podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Vijaykumar Devireddy
Shows
Ethical Hacking
Did you the term surveillance ? How we do it for our organization ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 89 today we're going to discuss about The first part of securing your organization is maintaining a good perimeter defense around your building.Now based on your organization this is going to have different requirements based on what kind of work you do.For example, if you work for the government or the military, you may be dealing with classified information and if that's the case you may see a big eight foot tall chain link fence with barbed wire at...
2022-02-21
07 min
Ethical Hacking
What do you know about Physical Security ?
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 88 today we're going to discuss about Physical security.Physical security is really important to your organization's network security.After all, if an attacker is able to touch your network,your server, or your work stations,they can take control over those devices and do whatever they want with them.While we've been talking a lot in this course about all of the logical protections you can put in place,things like firewalls and intrusion detection systems,router ACLs, passwords, encryption...
2022-01-28
04 min
Ethical Hacking
Other Wireless Technologies that you wanted to know about.....
Hello everyone welcome to the show "Ethical Hacking" episode 87 today we are going to discuss about We just spent a lot of time talking about wireless networks, but there are other wireless networks out there besides Wi-Fi.These include things like Bluetooth,RFID, Near Field Communication, cellular,GPS, and satellite communications.Previously, we've talked about some vulnerabilities with Bluetooth.I want to remind you of two big terms when it comes to Bluetooth.This is bluejacking and bluesnarfing.I'm covering these again because I guarantee you're going to get at least one question on test day about either bluejacking...
2022-01-20
11 min
Ethical Hacking
Wire less Attacks that you need to be aware of.
Hello everyone welcome to the show "Ethical Hacking" episode 86 today we are going to discuss about So we've talked about securing our wireless networks.Let's now spend a few minutes talking about the different types of attacks that focus on our wireless networks.The first is war driving.War driving is the act of searching for wireless networks by driving around until you find them.You could try this tonight. You can go sit in the backseat of your car,have your friend or your wife,drive you around the neighborhood and see which networks you can connect to...
2022-01-13
08 min
Ethical Hacking
Wireless Access point where exactly need to be placed in our organization or our home ?
Hello everyone welcome to the show "Ethical Hacking" episode 85 today we are going to discuss about Wireless access points.In addition to selecting the right encryption,it's also important to select the right placement and configuration of your wireless access points,in order for you to achieve a good security posture.Most small office, home office wireless system rely on a single point to multi-point setup.This relies on having a single access point that services all of the wireless clients.For example, on this floor plan,you can see the strongest signal is the red spot,that's centered...
2022-01-12
11 min
Ethical Hacking
Wireless encryption Explore the vulnerabilities it had before you use it.
Hello everyone welcome to the show "Ethical Hacking" episode 84 today we are going to discuss about Wireless encryption. Another huge vulnerability in wireless networks is the encryption that you choose to use.In this lesson, we're going to do a quick review of wireless encryption types,that you learned back in your Network Plus studies.The reason for this is because encryption of your data being transmitted is going to be paramount to increasing the security of your wireless networks.Now, most wireless encryption schemes rely on a pre-shared key.This is when the access point and the client...
2022-01-11
13 min
Ethical Hacking
How to secure Wi-Fi devices ? How to secure ?
Hello everyone welcome to the show "Ethical Hacking" episode 83 today we are going to discuss about Securing WiFi devices.Wireless devices are much less secure than our traditional networks because their data streams are simply flying through the air,waiting to be gobbled up by some attacker sitting out there.When we talked about wire tapping in the last lesson,we talked about having to gain access to the network physically.Well, with a wireless network that challenge is eliminated because the network is literally floating in the airways.In this lesson we're going to discuss some of the...
2022-01-01
12 min
Ethical Hacking
How to secure network media ?
Hello everyone welcome to the show "Ethical Hacking" episode 82 today we are going to discuss about Securing network media.Network media is the cabling that makes up our network.This can be copper,fiber optic, or coaxial.And they're going to be used as a connectivity method inside of our wired networks.Now, in addition to all the cables there's other parts of the cabling plant we have to think about.All those intermediate devices like patch panels, punch-down blocks,and network jacks all make up this cabling plant that runs throughout our organization.And each part of that...
2021-12-29
21 min
Ethical Hacking
How to secure network devices ? What are network devices ?
Hello everyone welcome to the show "Ethical Hacking" episode 81 today we are going to discuss about Securing network devices.Network devices include things like switches, routers,firewalls, IDS, IPS, and more.Each of these different devices has its own vulnerabilities that have to be addressed.But for the security.we're going to focus on the most common vulnerabilities across all of these different devices.The first vulnerability we're going to talk about is default accounts.These are accounts that exist on a device straight out of the box when you buy it.So for example, if you buy a...
2021-12-27
15 min
Ethical Hacking
How can we secure our Networks ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 80 today we're going to discuss about In this section of the course,we're going to talk about securing your wired and wireless networks.We're going to start out with wired network devices,things like switches and routers,and then we'll move into the cabling that helps put all these networks together.After that, we're going to start talking about wireless networks and how we can better secure them and all the different types of attacks that exist for wireless networks...
