Course #1 Hardware Assembly

●Learn the components of an embedded system.   ●how to assemble the embedded system   ●How to solder   ●Make your own custom IOT device Discus ways that system can be expanded to do more Cost for the hardware is $25 one time fee. Includes an embedded system with ram, CPU, wifi, usb, ethernet, power cable, connection cables, SD card, and case
Read More

Internet Privacy Rule is dead. Now what?

Congress killed the FCC privacy rules that would restrict ISP from selling your data. Come out this Sunday and we'll have a double presentation that will touch into the policy and why it hurts all customers. We'll also talk about how to protect, or at least make it harder for ISPs to track your online activity.
Read More

Cyber Hunt

Main topic notes: Talk about the current and new threats emerging on the front lines of cyber. Lets also talk about Cyber Hunting!! Today’s threats demand a more active role in detecting and responding to sophisticated attacks. Traditional security measures like firewalls, IDS, endpoint protection, and SIEMs are only part of the network security puzzle. Cyber Threat Hunting refers to proactively and iteratively searching through networks and datasets to detect threats that evade existing automated tools. It includes using both manual and machine-assisted techniques, and aims to find the Tactics, Techniques and Procedures (TTPs) of advanced adversaries. Hunting goes beyond rule or signature-based detection and instead utilizes a hypothesis-driven approach is often supported by behavioral analytics. From large corporations to SMBs, there are many levels of hunting maturity, but many organizations are already hunting for threats…
Read More

How to get Paid PenTest Tools for free

Main topic notes:  Learn about the tools in the industry and how to get them.  Nexpose, nessus, metasploit pro, cobalt strike, qualys, etc. ------------- Learn how to setup and install VM (virtual Machines) and to get yourself a platform to run on. ------------- Intro to Kali linux, what is it what it does and where to start. ------------- Software that runs on the common ports. SSH, FTP, SMTP, HTTP, etc. 22,21,25,80 What to bring: Bring your computer/mac/pc whatever if you want help setting up a virtual machine platform to start using tools and learning them. Agenda: Bypassing Easter Sunday Vote on meeting a week before or after??
Read More