More
bottom of page