2021-12-26
03 min
Ethical Hacking
What is ARP ? Where it will be ? How ARP Poisoning done ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 79 today we're going to discuss about In the last lesson, we talked about the concept of DNS poisoning.In this lesson, I want to cover the concept of ARP poisoning with you fairly quickly.Now ARP stands for the address resolution protocol,like you learned back in Network Plus,and it's used to convert an IP address into a MAC address.If you remember back from Network Plus and our OSI model lesson,as data moves down the OSI stack...
2021-12-25
07 min
Ethical Hacking
What is DNS ? How DNS(Domain Name Server) attacks can be performed ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 78 today we're going to discuss about DNS attacks.There are four different DNS attacks that you have to know for the security.There're DNS poisoning, unauthorized zone transfers,altered hosts files, and domain name kiting.Now, DNS poisoning occurs when the name resolution information is modified in the DNS server's cache.This modification of the data is done to redirect client computers to fraudulent or incorrect websites usually as part of follow-on attacks.The DNS system was designed without a...
2021-12-18
12 min
Ethical Hacking
How Transitive concept is used in Internet Attacks ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 77 today we're going to discuss about Transitive attacks.Transitive attacks aren't really an actual type of attack but more of a conceptual method.It gets its name from the Transitive Property we learned back in mathematics.Essentially, the Transitive Property says that if A equals B and B equals C,then by all logic, A also equals C.Now, when it comes to Security ,and they talk about the idea of a transitive attack,they're really focusing on the idea...
2021-12-12
04 min
Ethical Hacking
What is Replay Attack ? How it is performed...
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 76 today we're going to discuss about Replay attacks.A replay attack is a network-based attack where valid data transmissions are fraudulently or maliciously re-broadcast,repeated or delayed.This works a lot like a session hijack but it's a little bit different.With a session hijack,the attacker is trying to modify the information being sent and received at real time but with a replay attack,we're simply trying to intercept it,analyze it and decid whether or not to let...
2021-12-11
08 min
Ethical Hacking
What is Hijacking ? How it is performed in Internet world & How many types are there ...
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 75 today we're going to discuss about Hijacking, next we have hijacking which is the exploitation of a computer session in an attempt to gain unauthorized access to data,services, or other resources on a computer or server.There are eight types of session hijacking that can be performed.Session theft, TCP/IP hijacking, blind hijacking,clickjacking, Man-in-the-Middle,Man-in-the-Browser, the watering hole attack and cross-site-scripting attacks.The first type of hijacking is known as session theft.With session theft the attacker...
2021-12-09
08 min
Ethical Hacking
How Spoofing can be done or what is it ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 74 today we're going to discuss about Spoofing, spoofing is a category of network attacks that occur when an attacker masquerades as another person by falsifying their identity.Just like a person uses a mask to cover up their face to hide their true identity,spoofing is the electronic equivalent.We have briefly discussed spoofing a few times already,such as in the case of the DNS amplification attack when attempting a distributed denial of service by spoofing the IP address...
2021-12-08
05 min
Ethical Hacking
How to stop DDoS ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 73 today we're going to discuss about We talked about a denial of service attack involving the continual flooding of a victim system with a request for services that causes a system to crash and run out of memory.Now, this usually happens when you're talking about one system attacking one system.But that wasn't enough with modern computers,so we moved up to the distributed denial of service attack,where hundreds or thousands of people target a single server to...
2021-11-28
09 min
Ethical Hacking
What is a Distributed denial of service(DDoS) attack ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 72 today we're going to discuss about In the last lesson we discussed the concept of a denial of service attack,and we went over all of the different types of them, but most modern systems can't be taken down by a single machine attempting a denial of service anymore,so attackers got smarter and they created a distributed denial of service, or DDoS.Now a distributed denial of service attack,instead of using a single attack targeting one server they...
2021-11-23
04 min
Ethical Hacking
What is Denial of Service attack ?
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 71 today we're going to discuss about we're going to focus on the concept of a Denial of Service attack.Now, a Denial of Service attack isn't a specific attack in and of itself,but instead is this category or type of attack that's carried out in a number of different ways.Essentially, the term Denial of Service is used to describe any attack which attempts to make a computer or service resources unavailable,but it can also be extended to...
2021-11-22
17 min
Ethical Hacking
What are Unnecessary ports ? How to close it....
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 70 today we're going to discuss about Unnecessary ports.As we've already discussed,there are a lot of ports available for use by your computers and your networks.We started out with 65,536 ports available back in our ports and protocol lesson.Then, we narrowed it down to 35 port that you just had to memorize in the last lesson.But does that mean that all 35 of those are necessary for your computer to function? Well, the answer is no.When it comes...
2021-11-21
10 min
Ethical Hacking
What exactly ports & protocols does in our laptops...
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 69 today we're going to discuss about In security one of the most important things is to ensure that you understand,what openings you have created in your systems.When it comes to computers and networks,most of these openings are going to be created by ports.Now a port is simply a logical communication endpoint that exists on your computer or your server.For example, if you're running a web server,you're going to have port 80 open and listening for...
2021-11-19
14 min
Ethical Hacking
A small Intro of Network attacks...
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 68 today we're going to discuss about In this section of the course,we're going to discuss network attacks.There are many different types of threats out there and many of them carry out their attacks over your networks.These attacks include things like denial of service attacks,spoofing, hijacking, replays,transitive attacks, DNS attacks,and ARP poisoning.Now, before we get into all of those different types of attacks though,it's important for us to do a quick review of...
