We exist to close the cyber-security gender gap for BAME women.
We offer cyber-security lecture events and webinars from industry experts and reinvest 35% of our profits on our community projects. To enjoy tailored benefits such as CV review and coaching, sign up to our membership club by subscribing to our Newsletter.
Introduction into Cybersecurity
How it Works: Cybersecurity
Having the proper response plan in place in case of a security breach can stop it from becoming a major disaster. Fast fact: A recent study showed that 70% of U.S. security executives do not have a cybersecurity incident response plan in place. Learn more about how an incident response platform works by seeing what it does when one user’s account is hacked and suspicious activity is detected from that account.
An Introduction into Cybersecurity w/ Stephen Chapendama
Are you curious about a career in cybersecurity but not sure where to start? Do you want to have a better idea of cybersecurity and what it is really about? Are you concerned the regulation of technology and how we can protect people online? If you answered yes to at least two questions, then you should take part to our webinar and learn how you can achieve these goals. ________________________ What do we learn in this Webinar? Guided by Stephen Chapendama (Assistant Systems Consultant @ Hertfordshire University) and Stephanie Itimi (Cyber Analyst @ UK Government), during the 30 MINUTES WEBINAR they will explain: Cybersecurity Fundamentals What skills are needed in Cyber Security Routes you can take into Cybersecurity After the 30 MINUTES WEBINAR: There would be a Q&A in which the audience can participate and ask questions. ________________________ Who is this Webinar for: Individuals with an interest in cybersecurity.
How to learn Ethical Hacking with Python and Kali linux course
Ethical Hacking,Python and Linux Combo course Learn penetration,wifi hacking,ethical hacking,system hacking Requirements Basic IT Skill Description Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area. In the pre-assessment quiz you'll face questions from all sections of this Ethical Hacking training. Test your current knowledge and know your strengths and weaknesses. In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing. You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems. Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network. Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux. Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords — how they're created, how they're stored, and different methods used to crack them. You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover. You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information. Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing. Who is the target audience? Anyone want to learn how to hack
The Internet of Things (IoT) Security w/ Cigdem Sengul
The Internet of Things (IoT) is riddled with flaws. Many of these are systemic; a security flaw in one product will affect every device within that product line. Guided by Cigdem Sengul, Senior Researcher @ Nominet), this webinar provides the foundation of IoT Security.
How to become a Chartered Security Professional w/ Mahbubul Islam
Mahbubul Islam discusses the Institute of Security and the requirements needed to become a Chartered Security Professional, as well as the pros and cons. The future of cybersecurity certification is also discussed, as Mahbubul cites his current work with the UK Cybersecurity Council in developing a new framework of the accreditation.
How to Become a Network Engineer With No Experience?
How to Become a Network Engineer With No Experience? What does it take to be a Network Engineer | Interview with a Sr. Enterprise Network Engineer Questions and answers with a Veteran Network Engineer that has 16 years of enterprise management, design, and implementation experience. Hit me on Twitter at https://twitter.com/dlight330 Install Cisco Packet Tracker 7.0 on Windows 10 https://youtu.be/8qQvq5-i8SE About this Video. In this video I interview a Will Roberts III who has 16 years of experience as a Sr. Enterprise Network Engineer. We cover several hot I.T. topics like, "Are you smart enough to work in the Information Technology field? " I hope you enjoy and I would like to thank Will for taking the time to do this! ------------------------------------------------------------------------------ Here are some helpful books! ****CCNA BOOKS**** 📚CCNA Todd Lammle Study Guide: http://amzn.to/2oLCtXz 📚CCNA Official Cert Guide Library: http://amzn.to/2pdGReM ****A+ BOOKS***** 📚CompTIA A+ Certification All-in-One: http://amzn.to/2odOOEZ 📚CompTIA A+ Exam Cram: http://amzn.to/2p1kvhK ****SECURITY+ BOOKS***** 📚CompTIA Security+: Get Certified: http://amzn.to/2odLEkN 📚CompTIA Security+ All-in-One Exam: http://amzn.to/2ovhoOi -------HOW TO GET CCNA CERTIFIED-------- 100-105 ICND1 Exam Topics Link: https://goo.gl/vd2xJj 200-105 ICND2 Exam Topics Link: https://goo.gl/eiRWe3 ***New Videos Uploaded Every Tuesday*** Du'An Lightfoot on Social Media: https://twitter.com/dlight330 Thanks for viewing, Peace!