This week: Security 101
You may already know about pen testing. You might have even dabbled in some other White Hat hacking. This week, we talked about a variety of security topics that should be of interest to any IT pro.
Even authentication methods can be at risk of attacks. Learn about six cryptographic attacks that can specifically target your system(s) authentication.
There's a malicious way to hack. There's an ethical way to hack. And not surprisingly, there's a gray area, too. We covered the differences between white, black, and gray hat hackers.
There's network security, and then there's securing your physical assets — from the office building to the employees. Learn about several essential physical security controls and why they matter.