2021-08-29
01 min
Ethical Hacking
Defending Servers....
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 67 today we're going to discuss about We have spent a lot of time discussing the cloud in this section.But the cloud is made up of a lot of different types of servers.In this lesson we're going to discuss a few specific types of servers that may be hosted in the cloud,and how you can best secure them.First, we have file servers.File servers are used to store,transfer, migrate, synchronize and archive your files.Any computer...
2021-08-28
10 min
Ethical Hacking
Issues with Cloud and how to secure them.....
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 66 today we're going to discuss about cloud security.Once we begin to rely on virtualization and cloud computing for our deployments,it becomes very important to recognize that our data might be hosted on the same physical server as another organization's data.By doing so, we introduce some vulnerabilities into the security of our systems.First, if the physical server crashes due to something one organization does,it can affect all of the organizations hosted on that same physical server...
2021-08-27
04 min
Ethical Hacking
As a Service that we get over Network from Cloud....
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 65 today we're going to discuss about As a Service. Cloud computing also comes as four different types of services.I like to refer to these by the generalized term of as a service because as you're going to see,everything in the cloud is something as a service.The four types you need to be aware of are Software as a Service,Infrastructure as a Service,Platform as a Service,and Security as a Service.With Software as a Service...
2021-08-26
10 min
Ethical Hacking
Cloud Types...
Hello everyone my name is vijay kumar Devireddy and I am glad to have you back on my episode 64 today we're going to discuss about Cloud computing isn't a single thing though,because there are many different ways to implement the cloud you should know that there are four different cloud types.Public, private, hybrid and community.The most common type of cloud architecture is the public cloud.Under this model, a service provider makes resources available to the end user over the internet.There are numerous public cloud solutions available today,including those from google,Microsoft and Amazon.F...
2021-08-25
04 min
Ethical Hacking
New Trend In IT Industry - Cloud Computing
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 63 today we're going to discuss about Cloud Computing.These days,could computing seems to be the big trend within our industry.But what exactly is cloud computing? Well, cloud computing is defined as a way of offering on-demand services that extend the traditional capabilities of a computer or a network,out into the Internet.With the promise of increased availability,higher resiliency,and unlimited elasticity, the cloud definitely can provide our organizations a lot of advantages over our traditional network...
2021-08-24
06 min
Ethical Hacking
UTM Device Every Solution for your security problem...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 62 today we're going to discuss about Unified threat management,the unified threat management or UTM system is a newer concept that was introduced in the last five to 10 years.Basically, security professionals realized as I'm sure you're realizing now too,that relying on a single firewall is not enough to protect our networks,and so a UTM was created, now a unified threat management system is a combination of network security devices and technologies that are added to a network...
2021-08-04
05 min
Ethical Hacking
NIDS VS NIPS Which is better device ?
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 61 today we're going to discuss about NIDS versus NIPS.Now, we've already spoken a little bit about intrusion detection and intrusion prevention systems earlier on in this course.In this lesson though, we're going to focus on the differences between a network based IDS and a network based IPS.A Network Intrusion Detection System,or a NIDS, is a type of IDS that attempts to detect malicious network activities.For example, port scans and denial of service attacks.Now, this...
2021-08-03
12 min
Ethical Hacking
Data loss prevention (DLP) this is how we inspect the data that is going out of our network...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 60 today we're going to discuss about Data loss prevention.Data loss prevention, or DLP systems,are designed to protect data by conducting content inspection of your data as it's being sent out of your organization's network.While data loss prevention is the most commonly used term,it's also referred to as ILP for Information Leak Prevention or EPS, Extrusion Prevention Systems.Usually these systems are installed as a network based DLP or a Cloud based DLP.For example, my company...
2021-08-02
06 min
Ethical Hacking
What are Honeypots and Honeynets ?
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 59 today we're going to discuss about Honeypots and honeynets.Honeypots and honeynets are used to attract and trap potential attackers to counteract any attempts at unauthorized access to your organization's network.Now, a honeypot is generally a single computer,but it could also be a file, a group of files, or an area of unused IP address space that might be considered attractive to a would-be attacker.A honeynet, on the other hand,is one or more computers, servers,or...
2021-07-27
06 min
Ethical Hacking
Proxy Servers types that we use in these internet world...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 58 today we're going to discuss Proxy Servers.A proxy server is a device that acts as a middle man for your clients.For example, if you're at work and you wanted to connect to ,your work computer's likely going to go from itself, to a proxy server within your company's LAN.And then, that proxy server makes the connection to Dion Training to get the information that you requested.And then it will hand it back to you.This middle...
2021-07-26
09 min
Ethical Hacking
Firewalls first step for your perimeter security...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 58 today we're going to discuss Firewalls. Firewalls are primarily used to section off and protect one network from another.Now when we talk about firewalls, there's three main types.There's software-based, hardware-based,and embedded firewalls.Software-based firewalls are run as a piece of software on a host or a server.In fact, if you're running a Windows server,those have a built-in Windows Firewall that you can enable.Hardware firewalls, on the other hand,are a standalone device that's actually...
2021-07-23
20 min
Ethical Hacking
Perimeter Security A process of securing your devices for outer world
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 57 today we're going to discuss perimeter security.Now, when we talk about perimeter security,we're focused on the outer layer of our defense-in-depth posture for our networks.This is the boundary where we segment our LAN form the WAN and from the internet at large.When we focus on the boundary, or perimeter defenses,we utilize many different devices.In this section, you're going to learn all about firewalls,proxy servers, honey pots and honey nets,data loss prevention systems,network...
2021-07-21
02 min
Ethical Hacking
Telephony Devices that we used to communicate b/w two different computers in way back days...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 56 today we are discussing about Telephony devices.Telephony is a term that's used for a device that provides voice communication to your end users.Originally, telephony was used in networks to make connections with the outside world such us through your modem.So a modem was this old device that we used to use that would allow us to modulate and demodulate digital information into an analog signal that could transmit over a standard dial-up connection. So if you used...
2021-07-13
14 min
Ethical Hacking
Network Address Translation (NAT) this is how private IP address are changed to public IP address....
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 56 today we are discussing about Network Address Translation Network Address Translation or NAT is the process of changing an IP address while it transits across a router.Now, in network plus we discussed how this was used because we wanted to conserve public IP addresses because they were limited in IPv4.In security plus though we are going to gain an additional benefit when we use NAT,we can actually hide our internal networks from attackers.Now, the most commonly...
2021-07-09
10 min
Ethical Hacking
Subnetting a way of using IP address more efficiently...
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 55 today we are discussing about Subnetting.Subnetting is the act of creating subnetworks logically through the manipulation of IP addresses.So if I take a large chunk of IPs,like a 256 block, I can break it down into four blocks of 64 IPs,or eight blocks of 32 IPs, however you want to break it down in your subnetting,which you learned back in Network Plus.Now, subnetting has some benefits to our network. First, it allows us to more efficiently use...
2021-07-08
07 min
Ethical Hacking
Virtual Local Area Networks (VLANS)
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 54 today we are discussing about Switches can also provide the ability to create virtual local area networks.This adds a layer of separation to our networks without requiring us to buy additional switches that have to be configured and installed on the network.VLANs are implemented to segment our network,reduce collisions, organize our networks,boost performance and increase security.Unfortunately attackers have created VLAN hopping which allows them to break out of our VLANs and access other VLAN data...
2021-07-07
10 min
Ethical Hacking
Network Access Control (NAC) Rules that we set for a Network....
Hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 53 today we are discussing about Network Access Control Network Access Control or NAC is used to protect your network from both known and unknown devices.With NAC, a device is scanned to determine its current state of security prior to it being allowed access to your network.Now, NAC can be used for computers that are within your internal network that are physically located in your buildings and connected to it or it can be applied to devices that are...
2021-07-06
15 min
Ethical Hacking
Types of Network Zones that we use ...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 52 today we are discussing about Network Zones When considering the architecture of your internal network,it's important to consider breaking your network up into multiple security zones.These can be further broken up into sub-zones through the use of subnetting,ACLs, firewall rules,and other isolation methods that will help us prevent or shape the flow of data between thedifferent portions of our network.Most networks are segmented into at least three different zones:the LAN, the WAN, and the...
2021-06-21
12 min
Ethical Hacking
Routers which connect two different Internet Protocol address(I.P.)...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 51 today we are discussing about Routers, now while switches operate at layer two of the OSI model by making their decisions based on MAC addresses,routers operate at layer three, making their decisions based on IP addresses.Routers are used to connect two or more network to form an internetwork. Such as when you connect your small office home office router, your internal network,out to the internet.It connects your office's network out to other office's network over the...
2021-06-11
08 min
Ethical Hacking
Switches which work at Data link Layer of OSI Model...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 50 today we are discussing about Switches.Now hubs were originally used to connect devices on a network.All of the devices will be connected to a hub,and anytime something went into one port of the hub,it would then repeat that out all of the other ports.This was known as a broadcast message.Now this is because hubs were dumb.They had no intelligence.As networks got larger,hubs caused a lot of collisions and slowed down the...
2021-06-09
14 min
Ethical Hacking
OSI model this is how two devices can talk...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 49 today we are discussing about The OSI Model.The Open Systems Interconnection,or OSI Model is used to explain how network communications occur between a host and a remote device over a local area network or a LAN.Now the OSI Model is very useful to help use categorize different communication protocols that are used in networks,and gives us a common lexicon that we can use to use to describe the functions of different devices.you probably remember the...
2021-06-06
16 min
Ethical Hacking
A Short intro for Network the ins and outs of it....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 48 today we are discussing about In this episode, we're going to talk about some of the different devices that make up our networks and some of the different attacks that are used against them.But before we do that, we're going to cover quickly the basics of the networks by going through the OSI model.Now in this section of the course,we're going to do this as a quick review because you should have already learned the OSI model...
2021-06-05
08 min
Ethical Hacking
What is Structured Query Language(SQL) Injection ?
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 47 today we are discussing about SQL Injection.What is SQL?SQL, or Sequel, stands for the structured query language.And it's the way that a web application communicates to a database server to ask for information.Because this is the language used to communicate with the databases and the databases hold lotsof valuable information,this has become a popular target for attacks.This brings us to the concept of an SQL Injection,which is an attack consisting of the insertion o...
2021-06-04
11 min
Ethical Hacking
Another two most common vulnerabilities that can be found in web applications XSS & XSRF....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 46 today we are discussing about The next two exploits we're going to discuss are types of web application vulnerabilities.These are known as cross-site scripting and cross site request forgery. Cross-site scripting occurs when an attacker embeds malicious scripting commands into a trusted website.When this occurs the attacker's trying to gain elevated privileges, steal information from the victims cookies or gain other information stored by the victims web browser.During a cross-site scripting attack,the victim is the user...
2021-06-03
08 min
Ethical Hacking
Buffer Overflows the most common Vulnerability that can be found in any application in different forms...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 45 today we are discussing about The next type of exploit that were going to cover is called a buffer overflow.A buffer overflow occurs when a process in a program stores data outside the memory range allocated by the developer.Now, this begs the question, what exactly is a buffer?Well, a buffer is simply a temporary storage area that a program uses to store its data. Let's pretend that you have a glass sitting on a table.It can...
2021-06-02
14 min
Ethical Hacking
Common types of vulnerabilities and exploits that we can found in software products...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 44 today we are discussing about Software vulnerabilities and exploits. Now that we've covered how software should be securely coded,let's cover a few of the exploits that are used against improperly coded programs.First, we have backdoors. Backdoors consist of software code that's been placed in a computer programs to bypass on normal authentication and other securing mechanisms. These are often created by developers themselves in order to make it easier for them to update custom programs in the future...
2021-06-01
12 min
Ethical Hacking
Testing Methods of software products..
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 43 today we are discussing about In this lesson we're going to focus on the different testing methods that you may use to help your organization's developers secure their code.Most security analysts are not programmers themself,so the Security+ exam isn't focused on the specific types of code reviews like pair programming, over the shoulder reviews,and others.Instead the episode focuses on just a handful of testing methods that an entry level security analyst might conduct.The first type...
2021-05-31
13 min
Ethical Hacking
Principles of SDLC that we need to know in-order for secure coding Practices....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 43 today we are discussing about As we move through the seven phases of the software development lifecycle,it's important for not to forget the fundamentals of good security.Our developers should always remember the three tenets of the CIA triad:confidentiality, integrity, and availability.Remember, confidentiality ensures that only authorized users can access the data being processed by an application.The most common of ensuring confidentiality is to include the use of encryption to maintain the secrecy of the data...
2021-05-29
19 min
Ethical Hacking
Commonly used Software Development models in-order to develop software products...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 42 today we are discussing about In this section of the course,we're going to talk about software development.When a piece of software is created, it requires a lot of work.Each and every function that's performed by that software has to be written to be able to do its intended role.This often requires the work of dozens of programmers and hundreds of thousands of lines of code.Often, when a bug is found in a piece of software...
2021-05-28
18 min
Ethical Hacking
Securing Applications with the only features that they provide...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 41 today we are discussing about Securing applications.By far the most commonly used productivity suitein the world is Microsoft Office.This includes Word for word processing,Excel for Spreadsheets, PowerPoint for slide presentation,Outlook for email, and many others.Now, how can we protect the applications themselves,and the files that they create?Well, that's what we're going to cover in this lesson.First, let's talk about the obvious.If you have a document and you want to protect its...
2021-05-27
10 min
Ethical Hacking
Web Browser concerns that we need to know...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 40 today we are discussing about In the last lesson, we covered a lot of the basics of web browser security.In this lesson, we're going to go a bit more in depth and talk about some additional concerns that you need to think about within your organization when we start talking about web browser security.And the first one is cookies.Cookies are text files that are placed on a client's computer to store information about the user's browsing habits...
2021-05-26
10 min
Ethical Hacking
Things to known about Web browser Security...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 39 today we are discussing about Web Browser Security.Your web browser is your gateway to the internet and all of the wonders that it has,but it's also your gateway to the internet and all of the dangers that are out there lurking for you. This is why web browser security is really important.And in our organizations it's becoming more and more important everyday. In the old days when I first got started,if there was a custom application...
2021-05-25
14 min
Ethical Hacking
Intro to the Application Security....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 38 today we are discussing about Welcome to application security.In this section of the course,we are going to move up into the software realm and start looking at the different applications that are used on our desktop devices.These applications bring to us a world of functionality,whether that's browsing the internet,conducting productivity by creating Word documents and spreadsheets, or by doing a host of other things.But each piece of software does introduce additional vulnerabilities to our...
2021-05-21
03 min
Ethical Hacking
How to secure VMs...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 37 today we are discussing about So, now that I scared you with all of the threats that exists against virtual machines let's talk about how we can best secure them.Most of the things that we need to do to secure a virtual machine are very similar to things we need to do to secure a regular physical server too.This includes things like updating your operating system in your applications.Also, you need to ensure that each virtual machine...
2021-05-20
07 min
Ethical Hacking
Hypervisors father of virtual resource creation....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 36 today we are discussing about When using virtualization, each emulated server runs its own operating system inside of a virtual machine, but the virtual machines are run on top of what's known as a hypervisor.A hypervisor may adjust the distribution of the physical resources of the server to the virtual machines.This includes the processor, the memory and the hard disk space.Hypervisors come in two distinct flavors,Type 1 and Type 2. A Type 1 hypervisor is known as bare metal...
2021-05-19
10 min
Ethical Hacking
Threats that are associated with Virtualization....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 35 today we are discussing about While virtualization brings with it a lot of capability to add separations inside of our servers and bring in some additional security,there are some unique vulnerabilities that can be exploited by attackerswhen it comes to virtualization.These include VM escape, data remnants,privilege elevation and live VM migration.Virtual machines are segmented and separated by default so if an attacker is able to exploit the operating system being run inside one virtual machine,it...
2021-05-18
09 min
Ethical Hacking
Virtualization A door for excessive power...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 34 today we are discussing about Welcome to this episode on virtualization.Up to this point in the course,we've talked about a lot of different types of hackers and malicious software that are attempting to affect our systems.Then we started talking about how you can secure your hardware.And in the last section,we discussed securing your operating system.Now, we're going to talk about how you can use virtualization to emulate your physical hardware in order for you...
2021-05-16
07 min
Ethical Hacking
File Systems and Hard drives...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 33 today we are discussing about File systems and hard drives.Another aspect of hardening your operating system is determining exactly what file system it should utilize.The level of security of your system is effected by its file system type.There are many different file systems available to choose from.We have things like NTFS, FAT32,ext4, the Hierarchical File System Plus,and the Apple File System.Windows systems can utilize either NTFS or FAT32 file systems.It's highly recommended...
2021-05-15
15 min
Ethical Hacking
Group Policy An Administrative control....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 32 today we are discussing about Group Policies.A Group Policy is a set of rules or policies that can be applied to a set of users or computer accounts within an operating system.Now, to Access the Group Policy Editor simply go to the run prompt and enter gpedit.The Local Group Policy editor will then launch and this is used to create and manage policies within a Windows environment.Each policy acts as a security template that can apply...
2021-05-14
13 min
Ethical Hacking
This is how an organization Uses Patch Management System to update their devices....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 31 today we are discussing about What is patch management?Patch management is the planning, testing,implementing, and auditing of software patches.Why is patch management so important?Well, there are a lot of patches out there.Each manufacturer is going to create their own patches for their own applications.Part of patch management is keeping track of all of the various updates, and ensuring that they get installed properly throughout your environment.But it's also important to have a patch...
2021-05-09
13 min
Ethical Hacking
What is Updates and Patches What is the difference ?
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 30 today we are discussing about In order to maintain the security of our software, it's important for us to implement updates and patches.But, what exactly is a Patch? A patch is a single problem-fixing piece of software designed for an operating system or an application.Essentially, when we find a bug in the code,this is going to create a problem for us.And a patch is used to correct it.You may have also heard the term Hotfix...
2021-05-08
12 min
Ethical Hacking
On what basis we need to select the Operating system(O.S) that we want to use in our devices.....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 29 today we are discussing about Large organizations like the Federal Government process a lot of sensitive information,and they want to ensure that their operating systems are truly trusted.To provide organizations with a level of assurance, the classification of a Trusted Operating System was created.A Trusted Operating System is any operating system that meets the requirements set forth by the government and it contains multilevel security.For the Security+ exam,you don't need to learn the specific requirements...
2021-05-07
08 min
Ethical Hacking
How Unnecessary Application are eating Up your disk space and making your laptop vulnerable in the Internet world
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 28 today we are discussing about Let me ask you a question.How many applications do you have installed on your computer right now?Now I don't mean how many are currently running.But how many exist on your computer in total?Do you have five? 50? 500? Or maybe more?Each application that's installed on your device takes up valuable disk space,but more importantly, it introduces additional code and therefore additional vulnerabilities.To combat this system administers attempt to practice known...
2021-05-05
13 min
Ethical Hacking
10 Best Ways To secure your mobile devices....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 27 today we are discussing about In this episode we're going to discuss the 10 best ways to increase the security of your mobile devices.This is known as mobile device hardening.Number one, update your device to use the latest version of the software, whether this is your operating system,your apps or your firmware,you should always be updating it.By updating it, you're making sure that you have all known vulnerabilities patched and secured.Just like your desktop,most...
2021-05-04
09 min
Ethical Hacking
BYOD OR CYOD which does your organization use....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 26 today we are discussing about Bring Your Own Device is a policy that a lot of organizations have been adopting.This means when you come to work,you can bring your own device, and use it on their network.This may be your laptop, your tablet, your cellphone,keyboards, mice, or any other type of device.Some organizations have fully adopted Bring Your Own Device,and others are fully against it.We're going to talk about both,and why you...
2021-05-03
14 min
Ethical Hacking
How You are going to secure your Mobile Devices from App that was not developed by you ?
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 25 today we are discussing about Security of Apps.How do you know the app you want to install is secure?How do you know it's not going to be spying on you?How do you know there's no malware embedded in it?Well, you don't.But the best way to ensure that you don't get those type of things is by installing applications from the official mobile stores only.If you're using an Android device,that's the Google Play store...
2021-05-01
20 min
Ethical Hacking
What happens if you lost your mobile device which stores your valuable information.....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 24 today we are discussing about Mobile devices are an increasingly large part of our life.They are doing everything with us these days.When we're on travel, we have 'em with us.And sometimes if we're not careful, someone can steal 'em. For example, this guy's about to get his iPad stolen out of his backpack.It's not going to be a very good day for him.Now, we have to think about all of the data that's on that...
2021-04-30
18 min
Ethical Hacking
How Attacker's get into your devices over bluetooth.....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 23 today we are discussing about Bluetooth attacks.In this lesson, I want to talk about wireless connectivity and some of the attacks that go against it,specifically we're not going to focus on the 3G, 4G or LTE cell phone part of it,we're going to focus on Bluetooth.Now, when we talk about Bluetooth,there are two terms that you have to know for the exam.Bluejacking and bluesnarfing.Bluejacking is sending unsolicited messages to Bluetooth-enabled devices.This often...
2021-04-29
09 min
Ethical Hacking
SIM Cloning and ID Theft How it happens....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 22 today we are discussing about SIM cloning and ID theft.If you've gone and bought a new cell phone recently,you've gone to the store, they've pulled out a little chip our of your phone and placed it into your new phone.What is that chip? Well, that's a SIM card.It's stands for subscriber identity module.This is an integrated circuit that securely stores the international mobile subscriber identity, your IMSI number,and its related key.This is what...
2021-04-28
15 min
Ethical Hacking
How To Secure Mobile devices from mobile malware out there....
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 21 today we are discussing about These days we work all over the place.We're not just stuck in our cubicles behind a computer.Instead we can be working no matter where we are.When I'm sitting in the line at the grocery store,I can be checking my email and answering student questions.If I'm sitting on an airplane,I can be texting to my friend while I'm at 35,000 feet. Mobile devices are great and they give us a lot...
2021-04-27
19 min
Ethical Hacking
How To Secure Wireless devices that we are using...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 20 today we are discussing about We all use wireless devices these days.Whether it's your laptop, your tablet, or your smartphone,all of these have the ability to communicate wirelessly.How can we best secure these devices?Well, there's two main things we have to think about when we talk about wireless with these devices:wifi and Bluetooth.First, wifi, is there internet connectivity? If we're using wifi, we want to make sure the wifi is set to be protected...
2021-04-23
09 min
Ethical Hacking
How Encryption helps us to secure our hard disks in which we will store our precious information...
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 19 today we are discussing about Disk encryption, encryption is a process that scrambles data into unreadable information.It does this to ensure that nobody can read it,except the person who holds the secret key.This ensures confidentiality.If you have the key you can unlock that randomized data and translate it back into something readable.Think about it like a magic machine.The information goes in one side,and out the other side comes a jumbled mess.Without that...
2021-04-21
18 min
Ethical Hacking
Securing Storage Devices
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 18 today we are discussing about Securing the storage Devices There are a lot of ways to store data in your network and on your computers.In addition to your internal hard drive,most computers have the ability to use removable media as well.Removable media comes in many different formats.In the old days, we had our simple floppy disks.Then we moved up to CDs and then DVDs and those held a lot more information.Next, we had external...
2021-04-20
16 min
Ethical Hacking
Securing Basic Input Output System(BIOS)
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 17 today we are discussing about Securing the BIOS.What is the BIOS?Well, if you remember back to your CompTIA A plus studies,BIOS is a type of firmware which is software on a chip.The BIOS stands for the basic input output system..It's firmware that provides the computer's instructions for how it's going to accept input and send output.So anytime the motherboard is going to talk to a keyboard,a mouse, a network card, a hard drive...
2021-04-19
16 min
Ethical Hacking
For Keeping your information under your control use Data Loss Prevention(DLP) tool.
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 16 today we are discussing about Data loss prevention.Data loss prevention is set up to monitor the data of a system while it's in use,in transit, or at rest.It does this, in order to detect any attempts to steal the data.Let's think about when we had data stored,20 or 30 years ago.Where did they store most of it?Well, most businesses stored it printed off,and in a filing cabinet.And if somebody wanted to get it...
2021-04-18
15 min
Ethical Hacking
POP UP's how Dangerous they are .......
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 15 today we are discussing about If you're like most people,at some point during your internet surfing,you've come across and window that has a pop-up jump up in front of your browser.Usually, this is something trying to grab your attention like an ad or something else that they want you to click on.Now, while this is annoying,it can also be dangerous to your machine.And we're going to talk about that in this lesson.First, let...
2021-04-15
15 min
Ethical Hacking
Intrusion Detection System (IDS) a true security software guard for our laptops
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 14 today we are discussing about What is an IDS?Well, an IDS stands for the Intrusion Detection System.This is a device or a piece of software that's installed on a system or a network,and it will analyze all of the data that passes through it.It does this so that it can try to identify any incidents or attacks.Intrusion Detection Systems come in two different varieties,the host-based Intrusion Detection System and the network-based Intrusion Detection System.T...
2021-04-14
18 min
Ethical Hacking
Firewalls which help to secure in the internet world
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 13 today we are discussing about firewalls and we will be talking about them from a network perspective where they were dedicated pieces of hardware that sat at the edge of your network and controlled what went in and what went out. we're going to talk about personal firewalls.These are software based applications that protect just a single computer or server from unwanted internet traffic.Now these are also referred to as host-based firewalls.These firewalls work by applying a...
2021-04-09
14 min
Ethical Hacking
Preventing malware in order to stop infecting our electronic machines which has the internet facility
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 12 today I am going to give you a couple of tips on how to prevent malware from infecting your system.This includes malware like viruses, worms, Trojans,ransomware, spyware, rootkits, and spam.Let's talk about viruses first, viruses are most commonly detected using a good antivirus software.These can be either third-party solutions like Norton or McAfee, or using the included Windows Defender from your operating system.In addition to antivirus software,you'll also want to make sure that you're...
2021-04-07
17 min
Ethical Hacking
How to get rid of malware from our electronic device which has the internet facility
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 11 today we are going to discuss about Once you've identified that there's a symptom of malware that may be existing on your computer what should you do about it? Well, the first thing you should do is scan the computer to see if there's actually malware on it. In this case we have a virus that's been detected.How are we going to clean out that system from this virus or other types of malware? Well, before we take any...
2021-04-06
14 min
Ethical Hacking
How to identify the symptoms of malware on our electronic system
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 10 today we are going to discuss about Symptoms of Infection.How do you know your computer has been infected with malware? Well, the most common thing is to notice that it starts beginning to act strange. That could be a myriad of different things, though. For example, your computer might start running slower than normal.Why might this occur? Well, if you have a worm for example, it's using up processor resources and network resources to spread itself throughout the...
2021-04-05
14 min
Ethical Hacking
What are Backdoor & Logic bombs
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 09 today we are going to discuss about Backdoors and logic bombs.A backdoor was originally placed in computer programs to bypass the normal security and authentication functions. Now, if this sounds like a horrible idea to you, it really is, and it's a horrible security practice. This is something that was originally created back in the 80's, by manufacturers and programmers as a way for them to get back into the system to do maintenance and repairs, without having to...
2021-04-04
14 min
Ethical Hacking
What is Active Interception and Privilege Escalation
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 08 today we are going to discuss about Active Interception and Privilege Escalation.What is active interception? Active interception occurs when a computer Is placed between your sending computer and your receiving computer.Because of that position it's able to capture or modify the traffic that's going between the two computers. Now what does that really mean? We'll let's take a field trip. You and I are going to go meet at the local coffee shop. You're going to bring your...
2021-04-03
06 min
Ethical Hacking
What are Botnets and Zombies
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 07 today we are going to discuss about Botnets and zombies. What happens to your computer if it becomes the victim of a botnet? Well, let's say that your computer has picked up some kind of malware and that malware, it's purpose is to change your computer into it's victim, into what we call a zombie. That's right, a zombie becomes part of the botnet and a botnet is simply a collection of compromised computers under the control of a master...
2021-04-02
08 min
Ethical Hacking
Common Delivery methods for malware to get into your system
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 06 today we are going to discuss about Common Delivery Methods of malware and how do they get into your machines .There are number of ways that your computer can get infected with malware. But by far, the most common ones come from software, messaging, and media. Software and messaging are things like email programs, peer- to-peer networks like BitTorrent, FTP servers, and pretty much any other way that we communicate from one computer to another. When I'm talking a...
2021-04-01
11 min
Ethical Hacking
Intro to Malware Infections
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 05 Today we're going to talk about malware infections,malware doesn't just appear on your computer.It doesn't just show up out of thin air.Somebody has to deliver it somehow and install it on your machine.Malware can be delivered in lots of different ways,including through software,messaging and media,from a botnet or zombies.It can have activate interception that's going to put malware into your network,or it can have a privilege escalation.Where somebody goes from...
2021-03-30
08 min
Ethical Hacking
History of cryptography
hello everyone my name is vijay kumar devireddy and i am glad to have you back on my episode 04 well we had discussed about cryptography and how it helps us to protect the information in the internet world in this episode we are going to discuss about how it had evolved . for that we will jump into the history to know it briefly . Sending secret messages has been a documented human activity for thousands of years. The earliest example I am aware of can be found in the bible, from approximately 2600 years ago. it was named as The AT BASH cip...
2020-12-25
08 min
Ethical Hacking
Protect your information in the internet world with the help of cryptography...
hello every one my name is vijay kumar deviredy and i am glad to have you on my episode 03 today we are going to disscuss about how to protect your information in the internet world with the help of cryptography before going into deep let see where it is started with little drama. In 1586, Mary, Queen of Scots,was convicted of treason against Queen Elizabeth.She was found guilty of plotting to overthrow the English monarch,and not long afterwards she was beheaded.Did you know that the evidence that convicted her was obtained by the English spymaster's ability to br...
2020-12-24
04 min
Ethical Hacking
Malwares how they act as a middle man ??
malware is short term of malicious software. ▪ it is kind of Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent. we had different types of malware as well such as • Viruses • Worms • Trojan horses • Ransomware • Spyware • Rootkits • Spam Viruses o Virus ▪ Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed ▪ Viruses require a user action in order to reproduce and spread • Boot sector o Boot sector v...
2020-12-23
14 min
Ethical Hacking
Hackers what they do !!!
How many types of hackers we have white hat,balck hat, blue hat, elite, script kiddie and what they do with your information ??
2020-12-22
07 min
Ethical Hacking
Welcome to the ethical world!
What is ethical I am saying what everyone says....
2020-12-21
01 min